Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2020-0543 (GCVE-0-2020-0543)
Vulnerability from cvelistv5
Published
2020-06-15 13:55
Modified
2024-08-04 06:02
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Information Disclosure
Summary
Incomplete cleanup from specific special register read operations in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Intel(R) Processors |
Version: See provided reference |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T06:02:52.330Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00320.html" }, { "name": "USN-4385-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/4385-1/" }, { "name": "USN-4388-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/4388-1/" }, { "name": "openSUSE-SU-2020:0818", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00025.html" }, { "name": "USN-4392-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/4392-1/" }, { "name": "USN-4393-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/4393-1/" }, { "name": "USN-4389-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/4389-1/" }, { "name": "USN-4387-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/4387-1/" }, { "name": "FEDORA-2020-3364913ace", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NQZMOSHLTBBIECENNXA6M7DN5FEED4KI/" }, { "name": "FEDORA-2020-e8835a5f8e", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T5OUM24ZC43G4IDT3JUCIHJTSDXJSK6Y/" }, { "name": "USN-4390-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/4390-1/" }, { "name": "USN-4391-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/4391-1/" }, { "name": "FEDORA-2020-11ddbfbdf0", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DT2VKDMQ3I37NBNJ256A2EXR7OJHXXKZ/" }, { "name": "[oss-security] 20200714 Flatcar membership on the linux-distros list", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2020/07/14/5" }, { "name": "openSUSE-SU-2020:0965", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00024.html" }, { "name": "openSUSE-SU-2020:0985", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00031.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-534763.pdf" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10318" }, { "name": "FEDORA-2020-1afbe7ba2d", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GRFC7UAPKAFFH5WX3AMDUBVHLKYQA2NZ/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Intel(R) Processors", "vendor": "n/a", "versions": [ { "status": "affected", "version": "See provided reference" } ] } ], "descriptions": [ { "lang": "en", "value": "Incomplete cleanup from specific special register read operations in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access." } ], "problemTypes": [ { "descriptions": [ { "description": "Information Disclosure", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-11-29T02:06:12", "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "shortName": "intel" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00320.html" }, { "name": "USN-4385-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/4385-1/" }, { "name": "USN-4388-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/4388-1/" }, { "name": "openSUSE-SU-2020:0818", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00025.html" }, { "name": "USN-4392-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/4392-1/" }, { "name": "USN-4393-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/4393-1/" }, { "name": "USN-4389-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/4389-1/" }, { "name": "USN-4387-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/4387-1/" }, { "name": "FEDORA-2020-3364913ace", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NQZMOSHLTBBIECENNXA6M7DN5FEED4KI/" }, { "name": "FEDORA-2020-e8835a5f8e", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T5OUM24ZC43G4IDT3JUCIHJTSDXJSK6Y/" }, { "name": "USN-4390-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/4390-1/" }, { "name": "USN-4391-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/4391-1/" }, { "name": "FEDORA-2020-11ddbfbdf0", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DT2VKDMQ3I37NBNJ256A2EXR7OJHXXKZ/" }, { "name": "[oss-security] 20200714 Flatcar membership on the linux-distros list", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2020/07/14/5" }, { "name": "openSUSE-SU-2020:0965", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00024.html" }, { "name": "openSUSE-SU-2020:0985", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00031.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-534763.pdf" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10318" }, { "name": "FEDORA-2020-1afbe7ba2d", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GRFC7UAPKAFFH5WX3AMDUBVHLKYQA2NZ/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secure@intel.com", "ID": "CVE-2020-0543", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Intel(R) Processors", "version": { "version_data": [ { "version_value": "See provided reference" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Incomplete cleanup from specific special register read operations in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Information Disclosure" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00320.html", "refsource": "MISC", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00320.html" }, { "name": "USN-4385-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/4385-1/" }, { "name": "USN-4388-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/4388-1/" }, { "name": "openSUSE-SU-2020:0818", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00025.html" }, { "name": "USN-4392-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/4392-1/" }, { "name": "USN-4393-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/4393-1/" }, { "name": "USN-4389-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/4389-1/" }, { "name": "USN-4387-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/4387-1/" }, { "name": "FEDORA-2020-3364913ace", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NQZMOSHLTBBIECENNXA6M7DN5FEED4KI/" }, { "name": "FEDORA-2020-e8835a5f8e", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T5OUM24ZC43G4IDT3JUCIHJTSDXJSK6Y/" }, { "name": "USN-4390-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/4390-1/" }, { "name": "USN-4391-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/4391-1/" }, { "name": "FEDORA-2020-11ddbfbdf0", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DT2VKDMQ3I37NBNJ256A2EXR7OJHXXKZ/" }, { "name": "[oss-security] 20200714 Flatcar membership on the linux-distros list", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2020/07/14/5" }, { "name": "openSUSE-SU-2020:0965", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00024.html" }, { "name": "openSUSE-SU-2020:0985", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00031.html" }, { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-534763.pdf", "refsource": "CONFIRM", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-534763.pdf" }, { "name": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10318", "refsource": "CONFIRM", "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10318" }, { "name": "FEDORA-2020-1afbe7ba2d", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GRFC7UAPKAFFH5WX3AMDUBVHLKYQA2NZ/" } ] } } } }, "cveMetadata": { "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "assignerShortName": "intel", "cveId": "CVE-2020-0543", "datePublished": "2020-06-15T13:55:00", "dateReserved": "2019-10-28T00:00:00", "dateUpdated": "2024-08-04T06:02:52.330Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2020-0543\",\"sourceIdentifier\":\"secure@intel.com\",\"published\":\"2020-06-15T14:15:11.207\",\"lastModified\":\"2024-11-21T04:53:42.440\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Incomplete cleanup from specific special register read operations in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.\"},{\"lang\":\"es\",\"value\":\"Una limpieza incompleta de operaciones de lectura de un registro especial espec\u00edfico en algunos Intel\u00ae Processors puede permitir a un usuario autenticado habilitar potencialmente una divulgaci\u00f3n de informaci\u00f3n por medio de un acceso local\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N\",\"baseScore\":5.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":1.8,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:N/C:P/I:N/A:N\",\"baseScore\":2.1,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"LOW\",\"exploitabilityScore\":3.9,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-459\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:celeron_1000m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8BE23AB-1F5F-4FA7-8617-D4A4C9D5F6A4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:celeron_1005m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DD5FDB66-4805-4EB5-B6BE-938D40C48C25\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:celeron_1007u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5DD7CD7F-F0F4-408E-858C-8EB9BC82382E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:celeron_1017u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F898D49D-6B5C-45AA-A166-BFCE5CC9A6E1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:celeron_1019y:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"29560B2E-DAC6-478A-84AE-508AE21D0AEE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:celeron_1020e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CAB9B322-ACB3-4505-8281-2A365A21D286\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:celeron_1020m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9D54B11B-18A3-4DEE-84FF-B5A32C7E60CF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:celeron_1037u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C0198F9C-60DA-4D91-9FD2-5CC65ED346ED\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:celeron_1047ue:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B7F39FE0-A9F4-4232-B925-598E4F9167A4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:celeron_2955u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C6886FA9-E9FE-427C-A403-45C554ADA19C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:celeron_2957u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E3BE78C2-660F-4C48-B0F1-05D0116F0FDE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:celeron_2970m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BDB04659-871D-4B1E-9681-D5ADCEAE2CE3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:celeron_2980u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6F21EEA7-EE23-483B-8B01-5324E0063B2F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:celeron_2981u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"29792C69-EAE9-4DD9-B127-5AF1FFA9A1D1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:celeron_3755u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9B8FA7CE-FF47-4918-8171-EDCEA156C314\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:celeron_3765u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E2F086FB-60AA-421A-BA6C-C687B54A4993\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:celeron_3855u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"44FEB5D1-5177-4B5E-BB06-0C7E2A0CA6D1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:celeron_3865u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"20F761B4-2DCE-4E31-9974-C399B4982EFA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:celeron_3955u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9796C997-40C0-4C75-B2B3-06D037138976\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:celeron_3965u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"11F8482B-2E48-4976-83D0-F1E4BA015FEA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:celeron_3965y:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D36CCEB4-62C0-427D-B4B3-41F9B1B9194E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:celeron_5305u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"39831D4E-743A-4C09-900F-24DDAB5D1B22\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:celeron_725c:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ED49334B-38E1-4212-A23F-FE5437B773CE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:celeron_927ue:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A5AD98D1-5A73-4A92-A6F5-D9DDC14056AB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:celeron_g1610:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4003B029-36AE-47CD-BFB1-1F06DFEBA0C6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:celeron_g1610t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FADF19F8-54BB-4BF4-BF1C-515EBBEE2060\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:celeron_g1620:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B67D44E3-F8E1-4EB9-8D91-5777DC97D497\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:celeron_g1620t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0E4AC5E9-94DB-4970-BE29-747503AE81E4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:celeron_g1630:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"06FFA194-E200-4F4D-8E66-60D0134184E2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:celeron_g1820:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"12FD8D3B-0FC0-4E8A-9476-3092BAE9F15E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:celeron_g1820t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B950F6FC-2848-45B7-9C28-B0DF46BC442B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:celeron_g1830:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"95101653-A2BF-47F5-A209-097CA98A91F2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:celeron_g1840:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B72870A6-E156-46AE-A5C4-B9B8F10C147D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:celeron_g1840t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AAD76063-D9C2-4F41-B7D3-29A32678B527\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:celeron_g1850:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"95826FC7-9E92-4C6A-8F16-9D20B8E41F75\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:celeron_g3900:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"25847980-2D7B-4D4B-B0F2-C2CAB648182C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:celeron_g3900t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C5723C9D-E59D-4FA3-893F-D79E726025C3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:celeron_g3900te:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"25BC4638-06F6-41C9-BF0F-74037F24CBEF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:celeron_g3902e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"11A64939-F09B-4FEC-8F1D-FAC34D8E14BC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:celeron_g3920:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"77D7291F-752E-409F-82BE-6060BA5E2559\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:celeron_g3920t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"17560EF4-27C7-466A-9CD1-164F1B0F5B79\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:celeron_g3930e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"226CBC16-EC2A-4498-ADB3-655A0E9CF396\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:celeron_g3930te:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B9278297-5E4B-40D0-8782-E5AE87E43B7B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:celeron_g3940:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A562A07B-EDC4-4545-AC10-6CAA1494C6E7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:celeron_g4900:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7B801EF4-980C-40EF-84A8-4AA2D29CFB06\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:celeron_g4900t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2129E439-63C1-4CBF-B39D-2941621AB454\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:celeron_g4920:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"26E9CDAC-8C63-4F9A-B171-9E5E11E5313E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:celeron_g4930:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DA2A4A2A-CB99-4AEC-B0EB-11763E6C0E0F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:celeron_g4950:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"22828766-08EF-430F-A0F0-F59E772E38B2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_4205u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E6F8D167-C5B9-4B15-8861-529598D1C491\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_4410y:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0E6A6A15-1406-41C8-84F8-E0C202F554DC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_4415y:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A4B0FE5D-07FD-43E7-B89E-BDE6D6F49D30\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_5405u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"61FFCFE8-2B6E-4EB8-965C-AA5CB5493516\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_8269u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EDB4120A-B29F-496B-8FEB-CFD4A155202C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_9300h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"04AA92B3-DF06-45C3-8E46-D721262EFE71\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_9750hf:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"454DA7E4-ECDE-40C8-AA8F-181333BEFBE1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-2115c:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"166ED4A3-9466-4072-BD9D-B10AE3B98D31\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-3110m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"60EEC961-3871-47C8-87F3-E803E2DD63CE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-3115c:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CBB7DD58-9F34-42A7-90D6-39B29933527E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-3120m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"44C95EF0-D6F2-4F51-BA74-88B56F0FBED2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-3120me:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AE48E32B-9FF2-4F16-8E18-F982994457CD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-3130m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DE4BF988-5A82-4A0F-97EB-8D709CE5417D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-3210:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"913D6C36-8335-46EF-9164-E6FABDFFB6B4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-3217u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8A452D4-0DD6-43A9-9390-A62AE48AF310\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-3217ue:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3E95D40C-E599-4297-8079-39FA45AEA395\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-3220:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E117D09A-02A0-4A4C-8233-98C42E94A580\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-3220t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DCCED1FD-FAC8-4E12-97DF-5ACAC0C55632\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-3225:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E8C1BC59-9CB9-4A88-B414-0F94AF440086\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-3227u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D5E6FE39-7A75-4897-8336-9E4AFD77E3C1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-3229y:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FFFB351B-14E8-4145-A733-07586AE4C920\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-3240:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"869B680B-2585-418B-9C5C-349A3339C753\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-3240t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8009F20-942D-47B6-9C6C-3DB33C334ABF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-3245:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A7DFFAE3-24FF-4A9E-B3AC-93406A362E58\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-3250:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A219AF5E-BD41-4BFE-A299-6B45DB027663\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-3250t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EB755E29-BD69-4FFC-BEED-C5AE16357394\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-4005u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EDC0FB13-6766-4ED4-BF2E-439BEAAA29D0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-4010u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A4201168-8AF2-4C17-8D49-89D77062B835\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-4010y:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CCB9DBB4-5202-4A51-94BF-330756FED881\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-4012y:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"10606356-43F2-4DEB-AB52-6810FDD4CE49\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-4020y:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1D690FD7-DB10-4071-B156-09F49E71C479\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-4025u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"225F1973-15DA-4D6D-89EA-17E6AA10C36E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-4030u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5CD2F2F4-395C-4AB5-AAB0-0CB6FEE8ACE8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-4030y:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B5AF7A04-AAC2-4B03-9F66-5078BECBADF4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-4100m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BCF1BEDB-776F-4CAE-84F5-F29F7EE20D69\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-4100u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C6F33467-2074-4775-871F-013A513881A6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-4110m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4AD8C3F8-2B03-4FC3-826B-529B0AE005CF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-4120u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"435E1592-37A8-4436-8755-95FB585579E9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-4130:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"92C15BE9-B984-4675-AE59-9E275C4763F2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-4130t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"983FD869-68B3-454A-AF09-4AAF2F59BFAA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-4150:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"06C65583-56E8-46E6-A0F1-A46405460188\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-4150t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F3D3C6D6-504F-4FC2-A871-C4B36A5949D8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-4158u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"49482ADE-4DDE-448C-B491-88AFBBF08381\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-4160:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8D246820-03D1-48CD-9A08-2328D77428B1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-4160t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C714E08F-C724-4C36-99FC-4A85EB2B8BAA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-4170:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"793B03CA-B9F9-48CC-A0C6-E1FF86B71199\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-4170t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F117F239-FA9C-4B7F-A1C7-F0EB0F24E003\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-4330:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9B0D3709-EB3A-48E6-9A7B-0108FAE2AF04\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-4330t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"68066973-CB03-4AA8-9F24-D43C6F479348\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-4340:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C242A17E-6A79-4435-BF37-C503D69EB3E4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-4350:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7555AB52-CE91-48FE-8950-9E8B98A184FC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-4350t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E9D0B6B6-1CD6-4962-9054-7DB56D584248\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-4360:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C8042533-01E5-4C3E-9EF2-9AF475E2373E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-4360t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D29161F8-B122-4544-9B7F-9C9498532E44\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-4370:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D4C82B27-415C-4C7B-B3AC-FE398581EE81\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-4370t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F1A225BD-6E71-4EF0-A9DF-50AC5D94139B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-5005u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E3F45AB6-55EF-4ED0-BBAD-E78894ED399B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-5006u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0A4DB9FB-2256-4D44-9DCF-A8D6AFAE091B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-5010u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5DA07BF1-F5E6-4AFB-AE92-26E3E5125064\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-5015u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"81A627BB-47E3-4870-8B66-92546ABA0060\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-5020u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B6DD467D-BCB8-48CA-920B-5591A3E8D4C9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-5157u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9A64B0EA-FB22-4CE6-81E7-56CFFE12FC5A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-6100:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8A6E16A4-5B81-412F-9B02-D15288F0EB52\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-6100e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8448F47A-F956-4228-9A13-24AE86C532CA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-6100h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F0B9E6DB-C9C3-4B19-915B-B2E6E4D12158\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-6100t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"78C4115F-E374-47E9-A81F-CC06FA72C67F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-6100te:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AE81958E-5DFA-424C-9662-ECB1D9B738D5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-6100u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BE0F2403-8146-4CA0-9E89-04022B375CEC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-6102e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CD67C284-EFCE-4530-8E68-42BB1B6F15C3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-6110u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2E8CD54D-7BB0-4CA7-99C6-8E3EC20E2265\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-6120:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BE3DA00E-1BAC-4227-9ED0-F4757BC23B65\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-6120t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"34E0E209-5CEE-418F-B99B-9142CDE9ADE6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-6167u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"20B1E424-885F-4BB0-9257-8284A18B1655\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-6300:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BADEBE08-1478-4B88-9E06-5164BA0517DE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-6300t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4D672383-B9AD-466E-8D6C-68DEC432B9A8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-6320:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D16BDFF3-4CC0-4423-8385-C5E49C941F49\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-6320t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"048C652D-352D-4088-9986-30C280BC5C8B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-7007u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"102122A3-D47E-4CD2-8151-4B708C39D3E8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-7020u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"35F2CA68-9EEA-421F-A92E-E7685EC010EF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-7100e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4C17DCC3-9200-4198-B08D-EAD531B59995\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-7100h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"31CBD3FB-0835-4F28-BFA2-3D07459066F3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-7100u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5F059A42-0B43-4F79-BBAF-6ED05CFFE7EB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-7101e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1B6B298A-1480-41C2-BE7C-7291E7256D7C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-7101te:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CB3ABEFE-11A5-4EC3-9537-F9C75A46FF65\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-7102e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"14C20D2A-CD26-4019-A266-AB4E89EBD2E1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-7110u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"04C8B673-9E57-4970-AC45-EE3526757425\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-7120:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A6F9C441-D99C-4BA2-9269-83283507D7D7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-7120t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CF5748B4-1ED9-49DD-9140-DC7B47A30BB5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-7130u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B608F333-BD78-4082-B2AE-0F5BBE7E0D9A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-7167u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6F609E73-203F-45B9-9A3A-DC754B33860A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-7320t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"00A6DEC8-14E3-4A0E-93A5-72BB607A9D18\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-7340:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3C195F5C-9666-48C7-A1C0-43E189B17EEA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-8000:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BD3CA819-AFF3-47F8-AABE-A5F9DA89BAE5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-8000t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"06FDA087-0896-4138-9BA2-8238A845F5E7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-8020:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D8A63B09-D870-411D-8B26-ACDEE48C10F3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-8100:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FD84789A-B7F4-493E-A3F6-D5287ACFEB98\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-8100h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"47B28199-5B9A-4AC4-9529-77A6FC591DC9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-8100t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"33B0B0C9-54ED-4D7E-B0F2-C87690056800\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-8109u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E7DDCC11-A3DD-493E-AAFA-B50050FE3AC4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-8120:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"408A8035-BE57-435B-85A5-9C59D3B2DD42\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-8130u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6287BCB7-8EFD-485E-B40E-AE6B9DB067DF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-8145u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0D78093B-076C-48FB-A224-F94F5743ACF3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-8300:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F1DCD6D7-7FF2-419B-A41C-CF1FA830F289\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-8300t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8127E47-6082-4313-B310-1C6278471A21\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-8350k:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C14BA084-59CC-40E8-A62F-7AD1C9DD9283\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-i3-8100h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C25C1699-E656-4FA0-A9B7-59A3940814DD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-10110y:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"62BFF15A-0C78-45BC-8E71-EDF624AC162D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-10210u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"71615EAF-4DF4-4B9E-BF34-6ED0371A53D7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-10210y:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"376B6DD7-1284-4BD9-88A4-5C34303CC5D1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-10310y:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C8515D29-3823-4F9B-9578-8BB52336A2A7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-3210m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"16614725-F21F-45C9-85CA-9F9C8EFE0FBC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-3230m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6659D386-A44A-484F-AAE1-EA5CB3F17528\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-3317u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5427E131-5B27-4C64-BED0-C5780595831C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-3320m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9969E654-88F4-4F97-A737-C53D078BB9AE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-3330:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"27934CF8-2FB2-4D04-92FC-081F31B18D5E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-3330s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C5552F0B-6AA4-4E55-8871-E3E61B78F0B5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-3337u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"94F26990-272B-4A25-AAD1-1CEE2EC96515\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-3339y:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FEC9E4B4-BDF7-4D6B-99E2-9DFD3408EA9B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-3340:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9265D619-7C06-4297-BCA0-7B44AC3DE2BA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-3340m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6BAAB044-56DD-4F28-B794-7F3DF8F403DD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-3340s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2559481C-347F-4E3D-9E46-FB5E3E85682B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-3350p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"46D61342-E48F-426E-A856-3E0EAD268E5B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-3360m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"22D9B565-1A4C-4344-93E9-05390E036102\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-3380m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C5262FA4-704A-4FD8-AFC6-B35B28768CFF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-3427u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"96D540DD-94C1-4568-9275-01ED97A313BB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-3437u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AEBACE66-D68E-4D1D-9CDC-8A23F387BFE2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-3439y:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CBE75BFF-5251-4216-A49E-5CF2A8B69A0F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-3450:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C862334A-9B62-4FE9-AD65-383A240E1E2A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-3450s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"25345701-D7A9-47D9-8E84-BFD44669DBDA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-3470:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DA2E8D01-9A86-45ED-8E5D-83A41D68FA5F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-3470s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ABE78550-8862-4449-A114-39CDA89C4A6F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-3470t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1C3EBF20-9833-481F-86C4-65EF106D2438\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-3475s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"29A1EFA9-49A9-4127-8AC5-78EA78162A8D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-3550:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"26059622-2A47-4D95-B32C-867E19BFA204\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-3550s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F8E0A34F-29B3-487F-8FFA-63DC0E581F36\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-3570:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"163C5423-A6F8-4824-A823-962147C72BD2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-3570k:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"48BDE191-B712-4AE6-B577-788934849708\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-3570s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EE7D55B8-E611-4D90-85BC-2159136C47B6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-3570t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B3E241E2-9569-4F13-AE70-F717713AE845\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-3610me:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8BA5C764-BF33-4035-B832-0C5B7A084081\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-4200u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"13038065-613A-4560-AFC1-6CAD2C9D27EA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-4200y:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E44E93A2-5483-4CE5-B3E3-759BCDF67847\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-4202y:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0B769FF2-10FA-40F8-A702-CBF5EBB23B3A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-4210h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"71BBDB01-D110-4B44-92D3-D2936F02E749\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-4210u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"044D188E-792A-4007-9D87-6FB55AA685C8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-4210y:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C8D46072-8F46-4FCB-B161-7812B544C1A0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-4220y:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3F6A65B2-FFBE-482C-8E08-19E3D72977DE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-4250u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1DC0C2C7-F8A4-4ED0-B4FA-3372FAC11FA7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-4258u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2D98CCDE-E246-43B4-8778-9C357AF0C1C5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-4260u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"58AD9023-0D04-4A77-BB47-FAB873342FF5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-4278u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"09C41E56-9836-4D9E-8289-B9BFF8836B59\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-4288u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E0A15D53-6CCA-42AE-8DDE-B11E004451DE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-4300u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A69BF8F7-AB89-43B0-BD04-F95E7C655766\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-4300y:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E5D97AAB-5FD8-40DF-B13F-D12356023873\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-4302y:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2A0F7C52-2F89-449A-810D-4EDE87729EC0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-4308u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BC2BEF57-EADD-45C7-93EA-4257A0F8571B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-4350u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B6778D27-5442-44EA-8B69-3E9C406A7109\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-4402ec:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"260C49FB-83F0-428B-861B-9A34B28EBA3F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-4430:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"32531475-E54A-49B1-B15C-9366DE0BC003\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-4430s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"430479CC-7246-424F-A514-96035A14BA6A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-4440:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"061078C4-0B54-4BAD-9E3B-4114893FC8BC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-4440s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1ECAE7B1-7948-45A9-B73C-B362846A13EF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-4460:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F5B0D553-AB7D-453C-92C6-E3D08A7FAB08\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-4460s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6D153FDC-5420-4C9A-8FC3-2B29133F6F5F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-4460t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"166B6B12-BEEA-4CB4-B194-B53F382CCC3B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-4570:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3F417FFF-166E-4158-8AAF-B2B46539792B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-4570r:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"829EDA96-60C4-4BC9-AAFD-2E3CFFD8D878\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-4570s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F1F9933E-9B7E-439A-8E10-AAC45C834A5A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-4570t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CB34FDE0-6251-4B88-AA3F-B883639256B8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-4590:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BE57DEE6-5C9C-4A76-9EB2-7DD9A34599DE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-4590s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9BC6F12C-CADB-4D53-A75B-E7D98FF96383\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-4590t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"62D4DE4E-9FE4-4488-8B14-59A87EB6E286\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-4670:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6DCB38B4-DC0E-4C23-9E51-16B73199D0D4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-4670k:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"10FE39EA-B42A-4AD5-8343-0B644E795B3E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-4670r:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4612D9EA-ACEE-449D-A32B-AAA9474B49B2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-4670s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4C47E01F-EACA-41C4-B478-F1E718B5EC52\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-4670t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6CB47108-1104-4272-98B4-9458E1B1EA5B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-4690:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"50B07453-9E7C-4F2F-9B9E-B0F3A3710811\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-4690s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"505D6E8F-51BA-4947-9667-9402ED9111EF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-4690t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"74D12E38-F78E-4111-88FE-F8472F8A571B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-5200u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"60A08817-7679-4B7B-8D32-08F7F42525CC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-5250u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D8085F23-481D-4395-9071-5F79DCC4EFEA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-5257u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9CB0B9DA-FB37-4E96-99E7-3345B53FDC2F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-5287u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B7138774-E0CF-47C6-BA82-4034AA63AC1D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-5350:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"444D4778-B28C-4DA9-9F44-C2D1ACE20BF8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-5350u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D7EA9832-4E75-4295-B0AE-AB632B043FCF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-5575r:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E9BE5A85-4721-4AED-BC92-690094C877FB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-5675c:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0EDD172D-7ECF-4EF8-A731-0B6484240F23\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-5675r:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EFE1C5F5-C523-4EED-8C5C-7EEBFE9E6D73\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-6200u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9F611716-F3D6-4187-AE71-4FF87C95C18E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-6210u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"033028FD-BBD8-4BE0-B0D2-4744380D3EF7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-6260u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D5F67974-81B3-43C2-8DAE-A66C6A876B7A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-6267u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1054FBFC-1609-4301-A0D0-B78878FB2427\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-6287u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A0F889F1-3B57-46C1-9C23-9E78CD0DEECF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-6300hq:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"93929C7B-D4D9-436B-BA69-FD3C22FCEC2D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-6300u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C7F9109E-EADD-40F4-8360-BF7E37433E2B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-6310u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"02F5A50A-AAA4-440D-8AA3-54BE556322B9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-6350hq:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"41F7C959-BC66-40AB-8038-D37181A4CE5A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-6360u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3B9B3858-E58D-471E-8F12-DC109A133B81\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-6400:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4D37104E-78E5-4368-B67F-1F8C63873C3C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-6400t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A3B6BBA6-BAA6-4258-8A5D-94CD786A3B96\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-6440eq:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"30DFA368-60E2-42D7-9C59-04F61F1A1FDB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-6440hq:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0974E563-6326-4E79-95FF-40625440696E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-6442eq:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6B9D15BA-CC1B-4D83-9944-2593E2BA4AB2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-6500:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"467F294F-2FC5-4B2A-A1CD-4FE90F9D9C16\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-6500t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E904FB93-EFF6-4E8E-92F2-95C4952B0240\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-6500te:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5B232290-B3AD-4BB5-80B8-4CB3E6259A44\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-6600:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"772568B9-C502-4154-9320-16D78BF60B34\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-6600k:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"912614A7-45BA-411D-AE77-610EFE8D2A35\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-6600t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8FBD651A-306D-4341-8DEE-2E928CA6E0EF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-7200u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E993BEE9-72BD-4615-B1BE-5E9129D61ABD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-7210u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0FD6FEF4-73DA-47B7-966D-9C0C16089423\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-7260u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EFA6BB38-CDF8-46B0-9910-897AB7920D18\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-7267u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BF244D02-2B47-4884-8D70-37DFEB18CB60\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-7287u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"615D9B0D-8E91-4C8F-B5BC-6315C2CA90BD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-7300hq:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8EE85AE7-B4BD-442E-AFAB-CD01744C91B7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-7300u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2425FF8A-158C-40EE-BDBF-43E7641BC058\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-7360u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ADA681B4-37F8-4E2E-B73B-E0E17C66B754\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-7400:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DE4C6ADA-EE5E-401D-82B4-6E450EDBD49E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-7400t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"173C6F98-4022-4F40-A39A-D3D490CA6461\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-7440eq:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F6EACCCA-7ADB-40B8-87DD-A55313E5BB97\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-7440hq:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"78F1BD53-55ED-4346-A67A-141B5BC552CD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-7442eq:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"44D7B5DF-716F-48E6-9445-BB56A620DEF1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-7500:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2F3E6176-6F6D-4488-A03B-2BBF846ADC93\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-7500t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6AEAE7D3-6E26-43C5-B530-B0EE3DA65C80\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-7500u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B3C31236-EEDA-4558-944D-A6859F1A779A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-7600:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2603B0FB-A7B0-4E87-B989-D7EFFC2A64E4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-7600k:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BF705120-459D-49BA-BDCD-6AC38D95C820\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-7600t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2B91585C-4BD7-475B-8AC8-1B813A698D77\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-7640x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"70B7093E-97DA-4BED-AE7C-87090B82E5E8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-7y54:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CFA675E6-83DD-47FF-BEBC-D32E5223A065\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-7y57_:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3F5E4A60-291F-4F51-8F21-40928A95BA2D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-8200y:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2AC12E92-33CB-4603-AC14-3351CE1D4E3A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-8210y:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6E62309E-1071-4569-8C9A-11748D629CAB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-8250u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2DDA599F-09D5-4351-B7F5-351A2E04E091\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-8259u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D0D473E4-5EB1-434D-9D8F-C9365988EEAD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-8265u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6D3E166F-3D9F-4D0D-924A-147883598EA3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-8300h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8BD64BB5-CBC1-4862-BEE6-04FC53017976\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-8305g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F4D55B9D-4BAB-4082-A33F-626E15229333\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-8310y:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"71294A32-F3DD-45EA-A0FC-C3EA0351FA29\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-8350u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4E920376-561D-4892-97A2-F4400223B3CA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-8365u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C9054F35-AAB5-481E-B512-EDF4C3F2EA2F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-8400:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9D350A92-3992-4464-84AB-960ABCA45698\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-8400b:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"43DA2F8C-1C05-4447-A861-A33E81050F37\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-8400h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4D9E3717-83D4-4C7B-9700-2ABDA6DDAD23\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-8400t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AA341190-21EC-46FB-849D-F54AD3DFCF93\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-8420:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"874EF732-1067-45BB-BC15-DF815EC8CAFE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-8420t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BD92F60E-0103-44AC-A377-52FFACB0A701\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-8500:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"908629C1-FD27-4247-A33E-4F5E57DFF918\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-8500b:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7A98CDB0-BC13-4FB3-9DF2-56D9DCD9002F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-8500t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C2AF0758-7F39-40C0-A174-4805AADACE14\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-8550:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1AB63EC2-E95B-43B5-BA7A-16314C968126\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-8600:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D99484C0-1349-47EC-AFEB-5F7F281A514E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-8600k:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CF02D685-1E67-40E1-A858-000498D5D877\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-8600t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C9F74885-92EE-4F36-B4E1-5F1F8AD65F88\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-8650:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"238D4D09-7183-40D2-ABE0-4C477BCCEA49\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-8650k:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4CB1E0C8-5FFD-42A5-9798-1F324488A54A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-9400:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8AC9F52F-6669-459A-A0A9-8F472E1F2761\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-9400f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A7E91B92-4DB7-4866-8370-C6F8616D3D81\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-9400h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"85F465BF-4548-45EB-AC40-384F4E6248EE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-9600k:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B1DFFFEB-CC63-4F51-8828-C5D4E0287264\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-9600kf:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B176D141-26B0-477E-B2DB-2E48D6FB82AE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-10510u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"494A828B-F2BF-40CA-AAFB-7D2AF2BAF3AA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-10510y:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FD97F84B-ED73-4FFD-8634-10631FEE03EA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-3517u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3BF84DAA-69A2-4437-9AF5-972FB1569990\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-3517ue:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"41804B09-DFF0-48E4-91AC-6499FDA21C26\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-3520m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"71BDCDE0-A21F-47F1-A253-AAA5EDDD31BC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-3537u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EB5B6864-B51C-4C31-AA93-C7C170F4BD28\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-3540m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4D38D1F4-8332-4EFE-8998-86C654403C6A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-3555le:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"04D88300-9CC8-4725-9BEB-BA705CFD57A9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-3610qe:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1932E842-21A1-4D9F-A755-4201BD6721E2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-3610qm:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3257ABFD-7053-48BE-8827-311E9E922501\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-3612qe:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D8194009-767B-48E8-85FA-EB5F242C1B9C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-3612qm:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9CB92F26-67EC-4110-AD45-62530E662E45\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-3615qe:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7035D479-4C83-4A41-9164-6D8557E8F598\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-3615qm:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DF5113F5-A058-414F-B82B-EE91C71DD4AF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-3630qm:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"47D5CD40-9F2B-4021-B43E-E71B3E78B7E4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-3632qm:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"09B0D125-332D-416D-A379-F0D7C1F9DA27\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-3635qm:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CDB62B03-84E1-4514-BA89-1E13705F672B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-3667u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A036D2F8-6666-403C-B187-7884CE5D00A6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-3687u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C2BBBA0B-7761-44BE-82CF-92C1C3E25CA8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-3689y:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"89771BDB-E24E-48B1-885E-22B1A5BFD228\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-3720qm:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"59247DA5-9162-462A-9E3D-3FFB23CFCCED\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-3740qm:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4C75CB4A-259E-4B40-B8E0-490B93DD11CC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-3770:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1F47B9E3-118C-4270-824A-6A1BD2CC2121\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-3770k:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EAD0A970-9B15-4D9E-8644-15C5A93CEC03\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-3770s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0144B84E-7286-4316-B408-6F860FF03C28\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-3770t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5709EB3E-5B0E-46C7-9B6B-26999818EE18\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-3820qm:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DFD1A362-9C06-4BB7-830B-B308BB44A3DE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-3840qm_:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"904FF4A2-D2B6-4B3E-ACB2-3079F5098397\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-3920xm:-:*:*:*:extreme:*:*:*\",\"matchCriteriaId\":\"521F58D1-C114-4D81-88AD-6EC56A7AC686\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-3940xm:-:*:*:*:extreme:*:*:*\",\"matchCriteriaId\":\"D596B65D-A288-4DF1-9022-9E4946039954\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-4500u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"677C66EF-E9B9-430F-A19D-2D87AD83DBDB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-4510u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EFC25D04-7FF5-4178-A7D1-795B6A6134E9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-4550u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"238EA0E0-0FD6-4DA4-93C8-83490BB61A73\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-4558u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"73BBB876-4CC0-48C9-A40E-B2A017D7E8BF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-4578u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"757DBB7A-D8F1-4BA9-882F-4A112F41D3E2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-4600u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E6B019A1-F44F-426C-BE8B-189E7B0CFDB7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-4610y:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9DA22F64-0372-49DF-AB8F-0DF5519CB221\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-4650u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D973CBCE-D6AF-49A5-A8B4-355E866DA51B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-4700ec:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0A9D9852-5090-4BD2-B311-E6A7B7837795\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-4700eq:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"78AB646B-1FE3-44E3-A762-911843934439\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-4700hq:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0B4D9DD3-4EFD-448B-BA6E-175A99F47C99\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-4700mq:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"840CD8CE-E506-4273-9A42-80488E56FBE9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-4702ec:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9A6E0594-D194-4840-A323-FE0EE56D7E97\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-4702hq:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"794FB0BC-73A4-4FBA-8613-42057E8FCB1E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-4702mq:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"66B08A47-9478-4F1A-9959-BB9C7BC1C9E3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-4710hq:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"43479AB1-1D98-48EF-BD29-3EA0127CED22\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-4710mq:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"12F8412D-F1D5-4219-8DD3-EBFC1BDF27FF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-4712hq:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E974332C-498F-4183-8CE4-56BF61A7950E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-4712mq:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C7125D26-367E-45DA-A9B5-562310D8E01E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-4720hq:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E3B71011-540B-4C21-8E8F-FDC7AA80B557\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-4722hq:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FFDAAA3C-F332-4799-A0B3-952CB076E199\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-4750hq:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"67AB6E17-4975-4D45-9B42-FA2EBAF2D73B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-4760hq:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0ED0763B-9406-4644-A60A-676B665C9B34\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-4765t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B5DDE5AC-EB56-47B3-A737-05FC0050BC62\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-4770:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AC81D07E-F6D1-4B75-87BD-5A79F182FC03\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-4770hq:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B99F445E-2385-46CD-959A-32B95DEF22FE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-4770k:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F5277739-48A8-447A-A730-1C45107182F0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-4770r:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AC7A7DE5-019C-4FF6-B810-3A5FBB8A9276\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-4770s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7A321932-8B3C-49FD-87B2-CCC215A6A2A7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-4770t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"57585A7D-EF0A-4EF9-8AFE-A5F6AAAC9EF6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-4771:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5ADDCBE6-9148-420D-8DFF-AE6667DB71FF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-4785t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ADEBD889-5D07-4620-8E80-BEA16E7BEC54\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-4790:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1BF582C2-6958-4060-A49E-AC943678C5A2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-4790s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CDA7EEAE-64FE-4891-AC8C-019B1242E12A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-4790t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FB407F25-0554-4CD0-AC93-FC546EFB52DC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-4800mq:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6D83B6CD-CF5B-47B2-A547-C6EE8F901203\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-4810mq:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"20884D35-BBBA-44A8-BF14-95103C62F72B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-4850hq:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A14A6ECA-8879-40A2-8E33-156541B4E35B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-4860hq:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"07AD0193-68BC-44E6-99DF-DC266B16A8AE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-4870hq:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D38873C6-BB11-43A1-8233-7828FF143CF0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-4900mq:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7E079890-9A4D-4AF2-86F4-3663789105DC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-4910mq:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D9CB4BA0-CA4E-4C45-9A49-92AB0D411A95\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-4950hq:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"074C330A-B69B-4414-8B80-E67A6AFEA651\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-4960hq:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1EDDDFB8-3F05-4912-ABA3-A9F52B6636F9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-4980hq:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"38ECE802-5548-44A8-9777-081C28402AE9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-5500u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C34148EB-C6A7-49DE-8139-316F710D57F5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-5550u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0EA33B05-493C-4F55-82D9-5F2C942A603D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-5557u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7E8D6B87-CA43-4773-B13E-EB07128E5501\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-5600u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"80BAD40A-BE40-411C-A5E3-19C264BF4805\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-5650u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BCD85430-4610-41B7-B7BD-CD3AA5391FB6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-5700eq:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BA71265A-4E37-4AC6-97D4-ED31D94A35B6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-5700hq:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"91CEC4BC-098C-4B8F-AA4F-25B9211010D6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-5750hq:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9453959E-FB00-441B-B9B6-4BC75DD534B5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-5775c:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5ADC848D-C1AF-4FCE-89B4-DD3ABA050202\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-5775r:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0846BDFE-1643-49BE-8B48-03EC17B9BAC4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-5850eq:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B131EF48-4094-48C4-807E-4A76156A34CA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-5850hq:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"466ECE77-E232-4C03-83A2-FBAC06C82021\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-5950hq:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1D98586A-473F-44D7-B299-9480129AE8DA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-6500u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6CAD248D-0B95-4BE1-917F-E0976447927D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-6510u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"104F999D-584F-4D34-9538-679EDBE3B180\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-6560u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5726D5D4-F188-4F06-B78A-2C7C694A40E3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-6567u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"72467515-7793-479B-BABF-839275CA9AAD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-6600u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"56B79264-C756-408C-A32A-BFD4AA0B20CA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-6650u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4D3DB891-40F6-4000-BEAE-A1710C70C43D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-6660u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0D3EA33F-D137-4B24-9211-C8A62A7427A6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-6700:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"86FFF97C-C121-4F91-B62F-057356B0A048\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-6700hq:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"213B09CA-91E9-4D11-AA11-B84F40495E9A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-6700k:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EAFC55E4-D84D-4588-976D-1E2637B1BF0E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-6700t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DCB20762-51C5-44DD-9CEE-FEEC1E9C0E5A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-6700te:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FAC1A189-D822-405B-A090-B1573FE12B14\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-6770hq:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"31C57E58-66E3-4FEC-A88F-B82C4B372B2B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-6820eq:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C173CF7E-81DF-4AD5-AB17-A4C330B933D1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-6820hk:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"638549EC-1BB1-4206-B8DC-C0101BBEF8A3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-6820hq:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A8F450DA-5FBA-47BB-9A7D-75873FB3E69F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-6822eq:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"112701D9-7154-46E5-BF36-EE36A607C7DA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-6870hq:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"87B5258B-26E4-4853-9F27-4BB12886CC38\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-6920hq:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9B1B04E8-A31F-4027-8E05-5461E7855F04\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-6970hq:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"49BDD476-E402-408D-9BD6-886AB195704D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-7500u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0D566CFB-935B-40E4-9F4E-6216A42E7EBA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-7510u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F8065A9B-4236-44AE-B60B-17F6695A705C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-7560u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6A97ED15-D0C6-4B64-BA08-EE50A6990272\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-7567u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E6A121D8-0D01-4AA7-A1D9-5E2B9F0D30A6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-7600u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6D57834B-C031-4301-9839-7A32F13687EF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-7660u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CEE126ED-B743-4C6D-95FF-04F473A9A008\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-7700:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4D901944-8E2B-41E5-BB82-CF1C97064711\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-7700hq:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2A13E353-0063-468B-96CD-97BF91C747C9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-7700k:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"913BBEFF-49E7-42AF-A850-B49E5A12AB98\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-7700t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2FE6AE98-E4D9-4FBF-B90A-2B170A0AF26F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-7740x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8E9EF2F2-750C-4CB7-9858-69D7FFA4EF31\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-7820eq:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8C1205B-6AC7-4DB5-B247-2108511D9957\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-7820hk:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FA47107D-237A-4184-8BA2-601660F7FB5C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-7820hq:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E9862E49-124E-4B7D-941A-CFD2668B6481\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-7920hq:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EE6572E2-5B24-4E21-9F6F-3A7A17A9F098\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-7y75:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"85C7AD56-CA31-4C08-A5C1-B50E767E1FFD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-8500y:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"957F3AC9-D071-4932-B2C9-1643FB78BC7A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-8510y:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8B8DD6D2-5F42-4E44-A4BB-D3179D83C2BB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-8550u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1395788D-E23B-433A-B111-745C55018C68\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-8557u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"05EA3461-021B-42CD-B4BD-4D2E8703DB93\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-8559u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CB6774C8-431B-42AC-8955-02B529222372\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-8560u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DA0960D2-93EC-4CFC-B901-E38A59B798FF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-8565u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F41025AC-6EFE-4562-B1D1-BAB004875B06\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-8569u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AC1ED81E-3D62-47FB-8FD4-B2732525C33C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-8650u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AC82E058-25FE-4B6C-BA3C-AB043CFAB113\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-8665u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"34DD3CCB-91D5-48D6-80BC-CA643385BCE4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-8670:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"86817715-BF5A-40C8-8250-7A8CD637C05C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-8670t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DAAC740C-A02E-4342-8388-B85DDE54DF25\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-8700:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"04076FFA-D74F-4501-9921-D8EBDF97CD20\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-8700b:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A4440FC7-F90C-44E0-B7FB-C88BC95EAB77\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-8700k:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8846D3C-39C6-48BE-9643-ACC479416257\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-8700t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"07279DDB-B07D-4224-AA1C-24B4F3D63BB8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-8705g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D4DDEFAF-EEC8-441D-82EF-ECF20B9496A4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-8706g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F423BBE6-327A-40DC-8BCE-BF43600A68D5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-8709g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"08718840-D468-4E86-8FFF-A2B1841E6BF6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-8750h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C9B77426-B579-43C6-9340-F291138ECD7A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-8809g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DD0CF1E4-487A-4C61-AF4E-733D7ECBCFCC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-8850h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DE776B91-9E25-48F5-A4F0-EB36B704AEBB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-9700k:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1FB0C1DA-60C6-4C9E-99D6-7A47696DACD8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-9700kf:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F2EB81B1-7DEF-4CC3-ADC9-A4CB1042E406\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-9850h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4D0320CB-05E3-4D5B-BCEF-D862566B0AA2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i9-8950hk:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"469D79CD-B627-4ACF-ABC7-0EAE5D41A005\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i9-9880h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"659206BB-510A-47F8-8B6E-FD030A6BE1DA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i9-9900k:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7C3257F5-CA55-4F35-9D09-5B85253DE786\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i9-9900kf:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B6F8CEA0-1CD6-4F17-85E3-C1CB04D9833A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i9-9980hk:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A48A2969-DC53-48E2-A5CA-4DF2B00D1960\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_m-5y10:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"71AF96FE-EB28-474A-B260-EC22B4A334A1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_m-5y10a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"80F61261-1AF5-4B77-8065-25A6B0AFFEEC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_m-5y10c:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"232B0352-B020-4CAA-A5E3-38E75A157C4C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_m-5y3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7CD2FE9A-BFFB-4EC8-9C44-26B2D9911B5F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_m-5y51:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B0A5C29F-3597-4846-8CEC-74C8C73740C5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_m-5y70:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"091D17D3-213F-4EC7-81C3-CD96AB7BC89C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_m-5y71:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3F011F80-4FBA-490D-AF5F-F6DDC941CB61\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_m3-6y30:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"831048A2-657F-4F2C-83AC-802DF45204A5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_m3-7y30:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"18340F86-5545-4EEF-9F79-6560BB24F277\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_m3-8100y:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E5AFFC8B-3AC1-49B4-9A73-18A3EC928591\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_m5-6y54:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0504478A-E635-4A8B-A3F2-BE0E5908A7AA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_m5-6y57:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7AFFF65E-6576-41A5-82E0-F2EECDC64743\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_m7-6y75:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E29F8E70-5429-4756-A574-C7B60BE74A86\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:pentium_1405_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C25607D2-8404-4BD1-9E42-7ECE8DCF3E9F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:pentium_2020m_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3475F6C6-4E36-44E3-8E84-25ED06B4DB4F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:pentium_2030m_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E859E810-7280-464A-AB18-10E6DC6B038D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:pentium_2117u_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3255C643-CD77-446B-B98E-083D2F07CE12\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:pentium_2127u_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"493C0F33-F0FF-4828-9210-5976F0259D18\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:pentium_2129y_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0B612898-5BC9-4880-AF5E-F498A9634EFA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:pentium_3205u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AB8E1648-C77C-4C8A-BBDF-20468FF3BA00\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:pentium_3215u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"779DA292-A24F-42D6-8013-9DFC27BD8C2C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:pentium_3556u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8EF5B50A-63E4-469B-9D59-A2C7BD6F2E72\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:pentium_3558u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AC84C9FF-5E9B-41A1-8FF7-88D3F6687894\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:pentium_3560m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"489DA073-57C8-4904-90B7-F4E94CA34DDB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:pentium_3560y:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E8165EF6-316B-4EA3-95C3-F84B0028024F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:pentium_3561y:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"00024F21-F6FC-4EEC-BFD4-3723CAD8F8EA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:pentium_3665u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AD0D4FB5-8ABF-40CA-AABC-EF97D8993E15\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:pentium_3765u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2D6920AE-35D7-4A6F-9169-4EC5E7F2902B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:pentium_3805u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3E24661E-9974-466F-AA8E-C57048DD0978\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:pentium_3825u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BFB91D35-0E4F-478A-AE1E-7C8645DA51E1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:pentium_4405u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4156AF88-99DA-4331-93A9-07F2049D6B07\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:pentium_4405y:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A5F17DA0-EAF5-4BE0-B6CE-AE710C3F871E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:pentium_4415u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"079877E5-12C3-4A37-98F8-443DA366BAB3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:pentium_a1018_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A5E6A6CF-12C1-452E-8450-18BD2D4FD95C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:pentium_b915c:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AF838448-0E87-4E73-AF51-55302B329E6B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:pentium_b925c:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"66D7E11D-B0E7-42BC-8A6F-3B77D08EC79A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:pentium_g2010_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B1290CDC-0F8D-4860-85F7-A4B1B40E1F44\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:pentium_g2020_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B1110D3C-D880-4D4E-BB68-5A305AD3D5C7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:pentium_g2020t_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1623BCE2-AF99-45B1-B156-E81CE0D89D72\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:pentium_g2030_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2C2D72A6-9227-4F44-8243-626AF77A0D90\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:pentium_g2030t_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1BBA4425-A154-4F6A-86D1-A05D6FC26963\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:pentium_g2100t_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"311F9683-A58C-42F8-8044-711A7339EF4D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:pentium_g2120_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FADD9066-D903-4B59-A9C1-7987A7663ED7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:pentium_g2120t_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1B6C28AE-BAB8-4FC4-910D-A935B26D00E7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:pentium_g2130_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"341AB666-177D-47D2-B2BB-70C17400AECD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:pentium_g2140_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ADD28BA3-D5EE-4CA4-8A2B-3DC44BCB400A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:pentium_g3220:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A920E6F1-4226-44D1-A86E-43247DBC97E5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:pentium_g3220t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"851A04D2-49C2-451C-9CAE-40E98C729EAE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:pentium_g3240:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6AB0A5B7-DF08-40B2-B185-0956B2D7379E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:pentium_g3240t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D9591F53-E005-4DB6-B162-0DF218919D62\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:pentium_g3250:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"556DC4B9-4302-483F-BA37-2AF4801D5569\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:pentium_g3250t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F71359BA-067C-421B-B647-1D69C8BF7ED0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:pentium_g3258:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"63002B5D-D73A-4EE5-B0CB-21EDF718E70F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:pentium_g3260:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7B9F42F2-D5D7-4220-A327-359D3BF1C09F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:pentium_g3260t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C558DDC0-2998-476D-96B2-54235CEF4AE2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:pentium_g3420:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D6090D78-51C8-4295-A4D2-700AD290F745\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:pentium_g3420t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ACFB23AC-680E-4EE1-B9D9-E2B96E3794BD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:pentium_g3430:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"11E3D70C-F003-4A13-A9EC-3810E9585FB1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:pentium_g3440:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"14403B92-E903-4093-BFAB-F7C639D63862\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:pentium_g3440t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D252FFC3-B059-44DD-A4F9-49B591B4FD18\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:pentium_g3450:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D7075CF7-B643-460B-ABF2-9AE24ED68FCB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:pentium_g3450t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"631CD42C-4F66-42A7-8F9D-114CF866EBDF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:pentium_g3460:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BB7720B3-5489-41B8-BD0A-A6E5A004568F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:pentium_g3460t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"988D6BBB-3056-4AC3-8960-5BA6C2F74367\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:pentium_g3470:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3CBCDE97-E95E-4B53-B4C0-19F026A47229\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:pentium_g4400:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A85AE2D5-1BA9-45F5-808A-166E27D7D6CE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:pentium_g4400t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F142F6EC-F106-4828-B152-13612273A7AB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:pentium_g4400te:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FF5D3457-C139-499F-8B41-57C8E7E66D40\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:pentium_g4420:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F6FEFAF2-7784-4407-B58A-A0B1DA84415F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:pentium_g4420t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FD36DCA7-31D4-4E50-A38C-C437CB2BB439\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:pentium_g4500:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"63BED4F5-65DE-457D-9BDF-89AA5369304B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:pentium_g4500t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6C590C99-2770-4D63-9837-D1E1F251675D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:pentium_g4520:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A1FC6A24-AF3E-4B7F-9C12-E947C3E4BB1E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:pentium_g4520t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C90F5FB0-7AAD-42F2-9780-E93A82E0C239\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:pentium_g4540:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B207606B-14AD-48D0-8219-A54D2617F067\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:pentium_g5400:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9E80ABC5-7BAB-41A1-8D61-481A59BD9C21\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:pentium_g5400t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6A82B8D9-E751-48DA-948C-231ABEE90B54\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:pentium_g5420:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D7706D22-7E16-4068-A467-EE2D4BFAE968\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:pentium_g5420t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8D28A52-5EE7-42D2-B942-7A341AB00AB1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:pentium_g5500:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9ACD1AA7-8805-42A2-852E-C839417B10E1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:pentium_g5500t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C55F7F50-61ED-487F-AB1D-70B75D972184\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:pentium_g5600:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9AF50627-7830-4984-8F12-7B73C51E5828\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:pentium_gold_6405u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DE118AB2-A2C4-452C-B9AD-DDEF65B5EC67\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2124:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"43126A13-5931-4989-BEFD-E1A096F98D94\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2124g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"342E0783-288A-4DB0-A657-29937903927C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2126g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D4C40F91-138F-4396-9A6B-B969F6AC30B8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2134:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"23CA9365-B1C4-4188-A9BF-19215AFF58A0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2136:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C4797D2E-1270-447B-BFE4-CC96D9F10D5B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2144g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2CA77EB3-6F11-43BC-8B59-84217AA73205\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2146g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0866F1A3-8B9C-4B5A-B30D-71B3465EC80A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2174g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"331B8F10-3A20-46A8-B960-3546271CF701\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2176g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AE638E59-DF75-43B1-A6DC-10A838B05B00\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2176m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"109FA97C-10EE-41F9-B52B-B37E31642251\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2184g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F3FB62DD-090B-4434-9056-09427B66AAF0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2186g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A67B3834-E59E-47AF-A806-13A990E812B3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2186m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FDA04EFF-A9A0-4900-A2F8-7C0D346ACF6D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2224:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"79214F8B-1090-4DCD-B1F4-0FF78FC29C4A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2224g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DD176FB0-7427-4F2E-A969-72062BB3EF98\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2226g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B278081F-F900-4581-9D10-B5A2ACD2E2C1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2226ge:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EBBDAA3E-960B-4E84-AD3F-2F8B3A4FF903\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2234:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"45689B37-5085-41B3-BA9D-F05FD07DF1FC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2236:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A7186EA5-448F-473A-8FC8-058FC823ACC5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2244g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C12F0C71-8F25-4C77-A3F3-1231AC53C0CA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2246g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EB179A6F-FED8-45FB-89C7-3B17D6F5EB21\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2254me:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F58AEEB9-919B-4C6C-83B6-080846786A56\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2254ml:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C0BAE174-A158-4807-9D67-36F795028D76\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2274g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FAD38AEA-979D-484B-82F0-0161BA39E9F5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2276g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"780AB9F4-0C87-4528-B53A-69FBC4D87ADB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2276m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E5AA7BB1-6131-4206-8F99-BA8DCE60BFC7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2276me:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C2CA54AE-915F-45B9-B775-C04589E49802\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2276ml:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DB86F018-1F56-4146-A78E-C7BF7B616023\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2278g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"63650DBF-4DBD-4655-AE93-5CBE53F8E0FB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2278ge:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"00912C9C-D386-445E-B390-E96361ECDFA6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2278gel:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"60B582A1-784C-4BE8-A0D5-706DE01D769E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2284g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"56F30E1A-8EF1-4C90-974C-791312241BCA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2286m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"556637E1-9502-41E7-B91D-082C92F233A1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2288g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5EA930BC-EF68-4AD5-AA1B-0659358028D5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1105c:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E70E7B6B-C4B6-4864-939A-A0D8D648C661\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1105c_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"09BD9ADD-4FBE-4A12-A5F0-594B93824671\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1125c:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"97560433-94FE-44AC-98B6-E371C878162A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1125c_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E82681A7-C9A8-4CCD-A19A-B4D53343B34F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1220_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7A2BF613-A53F-437A-A483-564BB4D8CC96\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1220_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0493CF98-1A11-41D2-B719-6D94583232E8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1220_v5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4E629CF7-A706-4DD3-B3EB-A1F9711B0372\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1220_v6:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EFD11A3F-A2D4-4B09-84D2-548F97268805\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1220l_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"72953F49-8FB3-4D07-A1F9-96D682348679\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1220l_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EF9C696B-FA4E-419C-B036-76DCBBD9022C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1221_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"92ABFE16-E712-4805-8DAC-AA17C5214631\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1225_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2E8C4032-40A3-420E-BE9D-ADA27443535B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1225_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"771E2F3E-3FC2-462E-93C4-12301660E6C4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1225_v5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E1BCDBDF-A902-43A8-94A8-13541FB8CB32\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1225_v6:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8E031BE7-87C6-4E4B-8988-020221ECAEE7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1226_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"58BEE344-48BE-4D5E-B5BE-9391255C8550\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1230_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ADF68144-22B0-4B0E-A73D-6FE38C213C71\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1230_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"67A9DE3D-FA10-4C8A-952F-979DE9B19AA5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1230_v5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1CC1EDA9-6CB8-4643-AC65-76B892319879\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1230_v6:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"49C57129-0A27-4142-BF6E-68A558773573\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1230l_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"73B301CD-6105-448E-B013-52F894D8106E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1231_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DE531899-3AB8-4540-9099-BE4A0FB75EAF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1235_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B86BD818-70F8-409B-AB96-53CCF490B7FC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1235l_v5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"15DB4F8D-E42C-4119-83BD-44D6AB9319B0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1240_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E7FB452F-4FFE-449B-9846-198A61B1F521\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1240_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"231327DF-C1E2-469F-9C5C-25B14541F3AF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1240_v5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"51E0227B-8F2B-48B3-97BC-73BA1BACEED8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1240_v6:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D5EFEF14-4ECB-45C9-8911-01FD7B115D7B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1240l_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F6A3E845-3883-4034-B90B-3ABB61BBD1D0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1240l_v5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C8BD1F0B-7B75-4A5A-A708-BDE56D237354\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1241_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5BE15F08-0B49-486A-808F-5B647142F093\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1245_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7C661F8C-0F1B-4A0B-9B0F-A845883BA3D3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1245_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"15236325-68D7-4D7F-B500-A79AD02812CE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1245_v5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DE01A935-4048-4578-8FBA-1D12A95654D1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1245_v6:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"333364EE-BF57-4217-9517-2C1B95B826CC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1246_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CB7C3F31-16F9-4177-B7F2-B865010A6EDB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1258l_v4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AB35FC19-9CDC-46EB-87D5-F2418F16B548\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1260l_v5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2D45FCBB-CC03-40A8-ADCE-7AE0A7AA05A4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1265l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DC84425F-C08A-4188-82B9-E56F22DFA17D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1265l_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F2F157D9-5288-42FA-943C-53F0D227590A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1265l_v4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2F3FD78E-7790-4CFD-88F2-46889CBE1BF4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1268l_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E0BB6C08-9816-4F79-A91D-84B7E365D586\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1268l_v5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"28D7D164-E631-4D49-B87A-0B7885148790\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1270:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"23544F02-3847-4089-97F1-8C29B5596B9A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1270_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"251A501D-9744-49A7-88E8-035C239B06C8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1270_v5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FA74EB5E-3D7D-4E5A-8D7D-AF902F8BCF8C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1270_v6:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7F2476F2-6A8B-442F-B054-738F36613CE2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1271_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"95F1E851-0C83-466B-A89D-03486BD90CC0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1275_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"000FB0C9-0642-48D1-94CC-A035145963AA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1275_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"98FA6E45-B945-4923-84FD-B34F2CAA15C1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1275_v5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F2A10975-3375-4FB3-A008-56EB2ACD2737\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1275_v6:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7BC9CEA2-C621-4DCF-B64C-5495D3208DB4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1275l_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"565C5D54-D6C2-4387-AA45-F18C4DC344FE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1276_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5516A1EB-1A09-4248-A1E0-6438751DA0AF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1278l_v4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D4E19F29-3E2C-4F0C-A887-07E68D1EFB3F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1280_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CC228684-3F7B-477F-A010-66CD28B64ACD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1280_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"99848B67-F10E-4DD0-B394-A30463EF0E0D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1280_v5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E6A99895-6A48-4A44-B0F7-7BED55C677FC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1280_v6:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A32F3CD6-6BA6-40E7-9580-3C1A455B3C99\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1281_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8FC720A2-BD40-4FF7-ADE3-52430B263AD4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1285_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D4FBE620-5CA2-45B6-9CD9-15928146F23D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1285_v4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A656CC1F-943D-4B35-931C-CFBF8F3110B5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1285_v6:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C2559D24-F8AD-4202-A00D-F48D51A0940A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1285l_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3391CFE3-DDED-406A-8126-416C29E20A34\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1286_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"88DDE104-1102-4847-AF28-55A380E8C4C6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1286l_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"53E830C3-BCD4-45F1-8D00-0DE7959F4369\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1290_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"37C7A319-3FB2-460D-AF17-D70903EC53DD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1501l_v6:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"37AF4F98-0672-4101-9825-57B0F64EDBEE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1501m_v6:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2231374F-222A-4BA3-B14D-F69860668F7A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1505l_v5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"057E3667-7BA8-4142-8A1E-B957333D776A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1505l_v6:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"31BF874F-B640-4A18-AC92-F0E16AB7E1C4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1505m_v5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"84A77114-92C8-48C4-9D12-3ACC3030D5A3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1505m_v6:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"542BC61B-1EA3-4C42-BB99-C9C67EE82F7D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1515m_v5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"13B5BF22-5E95-46A4-AF05-450CFD1312C1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1535m_v5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9490F926-AD57-40F3-A523-61D67486DCB0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1535m_v6:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5FA12E60-4B0A-4723-8A02-3115494CD1DE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1545m_v5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"29CC9B92-CF59-4121-9638-F4D4521952D3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1558l_v5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2CC6592D-743B-4656-B1C0-247F36ABE5CA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1565l_v5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BCC32129-C5DC-4D26-96D5-219F5291D6F2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1575m_v5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"81F4426C-970C-49DB-950B-3F5ED17E682A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1578l_v5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4ADED698-2702-479C-A24E-E9E6F35E9AFE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1585_v5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D86C0CFB-72A3-4446-9601-2C956C9A71F4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1585l_v5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D3C578D9-8973-4F36-8BA4-9F4F3A8E0AE6\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B620311B-34A3-48A6-82DF-6F078D7A4493\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B009C22E-30A4-4288-BCF6-C3E81DEAF45A\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*\",\"matchCriteriaId\":\"8D305F7A-D159-4716-AB26-5E38BB5CD991\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*\",\"matchCriteriaId\":\"815D70A8-47D3-459C-A32C-9FEACA0659D1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*\",\"matchCriteriaId\":\"F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*\",\"matchCriteriaId\":\"23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A31C8344-3E02-4EB8-8BD8-4C84B7959624\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*\",\"matchCriteriaId\":\"902B8056-9E37-443B-8905-8AA93E2447FB\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"80F0FA5D-8D3B-4C0E-81E2-87998286AF33\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"36D96259-24BD-44E2-96D9-78CE1D41F956\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:simatic_field_pg_m4_firmware:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"496228A2-6907-4970-BEDC-E9B44CBF7CCD\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:simatic_field_pg_m4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7ADAD919-32C1-49D2-A419-C9A803DB6250\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:simatic_field_pg_m5_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"22.01.08\",\"matchCriteriaId\":\"F5320759-AAAB-4FEA-99AB-51A7F7EE9F58\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:simatic_field_pg_m5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"506DEE00-30D2-4E29-9645-757EB8778C0F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:simatic_field_pg_m6_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"26.01.07\",\"matchCriteriaId\":\"36E7D51E-4657-4594-BBD3-F98E3E50F4E1\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:simatic_field_pg_m6:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8F3C3E60-7C36-4F5D-B454-97C9D0FD9459\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:simatic_ipc347e_firmware:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C9830BAC-C836-4D00-8E21-28F180A59163\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:simatic_ipc347e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"49D276DE-950F-4A61-BA13-DD5D07A17571\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:simatic_ipc427d_firmware:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F6A2E4F1-7402-4EF2-8559-B9318A01C008\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:simatic_ipc427d:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"46CC8AFE-ED6C-4A50-AC80-D2309E03FAE4\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:simatic_ipc427e_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"21.01.14\",\"matchCriteriaId\":\"77B3A9A8-2AE8-4938-9114-BE75DDBB6A1D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:simatic_ipc427e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A40D0CDB-7BE6-491F-B730-3B4E10CA159A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:simatic_ipc477d_firmware:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A946EA63-4FA9-44B8-97F4-E53A5DAADE46\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:simatic_ipc477d:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"754A6744-5194-4A99-BD3B-944A8707C80F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:simatic_ipc477e_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"21.01.14\",\"matchCriteriaId\":\"AF94A909-1192-41AD-9717-EC88B30B8DCF\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:simatic_ipc477e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FDF9D4C3-1892-48FA-95B4-835B636A4005\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:simatic_ipc477e_pro_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"21.01.14\",\"matchCriteriaId\":\"C7011395-6ACF-4FC5-AF8F-971427128D27\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:simatic_ipc477e_pro:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3FC5CE20-7D08-4496-A857-C3A4BD0AB1AC\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:simatic_ipc527g_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.4.0\",\"matchCriteriaId\":\"65A6E7CD-4AEA-465D-89B3-6EF66E4F17B6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:simatic_ipc527g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"55156889-E9DA-4F04-B894-339DC39CA942\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:simatic_ipc547e_firmware:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F6A15ED1-124A-4642-988F-890FF4162346\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:simatic_ipc547e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D9DD4A97-1648-4C7F-A5A0-6899BD13A617\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:simatic_ipc547g_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"r1.28.0\",\"matchCriteriaId\":\"03F52E28-42B0-444F-892D-749B9A7EC498\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:simatic_ipc547g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9EB339B5-602F-4AB5-9998-465FDC6ABD6C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:simatic_ipc627d_firmware:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A30CB799-FF9A-4E4E-A3C6-EB12CE2EB5B0\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:simatic_ipc627d:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"509AD120-3465-4C00-AAB3-B6F6ED708B51\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:simatic_ipc627e_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"25.02.06\",\"matchCriteriaId\":\"1291471D-D36E-4ACF-A912-76697396CDE1\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:simatic_ipc627e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9D9AF082-8345-4BE1-B1FC-6E0316BB833B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:simatic_ipc647d_firmware:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"43337EC1-0BF8-40B3-88BC-38F06EF48DC6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:simatic_ipc647d:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D0EF28FB-BAB3-4710-9D25-25F67ACADC60\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:simatic_ipc647e_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"25.02.06\",\"matchCriteriaId\":\"7CAAF2D6-7799-4BB7-A151-561E8AB260DA\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:simatic_ipc647e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E430C4C5-D887-47C6-B50F-66EEE9519151\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:simatic_ipc677d_firmware:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7FCA9FA2-AA26-46A3-9E2D-3C87BC2BE0F3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:simatic_ipc677d:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"057D9947-CE4A-4B4C-B721-4B29FB71350C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:simatic_ipc677e_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"25.02.06\",\"matchCriteriaId\":\"F4DF4B0B-F376-472B-83E0-1B7E5F87EF6A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:simatic_ipc677e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5F9FA42D-B2F0-456F-89B7-6A5789787FBA\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:simatic_ipc827d_firmware:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3A03BCCF-9EF5-4353-8886-15DFE6A35765\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:simatic_ipc827d:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E6D87239-40C1-4038-B734-D77AC4DDD571\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:simatic_ipc847d_firmware:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"681C8A24-C3AC-4CF4-8283-DAC337909CC9\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:simatic_ipc847d:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D8F37D88-E086-4060-8420-BD0F8D8FF580\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:simatic_ipc847e_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"25.02.06\",\"matchCriteriaId\":\"8E63A5F2-8767-4E25-8785-F8F197B77F7A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:simatic_ipc847e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1157418C-14C4-43C4-B63E-7E98D868A94F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:simatic_ipc3000_smart_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.b\",\"matchCriteriaId\":\"BD3F04ED-C6D0-4387-BB3A-31C86B1F918F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:simatic_ipc3000_smart:2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DD37AB3C-6E1A-4E8D-A617-4D97B4501A28\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:simatic_itp1000_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"23.01.08\",\"matchCriteriaId\":\"4ABF49D4-34CE-4DEA-AA2E-A40A53472D1F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:simatic_itp1000:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"187C6D51-5B86-484D-AE0F-26D1C9465580\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:simotion_p320-4e_firmware:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F66E1293-5598-4A7D-8523-951F62080B22\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:simotion_p320-4e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9EE09494-625A-4FF7-8B3E-6510FF9AFC9C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:simotion_p320-4s_firmware:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D77F8F19-06C8-4B8A-8436-26508B2277DA\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:simotion_p320-4s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A49883F4-8360-4895-8E9E-B274A35BDE57\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mcafee:threat_intelligence_exchange_server:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"2.0.0\",\"versionEndIncluding\":\"2.3.1\",\"matchCriteriaId\":\"E26D80A2-E490-44B6-A8D2-1AEF487E72B2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mcafee:threat_intelligence_exchange_server:3.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A0F26126-55C2-4E2E-A586-D93FF38ABF6F\"}]}]}],\"references\":[{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00025.html\",\"source\":\"secure@intel.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00024.html\",\"source\":\"secure@intel.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00031.html\",\"source\":\"secure@intel.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2020/07/14/5\",\"source\":\"secure@intel.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://cert-portal.siemens.com/productcert/pdf/ssa-534763.pdf\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10318\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DT2VKDMQ3I37NBNJ256A2EXR7OJHXXKZ/\",\"source\":\"secure@intel.com\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GRFC7UAPKAFFH5WX3AMDUBVHLKYQA2NZ/\",\"source\":\"secure@intel.com\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NQZMOSHLTBBIECENNXA6M7DN5FEED4KI/\",\"source\":\"secure@intel.com\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T5OUM24ZC43G4IDT3JUCIHJTSDXJSK6Y/\",\"source\":\"secure@intel.com\"},{\"url\":\"https://usn.ubuntu.com/4385-1/\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/4387-1/\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/4388-1/\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/4389-1/\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/4390-1/\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/4391-1/\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/4392-1/\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/4393-1/\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00320.html\",\"source\":\"secure@intel.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00025.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00024.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00031.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2020/07/14/5\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://cert-portal.siemens.com/productcert/pdf/ssa-534763.pdf\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10318\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DT2VKDMQ3I37NBNJ256A2EXR7OJHXXKZ/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GRFC7UAPKAFFH5WX3AMDUBVHLKYQA2NZ/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NQZMOSHLTBBIECENNXA6M7DN5FEED4KI/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T5OUM24ZC43G4IDT3JUCIHJTSDXJSK6Y/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://usn.ubuntu.com/4385-1/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/4387-1/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/4388-1/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/4389-1/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/4390-1/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/4391-1/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/4392-1/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/4393-1/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00320.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}" } }
opensuse-su-2020:0985-1
Vulnerability from csaf_opensuse
Published
2020-07-17 22:28
Modified
2020-07-17 22:28
Summary
Security update for xen
Notes
Title of the patch
Security update for xen
Description of the patch
This update for xen fixes the following issues:
- CVE-2020-15563: Fixed inverted code paths in x86 dirty VRAM tracking (bsc#1173377).
- CVE-2020-15565: Fixed insufficient cache write-back under VT-d (bsc#1173378).
- CVE-2020-15566: Fixed incorrect error handling in event channel port allocation (bsc#1173376).
- CVE-2020-15567: Fixed non-atomic modification of live EPT PTE (bsc#1173380).
- CVE-2020-0543: Special Register Buffer Data Sampling (SRBDS) aka 'CrossTalk' (bsc#1172205).
Additional upstream bug fixes (bsc#1027519)
This update was imported from the SUSE:SLE-15-SP2:Update update project.
Patchnames
openSUSE-2020-985
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for xen", "title": "Title of the patch" }, { "category": "description", "text": "This update for xen fixes the following issues:\n\n- CVE-2020-15563: Fixed inverted code paths in x86 dirty VRAM tracking (bsc#1173377).\n- CVE-2020-15565: Fixed insufficient cache write-back under VT-d (bsc#1173378).\n- CVE-2020-15566: Fixed incorrect error handling in event channel port allocation (bsc#1173376).\n- CVE-2020-15567: Fixed non-atomic modification of live EPT PTE (bsc#1173380).\n- CVE-2020-0543: Special Register Buffer Data Sampling (SRBDS) aka \u0027CrossTalk\u0027 (bsc#1172205).\n\nAdditional upstream bug fixes (bsc#1027519)\n\nThis update was imported from the SUSE:SLE-15-SP2:Update update project.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-2020-985", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2020_0985-1.json" }, { "category": "self", "summary": "URL for openSUSE-SU-2020:0985-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/M6HXOTDBKTDVSG3RF4LKQV654JBFT3BZ/" }, { "category": "self", "summary": "E-Mail link for openSUSE-SU-2020:0985-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/M6HXOTDBKTDVSG3RF4LKQV654JBFT3BZ/" }, { "category": "self", "summary": "SUSE Bug 1027519", "url": "https://bugzilla.suse.com/1027519" }, { "category": "self", "summary": "SUSE Bug 1172205", "url": "https://bugzilla.suse.com/1172205" }, { "category": "self", "summary": "SUSE Bug 1173376", "url": "https://bugzilla.suse.com/1173376" }, { "category": "self", "summary": "SUSE Bug 1173377", "url": "https://bugzilla.suse.com/1173377" }, { "category": "self", "summary": "SUSE Bug 1173378", "url": "https://bugzilla.suse.com/1173378" }, { "category": "self", "summary": "SUSE Bug 1173380", "url": "https://bugzilla.suse.com/1173380" }, { "category": "self", "summary": "SUSE CVE CVE-2020-0543 page", "url": "https://www.suse.com/security/cve/CVE-2020-0543/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-15563 page", "url": "https://www.suse.com/security/cve/CVE-2020-15563/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-15565 page", "url": "https://www.suse.com/security/cve/CVE-2020-15565/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-15566 page", "url": "https://www.suse.com/security/cve/CVE-2020-15566/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-15567 page", "url": "https://www.suse.com/security/cve/CVE-2020-15567/" } ], "title": "Security update for xen", "tracking": { "current_release_date": "2020-07-17T22:28:33Z", "generator": { "date": "2020-07-17T22:28:33Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2020:0985-1", "initial_release_date": "2020-07-17T22:28:33Z", "revision_history": [ { "date": "2020-07-17T22:28:33Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "xen-devel-4.13.1_04-lp152.2.3.1.i586", "product": { "name": "xen-devel-4.13.1_04-lp152.2.3.1.i586", "product_id": "xen-devel-4.13.1_04-lp152.2.3.1.i586" } }, { "category": "product_version", "name": "xen-libs-4.13.1_04-lp152.2.3.1.i586", "product": { "name": "xen-libs-4.13.1_04-lp152.2.3.1.i586", "product_id": "xen-libs-4.13.1_04-lp152.2.3.1.i586" } }, { "category": "product_version", "name": "xen-tools-domU-4.13.1_04-lp152.2.3.1.i586", "product": { "name": "xen-tools-domU-4.13.1_04-lp152.2.3.1.i586", "product_id": "xen-tools-domU-4.13.1_04-lp152.2.3.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "xen-tools-xendomains-wait-disk-4.13.1_04-lp152.2.3.1.noarch", "product": { "name": "xen-tools-xendomains-wait-disk-4.13.1_04-lp152.2.3.1.noarch", "product_id": "xen-tools-xendomains-wait-disk-4.13.1_04-lp152.2.3.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "xen-4.13.1_04-lp152.2.3.1.x86_64", "product": { "name": "xen-4.13.1_04-lp152.2.3.1.x86_64", "product_id": "xen-4.13.1_04-lp152.2.3.1.x86_64" } }, { "category": "product_version", "name": "xen-devel-4.13.1_04-lp152.2.3.1.x86_64", "product": { "name": "xen-devel-4.13.1_04-lp152.2.3.1.x86_64", "product_id": "xen-devel-4.13.1_04-lp152.2.3.1.x86_64" } }, { "category": "product_version", "name": "xen-doc-html-4.13.1_04-lp152.2.3.1.x86_64", "product": { "name": "xen-doc-html-4.13.1_04-lp152.2.3.1.x86_64", "product_id": "xen-doc-html-4.13.1_04-lp152.2.3.1.x86_64" } }, { "category": "product_version", "name": "xen-libs-4.13.1_04-lp152.2.3.1.x86_64", "product": { "name": "xen-libs-4.13.1_04-lp152.2.3.1.x86_64", "product_id": "xen-libs-4.13.1_04-lp152.2.3.1.x86_64" } }, { "category": "product_version", "name": "xen-libs-32bit-4.13.1_04-lp152.2.3.1.x86_64", "product": { "name": "xen-libs-32bit-4.13.1_04-lp152.2.3.1.x86_64", "product_id": "xen-libs-32bit-4.13.1_04-lp152.2.3.1.x86_64" } }, { "category": "product_version", "name": "xen-tools-4.13.1_04-lp152.2.3.1.x86_64", "product": { "name": "xen-tools-4.13.1_04-lp152.2.3.1.x86_64", "product_id": "xen-tools-4.13.1_04-lp152.2.3.1.x86_64" } }, { "category": "product_version", "name": "xen-tools-domU-4.13.1_04-lp152.2.3.1.x86_64", "product": { "name": "xen-tools-domU-4.13.1_04-lp152.2.3.1.x86_64", "product_id": "xen-tools-domU-4.13.1_04-lp152.2.3.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Leap 15.2", "product": { "name": "openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap:15.2" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "xen-4.13.1_04-lp152.2.3.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:xen-4.13.1_04-lp152.2.3.1.x86_64" }, "product_reference": "xen-4.13.1_04-lp152.2.3.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "xen-devel-4.13.1_04-lp152.2.3.1.i586 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:xen-devel-4.13.1_04-lp152.2.3.1.i586" }, "product_reference": "xen-devel-4.13.1_04-lp152.2.3.1.i586", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "xen-devel-4.13.1_04-lp152.2.3.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:xen-devel-4.13.1_04-lp152.2.3.1.x86_64" }, "product_reference": "xen-devel-4.13.1_04-lp152.2.3.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "xen-doc-html-4.13.1_04-lp152.2.3.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:xen-doc-html-4.13.1_04-lp152.2.3.1.x86_64" }, "product_reference": "xen-doc-html-4.13.1_04-lp152.2.3.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.13.1_04-lp152.2.3.1.i586 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:xen-libs-4.13.1_04-lp152.2.3.1.i586" }, "product_reference": "xen-libs-4.13.1_04-lp152.2.3.1.i586", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.13.1_04-lp152.2.3.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:xen-libs-4.13.1_04-lp152.2.3.1.x86_64" }, "product_reference": "xen-libs-4.13.1_04-lp152.2.3.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-32bit-4.13.1_04-lp152.2.3.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:xen-libs-32bit-4.13.1_04-lp152.2.3.1.x86_64" }, "product_reference": "xen-libs-32bit-4.13.1_04-lp152.2.3.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.13.1_04-lp152.2.3.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:xen-tools-4.13.1_04-lp152.2.3.1.x86_64" }, "product_reference": "xen-tools-4.13.1_04-lp152.2.3.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.13.1_04-lp152.2.3.1.i586 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:xen-tools-domU-4.13.1_04-lp152.2.3.1.i586" }, "product_reference": "xen-tools-domU-4.13.1_04-lp152.2.3.1.i586", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.13.1_04-lp152.2.3.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:xen-tools-domU-4.13.1_04-lp152.2.3.1.x86_64" }, "product_reference": "xen-tools-domU-4.13.1_04-lp152.2.3.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-xendomains-wait-disk-4.13.1_04-lp152.2.3.1.noarch as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:xen-tools-xendomains-wait-disk-4.13.1_04-lp152.2.3.1.noarch" }, "product_reference": "xen-tools-xendomains-wait-disk-4.13.1_04-lp152.2.3.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.2" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-0543", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-0543" } ], "notes": [ { "category": "general", "text": "Incomplete cleanup from specific special register read operations in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:xen-4.13.1_04-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:xen-devel-4.13.1_04-lp152.2.3.1.i586", "openSUSE Leap 15.2:xen-devel-4.13.1_04-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:xen-doc-html-4.13.1_04-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:xen-libs-32bit-4.13.1_04-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:xen-libs-4.13.1_04-lp152.2.3.1.i586", "openSUSE Leap 15.2:xen-libs-4.13.1_04-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:xen-tools-4.13.1_04-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:xen-tools-domU-4.13.1_04-lp152.2.3.1.i586", "openSUSE Leap 15.2:xen-tools-domU-4.13.1_04-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:xen-tools-xendomains-wait-disk-4.13.1_04-lp152.2.3.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2020-0543", "url": "https://www.suse.com/security/cve/CVE-2020-0543" }, { "category": "external", "summary": "SUSE Bug 1154824 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1154824" }, { "category": "external", "summary": "SUSE Bug 1172205 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172205" }, { "category": "external", "summary": "SUSE Bug 1172206 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172206" }, { "category": "external", "summary": "SUSE Bug 1172207 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172207" }, { "category": "external", "summary": "SUSE Bug 1172770 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172770" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:xen-4.13.1_04-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:xen-devel-4.13.1_04-lp152.2.3.1.i586", "openSUSE Leap 15.2:xen-devel-4.13.1_04-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:xen-doc-html-4.13.1_04-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:xen-libs-32bit-4.13.1_04-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:xen-libs-4.13.1_04-lp152.2.3.1.i586", "openSUSE Leap 15.2:xen-libs-4.13.1_04-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:xen-tools-4.13.1_04-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:xen-tools-domU-4.13.1_04-lp152.2.3.1.i586", "openSUSE Leap 15.2:xen-tools-domU-4.13.1_04-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:xen-tools-xendomains-wait-disk-4.13.1_04-lp152.2.3.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:xen-4.13.1_04-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:xen-devel-4.13.1_04-lp152.2.3.1.i586", "openSUSE Leap 15.2:xen-devel-4.13.1_04-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:xen-doc-html-4.13.1_04-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:xen-libs-32bit-4.13.1_04-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:xen-libs-4.13.1_04-lp152.2.3.1.i586", "openSUSE Leap 15.2:xen-libs-4.13.1_04-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:xen-tools-4.13.1_04-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:xen-tools-domU-4.13.1_04-lp152.2.3.1.i586", "openSUSE Leap 15.2:xen-tools-domU-4.13.1_04-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:xen-tools-xendomains-wait-disk-4.13.1_04-lp152.2.3.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2020-07-17T22:28:33Z", "details": "moderate" } ], "title": "CVE-2020-0543" }, { "cve": "CVE-2020-15563", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-15563" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.13.x, allowing x86 HVM guest OS users to cause a hypervisor crash. An inverted conditional in x86 HVM guests\u0027 dirty video RAM tracking code allows such guests to make Xen de-reference a pointer guaranteed to point at unmapped space. A malicious or buggy HVM guest may cause the hypervisor to crash, resulting in Denial of Service (DoS) affecting the entire host. Xen versions from 4.8 onwards are affected. Xen versions 4.7 and earlier are not affected. Only x86 systems are affected. Arm systems are not affected. Only x86 HVM guests using shadow paging can leverage the vulnerability. In addition, there needs to be an entity actively monitoring a guest\u0027s video frame buffer (typically for display purposes) in order for such a guest to be able to leverage the vulnerability. x86 PV guests, as well as x86 HVM guests using hardware assisted paging (HAP), cannot leverage the vulnerability.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:xen-4.13.1_04-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:xen-devel-4.13.1_04-lp152.2.3.1.i586", "openSUSE Leap 15.2:xen-devel-4.13.1_04-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:xen-doc-html-4.13.1_04-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:xen-libs-32bit-4.13.1_04-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:xen-libs-4.13.1_04-lp152.2.3.1.i586", "openSUSE Leap 15.2:xen-libs-4.13.1_04-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:xen-tools-4.13.1_04-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:xen-tools-domU-4.13.1_04-lp152.2.3.1.i586", "openSUSE Leap 15.2:xen-tools-domU-4.13.1_04-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:xen-tools-xendomains-wait-disk-4.13.1_04-lp152.2.3.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2020-15563", "url": "https://www.suse.com/security/cve/CVE-2020-15563" }, { "category": "external", "summary": "SUSE Bug 1173377 for CVE-2020-15563", "url": "https://bugzilla.suse.com/1173377" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:xen-4.13.1_04-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:xen-devel-4.13.1_04-lp152.2.3.1.i586", "openSUSE Leap 15.2:xen-devel-4.13.1_04-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:xen-doc-html-4.13.1_04-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:xen-libs-32bit-4.13.1_04-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:xen-libs-4.13.1_04-lp152.2.3.1.i586", "openSUSE Leap 15.2:xen-libs-4.13.1_04-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:xen-tools-4.13.1_04-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:xen-tools-domU-4.13.1_04-lp152.2.3.1.i586", "openSUSE Leap 15.2:xen-tools-domU-4.13.1_04-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:xen-tools-xendomains-wait-disk-4.13.1_04-lp152.2.3.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:xen-4.13.1_04-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:xen-devel-4.13.1_04-lp152.2.3.1.i586", "openSUSE Leap 15.2:xen-devel-4.13.1_04-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:xen-doc-html-4.13.1_04-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:xen-libs-32bit-4.13.1_04-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:xen-libs-4.13.1_04-lp152.2.3.1.i586", "openSUSE Leap 15.2:xen-libs-4.13.1_04-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:xen-tools-4.13.1_04-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:xen-tools-domU-4.13.1_04-lp152.2.3.1.i586", "openSUSE Leap 15.2:xen-tools-domU-4.13.1_04-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:xen-tools-xendomains-wait-disk-4.13.1_04-lp152.2.3.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2020-07-17T22:28:33Z", "details": "moderate" } ], "title": "CVE-2020-15563" }, { "cve": "CVE-2020-15565", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-15565" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.13.x, allowing x86 Intel HVM guest OS users to cause a host OS denial of service or possibly gain privileges because of insufficient cache write-back under VT-d. When page tables are shared between IOMMU and CPU, changes to them require flushing of both TLBs. Furthermore, IOMMUs may be non-coherent, and hence prior to flushing IOMMU TLBs, a CPU cache also needs writing back to memory after changes were made. Such writing back of cached data was missing in particular when splitting large page mappings into smaller granularity ones. A malicious guest may be able to retain read/write DMA access to frames returned to Xen\u0027s free pool, and later reused for another purpose. Host crashes (leading to a Denial of Service) and privilege escalation cannot be ruled out. Xen versions from at least 3.2 onwards are affected. Only x86 Intel systems are affected. x86 AMD as well as Arm systems are not affected. Only x86 HVM guests using hardware assisted paging (HAP), having a passed through PCI device assigned, and having page table sharing enabled can leverage the vulnerability. Note that page table sharing will be enabled (by default) only if Xen considers IOMMU and CPU large page size support compatible.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:xen-4.13.1_04-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:xen-devel-4.13.1_04-lp152.2.3.1.i586", "openSUSE Leap 15.2:xen-devel-4.13.1_04-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:xen-doc-html-4.13.1_04-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:xen-libs-32bit-4.13.1_04-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:xen-libs-4.13.1_04-lp152.2.3.1.i586", "openSUSE Leap 15.2:xen-libs-4.13.1_04-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:xen-tools-4.13.1_04-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:xen-tools-domU-4.13.1_04-lp152.2.3.1.i586", "openSUSE Leap 15.2:xen-tools-domU-4.13.1_04-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:xen-tools-xendomains-wait-disk-4.13.1_04-lp152.2.3.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2020-15565", "url": "https://www.suse.com/security/cve/CVE-2020-15565" }, { "category": "external", "summary": "SUSE Bug 1173378 for CVE-2020-15565", "url": "https://bugzilla.suse.com/1173378" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:xen-4.13.1_04-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:xen-devel-4.13.1_04-lp152.2.3.1.i586", "openSUSE Leap 15.2:xen-devel-4.13.1_04-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:xen-doc-html-4.13.1_04-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:xen-libs-32bit-4.13.1_04-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:xen-libs-4.13.1_04-lp152.2.3.1.i586", "openSUSE Leap 15.2:xen-libs-4.13.1_04-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:xen-tools-4.13.1_04-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:xen-tools-domU-4.13.1_04-lp152.2.3.1.i586", "openSUSE Leap 15.2:xen-tools-domU-4.13.1_04-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:xen-tools-xendomains-wait-disk-4.13.1_04-lp152.2.3.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.9, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:xen-4.13.1_04-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:xen-devel-4.13.1_04-lp152.2.3.1.i586", "openSUSE Leap 15.2:xen-devel-4.13.1_04-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:xen-doc-html-4.13.1_04-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:xen-libs-32bit-4.13.1_04-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:xen-libs-4.13.1_04-lp152.2.3.1.i586", "openSUSE Leap 15.2:xen-libs-4.13.1_04-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:xen-tools-4.13.1_04-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:xen-tools-domU-4.13.1_04-lp152.2.3.1.i586", "openSUSE Leap 15.2:xen-tools-domU-4.13.1_04-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:xen-tools-xendomains-wait-disk-4.13.1_04-lp152.2.3.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2020-07-17T22:28:33Z", "details": "important" } ], "title": "CVE-2020-15565" }, { "cve": "CVE-2020-15566", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-15566" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.13.x, allowing guest OS users to cause a host OS crash because of incorrect error handling in event-channel port allocation. The allocation of an event-channel port may fail for multiple reasons: (1) port is already in use, (2) the memory allocation failed, or (3) the port we try to allocate is higher than what is supported by the ABI (e.g., 2L or FIFO) used by the guest or the limit set by an administrator (max_event_channels in xl cfg). Due to the missing error checks, only (1) will be considered an error. All the other cases will provide a valid port and will result in a crash when trying to access the event channel. When the administrator configured a guest to allow more than 1023 event channels, that guest may be able to crash the host. When Xen is out-of-memory, allocation of new event channels will result in crashing the host rather than reporting an error. Xen versions 4.10 and later are affected. All architectures are affected. The default configuration, when guests are created with xl/libxl, is not vulnerable, because of the default event-channel limit.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:xen-4.13.1_04-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:xen-devel-4.13.1_04-lp152.2.3.1.i586", "openSUSE Leap 15.2:xen-devel-4.13.1_04-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:xen-doc-html-4.13.1_04-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:xen-libs-32bit-4.13.1_04-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:xen-libs-4.13.1_04-lp152.2.3.1.i586", "openSUSE Leap 15.2:xen-libs-4.13.1_04-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:xen-tools-4.13.1_04-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:xen-tools-domU-4.13.1_04-lp152.2.3.1.i586", "openSUSE Leap 15.2:xen-tools-domU-4.13.1_04-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:xen-tools-xendomains-wait-disk-4.13.1_04-lp152.2.3.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2020-15566", "url": "https://www.suse.com/security/cve/CVE-2020-15566" }, { "category": "external", "summary": "SUSE Bug 1173376 for CVE-2020-15566", "url": "https://bugzilla.suse.com/1173376" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:xen-4.13.1_04-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:xen-devel-4.13.1_04-lp152.2.3.1.i586", "openSUSE Leap 15.2:xen-devel-4.13.1_04-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:xen-doc-html-4.13.1_04-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:xen-libs-32bit-4.13.1_04-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:xen-libs-4.13.1_04-lp152.2.3.1.i586", "openSUSE Leap 15.2:xen-libs-4.13.1_04-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:xen-tools-4.13.1_04-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:xen-tools-domU-4.13.1_04-lp152.2.3.1.i586", "openSUSE Leap 15.2:xen-tools-domU-4.13.1_04-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:xen-tools-xendomains-wait-disk-4.13.1_04-lp152.2.3.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:xen-4.13.1_04-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:xen-devel-4.13.1_04-lp152.2.3.1.i586", "openSUSE Leap 15.2:xen-devel-4.13.1_04-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:xen-doc-html-4.13.1_04-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:xen-libs-32bit-4.13.1_04-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:xen-libs-4.13.1_04-lp152.2.3.1.i586", "openSUSE Leap 15.2:xen-libs-4.13.1_04-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:xen-tools-4.13.1_04-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:xen-tools-domU-4.13.1_04-lp152.2.3.1.i586", "openSUSE Leap 15.2:xen-tools-domU-4.13.1_04-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:xen-tools-xendomains-wait-disk-4.13.1_04-lp152.2.3.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2020-07-17T22:28:33Z", "details": "moderate" } ], "title": "CVE-2020-15566" }, { "cve": "CVE-2020-15567", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-15567" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.13.x, allowing Intel guest OS users to gain privileges or cause a denial of service because of non-atomic modification of a live EPT PTE. When mapping guest EPT (nested paging) tables, Xen would in some circumstances use a series of non-atomic bitfield writes. Depending on the compiler version and optimisation flags, Xen might expose a dangerous partially written PTE to the hardware, which an attacker might be able to race to exploit. A guest administrator or perhaps even an unprivileged guest user might be able to cause denial of service, data corruption, or privilege escalation. Only systems using Intel CPUs are vulnerable. Systems using AMD CPUs, and Arm systems, are not vulnerable. Only systems using nested paging (hap, aka nested paging, aka in this case Intel EPT) are vulnerable. Only HVM and PVH guests can exploit the vulnerability. The presence and scope of the vulnerability depends on the precise optimisations performed by the compiler used to build Xen. If the compiler generates (a) a single 64-bit write, or (b) a series of read-modify-write operations in the same order as the source code, the hypervisor is not vulnerable. For example, in one test build using GCC 8.3 with normal settings, the compiler generated multiple (unlocked) read-modify-write operations in source-code order, which did not constitute a vulnerability. We have not been able to survey compilers; consequently we cannot say which compiler(s) might produce vulnerable code (with which code-generation options). The source code clearly violates the C rules, and thus should be considered vulnerable.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:xen-4.13.1_04-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:xen-devel-4.13.1_04-lp152.2.3.1.i586", "openSUSE Leap 15.2:xen-devel-4.13.1_04-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:xen-doc-html-4.13.1_04-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:xen-libs-32bit-4.13.1_04-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:xen-libs-4.13.1_04-lp152.2.3.1.i586", "openSUSE Leap 15.2:xen-libs-4.13.1_04-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:xen-tools-4.13.1_04-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:xen-tools-domU-4.13.1_04-lp152.2.3.1.i586", "openSUSE Leap 15.2:xen-tools-domU-4.13.1_04-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:xen-tools-xendomains-wait-disk-4.13.1_04-lp152.2.3.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2020-15567", "url": "https://www.suse.com/security/cve/CVE-2020-15567" }, { "category": "external", "summary": "SUSE Bug 1173380 for CVE-2020-15567", "url": "https://bugzilla.suse.com/1173380" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2020-15567", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:xen-4.13.1_04-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:xen-devel-4.13.1_04-lp152.2.3.1.i586", "openSUSE Leap 15.2:xen-devel-4.13.1_04-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:xen-doc-html-4.13.1_04-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:xen-libs-32bit-4.13.1_04-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:xen-libs-4.13.1_04-lp152.2.3.1.i586", "openSUSE Leap 15.2:xen-libs-4.13.1_04-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:xen-tools-4.13.1_04-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:xen-tools-domU-4.13.1_04-lp152.2.3.1.i586", "openSUSE Leap 15.2:xen-tools-domU-4.13.1_04-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:xen-tools-xendomains-wait-disk-4.13.1_04-lp152.2.3.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:xen-4.13.1_04-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:xen-devel-4.13.1_04-lp152.2.3.1.i586", "openSUSE Leap 15.2:xen-devel-4.13.1_04-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:xen-doc-html-4.13.1_04-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:xen-libs-32bit-4.13.1_04-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:xen-libs-4.13.1_04-lp152.2.3.1.i586", "openSUSE Leap 15.2:xen-libs-4.13.1_04-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:xen-tools-4.13.1_04-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:xen-tools-domU-4.13.1_04-lp152.2.3.1.i586", "openSUSE Leap 15.2:xen-tools-domU-4.13.1_04-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:xen-tools-xendomains-wait-disk-4.13.1_04-lp152.2.3.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2020-07-17T22:28:33Z", "details": "moderate" } ], "title": "CVE-2020-15567" } ] }
opensuse-su-2024:11369-1
Vulnerability from csaf_opensuse
Published
2024-06-15 00:00
Modified
2024-06-15 00:00
Summary
sca-patterns-sle11-1.3.5-1.2 on GA media
Notes
Title of the patch
sca-patterns-sle11-1.3.5-1.2 on GA media
Description of the patch
These are all security issues fixed in the sca-patterns-sle11-1.3.5-1.2 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2024-11369
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "sca-patterns-sle11-1.3.5-1.2 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the sca-patterns-sle11-1.3.5-1.2 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2024-11369", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_11369-1.json" }, { "category": "self", "summary": "SUSE CVE CVE-2020-0543 page", "url": "https://www.suse.com/security/cve/CVE-2020-0543/" } ], "title": "sca-patterns-sle11-1.3.5-1.2 on GA media", "tracking": { "current_release_date": "2024-06-15T00:00:00Z", "generator": { "date": "2024-06-15T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2024:11369-1", "initial_release_date": "2024-06-15T00:00:00Z", "revision_history": [ { "date": "2024-06-15T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "sca-patterns-sle11-1.3.5-1.2.aarch64", "product": { "name": "sca-patterns-sle11-1.3.5-1.2.aarch64", "product_id": "sca-patterns-sle11-1.3.5-1.2.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "sca-patterns-sle11-1.3.5-1.2.ppc64le", "product": { "name": "sca-patterns-sle11-1.3.5-1.2.ppc64le", "product_id": "sca-patterns-sle11-1.3.5-1.2.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "sca-patterns-sle11-1.3.5-1.2.s390x", "product": { "name": "sca-patterns-sle11-1.3.5-1.2.s390x", "product_id": "sca-patterns-sle11-1.3.5-1.2.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "sca-patterns-sle11-1.3.5-1.2.x86_64", "product": { "name": "sca-patterns-sle11-1.3.5-1.2.x86_64", "product_id": "sca-patterns-sle11-1.3.5-1.2.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "sca-patterns-sle11-1.3.5-1.2.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:sca-patterns-sle11-1.3.5-1.2.aarch64" }, "product_reference": "sca-patterns-sle11-1.3.5-1.2.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "sca-patterns-sle11-1.3.5-1.2.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:sca-patterns-sle11-1.3.5-1.2.ppc64le" }, "product_reference": "sca-patterns-sle11-1.3.5-1.2.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "sca-patterns-sle11-1.3.5-1.2.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:sca-patterns-sle11-1.3.5-1.2.s390x" }, "product_reference": "sca-patterns-sle11-1.3.5-1.2.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "sca-patterns-sle11-1.3.5-1.2.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:sca-patterns-sle11-1.3.5-1.2.x86_64" }, "product_reference": "sca-patterns-sle11-1.3.5-1.2.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-0543", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-0543" } ], "notes": [ { "category": "general", "text": "Incomplete cleanup from specific special register read operations in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:sca-patterns-sle11-1.3.5-1.2.aarch64", "openSUSE Tumbleweed:sca-patterns-sle11-1.3.5-1.2.ppc64le", "openSUSE Tumbleweed:sca-patterns-sle11-1.3.5-1.2.s390x", "openSUSE Tumbleweed:sca-patterns-sle11-1.3.5-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-0543", "url": "https://www.suse.com/security/cve/CVE-2020-0543" }, { "category": "external", "summary": "SUSE Bug 1154824 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1154824" }, { "category": "external", "summary": "SUSE Bug 1172205 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172205" }, { "category": "external", "summary": "SUSE Bug 1172206 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172206" }, { "category": "external", "summary": "SUSE Bug 1172207 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172207" }, { "category": "external", "summary": "SUSE Bug 1172770 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172770" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:sca-patterns-sle11-1.3.5-1.2.aarch64", "openSUSE Tumbleweed:sca-patterns-sle11-1.3.5-1.2.ppc64le", "openSUSE Tumbleweed:sca-patterns-sle11-1.3.5-1.2.s390x", "openSUSE Tumbleweed:sca-patterns-sle11-1.3.5-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:sca-patterns-sle11-1.3.5-1.2.aarch64", "openSUSE Tumbleweed:sca-patterns-sle11-1.3.5-1.2.ppc64le", "openSUSE Tumbleweed:sca-patterns-sle11-1.3.5-1.2.s390x", "openSUSE Tumbleweed:sca-patterns-sle11-1.3.5-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-0543" } ] }
opensuse-su-2024:11370-1
Vulnerability from csaf_opensuse
Published
2024-06-15 00:00
Modified
2024-06-15 00:00
Summary
sca-patterns-sle12-1.0.8-2.2 on GA media
Notes
Title of the patch
sca-patterns-sle12-1.0.8-2.2 on GA media
Description of the patch
These are all security issues fixed in the sca-patterns-sle12-1.0.8-2.2 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2024-11370
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "sca-patterns-sle12-1.0.8-2.2 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the sca-patterns-sle12-1.0.8-2.2 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2024-11370", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_11370-1.json" }, { "category": "self", "summary": "SUSE CVE CVE-2020-0543 page", "url": "https://www.suse.com/security/cve/CVE-2020-0543/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-0548 page", "url": "https://www.suse.com/security/cve/CVE-2020-0548/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12351 page", "url": "https://www.suse.com/security/cve/CVE-2020-12351/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-1472 page", "url": "https://www.suse.com/security/cve/CVE-2020-1472/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25705 page", "url": "https://www.suse.com/security/cve/CVE-2020-25705/" } ], "title": "sca-patterns-sle12-1.0.8-2.2 on GA media", "tracking": { "current_release_date": "2024-06-15T00:00:00Z", "generator": { "date": "2024-06-15T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2024:11370-1", "initial_release_date": "2024-06-15T00:00:00Z", "revision_history": [ { "date": "2024-06-15T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "sca-patterns-sle12-1.0.8-2.2.aarch64", "product": { "name": "sca-patterns-sle12-1.0.8-2.2.aarch64", "product_id": "sca-patterns-sle12-1.0.8-2.2.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "sca-patterns-sle12-1.0.8-2.2.ppc64le", "product": { "name": "sca-patterns-sle12-1.0.8-2.2.ppc64le", "product_id": "sca-patterns-sle12-1.0.8-2.2.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "sca-patterns-sle12-1.0.8-2.2.s390x", "product": { "name": "sca-patterns-sle12-1.0.8-2.2.s390x", "product_id": "sca-patterns-sle12-1.0.8-2.2.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "sca-patterns-sle12-1.0.8-2.2.x86_64", "product": { "name": "sca-patterns-sle12-1.0.8-2.2.x86_64", "product_id": "sca-patterns-sle12-1.0.8-2.2.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "sca-patterns-sle12-1.0.8-2.2.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:sca-patterns-sle12-1.0.8-2.2.aarch64" }, "product_reference": "sca-patterns-sle12-1.0.8-2.2.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "sca-patterns-sle12-1.0.8-2.2.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:sca-patterns-sle12-1.0.8-2.2.ppc64le" }, "product_reference": "sca-patterns-sle12-1.0.8-2.2.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "sca-patterns-sle12-1.0.8-2.2.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:sca-patterns-sle12-1.0.8-2.2.s390x" }, "product_reference": "sca-patterns-sle12-1.0.8-2.2.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "sca-patterns-sle12-1.0.8-2.2.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:sca-patterns-sle12-1.0.8-2.2.x86_64" }, "product_reference": "sca-patterns-sle12-1.0.8-2.2.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-0543", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-0543" } ], "notes": [ { "category": "general", "text": "Incomplete cleanup from specific special register read operations in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:sca-patterns-sle12-1.0.8-2.2.aarch64", "openSUSE Tumbleweed:sca-patterns-sle12-1.0.8-2.2.ppc64le", "openSUSE Tumbleweed:sca-patterns-sle12-1.0.8-2.2.s390x", "openSUSE Tumbleweed:sca-patterns-sle12-1.0.8-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-0543", "url": "https://www.suse.com/security/cve/CVE-2020-0543" }, { "category": "external", "summary": "SUSE Bug 1154824 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1154824" }, { "category": "external", "summary": "SUSE Bug 1172205 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172205" }, { "category": "external", "summary": "SUSE Bug 1172206 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172206" }, { "category": "external", "summary": "SUSE Bug 1172207 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172207" }, { "category": "external", "summary": "SUSE Bug 1172770 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172770" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:sca-patterns-sle12-1.0.8-2.2.aarch64", "openSUSE Tumbleweed:sca-patterns-sle12-1.0.8-2.2.ppc64le", "openSUSE Tumbleweed:sca-patterns-sle12-1.0.8-2.2.s390x", "openSUSE Tumbleweed:sca-patterns-sle12-1.0.8-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:sca-patterns-sle12-1.0.8-2.2.aarch64", "openSUSE Tumbleweed:sca-patterns-sle12-1.0.8-2.2.ppc64le", "openSUSE Tumbleweed:sca-patterns-sle12-1.0.8-2.2.s390x", "openSUSE Tumbleweed:sca-patterns-sle12-1.0.8-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-0543" }, { "cve": "CVE-2020-0548", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-0548" } ], "notes": [ { "category": "general", "text": "Cleanup errors in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:sca-patterns-sle12-1.0.8-2.2.aarch64", "openSUSE Tumbleweed:sca-patterns-sle12-1.0.8-2.2.ppc64le", "openSUSE Tumbleweed:sca-patterns-sle12-1.0.8-2.2.s390x", "openSUSE Tumbleweed:sca-patterns-sle12-1.0.8-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-0548", "url": "https://www.suse.com/security/cve/CVE-2020-0548" }, { "category": "external", "summary": "SUSE Bug 1156353 for CVE-2020-0548", "url": "https://bugzilla.suse.com/1156353" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:sca-patterns-sle12-1.0.8-2.2.aarch64", "openSUSE Tumbleweed:sca-patterns-sle12-1.0.8-2.2.ppc64le", "openSUSE Tumbleweed:sca-patterns-sle12-1.0.8-2.2.s390x", "openSUSE Tumbleweed:sca-patterns-sle12-1.0.8-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.8, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:sca-patterns-sle12-1.0.8-2.2.aarch64", "openSUSE Tumbleweed:sca-patterns-sle12-1.0.8-2.2.ppc64le", "openSUSE Tumbleweed:sca-patterns-sle12-1.0.8-2.2.s390x", "openSUSE Tumbleweed:sca-patterns-sle12-1.0.8-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-0548" }, { "cve": "CVE-2020-12351", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12351" } ], "notes": [ { "category": "general", "text": "Improper input validation in BlueZ may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:sca-patterns-sle12-1.0.8-2.2.aarch64", "openSUSE Tumbleweed:sca-patterns-sle12-1.0.8-2.2.ppc64le", "openSUSE Tumbleweed:sca-patterns-sle12-1.0.8-2.2.s390x", "openSUSE Tumbleweed:sca-patterns-sle12-1.0.8-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12351", "url": "https://www.suse.com/security/cve/CVE-2020-12351" }, { "category": "external", "summary": "SUSE Bug 1177724 for CVE-2020-12351", "url": "https://bugzilla.suse.com/1177724" }, { "category": "external", "summary": "SUSE Bug 1177729 for CVE-2020-12351", "url": "https://bugzilla.suse.com/1177729" }, { "category": "external", "summary": "SUSE Bug 1178397 for CVE-2020-12351", "url": "https://bugzilla.suse.com/1178397" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:sca-patterns-sle12-1.0.8-2.2.aarch64", "openSUSE Tumbleweed:sca-patterns-sle12-1.0.8-2.2.ppc64le", "openSUSE Tumbleweed:sca-patterns-sle12-1.0.8-2.2.s390x", "openSUSE Tumbleweed:sca-patterns-sle12-1.0.8-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:sca-patterns-sle12-1.0.8-2.2.aarch64", "openSUSE Tumbleweed:sca-patterns-sle12-1.0.8-2.2.ppc64le", "openSUSE Tumbleweed:sca-patterns-sle12-1.0.8-2.2.s390x", "openSUSE Tumbleweed:sca-patterns-sle12-1.0.8-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-12351" }, { "cve": "CVE-2020-1472", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-1472" } ], "notes": [ { "category": "general", "text": "unknown", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:sca-patterns-sle12-1.0.8-2.2.aarch64", "openSUSE Tumbleweed:sca-patterns-sle12-1.0.8-2.2.ppc64le", "openSUSE Tumbleweed:sca-patterns-sle12-1.0.8-2.2.s390x", "openSUSE Tumbleweed:sca-patterns-sle12-1.0.8-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-1472", "url": "https://www.suse.com/security/cve/CVE-2020-1472" }, { "category": "external", "summary": "SUSE Bug 1176579 for CVE-2020-1472", "url": "https://bugzilla.suse.com/1176579" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:sca-patterns-sle12-1.0.8-2.2.aarch64", "openSUSE Tumbleweed:sca-patterns-sle12-1.0.8-2.2.ppc64le", "openSUSE Tumbleweed:sca-patterns-sle12-1.0.8-2.2.s390x", "openSUSE Tumbleweed:sca-patterns-sle12-1.0.8-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:sca-patterns-sle12-1.0.8-2.2.aarch64", "openSUSE Tumbleweed:sca-patterns-sle12-1.0.8-2.2.ppc64le", "openSUSE Tumbleweed:sca-patterns-sle12-1.0.8-2.2.s390x", "openSUSE Tumbleweed:sca-patterns-sle12-1.0.8-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2020-1472" }, { "cve": "CVE-2020-25705", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25705" } ], "notes": [ { "category": "general", "text": "A flaw in ICMP packets in the Linux kernel may allow an attacker to quickly scan open UDP ports. This flaw allows an off-path remote attacker to effectively bypass source port UDP randomization. Software that relies on UDP source port randomization are indirectly affected as well on the Linux Based Products (RUGGEDCOM RM1224: All versions between v5.0 and v6.4, SCALANCE M-800: All versions between v5.0 and v6.4, SCALANCE S615: All versions between v5.0 and v6.4, SCALANCE SC-600: All versions prior to v2.1.3, SCALANCE W1750D: v8.3.0.1, v8.6.0, and v8.7.0, SIMATIC Cloud Connect 7: All versions, SIMATIC MV500 Family: All versions, SIMATIC NET CP 1243-1 (incl. SIPLUS variants): Versions 3.1.39 and later, SIMATIC NET CP 1243-7 LTE EU: Version", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:sca-patterns-sle12-1.0.8-2.2.aarch64", "openSUSE Tumbleweed:sca-patterns-sle12-1.0.8-2.2.ppc64le", "openSUSE Tumbleweed:sca-patterns-sle12-1.0.8-2.2.s390x", "openSUSE Tumbleweed:sca-patterns-sle12-1.0.8-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25705", "url": "https://www.suse.com/security/cve/CVE-2020-25705" }, { "category": "external", "summary": "SUSE Bug 1175721 for CVE-2020-25705", "url": "https://bugzilla.suse.com/1175721" }, { "category": "external", "summary": "SUSE Bug 1178782 for CVE-2020-25705", "url": "https://bugzilla.suse.com/1178782" }, { "category": "external", "summary": "SUSE Bug 1178783 for CVE-2020-25705", "url": "https://bugzilla.suse.com/1178783" }, { "category": "external", "summary": "SUSE Bug 1191790 for CVE-2020-25705", "url": "https://bugzilla.suse.com/1191790" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:sca-patterns-sle12-1.0.8-2.2.aarch64", "openSUSE Tumbleweed:sca-patterns-sle12-1.0.8-2.2.ppc64le", "openSUSE Tumbleweed:sca-patterns-sle12-1.0.8-2.2.s390x", "openSUSE Tumbleweed:sca-patterns-sle12-1.0.8-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:sca-patterns-sle12-1.0.8-2.2.aarch64", "openSUSE Tumbleweed:sca-patterns-sle12-1.0.8-2.2.ppc64le", "openSUSE Tumbleweed:sca-patterns-sle12-1.0.8-2.2.s390x", "openSUSE Tumbleweed:sca-patterns-sle12-1.0.8-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-25705" } ] }
opensuse-su-2024:11371-1
Vulnerability from csaf_opensuse
Published
2024-06-15 00:00
Modified
2024-06-15 00:00
Summary
sca-patterns-sle15-1.0.8-2.2 on GA media
Notes
Title of the patch
sca-patterns-sle15-1.0.8-2.2 on GA media
Description of the patch
These are all security issues fixed in the sca-patterns-sle15-1.0.8-2.2 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2024-11371
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "sca-patterns-sle15-1.0.8-2.2 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the sca-patterns-sle15-1.0.8-2.2 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2024-11371", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_11371-1.json" }, { "category": "self", "summary": "SUSE CVE CVE-2020-0543 page", "url": "https://www.suse.com/security/cve/CVE-2020-0543/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-0548 page", "url": "https://www.suse.com/security/cve/CVE-2020-0548/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12351 page", "url": "https://www.suse.com/security/cve/CVE-2020-12351/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-1472 page", "url": "https://www.suse.com/security/cve/CVE-2020-1472/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25705 page", "url": "https://www.suse.com/security/cve/CVE-2020-25705/" } ], "title": "sca-patterns-sle15-1.0.8-2.2 on GA media", "tracking": { "current_release_date": "2024-06-15T00:00:00Z", "generator": { "date": "2024-06-15T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2024:11371-1", "initial_release_date": "2024-06-15T00:00:00Z", "revision_history": [ { "date": "2024-06-15T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "sca-patterns-sle15-1.0.8-2.2.aarch64", "product": { "name": "sca-patterns-sle15-1.0.8-2.2.aarch64", "product_id": "sca-patterns-sle15-1.0.8-2.2.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "sca-patterns-sle15-1.0.8-2.2.ppc64le", "product": { "name": "sca-patterns-sle15-1.0.8-2.2.ppc64le", "product_id": "sca-patterns-sle15-1.0.8-2.2.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "sca-patterns-sle15-1.0.8-2.2.s390x", "product": { "name": "sca-patterns-sle15-1.0.8-2.2.s390x", "product_id": "sca-patterns-sle15-1.0.8-2.2.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "sca-patterns-sle15-1.0.8-2.2.x86_64", "product": { "name": "sca-patterns-sle15-1.0.8-2.2.x86_64", "product_id": "sca-patterns-sle15-1.0.8-2.2.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "sca-patterns-sle15-1.0.8-2.2.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:sca-patterns-sle15-1.0.8-2.2.aarch64" }, "product_reference": "sca-patterns-sle15-1.0.8-2.2.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "sca-patterns-sle15-1.0.8-2.2.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:sca-patterns-sle15-1.0.8-2.2.ppc64le" }, "product_reference": "sca-patterns-sle15-1.0.8-2.2.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "sca-patterns-sle15-1.0.8-2.2.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:sca-patterns-sle15-1.0.8-2.2.s390x" }, "product_reference": "sca-patterns-sle15-1.0.8-2.2.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "sca-patterns-sle15-1.0.8-2.2.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:sca-patterns-sle15-1.0.8-2.2.x86_64" }, "product_reference": "sca-patterns-sle15-1.0.8-2.2.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-0543", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-0543" } ], "notes": [ { "category": "general", "text": "Incomplete cleanup from specific special register read operations in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:sca-patterns-sle15-1.0.8-2.2.aarch64", "openSUSE Tumbleweed:sca-patterns-sle15-1.0.8-2.2.ppc64le", "openSUSE Tumbleweed:sca-patterns-sle15-1.0.8-2.2.s390x", "openSUSE Tumbleweed:sca-patterns-sle15-1.0.8-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-0543", "url": "https://www.suse.com/security/cve/CVE-2020-0543" }, { "category": "external", "summary": "SUSE Bug 1154824 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1154824" }, { "category": "external", "summary": "SUSE Bug 1172205 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172205" }, { "category": "external", "summary": "SUSE Bug 1172206 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172206" }, { "category": "external", "summary": "SUSE Bug 1172207 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172207" }, { "category": "external", "summary": "SUSE Bug 1172770 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172770" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:sca-patterns-sle15-1.0.8-2.2.aarch64", "openSUSE Tumbleweed:sca-patterns-sle15-1.0.8-2.2.ppc64le", "openSUSE Tumbleweed:sca-patterns-sle15-1.0.8-2.2.s390x", "openSUSE Tumbleweed:sca-patterns-sle15-1.0.8-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:sca-patterns-sle15-1.0.8-2.2.aarch64", "openSUSE Tumbleweed:sca-patterns-sle15-1.0.8-2.2.ppc64le", "openSUSE Tumbleweed:sca-patterns-sle15-1.0.8-2.2.s390x", "openSUSE Tumbleweed:sca-patterns-sle15-1.0.8-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-0543" }, { "cve": "CVE-2020-0548", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-0548" } ], "notes": [ { "category": "general", "text": "Cleanup errors in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:sca-patterns-sle15-1.0.8-2.2.aarch64", "openSUSE Tumbleweed:sca-patterns-sle15-1.0.8-2.2.ppc64le", "openSUSE Tumbleweed:sca-patterns-sle15-1.0.8-2.2.s390x", "openSUSE Tumbleweed:sca-patterns-sle15-1.0.8-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-0548", "url": "https://www.suse.com/security/cve/CVE-2020-0548" }, { "category": "external", "summary": "SUSE Bug 1156353 for CVE-2020-0548", "url": "https://bugzilla.suse.com/1156353" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:sca-patterns-sle15-1.0.8-2.2.aarch64", "openSUSE Tumbleweed:sca-patterns-sle15-1.0.8-2.2.ppc64le", "openSUSE Tumbleweed:sca-patterns-sle15-1.0.8-2.2.s390x", "openSUSE Tumbleweed:sca-patterns-sle15-1.0.8-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.8, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:sca-patterns-sle15-1.0.8-2.2.aarch64", "openSUSE Tumbleweed:sca-patterns-sle15-1.0.8-2.2.ppc64le", "openSUSE Tumbleweed:sca-patterns-sle15-1.0.8-2.2.s390x", "openSUSE Tumbleweed:sca-patterns-sle15-1.0.8-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-0548" }, { "cve": "CVE-2020-12351", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12351" } ], "notes": [ { "category": "general", "text": "Improper input validation in BlueZ may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:sca-patterns-sle15-1.0.8-2.2.aarch64", "openSUSE Tumbleweed:sca-patterns-sle15-1.0.8-2.2.ppc64le", "openSUSE Tumbleweed:sca-patterns-sle15-1.0.8-2.2.s390x", "openSUSE Tumbleweed:sca-patterns-sle15-1.0.8-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12351", "url": "https://www.suse.com/security/cve/CVE-2020-12351" }, { "category": "external", "summary": "SUSE Bug 1177724 for CVE-2020-12351", "url": "https://bugzilla.suse.com/1177724" }, { "category": "external", "summary": "SUSE Bug 1177729 for CVE-2020-12351", "url": "https://bugzilla.suse.com/1177729" }, { "category": "external", "summary": "SUSE Bug 1178397 for CVE-2020-12351", "url": "https://bugzilla.suse.com/1178397" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:sca-patterns-sle15-1.0.8-2.2.aarch64", "openSUSE Tumbleweed:sca-patterns-sle15-1.0.8-2.2.ppc64le", "openSUSE Tumbleweed:sca-patterns-sle15-1.0.8-2.2.s390x", "openSUSE Tumbleweed:sca-patterns-sle15-1.0.8-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:sca-patterns-sle15-1.0.8-2.2.aarch64", "openSUSE Tumbleweed:sca-patterns-sle15-1.0.8-2.2.ppc64le", "openSUSE Tumbleweed:sca-patterns-sle15-1.0.8-2.2.s390x", "openSUSE Tumbleweed:sca-patterns-sle15-1.0.8-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-12351" }, { "cve": "CVE-2020-1472", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-1472" } ], "notes": [ { "category": "general", "text": "unknown", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:sca-patterns-sle15-1.0.8-2.2.aarch64", "openSUSE Tumbleweed:sca-patterns-sle15-1.0.8-2.2.ppc64le", "openSUSE Tumbleweed:sca-patterns-sle15-1.0.8-2.2.s390x", "openSUSE Tumbleweed:sca-patterns-sle15-1.0.8-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-1472", "url": "https://www.suse.com/security/cve/CVE-2020-1472" }, { "category": "external", "summary": "SUSE Bug 1176579 for CVE-2020-1472", "url": "https://bugzilla.suse.com/1176579" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:sca-patterns-sle15-1.0.8-2.2.aarch64", "openSUSE Tumbleweed:sca-patterns-sle15-1.0.8-2.2.ppc64le", "openSUSE Tumbleweed:sca-patterns-sle15-1.0.8-2.2.s390x", "openSUSE Tumbleweed:sca-patterns-sle15-1.0.8-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:sca-patterns-sle15-1.0.8-2.2.aarch64", "openSUSE Tumbleweed:sca-patterns-sle15-1.0.8-2.2.ppc64le", "openSUSE Tumbleweed:sca-patterns-sle15-1.0.8-2.2.s390x", "openSUSE Tumbleweed:sca-patterns-sle15-1.0.8-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2020-1472" }, { "cve": "CVE-2020-25705", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25705" } ], "notes": [ { "category": "general", "text": "A flaw in ICMP packets in the Linux kernel may allow an attacker to quickly scan open UDP ports. This flaw allows an off-path remote attacker to effectively bypass source port UDP randomization. Software that relies on UDP source port randomization are indirectly affected as well on the Linux Based Products (RUGGEDCOM RM1224: All versions between v5.0 and v6.4, SCALANCE M-800: All versions between v5.0 and v6.4, SCALANCE S615: All versions between v5.0 and v6.4, SCALANCE SC-600: All versions prior to v2.1.3, SCALANCE W1750D: v8.3.0.1, v8.6.0, and v8.7.0, SIMATIC Cloud Connect 7: All versions, SIMATIC MV500 Family: All versions, SIMATIC NET CP 1243-1 (incl. SIPLUS variants): Versions 3.1.39 and later, SIMATIC NET CP 1243-7 LTE EU: Version", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:sca-patterns-sle15-1.0.8-2.2.aarch64", "openSUSE Tumbleweed:sca-patterns-sle15-1.0.8-2.2.ppc64le", "openSUSE Tumbleweed:sca-patterns-sle15-1.0.8-2.2.s390x", "openSUSE Tumbleweed:sca-patterns-sle15-1.0.8-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25705", "url": "https://www.suse.com/security/cve/CVE-2020-25705" }, { "category": "external", "summary": "SUSE Bug 1175721 for CVE-2020-25705", "url": "https://bugzilla.suse.com/1175721" }, { "category": "external", "summary": "SUSE Bug 1178782 for CVE-2020-25705", "url": "https://bugzilla.suse.com/1178782" }, { "category": "external", "summary": "SUSE Bug 1178783 for CVE-2020-25705", "url": "https://bugzilla.suse.com/1178783" }, { "category": "external", "summary": "SUSE Bug 1191790 for CVE-2020-25705", "url": "https://bugzilla.suse.com/1191790" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:sca-patterns-sle15-1.0.8-2.2.aarch64", "openSUSE Tumbleweed:sca-patterns-sle15-1.0.8-2.2.ppc64le", "openSUSE Tumbleweed:sca-patterns-sle15-1.0.8-2.2.s390x", "openSUSE Tumbleweed:sca-patterns-sle15-1.0.8-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:sca-patterns-sle15-1.0.8-2.2.aarch64", "openSUSE Tumbleweed:sca-patterns-sle15-1.0.8-2.2.ppc64le", "openSUSE Tumbleweed:sca-patterns-sle15-1.0.8-2.2.s390x", "openSUSE Tumbleweed:sca-patterns-sle15-1.0.8-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-25705" } ] }
opensuse-su-2020:0791-1
Vulnerability from csaf_opensuse
Published
2020-06-10 17:58
Modified
2020-06-10 17:58
Summary
Security update for ucode-intel
Notes
Title of the patch
Security update for ucode-intel
Description of the patch
This update for ucode-intel fixes the following issues:
Updated Intel CPU Microcode to 20200602 (prerelease) (bsc#1172466)
This update contains security mitigations for:
- CVE-2020-0543: Fixed a side channel attack against special registers
which could have resulted in leaking of read values to cores other
than the one which called it. This attack is known as Special Register
Buffer Data Sampling (SRBDS) or 'CrossTalk' (bsc#1154824).
- CVE-2020-0548,CVE-2020-0549: Additional ucode updates were supplied to
mitigate the Vector Register and L1D Eviction Sampling aka 'CacheOutAttack'
attacks. (bsc#1156353)
Microcode Table:
Processor Identifier Version Products
Model Stepping F-MO-S/PI Old->New
---- new platforms ----------------------------------------
---- updated platforms ------------------------------------
HSW C0 6-3c-3/32 00000027->00000028 Core Gen4
BDW-U/Y E0/F0 6-3d-4/c0 0000002e->0000002f Core Gen5
HSW-U C0/D0 6-45-1/72 00000025->00000026 Core Gen4
HSW-H C0 6-46-1/32 0000001b->0000001c Core Gen4
BDW-H/E3 E0/G0 6-47-1/22 00000021->00000022 Core Gen5
SKL-U/Y D0 6-4e-3/c0 000000d6->000000dc Core Gen6 Mobile
SKL-U23e K1 6-4e-3/c0 000000d6->000000dc Core Gen6 Mobile
SKX-SP B1 6-55-3/97 01000151->01000157 Xeon Scalable
SKX-SP H0/M0/U0 6-55-4/b7 02000065->02006906 Xeon Scalable
SKX-D M1 6-55-4/b7 02000065->02006906 Xeon D-21xx
CLX-SP B0 6-55-6/bf 0400002c->04002f01 Xeon Scalable Gen2
CLX-SP B1 6-55-7/bf 0500002c->04002f01 Xeon Scalable Gen2
SKL-H/S R0/N0 6-5e-3/36 000000d6->000000dc Core Gen6; Xeon E3 v5
AML-Y22 H0 6-8e-9/10 000000ca->000000d6 Core Gen8 Mobile
KBL-U/Y H0 6-8e-9/c0 000000ca->000000d6 Core Gen7 Mobile
CFL-U43e D0 6-8e-a/c0 000000ca->000000d6 Core Gen8 Mobile
WHL-U W0 6-8e-b/d0 000000ca->000000d6 Core Gen8 Mobile
AML-Y42 V0 6-8e-c/94 000000ca->000000d6 Core Gen10 Mobile
CML-Y42 V0 6-8e-c/94 000000ca->000000d6 Core Gen10 Mobile
WHL-U V0 6-8e-c/94 000000ca->000000d6 Core Gen8 Mobile
KBL-G/H/S/E3 B0 6-9e-9/2a 000000ca->000000d6 Core Gen7; Xeon E3 v6
CFL-H/S/E3 U0 6-9e-a/22 000000ca->000000d6 Core Gen8 Desktop, Mobile, Xeon E
CFL-S B0 6-9e-b/02 000000ca->000000d6 Core Gen8
CFL-H/S P0 6-9e-c/22 000000ca->000000d6 Core Gen9
CFL-H R0 6-9e-d/22 000000ca->000000d6 Core Gen9 Mobile
Also contains the Intel CPU Microcode update to 20200520:
Processor Identifier Version Products
Model Stepping F-MO-S/PI Old->New
---- new platforms ----------------------------------------
---- updated platforms ------------------------------------
SNB-E/EN/EP C1/M0 6-2d-6/6d 0000061f->00000621 Xeon E3/E5, Core X
SNB-E/EN/EP C2/M1 6-2d-7/6d 00000718->0000071a Xeon E3/E5, Core X
This update was imported from the SUSE:SLE-15-SP1:Update update project.
Patchnames
openSUSE-2020-791
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for ucode-intel", "title": "Title of the patch" }, { "category": "description", "text": "This update for ucode-intel fixes the following issues:\n\nUpdated Intel CPU Microcode to 20200602 (prerelease) (bsc#1172466)\n \nThis update contains security mitigations for:\n\n- CVE-2020-0543: Fixed a side channel attack against special registers\n which could have resulted in leaking of read values to cores other\n than the one which called it. This attack is known as Special Register\n Buffer Data Sampling (SRBDS) or \u0027CrossTalk\u0027 (bsc#1154824).\n- CVE-2020-0548,CVE-2020-0549: Additional ucode updates were supplied to\n mitigate the Vector Register and L1D Eviction Sampling aka \u0027CacheOutAttack\u0027\n attacks. (bsc#1156353)\n\nMicrocode Table:\n\n Processor Identifier Version Products\n Model Stepping F-MO-S/PI Old-\u003eNew\n ---- new platforms ----------------------------------------\n ---- updated platforms ------------------------------------\n HSW C0 6-3c-3/32 00000027-\u003e00000028 Core Gen4\n BDW-U/Y E0/F0 6-3d-4/c0 0000002e-\u003e0000002f Core Gen5\n HSW-U C0/D0 6-45-1/72 00000025-\u003e00000026 Core Gen4\n HSW-H C0 6-46-1/32 0000001b-\u003e0000001c Core Gen4\n BDW-H/E3 E0/G0 6-47-1/22 00000021-\u003e00000022 Core Gen5\n SKL-U/Y D0 6-4e-3/c0 000000d6-\u003e000000dc Core Gen6 Mobile\n SKL-U23e K1 6-4e-3/c0 000000d6-\u003e000000dc Core Gen6 Mobile\n SKX-SP B1 6-55-3/97 01000151-\u003e01000157 Xeon Scalable\n SKX-SP H0/M0/U0 6-55-4/b7 02000065-\u003e02006906 Xeon Scalable\n SKX-D M1 6-55-4/b7 02000065-\u003e02006906 Xeon D-21xx\n CLX-SP B0 6-55-6/bf 0400002c-\u003e04002f01 Xeon Scalable Gen2\n CLX-SP B1 6-55-7/bf 0500002c-\u003e04002f01 Xeon Scalable Gen2\n SKL-H/S R0/N0 6-5e-3/36 000000d6-\u003e000000dc Core Gen6; Xeon E3 v5\n AML-Y22 H0 6-8e-9/10 000000ca-\u003e000000d6 Core Gen8 Mobile\n KBL-U/Y H0 6-8e-9/c0 000000ca-\u003e000000d6 Core Gen7 Mobile\n CFL-U43e D0 6-8e-a/c0 000000ca-\u003e000000d6 Core Gen8 Mobile\n WHL-U W0 6-8e-b/d0 000000ca-\u003e000000d6 Core Gen8 Mobile\n AML-Y42 V0 6-8e-c/94 000000ca-\u003e000000d6 Core Gen10 Mobile\n CML-Y42 V0 6-8e-c/94 000000ca-\u003e000000d6 Core Gen10 Mobile\n WHL-U V0 6-8e-c/94 000000ca-\u003e000000d6 Core Gen8 Mobile\n KBL-G/H/S/E3 B0 6-9e-9/2a 000000ca-\u003e000000d6 Core Gen7; Xeon E3 v6\n CFL-H/S/E3 U0 6-9e-a/22 000000ca-\u003e000000d6 Core Gen8 Desktop, Mobile, Xeon E\n CFL-S B0 6-9e-b/02 000000ca-\u003e000000d6 Core Gen8\n CFL-H/S P0 6-9e-c/22 000000ca-\u003e000000d6 Core Gen9\n CFL-H R0 6-9e-d/22 000000ca-\u003e000000d6 Core Gen9 Mobile\n\nAlso contains the Intel CPU Microcode update to 20200520:\n\n Processor Identifier Version Products\n Model Stepping F-MO-S/PI Old-\u003eNew\n ---- new platforms ----------------------------------------\n ---- updated platforms ------------------------------------\n SNB-E/EN/EP C1/M0 6-2d-6/6d 0000061f-\u003e00000621 Xeon E3/E5, Core X\n SNB-E/EN/EP C2/M1 6-2d-7/6d 00000718-\u003e0000071a Xeon E3/E5, Core X\n\nThis update was imported from the SUSE:SLE-15-SP1:Update update project.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-2020-791", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2020_0791-1.json" }, { "category": "self", "summary": "URL for openSUSE-SU-2020:0791-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FEGYVZIAZERXLY4SF7SWJUPJOF7CD7LU/" }, { "category": "self", "summary": "E-Mail link for openSUSE-SU-2020:0791-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FEGYVZIAZERXLY4SF7SWJUPJOF7CD7LU/" }, { "category": "self", "summary": "SUSE Bug 1154824", "url": "https://bugzilla.suse.com/1154824" }, { "category": "self", "summary": "SUSE Bug 1156353", "url": "https://bugzilla.suse.com/1156353" }, { "category": "self", "summary": "SUSE Bug 1172466", "url": "https://bugzilla.suse.com/1172466" }, { "category": "self", "summary": "SUSE CVE CVE-2020-0543 page", "url": "https://www.suse.com/security/cve/CVE-2020-0543/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-0548 page", "url": "https://www.suse.com/security/cve/CVE-2020-0548/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-0549 page", "url": "https://www.suse.com/security/cve/CVE-2020-0549/" } ], "title": "Security update for ucode-intel", "tracking": { "current_release_date": "2020-06-10T17:58:41Z", "generator": { "date": "2020-06-10T17:58:41Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2020:0791-1", "initial_release_date": "2020-06-10T17:58:41Z", "revision_history": [ { "date": "2020-06-10T17:58:41Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "ucode-intel-20200602-lp151.2.24.1.x86_64", "product": { "name": "ucode-intel-20200602-lp151.2.24.1.x86_64", "product_id": "ucode-intel-20200602-lp151.2.24.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Leap 15.1", "product": { "name": "openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap:15.1" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "ucode-intel-20200602-lp151.2.24.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:ucode-intel-20200602-lp151.2.24.1.x86_64" }, "product_reference": "ucode-intel-20200602-lp151.2.24.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-0543", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-0543" } ], "notes": [ { "category": "general", "text": "Incomplete cleanup from specific special register read operations in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:ucode-intel-20200602-lp151.2.24.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-0543", "url": "https://www.suse.com/security/cve/CVE-2020-0543" }, { "category": "external", "summary": "SUSE Bug 1154824 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1154824" }, { "category": "external", "summary": "SUSE Bug 1172205 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172205" }, { "category": "external", "summary": "SUSE Bug 1172206 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172206" }, { "category": "external", "summary": "SUSE Bug 1172207 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172207" }, { "category": "external", "summary": "SUSE Bug 1172770 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172770" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:ucode-intel-20200602-lp151.2.24.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.1:ucode-intel-20200602-lp151.2.24.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-10T17:58:41Z", "details": "moderate" } ], "title": "CVE-2020-0543" }, { "cve": "CVE-2020-0548", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-0548" } ], "notes": [ { "category": "general", "text": "Cleanup errors in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:ucode-intel-20200602-lp151.2.24.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-0548", "url": "https://www.suse.com/security/cve/CVE-2020-0548" }, { "category": "external", "summary": "SUSE Bug 1156353 for CVE-2020-0548", "url": "https://bugzilla.suse.com/1156353" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:ucode-intel-20200602-lp151.2.24.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.8, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.1:ucode-intel-20200602-lp151.2.24.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-10T17:58:41Z", "details": "moderate" } ], "title": "CVE-2020-0548" }, { "cve": "CVE-2020-0549", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-0549" } ], "notes": [ { "category": "general", "text": "Cleanup errors in some data cache evictions for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:ucode-intel-20200602-lp151.2.24.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-0549", "url": "https://www.suse.com/security/cve/CVE-2020-0549" }, { "category": "external", "summary": "SUSE Bug 1156353 for CVE-2020-0549", "url": "https://bugzilla.suse.com/1156353" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:ucode-intel-20200602-lp151.2.24.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.1:ucode-intel-20200602-lp151.2.24.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-10T17:58:41Z", "details": "moderate" } ], "title": "CVE-2020-0549" } ] }
opensuse-su-2024:11478-1
Vulnerability from csaf_opensuse
Published
2024-06-15 00:00
Modified
2024-06-15 00:00
Summary
ucode-intel-20210608-1.2 on GA media
Notes
Title of the patch
ucode-intel-20210608-1.2 on GA media
Description of the patch
These are all security issues fixed in the ucode-intel-20210608-1.2 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2024-11478
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "ucode-intel-20210608-1.2 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the ucode-intel-20210608-1.2 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2024-11478", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_11478-1.json" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5715 page", "url": "https://www.suse.com/security/cve/CVE-2017-5715/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-12126 page", "url": "https://www.suse.com/security/cve/CVE-2018-12126/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-12130 page", "url": "https://www.suse.com/security/cve/CVE-2018-12130/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3640 page", "url": "https://www.suse.com/security/cve/CVE-2018-3640/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11135 page", "url": "https://www.suse.com/security/cve/CVE-2019-11135/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11139 page", "url": "https://www.suse.com/security/cve/CVE-2019-11139/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-0543 page", "url": "https://www.suse.com/security/cve/CVE-2020-0543/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-0548 page", "url": "https://www.suse.com/security/cve/CVE-2020-0548/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-24489 page", "url": "https://www.suse.com/security/cve/CVE-2020-24489/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-24511 page", "url": "https://www.suse.com/security/cve/CVE-2020-24511/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-24512 page", "url": "https://www.suse.com/security/cve/CVE-2020-24512/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-24513 page", "url": "https://www.suse.com/security/cve/CVE-2020-24513/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-8695 page", "url": "https://www.suse.com/security/cve/CVE-2020-8695/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-8696 page", "url": "https://www.suse.com/security/cve/CVE-2020-8696/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-8698 page", "url": "https://www.suse.com/security/cve/CVE-2020-8698/" } ], "title": "ucode-intel-20210608-1.2 on GA media", "tracking": { "current_release_date": "2024-06-15T00:00:00Z", "generator": { "date": "2024-06-15T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2024:11478-1", "initial_release_date": "2024-06-15T00:00:00Z", "revision_history": [ { "date": "2024-06-15T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "ucode-intel-20210608-1.2.aarch64", "product": { "name": "ucode-intel-20210608-1.2.aarch64", "product_id": "ucode-intel-20210608-1.2.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "ucode-intel-20210608-1.2.ppc64le", "product": { "name": "ucode-intel-20210608-1.2.ppc64le", "product_id": "ucode-intel-20210608-1.2.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "ucode-intel-20210608-1.2.s390x", "product": { "name": "ucode-intel-20210608-1.2.s390x", "product_id": "ucode-intel-20210608-1.2.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "ucode-intel-20210608-1.2.x86_64", "product": { "name": "ucode-intel-20210608-1.2.x86_64", "product_id": "ucode-intel-20210608-1.2.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "ucode-intel-20210608-1.2.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ucode-intel-20210608-1.2.aarch64" }, "product_reference": "ucode-intel-20210608-1.2.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ucode-intel-20210608-1.2.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ucode-intel-20210608-1.2.ppc64le" }, "product_reference": "ucode-intel-20210608-1.2.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ucode-intel-20210608-1.2.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ucode-intel-20210608-1.2.s390x" }, "product_reference": "ucode-intel-20210608-1.2.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ucode-intel-20210608-1.2.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ucode-intel-20210608-1.2.x86_64" }, "product_reference": "ucode-intel-20210608-1.2.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-5715", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-5715" } ], "notes": [ { "category": "general", "text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ucode-intel-20210608-1.2.aarch64", "openSUSE Tumbleweed:ucode-intel-20210608-1.2.ppc64le", "openSUSE Tumbleweed:ucode-intel-20210608-1.2.s390x", "openSUSE Tumbleweed:ucode-intel-20210608-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-5715", "url": "https://www.suse.com/security/cve/CVE-2017-5715" }, { "category": "external", "summary": "SUSE Bug 1068032 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1068032" }, { "category": "external", "summary": "SUSE Bug 1074562 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1074562" }, { "category": "external", "summary": "SUSE Bug 1074578 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1074578" }, { "category": "external", "summary": "SUSE Bug 1074701 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1074701" }, { "category": "external", "summary": "SUSE Bug 1074741 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1074741" }, { "category": "external", "summary": "SUSE Bug 1074919 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1074919" }, { "category": "external", "summary": "SUSE Bug 1075006 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1075006" }, { "category": "external", "summary": "SUSE Bug 1075007 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1075007" }, { "category": "external", "summary": "SUSE Bug 1075262 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1075262" }, { "category": "external", "summary": "SUSE Bug 1075419 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1075419" }, { "category": "external", "summary": "SUSE Bug 1076115 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1076115" }, { "category": "external", "summary": "SUSE Bug 1076372 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1076372" }, { "category": "external", "summary": "SUSE Bug 1076606 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1076606" }, { "category": "external", "summary": "SUSE Bug 1078353 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1078353" }, { "category": "external", "summary": "SUSE Bug 1080039 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1080039" }, { "category": "external", "summary": "SUSE Bug 1087887 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1087887" }, { "category": "external", "summary": "SUSE Bug 1087939 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1087939" }, { "category": "external", "summary": "SUSE Bug 1088147 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1088147" }, { "category": "external", "summary": "SUSE Bug 1089055 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1089055" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1091815" }, { "category": "external", "summary": "SUSE Bug 1095735 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1095735" }, { "category": "external", "summary": "SUSE Bug 1102517 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1102517" }, { "category": "external", "summary": "SUSE Bug 1105108 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1105108" }, { "category": "external", "summary": "SUSE Bug 1126516 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1126516" }, { "category": "external", "summary": "SUSE Bug 1173489 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1173489" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201457 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1201457" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1201877" }, { "category": "external", "summary": "SUSE Bug 1203236 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1203236" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ucode-intel-20210608-1.2.aarch64", "openSUSE Tumbleweed:ucode-intel-20210608-1.2.ppc64le", "openSUSE Tumbleweed:ucode-intel-20210608-1.2.s390x", "openSUSE Tumbleweed:ucode-intel-20210608-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ucode-intel-20210608-1.2.aarch64", "openSUSE Tumbleweed:ucode-intel-20210608-1.2.ppc64le", "openSUSE Tumbleweed:ucode-intel-20210608-1.2.s390x", "openSUSE Tumbleweed:ucode-intel-20210608-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2017-5715" }, { "cve": "CVE-2018-12126", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-12126" } ], "notes": [ { "category": "general", "text": "Microarchitectural Store Buffer Data Sampling (MSBDS): Store buffers on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ucode-intel-20210608-1.2.aarch64", "openSUSE Tumbleweed:ucode-intel-20210608-1.2.ppc64le", "openSUSE Tumbleweed:ucode-intel-20210608-1.2.s390x", "openSUSE Tumbleweed:ucode-intel-20210608-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-12126", "url": "https://www.suse.com/security/cve/CVE-2018-12126" }, { "category": "external", "summary": "SUSE Bug 1103186 for CVE-2018-12126", "url": "https://bugzilla.suse.com/1103186" }, { "category": "external", "summary": "SUSE Bug 1111331 for CVE-2018-12126", "url": "https://bugzilla.suse.com/1111331" }, { "category": "external", "summary": "SUSE Bug 1132686 for CVE-2018-12126", "url": "https://bugzilla.suse.com/1132686" }, { "category": "external", "summary": "SUSE Bug 1135409 for CVE-2018-12126", "url": "https://bugzilla.suse.com/1135409" }, { "category": "external", "summary": "SUSE Bug 1135524 for CVE-2018-12126", "url": "https://bugzilla.suse.com/1135524" }, { "category": "external", "summary": "SUSE Bug 1137916 for CVE-2018-12126", "url": "https://bugzilla.suse.com/1137916" }, { "category": "external", "summary": "SUSE Bug 1138534 for CVE-2018-12126", "url": "https://bugzilla.suse.com/1138534" }, { "category": "external", "summary": "SUSE Bug 1141977 for CVE-2018-12126", "url": "https://bugzilla.suse.com/1141977" }, { "category": "external", "summary": "SUSE Bug 1149725 for CVE-2018-12126", "url": "https://bugzilla.suse.com/1149725" }, { "category": "external", "summary": "SUSE Bug 1149726 for CVE-2018-12126", "url": "https://bugzilla.suse.com/1149726" }, { "category": "external", "summary": "SUSE Bug 1149729 for CVE-2018-12126", "url": "https://bugzilla.suse.com/1149729" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-12126", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2018-12126", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ucode-intel-20210608-1.2.aarch64", "openSUSE Tumbleweed:ucode-intel-20210608-1.2.ppc64le", "openSUSE Tumbleweed:ucode-intel-20210608-1.2.s390x", "openSUSE Tumbleweed:ucode-intel-20210608-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.8, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ucode-intel-20210608-1.2.aarch64", "openSUSE Tumbleweed:ucode-intel-20210608-1.2.ppc64le", "openSUSE Tumbleweed:ucode-intel-20210608-1.2.s390x", "openSUSE Tumbleweed:ucode-intel-20210608-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-12126" }, { "cve": "CVE-2018-12130", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-12130" } ], "notes": [ { "category": "general", "text": "Microarchitectural Fill Buffer Data Sampling (MFBDS): Fill buffers on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ucode-intel-20210608-1.2.aarch64", "openSUSE Tumbleweed:ucode-intel-20210608-1.2.ppc64le", "openSUSE Tumbleweed:ucode-intel-20210608-1.2.s390x", "openSUSE Tumbleweed:ucode-intel-20210608-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-12130", "url": "https://www.suse.com/security/cve/CVE-2018-12130" }, { "category": "external", "summary": "SUSE Bug 1103186 for CVE-2018-12130", "url": "https://bugzilla.suse.com/1103186" }, { "category": "external", "summary": "SUSE Bug 1111331 for CVE-2018-12130", "url": "https://bugzilla.suse.com/1111331" }, { "category": "external", "summary": "SUSE Bug 1132686 for CVE-2018-12130", "url": "https://bugzilla.suse.com/1132686" }, { "category": "external", "summary": "SUSE Bug 1135409 for CVE-2018-12130", "url": "https://bugzilla.suse.com/1135409" }, { "category": "external", "summary": "SUSE Bug 1137916 for CVE-2018-12130", "url": "https://bugzilla.suse.com/1137916" }, { "category": "external", "summary": "SUSE Bug 1138534 for CVE-2018-12130", "url": "https://bugzilla.suse.com/1138534" }, { "category": "external", "summary": "SUSE Bug 1141977 for CVE-2018-12130", "url": "https://bugzilla.suse.com/1141977" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-12130", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2018-12130", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ucode-intel-20210608-1.2.aarch64", "openSUSE Tumbleweed:ucode-intel-20210608-1.2.ppc64le", "openSUSE Tumbleweed:ucode-intel-20210608-1.2.s390x", "openSUSE Tumbleweed:ucode-intel-20210608-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ucode-intel-20210608-1.2.aarch64", "openSUSE Tumbleweed:ucode-intel-20210608-1.2.ppc64le", "openSUSE Tumbleweed:ucode-intel-20210608-1.2.s390x", "openSUSE Tumbleweed:ucode-intel-20210608-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-12130" }, { "cve": "CVE-2018-3640", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3640" } ], "notes": [ { "category": "general", "text": "Systems with microprocessors utilizing speculative execution and that perform speculative reads of system registers may allow unauthorized disclosure of system parameters to an attacker with local user access via a side-channel analysis, aka Rogue System Register Read (RSRE), Variant 3a.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ucode-intel-20210608-1.2.aarch64", "openSUSE Tumbleweed:ucode-intel-20210608-1.2.ppc64le", "openSUSE Tumbleweed:ucode-intel-20210608-1.2.s390x", "openSUSE Tumbleweed:ucode-intel-20210608-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3640", "url": "https://www.suse.com/security/cve/CVE-2018-3640" }, { "category": "external", "summary": "SUSE Bug 1074701 for CVE-2018-3640", "url": "https://bugzilla.suse.com/1074701" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-3640", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087083 for CVE-2018-3640", "url": "https://bugzilla.suse.com/1087083" }, { "category": "external", "summary": "SUSE Bug 1094912 for CVE-2018-3640", "url": "https://bugzilla.suse.com/1094912" }, { "category": "external", "summary": "SUSE Bug 1098813 for CVE-2018-3640", "url": "https://bugzilla.suse.com/1098813" }, { "category": "external", "summary": "SUSE Bug 1100394 for CVE-2018-3640", "url": "https://bugzilla.suse.com/1100394" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2018-3640", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 1175912 for CVE-2018-3640", "url": "https://bugzilla.suse.com/1175912" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2018-3640", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ucode-intel-20210608-1.2.aarch64", "openSUSE Tumbleweed:ucode-intel-20210608-1.2.ppc64le", "openSUSE Tumbleweed:ucode-intel-20210608-1.2.s390x", "openSUSE Tumbleweed:ucode-intel-20210608-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ucode-intel-20210608-1.2.aarch64", "openSUSE Tumbleweed:ucode-intel-20210608-1.2.ppc64le", "openSUSE Tumbleweed:ucode-intel-20210608-1.2.s390x", "openSUSE Tumbleweed:ucode-intel-20210608-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-3640" }, { "cve": "CVE-2019-11135", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11135" } ], "notes": [ { "category": "general", "text": "TSX Asynchronous Abort condition on some CPUs utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ucode-intel-20210608-1.2.aarch64", "openSUSE Tumbleweed:ucode-intel-20210608-1.2.ppc64le", "openSUSE Tumbleweed:ucode-intel-20210608-1.2.s390x", "openSUSE Tumbleweed:ucode-intel-20210608-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11135", "url": "https://www.suse.com/security/cve/CVE-2019-11135" }, { "category": "external", "summary": "SUSE Bug 1139073 for CVE-2019-11135", "url": "https://bugzilla.suse.com/1139073" }, { "category": "external", "summary": "SUSE Bug 1152497 for CVE-2019-11135", "url": "https://bugzilla.suse.com/1152497" }, { "category": "external", "summary": "SUSE Bug 1152505 for CVE-2019-11135", "url": "https://bugzilla.suse.com/1152505" }, { "category": "external", "summary": "SUSE Bug 1152506 for CVE-2019-11135", "url": "https://bugzilla.suse.com/1152506" }, { "category": "external", "summary": "SUSE Bug 1160120 for CVE-2019-11135", "url": "https://bugzilla.suse.com/1160120" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2019-11135", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ucode-intel-20210608-1.2.aarch64", "openSUSE Tumbleweed:ucode-intel-20210608-1.2.ppc64le", "openSUSE Tumbleweed:ucode-intel-20210608-1.2.s390x", "openSUSE Tumbleweed:ucode-intel-20210608-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ucode-intel-20210608-1.2.aarch64", "openSUSE Tumbleweed:ucode-intel-20210608-1.2.ppc64le", "openSUSE Tumbleweed:ucode-intel-20210608-1.2.s390x", "openSUSE Tumbleweed:ucode-intel-20210608-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-11135" }, { "cve": "CVE-2019-11139", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11139" } ], "notes": [ { "category": "general", "text": "Improper conditions check in the voltage modulation interface for some Intel(R) Xeon(R) Scalable Processors may allow a privileged user to potentially enable denial of service via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ucode-intel-20210608-1.2.aarch64", "openSUSE Tumbleweed:ucode-intel-20210608-1.2.ppc64le", "openSUSE Tumbleweed:ucode-intel-20210608-1.2.s390x", "openSUSE Tumbleweed:ucode-intel-20210608-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11139", "url": "https://www.suse.com/security/cve/CVE-2019-11139" }, { "category": "external", "summary": "SUSE Bug 1141035 for CVE-2019-11139", "url": "https://bugzilla.suse.com/1141035" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ucode-intel-20210608-1.2.aarch64", "openSUSE Tumbleweed:ucode-intel-20210608-1.2.ppc64le", "openSUSE Tumbleweed:ucode-intel-20210608-1.2.s390x", "openSUSE Tumbleweed:ucode-intel-20210608-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:ucode-intel-20210608-1.2.aarch64", "openSUSE Tumbleweed:ucode-intel-20210608-1.2.ppc64le", "openSUSE Tumbleweed:ucode-intel-20210608-1.2.s390x", "openSUSE Tumbleweed:ucode-intel-20210608-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-11139" }, { "cve": "CVE-2020-0543", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-0543" } ], "notes": [ { "category": "general", "text": "Incomplete cleanup from specific special register read operations in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ucode-intel-20210608-1.2.aarch64", "openSUSE Tumbleweed:ucode-intel-20210608-1.2.ppc64le", "openSUSE Tumbleweed:ucode-intel-20210608-1.2.s390x", "openSUSE Tumbleweed:ucode-intel-20210608-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-0543", "url": "https://www.suse.com/security/cve/CVE-2020-0543" }, { "category": "external", "summary": "SUSE Bug 1154824 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1154824" }, { "category": "external", "summary": "SUSE Bug 1172205 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172205" }, { "category": "external", "summary": "SUSE Bug 1172206 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172206" }, { "category": "external", "summary": "SUSE Bug 1172207 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172207" }, { "category": "external", "summary": "SUSE Bug 1172770 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172770" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ucode-intel-20210608-1.2.aarch64", "openSUSE Tumbleweed:ucode-intel-20210608-1.2.ppc64le", "openSUSE Tumbleweed:ucode-intel-20210608-1.2.s390x", "openSUSE Tumbleweed:ucode-intel-20210608-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:ucode-intel-20210608-1.2.aarch64", "openSUSE Tumbleweed:ucode-intel-20210608-1.2.ppc64le", "openSUSE Tumbleweed:ucode-intel-20210608-1.2.s390x", "openSUSE Tumbleweed:ucode-intel-20210608-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-0543" }, { "cve": "CVE-2020-0548", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-0548" } ], "notes": [ { "category": "general", "text": "Cleanup errors in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ucode-intel-20210608-1.2.aarch64", "openSUSE Tumbleweed:ucode-intel-20210608-1.2.ppc64le", "openSUSE Tumbleweed:ucode-intel-20210608-1.2.s390x", "openSUSE Tumbleweed:ucode-intel-20210608-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-0548", "url": "https://www.suse.com/security/cve/CVE-2020-0548" }, { "category": "external", "summary": "SUSE Bug 1156353 for CVE-2020-0548", "url": "https://bugzilla.suse.com/1156353" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ucode-intel-20210608-1.2.aarch64", "openSUSE Tumbleweed:ucode-intel-20210608-1.2.ppc64le", "openSUSE Tumbleweed:ucode-intel-20210608-1.2.s390x", "openSUSE Tumbleweed:ucode-intel-20210608-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.8, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:ucode-intel-20210608-1.2.aarch64", "openSUSE Tumbleweed:ucode-intel-20210608-1.2.ppc64le", "openSUSE Tumbleweed:ucode-intel-20210608-1.2.s390x", "openSUSE Tumbleweed:ucode-intel-20210608-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-0548" }, { "cve": "CVE-2020-24489", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-24489" } ], "notes": [ { "category": "general", "text": "Incomplete cleanup in some Intel(R) VT-d products may allow an authenticated user to potentially enable escalation of privilege via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ucode-intel-20210608-1.2.aarch64", "openSUSE Tumbleweed:ucode-intel-20210608-1.2.ppc64le", "openSUSE Tumbleweed:ucode-intel-20210608-1.2.s390x", "openSUSE Tumbleweed:ucode-intel-20210608-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-24489", "url": "https://www.suse.com/security/cve/CVE-2020-24489" }, { "category": "external", "summary": "SUSE Bug 1179839 for CVE-2020-24489", "url": "https://bugzilla.suse.com/1179839" }, { "category": "external", "summary": "SUSE Bug 1192359 for CVE-2020-24489", "url": "https://bugzilla.suse.com/1192359" }, { "category": "external", "summary": "SUSE Bug 1199300 for CVE-2020-24489", "url": "https://bugzilla.suse.com/1199300" }, { "category": "external", "summary": "SUSE Bug 1201731 for CVE-2020-24489", "url": "https://bugzilla.suse.com/1201731" }, { "category": "external", "summary": "SUSE Bug 1225680 for CVE-2020-24489", "url": "https://bugzilla.suse.com/1225680" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ucode-intel-20210608-1.2.aarch64", "openSUSE Tumbleweed:ucode-intel-20210608-1.2.ppc64le", "openSUSE Tumbleweed:ucode-intel-20210608-1.2.s390x", "openSUSE Tumbleweed:ucode-intel-20210608-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:ucode-intel-20210608-1.2.aarch64", "openSUSE Tumbleweed:ucode-intel-20210608-1.2.ppc64le", "openSUSE Tumbleweed:ucode-intel-20210608-1.2.s390x", "openSUSE Tumbleweed:ucode-intel-20210608-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-24489" }, { "cve": "CVE-2020-24511", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-24511" } ], "notes": [ { "category": "general", "text": "Improper isolation of shared resources in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ucode-intel-20210608-1.2.aarch64", "openSUSE Tumbleweed:ucode-intel-20210608-1.2.ppc64le", "openSUSE Tumbleweed:ucode-intel-20210608-1.2.s390x", "openSUSE Tumbleweed:ucode-intel-20210608-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-24511", "url": "https://www.suse.com/security/cve/CVE-2020-24511" }, { "category": "external", "summary": "SUSE Bug 1179836 for CVE-2020-24511", "url": "https://bugzilla.suse.com/1179836" }, { "category": "external", "summary": "SUSE Bug 1192360 for CVE-2020-24511", "url": "https://bugzilla.suse.com/1192360" }, { "category": "external", "summary": "SUSE Bug 1199300 for CVE-2020-24511", "url": "https://bugzilla.suse.com/1199300" }, { "category": "external", "summary": "SUSE Bug 1201731 for CVE-2020-24511", "url": "https://bugzilla.suse.com/1201731" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ucode-intel-20210608-1.2.aarch64", "openSUSE Tumbleweed:ucode-intel-20210608-1.2.ppc64le", "openSUSE Tumbleweed:ucode-intel-20210608-1.2.s390x", "openSUSE Tumbleweed:ucode-intel-20210608-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:ucode-intel-20210608-1.2.aarch64", "openSUSE Tumbleweed:ucode-intel-20210608-1.2.ppc64le", "openSUSE Tumbleweed:ucode-intel-20210608-1.2.s390x", "openSUSE Tumbleweed:ucode-intel-20210608-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-24511" }, { "cve": "CVE-2020-24512", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-24512" } ], "notes": [ { "category": "general", "text": "Observable timing discrepancy in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ucode-intel-20210608-1.2.aarch64", "openSUSE Tumbleweed:ucode-intel-20210608-1.2.ppc64le", "openSUSE Tumbleweed:ucode-intel-20210608-1.2.s390x", "openSUSE Tumbleweed:ucode-intel-20210608-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-24512", "url": "https://www.suse.com/security/cve/CVE-2020-24512" }, { "category": "external", "summary": "SUSE Bug 1179837 for CVE-2020-24512", "url": "https://bugzilla.suse.com/1179837" }, { "category": "external", "summary": "SUSE Bug 1192360 for CVE-2020-24512", "url": "https://bugzilla.suse.com/1192360" }, { "category": "external", "summary": "SUSE Bug 1199300 for CVE-2020-24512", "url": "https://bugzilla.suse.com/1199300" }, { "category": "external", "summary": "SUSE Bug 1201731 for CVE-2020-24512", "url": "https://bugzilla.suse.com/1201731" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ucode-intel-20210608-1.2.aarch64", "openSUSE Tumbleweed:ucode-intel-20210608-1.2.ppc64le", "openSUSE Tumbleweed:ucode-intel-20210608-1.2.s390x", "openSUSE Tumbleweed:ucode-intel-20210608-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.8, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:ucode-intel-20210608-1.2.aarch64", "openSUSE Tumbleweed:ucode-intel-20210608-1.2.ppc64le", "openSUSE Tumbleweed:ucode-intel-20210608-1.2.s390x", "openSUSE Tumbleweed:ucode-intel-20210608-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2020-24512" }, { "cve": "CVE-2020-24513", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-24513" } ], "notes": [ { "category": "general", "text": "Domain-bypass transient execution vulnerability in some Intel Atom(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ucode-intel-20210608-1.2.aarch64", "openSUSE Tumbleweed:ucode-intel-20210608-1.2.ppc64le", "openSUSE Tumbleweed:ucode-intel-20210608-1.2.s390x", "openSUSE Tumbleweed:ucode-intel-20210608-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-24513", "url": "https://www.suse.com/security/cve/CVE-2020-24513" }, { "category": "external", "summary": "SUSE Bug 1179833 for CVE-2020-24513", "url": "https://bugzilla.suse.com/1179833" }, { "category": "external", "summary": "SUSE Bug 1192360 for CVE-2020-24513", "url": "https://bugzilla.suse.com/1192360" }, { "category": "external", "summary": "SUSE Bug 1199300 for CVE-2020-24513", "url": "https://bugzilla.suse.com/1199300" }, { "category": "external", "summary": "SUSE Bug 1201731 for CVE-2020-24513", "url": "https://bugzilla.suse.com/1201731" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ucode-intel-20210608-1.2.aarch64", "openSUSE Tumbleweed:ucode-intel-20210608-1.2.ppc64le", "openSUSE Tumbleweed:ucode-intel-20210608-1.2.s390x", "openSUSE Tumbleweed:ucode-intel-20210608-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:ucode-intel-20210608-1.2.aarch64", "openSUSE Tumbleweed:ucode-intel-20210608-1.2.ppc64le", "openSUSE Tumbleweed:ucode-intel-20210608-1.2.s390x", "openSUSE Tumbleweed:ucode-intel-20210608-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-24513" }, { "cve": "CVE-2020-8695", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-8695" } ], "notes": [ { "category": "general", "text": "Observable discrepancy in the RAPL interface for some Intel(R) Processors may allow a privileged user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ucode-intel-20210608-1.2.aarch64", "openSUSE Tumbleweed:ucode-intel-20210608-1.2.ppc64le", "openSUSE Tumbleweed:ucode-intel-20210608-1.2.s390x", "openSUSE Tumbleweed:ucode-intel-20210608-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-8695", "url": "https://www.suse.com/security/cve/CVE-2020-8695" }, { "category": "external", "summary": "SUSE Bug 1170415 for CVE-2020-8695", "url": "https://bugzilla.suse.com/1170415" }, { "category": "external", "summary": "SUSE Bug 1170446 for CVE-2020-8695", "url": "https://bugzilla.suse.com/1170446" }, { "category": "external", "summary": "SUSE Bug 1178591 for CVE-2020-8695", "url": "https://bugzilla.suse.com/1178591" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ucode-intel-20210608-1.2.aarch64", "openSUSE Tumbleweed:ucode-intel-20210608-1.2.ppc64le", "openSUSE Tumbleweed:ucode-intel-20210608-1.2.s390x", "openSUSE Tumbleweed:ucode-intel-20210608-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:ucode-intel-20210608-1.2.aarch64", "openSUSE Tumbleweed:ucode-intel-20210608-1.2.ppc64le", "openSUSE Tumbleweed:ucode-intel-20210608-1.2.s390x", "openSUSE Tumbleweed:ucode-intel-20210608-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-8695" }, { "cve": "CVE-2020-8696", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-8696" } ], "notes": [ { "category": "general", "text": "Improper removal of sensitive information before storage or transfer in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ucode-intel-20210608-1.2.aarch64", "openSUSE Tumbleweed:ucode-intel-20210608-1.2.ppc64le", "openSUSE Tumbleweed:ucode-intel-20210608-1.2.s390x", "openSUSE Tumbleweed:ucode-intel-20210608-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-8696", "url": "https://www.suse.com/security/cve/CVE-2020-8696" }, { "category": "external", "summary": "SUSE Bug 1173592 for CVE-2020-8696", "url": "https://bugzilla.suse.com/1173592" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ucode-intel-20210608-1.2.aarch64", "openSUSE Tumbleweed:ucode-intel-20210608-1.2.ppc64le", "openSUSE Tumbleweed:ucode-intel-20210608-1.2.s390x", "openSUSE Tumbleweed:ucode-intel-20210608-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.5, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:ucode-intel-20210608-1.2.aarch64", "openSUSE Tumbleweed:ucode-intel-20210608-1.2.ppc64le", "openSUSE Tumbleweed:ucode-intel-20210608-1.2.s390x", "openSUSE Tumbleweed:ucode-intel-20210608-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-8696" }, { "cve": "CVE-2020-8698", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-8698" } ], "notes": [ { "category": "general", "text": "Improper isolation of shared resources in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ucode-intel-20210608-1.2.aarch64", "openSUSE Tumbleweed:ucode-intel-20210608-1.2.ppc64le", "openSUSE Tumbleweed:ucode-intel-20210608-1.2.s390x", "openSUSE Tumbleweed:ucode-intel-20210608-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-8698", "url": "https://www.suse.com/security/cve/CVE-2020-8698" }, { "category": "external", "summary": "SUSE Bug 1173594 for CVE-2020-8698", "url": "https://bugzilla.suse.com/1173594" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ucode-intel-20210608-1.2.aarch64", "openSUSE Tumbleweed:ucode-intel-20210608-1.2.ppc64le", "openSUSE Tumbleweed:ucode-intel-20210608-1.2.s390x", "openSUSE Tumbleweed:ucode-intel-20210608-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.5, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:ucode-intel-20210608-1.2.aarch64", "openSUSE Tumbleweed:ucode-intel-20210608-1.2.ppc64le", "openSUSE Tumbleweed:ucode-intel-20210608-1.2.s390x", "openSUSE Tumbleweed:ucode-intel-20210608-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-8698" } ] }
opensuse-su-2020:0801-1
Vulnerability from csaf_opensuse
Published
2020-06-12 15:14
Modified
2020-06-12 15:14
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The openSUSE Leap 15.1 kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2020-0543: Fixed a side channel attack against special registers which could have resulted in leaking of read values to cores other than the one which called it.
This attack is known as Special Register Buffer Data Sampling (SRBDS) or 'CrossTalk' (bsc#1154824).
- CVE-2018-1000199: Fixed a potential local code execution via ptrace (bsc#1089895).
- CVE-2019-19462: relay_open in kernel/relay.c allowed local users to cause a denial of service (such as relay blockage) by triggering a NULL alloc_percpu result (bnc#1158265).
- CVE-2019-20806: Fixed a null pointer dereference in tw5864_handle_frame() which may had lead to denial of service (bsc#1172199).
- CVE-2019-20812: The prb_calc_retire_blk_tmo() function in net/packet/af_packet.c can result in a denial of service (CPU consumption and soft lockup) in a certain failure case involving TPACKET_V3, aka CID-b43d1f9f7067 (bnc#1172453).
- CVE-2019-9455: Fixed a pointer leak due to a WARN_ON statement in a video driver. This could lead to local information disclosure with System execution privileges needed (bsc#1170345).
- CVE-2020-10690: Fixed the race between the release of ptp_clock and cdev (bsc#1170056).
- CVE-2020-10711: Fixed a null pointer dereference in SELinux subsystem which could have allowed a remote network user to crash the kernel resulting in a denial of service (bsc#1171191).
- CVE-2020-10720: Fixed a use-after-free read in napi_gro_frags() (bsc#1170778).
- CVE-2020-10732: Fixed kernel data leak in userspace coredumps due to uninitialized data (bsc#1171220).
- CVE-2020-10751: Fixed an improper implementation in SELinux LSM hook where it was assumed that an skb would only contain a single netlink message (bsc#1171189).
- CVE-2020-10757: Fixed an issue where remaping hugepage DAX to anon mmap could have caused user PTE access (bsc#1172317).
- CVE-2020-11608: An issue was discovered in drivers/media/usb/gspca/ov519.c that allowed NULL pointer dereferences in ov511_mode_init_regs and ov518_mode_init_regs when there are zero endpoints, aka CID-998912346c0d (bnc#1168829).
- CVE-2020-11609: An issue was discovered in the stv06xx subsystem in drivers/media/usb/gspca/stv06xx/stv06xx.c and drivers/media/usb/gspca/stv06xx/stv06xx_pb0100.c mishandle invalid descriptors, as demonstrated by a NULL pointer dereference, aka CID-485b06aadb93 (bnc#1168854).
- CVE-2020-12114: Fixed a pivot_root race condition which could have allowed local users to cause a denial of service (panic) by corrupting a mountpoint reference counter (bsc#1171098).
- CVE-2020-12464: Fixed a use-after-free due to a transfer without a reference (bsc#1170901).
- CVE-2020-12652: Fixed an issue which could have allowed local users to hold an incorrect lock during the ioctl operation and trigger a race condition (bsc#1171218).
- CVE-2020-12653: Fixed an issue in the wifi driver which could have allowed local users to gain privileges or cause a denial of service (bsc#1171195).
- CVE-2020-12654: Fixed an issue in he wifi driver which could have allowed a remote AP to trigger a heap-based buffer overflow (bsc#1171202).
- CVE-2020-12655: Fixed an issue which could have allowed attackers to trigger a sync of excessive duration via an XFS v5 image with crafted metadata (bsc#1171217).
- CVE-2020-12656: Fixed an improper handling of certain domain_release calls leadingch could have led to a memory leak (bsc#1171219).
- CVE-2020-12657: An a use-after-free in block/bfq-iosched.c (bsc#1171205).
- CVE-2020-12659: Fixed an out-of-bounds write (by a user with the CAP_NET_ADMIN capability) due to improper headroom validation (bsc#1171214).
- CVE-2020-12769: Fixed an issue which could have allowed attackers to cause a panic via concurrent calls to dw_spi_irq and dw_spi_transfer_one (bsc#1171983).
- CVE-2020-13143: Fixed an out-of-bounds read in gadget_dev_desc_UDC_store in drivers/usb/gadget/configfs.c (bsc#1171982).
The following non-security bugs were fixed:
- ACPI: CPPC: Fix reference count leak in acpi_cppc_processor_probe() (bsc#1051510).
- ACPI: sysfs: Fix reference count leak in acpi_sysfs_add_hotplug_profile() (bsc#1051510).
- acpi/x86: ignore unspecified bit positions in the ACPI global lock field (bsc#1051510).
- Add br_netfilter to kernel-default-base (bsc#1169020)
- agp/intel: Reinforce the barrier after GTT updates (bsc#1051510).
- ALSA: ctxfi: Remove unnecessary cast in kfree (bsc#1051510).
- ALSA: doc: Document PC Beep Hidden Register on Realtek ALC256 (bsc#1051510).
- ALSA: dummy: Fix PCM format loop in proc output (bsc#1111666).
- ALSA: hda: Add driver blacklist (bsc#1051510).
- ALSA: hda: Always use jackpoll helper for jack update after resume (bsc#1051510).
- ALSA: hda: call runtime_allow() for all hda controllers (bsc#1051510).
- ALSA: hda: Do not release card at firmware loading error (bsc#1051510).
- ALSA: hda: Explicitly permit using autosuspend if runtime PM is supported (bsc#1051510).
- ALSA: hda/hdmi: fix race in monitor detection during probe (bsc#1051510).
- ALSA: hda/hdmi: fix without unlocked before return (bsc#1051510).
- ALSA: hda: Honor PM disablement in PM freeze and thaw_noirq ops (bsc#1051510).
- ALSA: hda: Keep the controller initialization even if no codecs found (bsc#1051510).
- ALSA: hda: Match both PCI ID and SSID for driver blacklist (bsc#1111666).
- ALSA: hda/realtek - Add a model for Thinkpad T570 without DAC workaround (bsc#1172017).
- ALSA: hda/realtek - Add COEF workaround for ASUS ZenBook UX431DA (git-fixes).
- ALSA: hda/realtek - Add HP new mute led supported for ALC236 (git-fixes).
- ALSA: hda/realtek - Add more fixup entries for Clevo machines (git-fixes).
- ALSA: hda/realtek - Add new codec supported for ALC245 (bsc#1051510).
- ALSA: hda/realtek - Add new codec supported for ALC287 (git-fixes).
- ALSA: hda/realtek: Add quirk for Samsung Notebook (git-fixes).
- ALSA: hda/realtek - Add supported new mute Led for HP (git-fixes).
- ALSA: hda/realtek - Enable headset mic of ASUS GL503VM with ALC295 (git-fixes).
- ALSA: hda/realtek - Enable headset mic of ASUS UX550GE with ALC295 (git-fixes).
- ALSA: hda/realtek: Enable headset mic of ASUS UX581LV with ALC295 (git-fixes).
- ALSA: hda/realtek - Enable the headset mic on Asus FX505DT (bsc#1051510).
- ALSA: hda/realtek - Fix S3 pop noise on Dell Wyse (git-fixes).
- ALSA: hda/realtek - Fix silent output on Gigabyte X570 Aorus Xtreme (bsc#1111666).
- ALSA: hda/realtek - Fix unexpected init_amp override (bsc#1051510).
- ALSA: hda/realtek - Limit int mic boost for Thinkpad T530 (git-fixes bsc#1171293).
- ALSA: hda/realtek - Two front mics on a Lenovo ThinkCenter (bsc#1051510).
- ALSA: hda: Release resources at error in delayed probe (bsc#1051510).
- ALSA: hda: Remove ASUS ROG Zenith from the blacklist (bsc#1051510).
- ALSA: hda: Skip controller resume if not needed (bsc#1051510).
- ALSA: hwdep: fix a left shifting 1 by 31 UB bug (git-fixes).
- ALSA: iec1712: Initialize STDSP24 properly when using the model=staudio option (git-fixes).
- ALSA: opti9xx: shut up gcc-10 range warning (bsc#1051510).
- ALSA: pcm: fix incorrect hw_base increase (git-fixes).
- ALSA: pcm: oss: Place the plugin buffer overflow checks correctly (bsc#1170522).
- ALSA: rawmidi: Fix racy buffer resize under concurrent accesses (git-fixes).
- ALSA: usb-audio: Add connector notifier delegation (bsc#1051510).
- ALSA: usb-audio: Add control message quirk delay for Kingston HyperX headset (git-fixes).
- ALSA: usb-audio: add mapping for ASRock TRX40 Creator (git-fixes).
- ALSA: usb-audio: Add mixer workaround for TRX40 and co (bsc#1051510).
- ALSA: usb-audio: Add quirk for Focusrite Scarlett 2i2 (bsc#1051510).
- ALSA: usb-audio: Add static mapping table for ALC1220-VB-based mobos (bsc#1051510).
- ALSA: usb-audio: Apply async workaround for Scarlett 2i4 2nd gen (bsc#1051510).
- ALSA: usb-audio: Check mapping at creating connector controls, too (bsc#1051510).
- ALSA: usb-audio: Correct a typo of NuPrime DAC-10 USB ID (bsc#1051510).
- ALSA: usb-audio: Do not create jack controls for PCM terminals (bsc#1051510).
- ALSA: usb-audio: Do not override ignore_ctl_error value from the map (bsc#1051510).
- ALSA: usb-audio: Filter error from connector kctl ops, too (bsc#1051510).
- ALSA: usb-audio: Fix usb audio refcnt leak when getting spdif (bsc#1051510).
- ALSA: usb-audio: mixer: volume quirk for ESS Technology Asus USB DAC (git-fixes).
- ALSA: usb-audio: Quirks for Gigabyte TRX40 Aorus Master onboard audio (git-fixes).
- ALSA: usx2y: Fix potential NULL dereference (bsc#1051510).
- ASoC: codecs: hdac_hdmi: Fix incorrect use of list_for_each_entry (bsc#1051510).
- ASoC: dapm: connect virtual mux with default value (bsc#1051510).
- ASoC: dapm: fixup dapm kcontrol widget (bsc#1051510).
- ASoC: dpcm: allow start or stop during pause for backend (bsc#1051510).
- ASoC: fix regwmask (bsc#1051510).
- ASoC: msm8916-wcd-digital: Reset RX interpolation path after use (bsc#1051510).
- ASoC: samsung: Prevent clk_get_rate() calls in atomic context (bsc#1111666).
- ASoC: topology: Check return value of pcm_new_ver (bsc#1051510).
- ASoC: topology: use name_prefix for new kcontrol (bsc#1051510).
- b43legacy: Fix case where channel status is corrupted (bsc#1051510).
- batman-adv: fix batadv_nc_random_weight_tq (git-fixes).
- batman-adv: Fix refcnt leak in batadv_show_throughput_override (git-fixes).
- batman-adv: Fix refcnt leak in batadv_store_throughput_override (git-fixes).
- batman-adv: Fix refcnt leak in batadv_v_ogm_process (git-fixes).
- bcache: avoid unnecessary btree nodes flushing in btree_flush_write() (git fixes (block drivers)).
- bcache: fix incorrect data type usage in btree_flush_write() (git fixes (block drivers)).
- bcache: Revert 'bcache: shrink btree node cache after bch_btree_check()' (git fixes (block drivers)).
- blk-mq: honor IO scheduler for multiqueue devices (bsc#1165478).
- blk-mq: simplify blk_mq_make_request() (bsc#1165478).
- block/drbd: delete invalid function drbd_md_mark_dirty_ (bsc#1171527).
- block: drbd: remove a stray unlock in __drbd_send_protocol() (bsc#1171599).
- block: fix busy device checking in blk_drop_partitions again (bsc#1171948).
- block: fix busy device checking in blk_drop_partitions (bsc#1171948).
- block: fix memleak of bio integrity data (git fixes (block drivers)).
- block: remove the bd_openers checks in blk_drop_partitions (bsc#1171948).
- bnxt_en: fix memory leaks in bnxt_dcbnl_ieee_getets() (networking-stable-20_03_28).
- bnxt_en: Reduce BNXT_MSIX_VEC_MAX value to supported CQs per PF (bsc#1104745).
- bnxt_en: reinitialize IRQs when MTU is modified (networking-stable-20_03_14).
- bnxt_en: Return error if bnxt_alloc_ctx_mem() fails (bsc#1104745 ).
- bnxt_en: Return error when allocating zero size context memory (bsc#1104745).
- bonding/alb: make sure arp header is pulled before accessing it (networking-stable-20_03_14).
- bpf: Fix sk_psock refcnt leak when receiving message (bsc#1083647).
- bpf: Forbid XADD on spilled pointers for unprivileged users (bsc#1083647).
- brcmfmac: abort and release host after error (bsc#1051510).
- btrfs: fix deadlock with memory reclaim during scrub (bsc#1172127).
- btrfs: fix log context list corruption after rename whiteout error (bsc#1172342).
- btrfs: fix partial loss of prealloc extent past i_size after fsync (bsc#1172343).
- btrfs: relocation: add error injection points for cancelling balance (bsc#1171417).
- btrfs: relocation: Check cancel request after each data page read (bsc#1171417).
- btrfs: relocation: Check cancel request after each extent found (bsc#1171417).
- btrfs: relocation: Clear the DEAD_RELOC_TREE bit for orphan roots to prevent runaway balance (bsc#1171417).
- btrfs: relocation: Fix reloc root leakage and the NULL pointer reference caused by the leakage (bsc#1171417).
- btrfs: relocation: Work around dead relocation stage loop (bsc#1171417).
- btrfs: reloc: clear DEAD_RELOC_TREE bit for orphan roots to prevent runaway balance (bsc#1171417 bsc#1160947 bsc#1172366).
- btrfs: reloc: fix reloc root leak and NULL pointer dereference (bsc#1171417 bsc#1160947 bsc#1172366).
- btrfs: setup a nofs context for memory allocation at btrfs_create_tree() (bsc#1172127).
- btrfs: setup a nofs context for memory allocation at __btrfs_set_acl (bsc#1172127).
- btrfs: use nofs context when initializing security xattrs to avoid deadlock (bsc#1172127).
- can: add missing attribute validation for termination (networking-stable-20_03_14).
- cdc-acm: close race betrween suspend() and acm_softint (git-fixes).
- cdc-acm: introduce a cool down (git-fixes).
- ceph: check if file lock exists before sending unlock request (bsc#1168789).
- ceph: demote quotarealm lookup warning to a debug message (bsc#1171692).
- ceph: fix double unlock in handle_cap_export() (bsc#1171694).
- ceph: fix endianness bug when handling MDS session feature bits (bsc#1171695).
- cgroup, netclassid: periodically release file_lock on classid updating (networking-stable-20_03_14).
- cifs: Allocate crypto structures on the fly for calculating signatures of incoming packets (bsc#1144333).
- cifs: Allocate encryption header through kmalloc (bsc#1144333).
- cifs: allow unlock flock and OFD lock across fork (bsc#1144333).
- cifs: check new file size when extending file by fallocate (bsc#1144333).
- cifs: cifspdu.h: Replace zero-length array with flexible-array member (bsc#1144333).
- cifs: clear PF_MEMALLOC before exiting demultiplex thread (bsc#1144333).
- cifs: do not share tcons with DFS (bsc#1144333).
- cifs: dump the session id and keys also for SMB2 sessions (bsc#1144333).
- cifs: ensure correct super block for DFS reconnect (bsc#1144333).
- cifs: Fix bug which the return value by asynchronous read is error (bsc#1144333).
- cifs: fix uninitialised lease_key in open_shroot() (bsc#1144333).
- cifs: improve read performance for page size 64KB & cache=strict & vers=2.1+ (bsc#1144333).
- cifs: Increment num_remote_opens stats counter even in case of smb2_query_dir_first (bsc#1144333).
- cifs: minor update to comments around the cifs_tcp_ses_lock mutex (bsc#1144333).
- cifs: protect updating server->dstaddr with a spinlock (bsc#1144333).
- cifs: smb2pdu.h: Replace zero-length array with flexible-array member (bsc#1144333).
- cifs: smbd: Calculate the correct maximum packet size for segmented SMBDirect send/receive (bsc#1144333).
- cifs: smbd: Check and extend sender credits in interrupt context (bsc#1144333).
- cifs: smbd: Check send queue size before posting a send (bsc#1144333).
- cifs: smbd: Do not schedule work to send immediate packet on every receive (bsc#1144333).
- cifs: smbd: Merge code to track pending packets (bsc#1144333).
- cifs: smbd: Properly process errors on ib_post_send (bsc#1144333).
- cifs: smbd: Update receive credits before sending and deal with credits roll back on failure before sending (bsc#1144333).
- cifs: Warn less noisily on default mount (bsc#1144333).
- clk: Add clk_hw_unregister_composite helper function definition (bsc#1051510).
- clk: imx6ull: use OSC clock during AXI rate change (bsc#1051510).
- clk: imx: make mux parent strings const (bsc#1051510).
- clk: mediatek: correct the clocks for MT2701 HDMI PHY module (bsc#1051510).
- clk: sunxi-ng: a64: Fix gate bit of DSI DPHY (bsc#1051510).
- clocksource/drivers/hyper-v: Set TSC clocksource as default w/ InvariantTSC (bsc#1170620, bsc#1170621).
- clocksource: dw_apb_timer_of: Fix missing clockevent timers (bsc#1051510).
- component: Silence bind error on -EPROBE_DEFER (bsc#1051510).
- coresight: do not use the BIT() macro in the UAPI header (git fixes (block drivers)).
- cpufreq: s3c64xx: Remove pointless NULL check in s3c64xx_cpufreq_driver_init (bsc#1051510).
- crypto: ccp - AES CFB mode is a stream cipher (git-fixes).
- crypto: ccp - Clean up and exit correctly on allocation failure (git-fixes).
- crypto: ccp - Cleanup misc_dev on sev_exit() (bsc#1114279).
- crypto: ccp - Cleanup sp_dev_master in psp_dev_destroy() (bsc#1114279).
- cxgb4: fix MPS index overwrite when setting MAC address (bsc#1127355).
- cxgb4: fix Txq restart check during backpressure (bsc#1127354 bsc#1127371).
- debugfs: Add debugfs_create_xul() for hexadecimal unsigned long (git-fixes).
- debugfs_lookup(): switch to lookup_one_len_unlocked() (bsc#1171979).
- devlink: fix return value after hitting end in region read (bsc#1109837).
- devlink: validate length of param values (bsc#1109837).
- devlink: validate length of region addr/len (bsc#1109837).
- dmaengine: dmatest: Fix iteration non-stop logic (bsc#1051510).
- dm mpath: switch paths in dm_blk_ioctl() code path (bsc#1167574).
- dm-raid1: fix invalid return value from dm_mirror (bsc#1172378).
- dm writecache: fix data corruption when reloading the target (git fixes (block drivers)).
- dm writecache: fix incorrect flush sequence when doing SSD mode commit (git fixes (block drivers)).
- dm writecache: verify watermark during resume (git fixes (block drivers)).
- dm zoned: fix invalid memory access (git fixes (block drivers)).
- dm zoned: reduce overhead of backing device checks (git fixes (block drivers)).
- dm zoned: remove duplicate nr_rnd_zones increase in dmz_init_zone() (git fixes (block drivers)).
- dm zoned: support zone sizes smaller than 128MiB (git fixes (block drivers)).
- dp83640: reverse arguments to list_add_tail (git-fixes).
- drivers: hv: Add a module description line to the hv_vmbus driver (bsc#1172249, bsc#1172251).
- drivers/net/ibmvnic: Update VNIC protocol version reporting (bsc#1065729).
- drivers: w1: add hwmon support structures (jsc#SLE-11048).
- drivers: w1: add hwmon temp support for w1_therm (jsc#SLE-11048).
- drivers: w1: refactor w1_slave_show to make the temp reading functionality separate (jsc#SLE-11048).
- drm: amd/acp: fix broken menu structure (bsc#1114279)
- drm/amdgpu: Correctly initialize thermal controller for GPUs with Powerplay table v0 (e.g Hawaii) (bsc#1111666).
- drm/amdgpu: Fix oops when pp_funcs is unset in ACPI event (bsc#1111666).
- drm/amd/powerplay: force the trim of the mclk dpm_levels if OD is (bsc#1113956)
- drm/atomic: Take the atomic toys away from X (bsc#1112178) * context changes
- drm/crc: Actually allow to change the crc source (bsc#1114279) * offset changes
- drm/dp_mst: Fix clearing payload state on topology disable (bsc#1051510).
- drm/dp_mst: Reformat drm_dp_check_act_status() a bit (bsc#1051510).
- drm/edid: Fix off-by-one in DispID DTD pixel clock (bsc#1114279)
- drm/etnaviv: fix perfmon domain interation (bsc#1113956)
- drm/etnaviv: rework perfmon query infrastructure (bsc#1112178)
- drm/i915: Apply Wa_1406680159:icl,ehl as an engine workaround (bsc#1112178)
- drm/i915/gvt: Init DPLL/DDI vreg for virtual display instead of (bsc#1114279)
- drm/i915: HDCP: fix Ri prime check done during link check (bsc#1112178)
- drm/i915: properly sanity check batch_start_offset (bsc#1114279)
- drm/meson: Delete an error message in meson_dw_hdmi_bind() (bsc#1051510).
- drm: NULL pointer dereference [null-pointer-deref] (CWE 476) problem (bsc#1114279)
- drm/qxl: qxl_release leak in qxl_draw_dirty_fb() (bsc#1051510).
- drm/qxl: qxl_release leak in qxl_hw_surface_alloc() (bsc#1051510).
- drm/qxl: qxl_release use after free (bsc#1051510).
- drm: Remove PageReserved manipulation from drm_pci_alloc (bsc#1114279)
- drm/sun4i: dsi: Allow binding the host without a panel (bsc#1113956)
- drm/sun4i: dsi: Avoid hotplug race with DRM driver bind (bsc#1113956)
- drm/sun4i: dsi: Remove incorrect use of runtime PM (bsc#1113956)
- drm/sun4i: dsi: Remove unused drv from driver context (bsc#1113956)
- dump_stack: avoid the livelock of the dump_lock (git fixes (block drivers)).
- EDAC, sb_edac: Add support for systems with segmented PCI buses (bsc#1169525).
- ext4: do not zeroout extents beyond i_disksize (bsc#1167851).
- ext4: fix extent_status fragmentation for plain files (bsc#1171949).
- ext4: use non-movable memory for superblock readahead (bsc#1171952).
- fanotify: fix merging marks masks with FAN_ONDIR (bsc#1171679).
- fbcon: fix null-ptr-deref in fbcon_switch (bsc#1114279)
- fib: add missing attribute validation for tun_id (networking-stable-20_03_14).
- firmware: qcom: scm: fix compilation error when disabled (bsc#1051510).
- Fix a backport bug, where btrfs_put_root() -> btrfs_put_fs_root() modification is not needed due to missing dependency
- Following two patches needs to be combined as one commit (one adds context, later removes which affects existing patch) else commit series cannot be sequenced.
- fpga: dfl: afu: Corrected error handling levels (git-fixes).
- fs/cifs: fix gcc warning in sid_to_id (bsc#1144333).
- fs/seq_file.c: simplify seq_file iteration code and interface (bsc#1170125).
- gpio: tegra: mask GPIO IRQs during IRQ shutdown (bsc#1051510).
- gre: fix uninit-value in __iptunnel_pull_header (networking-stable-20_03_14).
- HID: hid-input: clear unmapped usages (git-fixes).
- HID: hyperv: Add a module description line (bsc#1172249, bsc#1172251).
- HID: i2c-hid: add Trekstor Primebook C11B to descriptor override (git-fixes).
- HID: i2c-hid: override HID descriptors for certain devices (git-fixes).
- HID: multitouch: add eGalaxTouch P80H84 support (bsc#1051510).
- HID: wacom: Read HID_DG_CONTACTMAX directly for non-generic devices (git-fixes).
- hrtimer: Annotate lockless access to timer->state (git fixes (block drivers)).
- hsr: add restart routine into hsr_get_node_list() (networking-stable-20_03_28).
- hsr: check protocol version in hsr_newlink() (networking-stable-20_04_17).
- hsr: fix general protection fault in hsr_addr_is_self() (networking-stable-20_03_28).
- hsr: set .netnsok flag (networking-stable-20_03_28).
- hsr: use rcu_read_lock() in hsr_get_node_{list/status}() (networking-stable-20_03_28).
- i2c: acpi: Force bus speed to 400KHz if a Silead touchscreen is present (git-fixes).
- i2c: acpi: put device when verifying client fails (git-fixes).
- i2c: brcmstb: remove unused struct member (git-fixes).
- i2c: core: Allow empty id_table in ACPI case as well (git-fixes).
- i2c: core: decrease reference count of device node in i2c_unregister_device (git-fixes).
- i2c: dev: Fix the race between the release of i2c_dev and cdev (bsc#1051510).
- i2c: fix missing pm_runtime_put_sync in i2c_device_probe (git-fixes).
- i2c-hid: properly terminate i2c_hid_dmi_desc_override_table array (git-fixes).
- i2c: i801: Do not add ICH_RES_IO_SMI for the iTCO_wdt device (git-fixes).
- i2c: iproc: Stop advertising support of SMBUS quick cmd (git-fixes).
- i2c: isch: Remove unnecessary acpi.h include (git-fixes).
- i2c: mux: demux-pinctrl: Fix an error handling path in 'i2c_demux_pinctrl_probe()' (bsc#1051510).
- i2c: st: fix missing struct parameter description (bsc#1051510).
- IB/mlx5: Fix missing congestion control debugfs on rep rdma device (bsc#1103991).
- ibmvnic: Skip fatal error reset after passive init (bsc#1171078 ltc#184239).
- iio:ad7797: Use correct attribute_group (bsc#1051510).
- iio: adc: stm32-adc: fix device used to request dma (bsc#1051510).
- iio: adc: stm32-adc: fix sleep in atomic context (git-fixes).
- iio: adc: stm32-adc: Use dma_request_chan() instead dma_request_slave_channel() (bsc#1051510).
- iio: dac: vf610: Fix an error handling path in 'vf610_dac_probe()' (bsc#1051510).
- iio: sca3000: Remove an erroneous 'get_device()' (bsc#1051510).
- iio: xilinx-xadc: Fix ADC-B powerdown (bsc#1051510).
- iio: xilinx-xadc: Fix clearing interrupt when enabling trigger (bsc#1051510).
- iio: xilinx-xadc: Fix sequencer configuration for aux channels in simultaneous mode (bsc#1051510).
- ima: Fix return value of ima_write_policy() (git-fixes).
- input: evdev - call input_flush_device() on release(), not flush() (bsc#1051510).
- input: hyperv-keyboard - add module description (bsc#1172249, bsc#1172251).
- input: i8042 - add Acer Aspire 5738z to nomux list (bsc#1051510).
- input: i8042 - add ThinkPad S230u to i8042 reset list (bsc#1051510).
- input: raydium_i2c_ts - use true and false for boolean values (bsc#1051510).
- input: synaptics-rmi4 - fix error return code in rmi_driver_probe() (bsc#1051510).
- input: synaptics-rmi4 - really fix attn_data use-after-free (git-fixes).
- input: usbtouchscreen - add support for BonXeon TP (bsc#1051510).
- input: xpad - add custom init packet for Xbox One S controllers (bsc#1051510).
- iommu/amd: Call domain_flush_complete() in update_domain() (bsc#1172096).
- iommu/amd: Do not flush Device Table in iommu_map_page() (bsc#1172097).
- iommu/amd: Do not loop forever when trying to increase address space (bsc#1172098).
- iommu/amd: Fix legacy interrupt remapping for x2APIC-enabled system (bsc#1172099).
- iommu/amd: Fix over-read of ACPI UID from IVRS table (bsc#1172101).
- iommu/amd: Fix race in increase_address_space()/fetch_pte() (bsc#1172102).
- iommu/amd: Update Device Table in increase_address_space() (bsc#1172103).
- iommu: Fix reference count leak in iommu_group_alloc (bsc#1172397).
- ip6_tunnel: Allow rcv/xmit even if remote address is a local address (bsc#1166978).
- ipmi: fix hung processes in __get_guid() (git-fixes).
- ipv4: fix a RCU-list lock in fib_triestat_seq_show (networking-stable-20_04_02).
- ipv6/addrconf: call ipv6_mc_up() for non-Ethernet interface (networking-stable-20_03_14).
- ipv6: do not auto-add link-local address to lag ports (networking-stable-20_04_09).
- ipv6: fix IPV6_ADDRFORM operation logic (bsc#1171662).
- ipv6: Fix nlmsg_flags when splitting a multipath route (networking-stable-20_03_01).
- ipv6: fix restrict IPV6_ADDRFORM operation (bsc#1171662).
- ipv6: Fix route replacement with dev-only route (networking-stable-20_03_01).
- ipvlan: add cond_resched_rcu() while processing muticast backlog (networking-stable-20_03_14).
- ipvlan: do not deref eth hdr before checking it's set (networking-stable-20_03_14).
- ipvlan: do not use cond_resched_rcu() in ipvlan_process_multicast() (networking-stable-20_03_14).
- iwlwifi: pcie: actually release queue memory in TVQM (bsc#1051510).
- ixgbe: do not check firmware errors (bsc#1170284).
- kABI fix for early XHCI debug (git-fixes).
- kabi for for md: improve handling of bio with REQ_PREFLUSH in md_flush_request() (git-fixes).
- kabi/severities: Do not track KVM internal symbols.
- kabi/severities: Ingnore get_dev_data() The function is internal to the AMD IOMMU driver and must not be called by any third party.
- kABI workaround for snd_rawmidi buffer_ref field addition (git-fixes).
- keys: reaching the keys quotas correctly (bsc#1051510).
- KVM: arm64: Change hyp_panic()s dependency on tpidr_el2 (bsc#1133021).
- KVM: arm64: Stop save/restoring host tpidr_el1 on VHE (bsc#1133021).
- KVM: Check validity of resolved slot when searching memslots (bsc#1172104).
- KVM: s390: vsie: Fix delivery of addressing exceptions (git-fixes).
- KVM: s390: vsie: Fix possible race when shadowing region 3 tables (git-fixes).
- KVM: s390: vsie: Fix region 1 ASCE sanity shadow address checks (git-fixes).
- KVM: SVM: Fix potential memory leak in svm_cpu_init() (bsc#1171736).
- KVM x86: Extend AMD specific guest behavior to Hygon virtual CPUs (bsc#1152489).
- l2tp: Allow management of tunnels and session in user namespace (networking-stable-20_04_17).
- libata: Remove extra scsi_host_put() in ata_scsi_add_hosts() (bsc#1051510).
- libata: Return correct status in sata_pmp_eh_recover_pm() when ATA_DFLAG_DETACH is set (bsc#1051510).
- lib: raid6: fix awk build warnings (git fixes (block drivers)).
- lib/raid6/test: fix build on distros whose /bin/sh is not bash (git fixes (block drivers)).
- lib/stackdepot.c: fix global out-of-bounds in stack_slabs (git fixes (block drivers)).
- locks: print unsigned ino in /proc/locks (bsc#1171951).
- mac80211: add ieee80211_is_any_nullfunc() (bsc#1051510).
- mac80211_hwsim: Use kstrndup() in place of kasprintf() (bsc#1051510).
- mac80211: mesh: fix discovery timer re-arming issue / crash (bsc#1051510).
- macsec: avoid to set wrong mtu (bsc#1051510).
- macsec: restrict to ethernet devices (networking-stable-20_03_28).
- macvlan: add cond_resched() during multicast processing (networking-stable-20_03_14).
- macvlan: fix null dereference in macvlan_device_event() (bsc#1051510).
- md: improve handling of bio with REQ_PREFLUSH in md_flush_request() (git-fixes).
- md/raid0: Fix an error message in raid0_make_request() (git fixes (block drivers)).
- md/raid10: prevent access of uninitialized resync_pages offset (git-fixes).
- media: dvb: return -EREMOTEIO on i2c transfer failure (bsc#1051510).
- media: platform: fcp: Set appropriate DMA parameters (bsc#1051510).
- media: ti-vpe: cal: fix disable_irqs to only the intended target (git-fixes).
- mei: release me_cl object reference (bsc#1051510).
- mlxsw: Fix some IS_ERR() vs NULL bugs (networking-stable-20_04_27).
- mlxsw: spectrum_flower: Do not stop at FLOW_ACTION_VLAN_MANGLE (networking-stable-20_04_09).
- mlxsw: spectrum_mr: Fix list iteration in error path (bsc#1112374).
- mmc: atmel-mci: Fix debugfs on 64-bit platforms (git-fixes).
- mmc: core: Check request type before completing the request (git-fixes).
- mmc: core: Fix recursive locking issue in CQE recovery path (git-fixes).
- mmc: cqhci: Avoid false 'cqhci: CQE stuck on' by not open-coding timeout loop (git-fixes).
- mmc: dw_mmc: Fix debugfs on 64-bit platforms (git-fixes).
- mmc: meson-gx: make sure the descriptor is stopped on errors (git-fixes).
- mmc: meson-gx: simplify interrupt handler (git-fixes).
- mmc: renesas_sdhi: limit block count to 16 bit for old revisions (git-fixes).
- mmc: sdhci-esdhc-imx: fix the mask for tuning start point (bsc#1051510).
- mmc: sdhci-msm: Clear tuning done flag while hs400 tuning (bsc#1051510).
- mmc: sdhci-of-at91: fix memleak on clk_get failure (git-fixes).
- mmc: sdhci-pci: Fix eMMC driver strength for BYT-based controllers (bsc#1051510).
- mmc: sdhci: Update the tuning failed messages to pr_debug level (git-fixes).
- mmc: sdhci-xenon: fix annoying 1.8V regulator warning (bsc#1051510).
- mmc: sdio: Fix potential NULL pointer error in mmc_sdio_init_card() (bsc#1051510).
- mmc: tmio: fix access width of Block Count Register (git-fixes).
- mm: limit boost_watermark on small zones (git fixes (mm/pgalloc)).
- mm: thp: handle page cache THP correctly in PageTransCompoundMap (git fixes (block drivers)).
- mtd: cfi: fix deadloop in cfi_cmdset_0002.c do_write_buffer (bsc#1051510).
- mtd: spi-nor: cadence-quadspi: add a delay in write sequence (git-fixes).
- mtd: spi-nor: enable 4B opcodes for mx66l51235l (git-fixes).
- mtd: spi-nor: fsl-quadspi: Do not let -EINVAL on the bus (git-fixes).
- mwifiex: avoid -Wstringop-overflow warning (bsc#1051510).
- mwifiex: Fix memory corruption in dump_station (bsc#1051510).
- net: bcmgenet: correct per TX/RX ring statistics (networking-stable-20_04_27).
- net: dsa: b53: Fix ARL register definitions (networking-stable-20_04_27).
- net: dsa: b53: Rework ARL bin logic (networking-stable-20_04_27).
- net: dsa: bcm_sf2: Do not register slave MDIO bus with OF (networking-stable-20_04_09).
- net: dsa: bcm_sf2: Ensure correct sub-node is parsed (networking-stable-20_04_09).
- net: dsa: bcm_sf2: Fix overflow checks (git-fixes).
- net: dsa: Fix duplicate frames flooded by learning (networking-stable-20_03_28).
- net: dsa: mv88e6xxx: fix lockup on warm boot (networking-stable-20_03_14).
- net/ethernet: add Google GVE driver (jsc#SLE-10538)
- net: fec: add phy_reset_after_clk_enable() support (git-fixes).
- net: fec: validate the new settings in fec_enet_set_coalesce() (networking-stable-20_03_14).
- net: fib_rules: Correctly set table field when table number exceeds 8 bits (networking-stable-20_03_01).
- net: fix race condition in __inet_lookup_established() (bsc#1151794).
- net: fq: add missing attribute validation for orphan mask (networking-stable-20_03_14).
- net: hns3: fix 'tc qdisc del' failed issue (bsc#1109837).
- net, ip_tunnel: fix interface lookup with no key (networking-stable-20_04_02).
- net: ipv4: devinet: Fix crash when add/del multicast IP with autojoin (networking-stable-20_04_17).
- net: ipv6: do not consider routes via gateways for anycast address check (networking-stable-20_04_17).
- netlink: Use netlink header as base to calculate bad attribute offset (networking-stable-20_03_14).
- net: macsec: update SCI upon MAC address change (networking-stable-20_03_14).
- net: memcg: fix lockdep splat in inet_csk_accept() (networking-stable-20_03_14).
- net: memcg: late association of sock to memcg (networking-stable-20_03_14).
- net/mlx4_en: avoid indirect call in TX completion (networking-stable-20_04_27).
- net/mlx5: Add new fields to Port Type and Speed register (bsc#1171118).
- net/mlx5: Expose link speed directly (bsc#1171118).
- net/mlx5: Expose port speed when possible (bsc#1171118).
- net/mlx5: Fix failing fw tracer allocation on s390 (bsc#1103990 ).
- net: mvneta: Fix the case where the last poll did not process all rx (networking-stable-20_03_28).
- net: netrom: Fix potential nr_neigh refcnt leak in nr_add_node (networking-stable-20_04_27).
- net/packet: tpacket_rcv: do not increment ring index on drop (networking-stable-20_03_14).
- net: phy: restore mdio regs in the iproc mdio driver (networking-stable-20_03_01).
- net: qmi_wwan: add support for ASKEY WWHC050 (networking-stable-20_03_28).
- net: revert default NAPI poll timeout to 2 jiffies (networking-stable-20_04_17).
- net_sched: cls_route: remove the right filter from hashtable (networking-stable-20_03_28).
- net_sched: sch_skbprio: add message validation to skbprio_change() (bsc#1109837).
- net/x25: Fix x25_neigh refcnt leak when receiving frame (networking-stable-20_04_27).
- nfc: add missing attribute validation for SE API (networking-stable-20_03_14).
- nfc: add missing attribute validation for vendor subcommand (networking-stable-20_03_14).
- nfc: pn544: Fix occasional HW initialization failure (networking-stable-20_03_01).
- NFC: st21nfca: add missed kfree_skb() in an error path (bsc#1051510).
- nfp: abm: fix a memory leak bug (bsc#1109837).
- nfsd4: fix up replay_matches_cache() (git-fixes).
- nfsd: Ensure CLONE persists data and metadata changes to the target file (git-fixes).
- nfsd: fix delay timer on 32-bit architectures (git-fixes).
- nfsd: fix jiffies/time_t mixup in LRU list (git-fixes).
- nfs: Directory page cache pages need to be locked when read (git-fixes).
- nfsd: memory corruption in nfsd4_lock() (git-fixes).
- nfs: Do not call generic_error_remove_page() while holding locks (bsc#1170457).
- nfs: Fix memory leaks and corruption in readdir (git-fixes).
- nfs: Fix O_DIRECT accounting of number of bytes read/written (git-fixes).
- nfs: Fix potential posix_acl refcnt leak in nfs3_set_acl (git-fixes).
- nfs: fix racey wait in nfs_set_open_stateid_locked (bsc#1170592).
- NFS/flexfiles: Use the correct TCP timeout for flexfiles I/O (git-fixes).
- NFS/pnfs: Fix pnfs_generic_prepare_to_resend_writes() (git-fixes).
- nfs: Revalidate the file size on a fatal write error (git-fixes).
- NFSv4.0: nfs4_do_fsinfo() should not do implicit lease renewals (git-fixes).
- NFSv4: Do not allow a cached open with a revoked delegation (git-fixes).
- NFSv4: Fix leak of clp->cl_acceptor string (git-fixes).
- NFSv4-Fix-OPEN-CLOSE-race.patch
- NFSv4/pnfs: Return valid stateids in nfs_layout_find_inode_by_stateid() (git-fixes).
- NFSv4: try lease recovery on NFS4ERR_EXPIRED (git-fixes).
- NFSv4.x: Drop the slot if nfs4_delegreturn_prepare waits for layoutreturn (git-fixes).
- nl802154: add missing attribute validation for dev_type (networking-stable-20_03_14).
- nl802154: add missing attribute validation (networking-stable-20_03_14).
- nvme-fc: print proper nvme-fc devloss_tmo value (bsc#1172391).
- objtool: Fix stack offset tracking for indirect CFAs (bsc#1169514).
- objtool: Fix switch table detection in .text.unlikely (bsc#1169514).
- objtool: Make BP scratch register warning more robust (bsc#1169514).
- padata: Remove broken queue flushing (git-fixes).
- Partially revert 'kfifo: fix kfifo_alloc() and kfifo_init()' (git fixes (block drivers)).
- PCI: hv: Add support for protocol 1.3 and support PCI_BUS_RELATIONS2 (bsc#1172201, bsc#1172202).
- PCI: hv: Decouple the func definition in hv_dr_state from VSP message (bsc#1172201, bsc#1172202).
- PCI/PM: Call .bridge_d3() hook only if non-NULL (git-fixes).
- perf: Allocate context task_ctx_data for child event (git-fixes).
- perf/cgroup: Fix perf cgroup hierarchy support (git-fixes).
- perf: Copy parent's address filter offsets on clone (git-fixes).
- perf/core: Add sanity check to deal with pinned event failure (git-fixes).
- perf/core: Avoid freeing static PMU contexts when PMU is unregistered (git-fixes).
- perf/core: Correct event creation with PERF_FORMAT_GROUP (git-fixes).
- perf/core: Do not WARN() for impossible ring-buffer sizes (git-fixes).
- perf/core: Fix ctx_event_type in ctx_resched() (git-fixes).
- perf/core: Fix error handling in perf_event_alloc() (git-fixes).
- perf/core: Fix exclusive events' grouping (git-fixes).
- perf/core: Fix group scheduling with mixed hw and sw events (git-fixes).
- perf/core: Fix impossible ring-buffer sizes warning (git-fixes).
- perf/core: Fix locking for children siblings group read (git-fixes).
- perf/core: Fix lock inversion between perf,trace,cpuhp (git-fixes (dependent patch for 18736eef1213)).
- perf/core: Fix perf_event_read_value() locking (git-fixes).
- perf/core: Fix perf_pmu_unregister() locking (git-fixes).
- perf/core: Fix __perf_read_group_add() locking (git-fixes (dependent patch)).
- perf/core: Fix perf_sample_regs_user() mm check (git-fixes).
- perf/core: Fix possible Spectre-v1 indexing for ->aux_pages (git-fixes).
- perf/core: Fix race between close() and fork() (git-fixes).
- perf/core: Fix the address filtering fix (git-fixes).
- perf/core: Fix use-after-free in uprobe_perf_close() (git-fixes).
- perf/core: Force USER_DS when recording user stack data (git-fixes).
- perf/core: Restore mmap record type correctly (git-fixes).
- perf: Fix header.size for namespace events (git-fixes).
- perf/ioctl: Add check for the sample_period value (git-fixes).
- perf, pt, coresight: Fix address filters for vmas with non-zero offset (git-fixes).
- perf: Return proper values for user stack errors (git-fixes).
- pinctrl: baytrail: Enable pin configuration setting for GPIO chip (git-fixes).
- pinctrl: cherryview: Add missing spinlock usage in chv_gpio_irq_handler (git-fixes).
- pinctrl: sunrisepoint: Fix PAD lock register offset for SPT-H (git-fixes).
- platform/x86: asus-nb-wmi: Do not load on Asus T100TA and T200TA (bsc#1051510).
- pnfs: Ensure we do clear the return-on-close layout stateid on fatal errors (git-fixes).
- powerpc: Add attributes for setjmp/longjmp (bsc#1065729).
- powerpc/pci/of: Parse unassigned resources (bsc#1065729).
- powerpc/setup_64: Set cache-line-size based on cache-block-size (bsc#1065729).
- powerpc/sstep: Fix DS operand in ld encoding to appropriate value (bsc#1065729).
- qede: Fix race between rdma destroy workqueue and link change event (networking-stable-20_03_01).
- r8152: check disconnect status after long sleep (networking-stable-20_03_14).
- raid6/ppc: Fix build for clang (git fixes (block drivers)).
- random: always use batched entropy for get_random_u{32,64} (bsc#1164871).
- rcu: locking and unlocking need to always be at least barriers (git fixes (block drivers)).
- Redo patch for SLE15-SP1, based on feedback from IBM: patches.suse/s390-ftrace-fix-potential-crashes-when-switching-tracers (bsc#1171244 LTC#185785 git-fixes).
- resolve KABI warning for perf-pt-coresight (git-fixes).
- Revert 'ALSA: hda/realtek: Fix pop noise on ALC225' (git-fixes).
- Revert 'drm/panel: simple: Add support for Sharp LQ150X1LG11 panels' (bsc#1114279) * offset changes
- Revert 'HID: i2c-hid: add Trekstor Primebook C11B to descriptor override' Depends on 9b5c747685982d22efffeafc5ec601bd28f6d78b, which was also reverted.
- Revert 'HID: i2c-hid: override HID descriptors for certain devices' This broke i2c-hid.ko's build, there is no way around it without a big file rename or renaming the kernel module.
- Revert 'i2c-hid: properly terminate i2c_hid_dmi_desc_override_table' Fixed 9b5c747685982d22efffeafc5ec601bd28f6d78b, which was also reverted.
- Revert 'ipc,sem: remove uneeded sem_undo_list lock usage in exit_sem()' (bsc#1172221).
- Revert 'RDMA/cma: Simplify rdma_resolve_addr() error flow' (bsc#1103992).
- rtlwifi: Fix a double free in _rtl_usb_tx_urb_setup() (bsc#1051510).
- s390/cio: avoid duplicated 'ADD' uevents (git-fixes).
- s390/cio: generate delayed uevent for vfio-ccw subchannels (git-fixes).
- s390/cpuinfo: fix wrong output when CPU0 is offline (git-fixes).
- s390/cpum_cf: Add new extended counters for IBM z15 (bsc#1169762 LTC#185291).
- s390/diag: fix display of diagnose call statistics (git-fixes).
- s390/ftrace: fix potential crashes when switching tracers (git-fixes).
- s390/gmap: return proper error code on ksm unsharing (git-fixes).
- s390/ism: fix error return code in ism_probe() (git-fixes).
- s390/pci: do not set affinity for floating irqs (git-fixes).
- s390/pci: Fix possible deadlock in recover_store() (bsc#1165183 LTC#184103).
- s390/pci: Recover handle in clp_set_pci_fn() (bsc#1165183 LTC#184103).
- s390/qeth: cancel RX reclaim work earlier (git-fixes).
- s390/qeth: do not return -ENOTSUPP to userspace (git-fixes).
- s390/qeth: do not warn for napi with 0 budget (git-fixes).
- s390/qeth: fix off-by-one in RX copybreak check (git-fixes).
- s390/qeth: fix promiscuous mode after reset (git-fixes).
- s390/qeth: fix qdio teardown after early init error (git-fixes).
- s390/qeth: handle error due to unsupported transport mode (git-fixes).
- s390/qeth: handle error when backing RX buffer (git-fixes).
- s390/qeth: lock the card while changing its hsuid (git-fixes).
- s390/qeth: support net namespaces for L3 devices (git-fixes).
- s390/time: Fix clk type in get_tod_clock (git-fixes).
- scripts/decodecode: fix trapping instruction formatting (bsc#1065729).
- scripts/dtc: Remove redundant YYLOC global declaration (bsc#1160388).
- scsi: bnx2i: fix potential use after free (bsc#1171600).
- scsi: core: Handle drivers which set sg_tablesize to zero (bsc#1171601)
- scsi: core: save/restore command resid for error handling (bsc#1171602).
- scsi: core: scsi_trace: Use get_unaligned_be*() (bsc#1171604).
- scsi: core: try to get module before removing device (bsc#1171605).
- scsi: csiostor: Adjust indentation in csio_device_reset (bsc#1171606).
- scsi: csiostor: Do not enable IRQs too early (bsc#1171607).
- scsi: esas2r: unlock on error in esas2r_nvram_read_direct() (bsc#1171608).
- scsi: fnic: fix invalid stack access (bsc#1171609).
- scsi: fnic: fix msix interrupt allocation (bsc#1171610).
- scsi-ibmvfc-Don-t-send-implicit-logouts-prior-to-NPI.patch
- scsi: ibmvscsi: Fix WARN_ON during event pool release (bsc#1170791 ltc#185128).
- scsi-ibmvscsi-Fix-WARN_ON-during-event-pool-release.patch
- scsi: iscsi: Avoid potential deadlock in iscsi_if_rx func (bsc#1171611).
- scsi: iscsi: Fix a potential deadlock in the timeout handler (bsc#1171612).
- scsi: iscsi: qla4xxx: fix double free in probe (bsc#1171613).
- scsi: lpfc: Change default queue allocation for reduced memory consumption (bsc#1164780).
- scsi: lpfc: fix: Coverity: lpfc_cmpl_els_rsp(): Null pointer dereferences (bsc#1171614).
- scsi: lpfc: Fix crash in target side cable pulls hitting WAIT_FOR_UNREG (bsc#1171615).
- scsi: lpfc: Fix lpfc_nodelist leak when processing unsolicited event (bsc#1164780).
- scsi: lpfc: Fix MDS Diagnostic Enablement definition (bsc#1164780).
- scsi: lpfc: Fix negation of else clause in lpfc_prep_node_fc4type (bsc#1164780).
- scsi: lpfc: Fix noderef and address space warnings (bsc#1164780).
- scsi: lpfc: Maintain atomic consistency of queue_claimed flag (bsc#1164780).
- scsi: lpfc: remove duplicate unloading checks (bsc#1164780).
- scsi: lpfc: Remove re-binding of nvme rport during registration (bsc#1164780).
- scsi: lpfc: Remove redundant initialization to variable rc (bsc#1164780).
- scsi: lpfc: Remove unnecessary lockdep_assert_held calls (bsc#1164780).
- scsi: lpfc: Update lpfc version to 12.8.0.1 (bsc#1164780).
- scsi: megaraid_sas: Do not initiate OCR if controller is not in ready state (bsc#1171616).
- scsi: qla2xxx: add ring buffer for tracing debug logs (bsc#1157169).
- scsi-qla2xxx-check-UNLOADING-before-posting-async-wo.patch
- scsi: qla2xxx: check UNLOADING before posting async work (bsc#1157169).
- scsi: qla2xxx: Delete all sessions before unregister local nvme port (bsc#1157169).
- scsi: qla2xxx: Do not log message when reading port speed via sysfs (bsc#1157169).
- scsi: qla2xxx: Fix hang when issuing nvme disconnect-all in NPIV (bsc#1157169).
- scsi: qla2xxx: Fix regression warnings (bsc#1157169).
- scsi: qla2xxx: Remove non functional code (bsc#1157169).
- scsi: qla2xxx: set UNLOADING before waiting for session deletion (bsc#1157169).
- scsi-qla2xxx-set-UNLOADING-before-waiting-for-sessio.patch
- scsi: qla4xxx: Adjust indentation in qla4xxx_mem_free (bsc#1171617).
- scsi: qla4xxx: fix double free bug (bsc#1171618).
- scsi: sd: Clear sdkp->protection_type if disk is reformatted without PI (bsc#1171619).
- scsi: sg: add sg_remove_request in sg_common_write (bsc#1171620).
- scsi: tracing: Fix handling of TRANSFER LENGTH == 0 for READ(6) and WRITE(6) (bsc#1171621).
- scsi: ufs: change msleep to usleep_range (bsc#1171622).
- scsi: ufs: Clean up ufshcd_scale_clks() and clock scaling error out path (bsc#1171623).
- scsi: ufs: Fix ufshcd_hold() caused scheduling while atomic (bsc#1171624).
- scsi: ufs: Fix ufshcd_probe_hba() reture value in case ufshcd_scsi_add_wlus() fails (bsc#1171625).
- scsi: ufs: Recheck bkops level if bkops is disabled (bsc#1171626).
- scsi: zfcp: fix missing erp_lock in port recovery trigger for point-to-point (git-fixes).
- sctp: fix possibly using a bad saddr with a given dst (networking-stable-20_04_02).
- sctp: fix refcount bug in sctp_wfree (networking-stable-20_04_02).
- sctp: move the format error check out of __sctp_sf_do_9_1_abort (networking-stable-20_03_01).
- selftests/powerpc: Fix build errors in powerpc ptrace selftests (boo#1124278).
- seq_file: fix problem when seeking mid-record (bsc#1170125).
- serial: uartps: Move the spinlock after the read of the tx empty (git-fixes).
- sfc: detach from cb_page in efx_copy_channel() (networking-stable-20_03_14).
- signal/pid_namespace: Fix reboot_pid_ns to use send_sig not force_sig (bsc#1172185).
- slcan: not call free_netdev before rtnl_unlock in slcan_open (networking-stable-20_03_28).
- slip: make slhc_compress() more robust against malicious packets (networking-stable-20_03_14).
- smb3: Additional compression structures (bsc#1144333).
- smb3: Add new compression flags (bsc#1144333).
- smb3: change noisy error message to FYI (bsc#1144333).
- smb3: enable swap on SMB3 mounts (bsc#1144333).
- smb3-fix-performance-regression-with-setting-mtime.patch
- smb3: Minor cleanup of protocol definitions (bsc#1144333).
- smb3: remove overly noisy debug line in signing errors (bsc#1144333).
- smb3: smbdirect support can be configured by default (bsc#1144333).
- smb3: use SMB2_SIGNATURE_SIZE define (bsc#1144333).
- spi: bcm2835: Fix 3-wire mode if DMA is enabled (git-fixes).
- spi: bcm63xx-hsspi: Really keep pll clk enabled (bsc#1051510).
- spi: bcm-qspi: when tx/rx buffer is NULL set to 0 (bsc#1051510).
- spi: dw: Add SPI Rx-done wait method to DMA-based transfer (bsc#1051510).
- spi: dw: Add SPI Tx-done wait method to DMA-based transfer (bsc#1051510).
- spi: dw: Zero DMA Tx and Rx configurations on stack (bsc#1051510).
- spi: fsl: do not map irq during probe (git-fixes).
- spi: fsl: use platform_get_irq() instead of of_irq_to_resource() (git-fixes).
- spi: pxa2xx: Add CS control clock quirk (bsc#1051510).
- spi: qup: call spi_qup_pm_resume_runtime before suspending (bsc#1051510).
- spi: spi-fsl-dspi: Replace interruptible wait queue with a simple completion (git-fixes).
- spi: spi-s3c64xx: Fix system resume support (git-fixes).
- spi/zynqmp: remove entry that causes a cs glitch (bsc#1051510).
- staging: comedi: dt2815: fix writing hi byte of analog output (bsc#1051510).
- staging: comedi: Fix comedi_device refcnt leak in comedi_open (bsc#1051510).
- staging: iio: ad2s1210: Fix SPI reading (bsc#1051510).
- staging: vt6656: Do not set RCR_MULTICAST or RCR_BROADCAST by default (git-fixes).
- staging: vt6656: Fix drivers TBTT timing counter (git-fixes).
- staging: vt6656: Fix pairwise key entry save (git-fixes).
- sunrpc: expiry_time should be seconds not timeval (git-fixes).
- sunrpc: Fix a potential buffer overflow in 'svc_print_xprts()' (git-fixes).
- supported.conf: Add br_netfilter to base (bsc#1169020).
- supported.conf: support w1 core and thermometer support
- svcrdma: Fix double svc_rdma_send_ctxt_put() in an error path (bsc#1103992).
- svcrdma: Fix leak of transport addresses (git-fixes).
- svcrdma: Fix trace point use-after-free race (bsc#1103992 ).
- taskstats: fix data-race (bsc#1172188).
- tcp: cache line align MAX_TCP_HEADER (networking-stable-20_04_27).
- tcp: repair: fix TCP_QUEUE_SEQ implementation (networking-stable-20_03_28).
- team: add missing attribute validation for array index (networking-stable-20_03_14).
- team: add missing attribute validation for port ifindex (networking-stable-20_03_14).
- team: fix hang in team_mode_get() (networking-stable-20_04_27).
- tools lib traceevent: Remove unneeded qsort and uses memmove instead (git-fixes).
- tpm: ibmvtpm: retry on H_CLOSED in tpm_ibmvtpm_send() (bsc#1065729).
- tpm/tpm_tis: Free IRQ if probing fails (bsc#1082555).
- tpm/tpm_tis: Free IRQ if probing fails (git-fixes).
- tracing: Add a vmalloc_sync_mappings() for safe measure (git-fixes).
- tracing: Disable trace_printk() on post poned tests (git-fixes).
- tracing: Fix the race between registering 'snapshot' event trigger and triggering 'snapshot' operation (git-fixes).
- tty: rocket, avoid OOB access (git-fixes).
- tun: Do not put_page() for all negative return values from XDP program (bsc#1109837).
- UAS: fix deadlock in error handling and PM flushing work (git-fixes).
- UAS: no use logging any details in case of ENODEV (git-fixes).
- Update config files: Build w1 bus on arm64 (jsc#SLE-11048)
- Update config files: re-enable CONFIG_HAMRADIO and co (bsc#1170740)
- Update patches.suse/powerpc-pseries-ddw-Extend-upper-limit-for-huge-DMA-.patch (bsc#1142685 bsc#1167867 ltc#179509 ltc#184616).
- Update patches.suse/x86-mm-split-vmalloc_sync_all.patch (bsc#1165741, bsc#1166969).
- Update references: patches.suse/s390-pci-do-not-set-affinity-for-floating-irqs (bsc#1171817 LTC#185819 git-fixes).
- usb: Add USB_QUIRK_DELAY_CTRL_MSG and USB_QUIRK_DELAY_INIT for Corsair K70 RGB RAPIDFIRE (git-fixes).
- usb: cdc-acm: restore capability check order (git-fixes).
- usb: core: Fix misleading driver bug report (bsc#1051510).
- usb: dwc3: do not set gadget->is_otg flag (git-fixes).
- usb: dwc3: gadget: Do link recovery for SS and SSP (git-fixes).
- usb: early: Handle AMD's spec-compliant identifiers, too (git-fixes).
- usb: f_fs: Clear OS Extended descriptor counts to zero in ffs_data_reset() (git-fixes).
- usb: gadget: audio: Fix a missing error return value in audio_bind() (git-fixes).
- usb: gadget: composite: Inform controller driver of self-powered (git-fixes).
- usb: gadget: legacy: fix error return code in cdc_bind() (git-fixes).
- usb: gadget: legacy: fix error return code in gncm_bind() (git-fixes).
- usb: gadget: legacy: fix redundant initialization warnings (bsc#1051510).
- usb: gadget: net2272: Fix a memory leak in an error handling path in 'net2272_plat_probe()' (git-fixes).
- usb: gadget: udc: atmel: Fix vbus disconnect handling (git-fixes).
- usb: gadget: udc: atmel: Make some symbols static (git-fixes).
- usb: gadget: udc: bdc: Remove unnecessary NULL checks in bdc_req_complete (git-fixes).
- usb: host: xhci-plat: keep runtime active when removing host (git-fixes).
- usb: hub: Fix handling of connect changes during sleep (git-fixes).
- usbnet: silence an unnecessary warning (bsc#1170770).
- usb: serial: garmin_gps: add sanity checking for data length (git-fixes).
- usb: serial: option: add BroadMobi BM806U (git-fixes).
- usb: serial: option: add support for ASKEY WWHC050 (git-fixes).
- usb: serial: option: add Wistron Neweb D19Q1 (git-fixes).
- usb: serial: qcserial: Add DW5816e support (git-fixes).
- usb: sisusbvga: Change port variable from signed to unsigned (git-fixes).
- usb-storage: Add unusual_devs entry for JMicron JMS566 (git-fixes).
- usb: uas: add quirk for LaCie 2Big Quadra (git-fixes).
- usb: xhci: Fix NULL pointer dereference when enqueuing trbs from urb sg list (git-fixes).
- video: fbdev: sis: Remove unnecessary parentheses and commented code (bsc#1114279)
- video: fbdev: w100fb: Fix a potential double free (bsc#1051510).
- vrf: Check skb for XFRM_TRANSFORMED flag (networking-stable-20_04_27).
- vt: ioctl, switch VT_IS_IN_USE and VT_BUSY to inlines (git-fixes).
- vt: selection, introduce vc_is_sel (git-fixes).
- vt: vt_ioctl: fix race in VT_RESIZEX (git-fixes).
- vt: vt_ioctl: fix use-after-free in vt_in_use() (git-fixes).
- vt: vt_ioctl: fix VT_DISALLOCATE freeing in-use virtual console (git-fixes).
- vxlan: check return value of gro_cells_init() (networking-stable-20_03_28).
- w1: Add subsystem kernel public interface (jsc#SLE-11048).
- w1: Fix slave count on 1-Wire bus (resend) (jsc#SLE-11048).
- w1: keep balance of mutex locks and refcnts (jsc#SLE-11048).
- w1: use put_device() if device_register() fail (jsc#SLE-11048).
- watchdog: reset last_hw_keepalive time at start (git-fixes).
- wcn36xx: Fix error handling path in 'wcn36xx_probe()' (bsc#1051510).
- wil6210: remove reset file from debugfs (git-fixes).
- wimax/i2400m: Fix potential urb refcnt leak (bsc#1051510).
- workqueue: do not use wq_select_unbound_cpu() for bound works (bsc#1172130).
- x86/entry/64: Fix unwind hints in kernel exit path (bsc#1058115).
- x86/entry/64: Fix unwind hints in register clearing code (bsc#1058115).
- x86/entry/64: Fix unwind hints in rewind_stack_do_exit() (bsc#1058115).
- x86/entry/64: Fix unwind hints in __switch_to_asm() (bsc#1058115).
- x86/hyperv: Allow guests to enable InvariantTSC (bsc#1170621, bsc#1170620).
- x86/Hyper-V: Free hv_panic_page when fail to register kmsg dump (bsc#1170617, bsc#1170618).
- x86/Hyper-V: Report crash data in die() when panic_on_oops is set (bsc#1170617, bsc#1170618).
- x86/Hyper-V: Report crash register data or kmsg before running crash kernel (bsc#1170617, bsc#1170618).
- x86/Hyper-V: Report crash register data when sysctl_record_panic_msg is not set (bsc#1170617, bsc#1170618).
- x86: hyperv: report value of misc_features (git fixes).
- x86/Hyper-V: Trigger crash enlightenment only once during system crash (bsc#1170617, bsc#1170618).
- x86/Hyper-V: Unload vmbus channel in hv panic callback (bsc#1170617, bsc#1170618).
- x86/kprobes: Avoid kretprobe recursion bug (bsc#1114279).
- x86/resctrl: Fix invalid attempt at removing the default resource group (git-fixes).
- x86/resctrl: Preserve CDP enable over CPU hotplug (bsc#1114279).
- x86/unwind/orc: Do not skip the first frame for inactive tasks (bsc#1058115).
- x86/unwind/orc: Fix error handling in __unwind_start() (bsc#1058115).
- x86/unwind/orc: Fix error path for bad ORC entry type (bsc#1058115).
- x86/unwind/orc: Fix unwind_get_return_address_ptr() for inactive tasks (bsc#1058115).
- x86/unwind/orc: Prevent unwinding before ORC initialization (bsc#1058115).
- x86/unwind: Prevent false warnings for non-current tasks (bsc#1058115).
- x86/xen: fix booting 32-bit pv guest (bsc#1071995).
- x86/xen: Make the boot CPU idle task reliable (bsc#1071995).
- x86/xen: Make the secondary CPU idle tasks reliable (bsc#1071995).
- xen/pci: reserve MCFG areas earlier (bsc#1170145).
- xfrm: Always set XFRM_TRANSFORMED in xfrm{4,6}_output_finish (networking-stable-20_04_27).
- xfs: clear PF_MEMALLOC before exiting xfsaild thread (git-fixes).
- xfs: Correctly invert xfs_buftarg LRU isolation logic (git-fixes).
- xfs: do not ever return a stale pointer from __xfs_dir3_free_read (git-fixes).
- xprtrdma: Fix completion wait during device removal (git-fixes).
Patchnames
openSUSE-2020-801
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\n\nThe openSUSE Leap 15.1 kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2020-0543: Fixed a side channel attack against special registers which could have resulted in leaking of read values to cores other than the one which called it.\n This attack is known as Special Register Buffer Data Sampling (SRBDS) or \u0027CrossTalk\u0027 (bsc#1154824).\n- CVE-2018-1000199: Fixed a potential local code execution via ptrace (bsc#1089895).\n- CVE-2019-19462: relay_open in kernel/relay.c allowed local users to cause a denial of service (such as relay blockage) by triggering a NULL alloc_percpu result (bnc#1158265).\n- CVE-2019-20806: Fixed a null pointer dereference in tw5864_handle_frame() which may had lead to denial of service (bsc#1172199).\n- CVE-2019-20812: The prb_calc_retire_blk_tmo() function in net/packet/af_packet.c can result in a denial of service (CPU consumption and soft lockup) in a certain failure case involving TPACKET_V3, aka CID-b43d1f9f7067 (bnc#1172453).\n- CVE-2019-9455: Fixed a pointer leak due to a WARN_ON statement in a video driver. This could lead to local information disclosure with System execution privileges needed (bsc#1170345).\n- CVE-2020-10690: Fixed the race between the release of ptp_clock and cdev (bsc#1170056).\n- CVE-2020-10711: Fixed a null pointer dereference in SELinux subsystem which could have allowed a remote network user to crash the kernel resulting in a denial of service (bsc#1171191).\n- CVE-2020-10720: Fixed a use-after-free read in napi_gro_frags() (bsc#1170778).\n- CVE-2020-10732: Fixed kernel data leak in userspace coredumps due to uninitialized data (bsc#1171220).\n- CVE-2020-10751: Fixed an improper implementation in SELinux LSM hook where it was assumed that an skb would only contain a single netlink message (bsc#1171189).\n- CVE-2020-10757: Fixed an issue where remaping hugepage DAX to anon mmap could have caused user PTE access (bsc#1172317).\n- CVE-2020-11608: An issue was discovered in drivers/media/usb/gspca/ov519.c that allowed NULL pointer dereferences in ov511_mode_init_regs and ov518_mode_init_regs when there are zero endpoints, aka CID-998912346c0d (bnc#1168829).\n- CVE-2020-11609: An issue was discovered in the stv06xx subsystem in drivers/media/usb/gspca/stv06xx/stv06xx.c and drivers/media/usb/gspca/stv06xx/stv06xx_pb0100.c mishandle invalid descriptors, as demonstrated by a NULL pointer dereference, aka CID-485b06aadb93 (bnc#1168854).\n- CVE-2020-12114: Fixed a pivot_root race condition which could have allowed local users to cause a denial of service (panic) by corrupting a mountpoint reference counter (bsc#1171098).\n- CVE-2020-12464: Fixed a use-after-free due to a transfer without a reference (bsc#1170901).\n- CVE-2020-12652: Fixed an issue which could have allowed local users to hold an incorrect lock during the ioctl operation and trigger a race condition (bsc#1171218).\n- CVE-2020-12653: Fixed an issue in the wifi driver which could have allowed local users to gain privileges or cause a denial of service (bsc#1171195).\n- CVE-2020-12654: Fixed an issue in he wifi driver which could have allowed a remote AP to trigger a heap-based buffer overflow (bsc#1171202).\n- CVE-2020-12655: Fixed an issue which could have allowed attackers to trigger a sync of excessive duration via an XFS v5 image with crafted metadata (bsc#1171217).\n- CVE-2020-12656: Fixed an improper handling of certain domain_release calls leadingch could have led to a memory leak (bsc#1171219).\n- CVE-2020-12657: An a use-after-free in block/bfq-iosched.c (bsc#1171205).\n- CVE-2020-12659: Fixed an out-of-bounds write (by a user with the CAP_NET_ADMIN capability) due to improper headroom validation (bsc#1171214).\n- CVE-2020-12769: Fixed an issue which could have allowed attackers to cause a panic via concurrent calls to dw_spi_irq and dw_spi_transfer_one (bsc#1171983).\n- CVE-2020-13143: Fixed an out-of-bounds read in gadget_dev_desc_UDC_store in drivers/usb/gadget/configfs.c (bsc#1171982).\n\nThe following non-security bugs were fixed:\n\n- ACPI: CPPC: Fix reference count leak in acpi_cppc_processor_probe() (bsc#1051510).\n- ACPI: sysfs: Fix reference count leak in acpi_sysfs_add_hotplug_profile() (bsc#1051510).\n- acpi/x86: ignore unspecified bit positions in the ACPI global lock field (bsc#1051510).\n- Add br_netfilter to kernel-default-base (bsc#1169020)\n- agp/intel: Reinforce the barrier after GTT updates (bsc#1051510).\n- ALSA: ctxfi: Remove unnecessary cast in kfree (bsc#1051510).\n- ALSA: doc: Document PC Beep Hidden Register on Realtek ALC256 (bsc#1051510).\n- ALSA: dummy: Fix PCM format loop in proc output (bsc#1111666).\n- ALSA: hda: Add driver blacklist (bsc#1051510).\n- ALSA: hda: Always use jackpoll helper for jack update after resume (bsc#1051510).\n- ALSA: hda: call runtime_allow() for all hda controllers (bsc#1051510).\n- ALSA: hda: Do not release card at firmware loading error (bsc#1051510).\n- ALSA: hda: Explicitly permit using autosuspend if runtime PM is supported (bsc#1051510).\n- ALSA: hda/hdmi: fix race in monitor detection during probe (bsc#1051510).\n- ALSA: hda/hdmi: fix without unlocked before return (bsc#1051510).\n- ALSA: hda: Honor PM disablement in PM freeze and thaw_noirq ops (bsc#1051510).\n- ALSA: hda: Keep the controller initialization even if no codecs found (bsc#1051510).\n- ALSA: hda: Match both PCI ID and SSID for driver blacklist (bsc#1111666).\n- ALSA: hda/realtek - Add a model for Thinkpad T570 without DAC workaround (bsc#1172017).\n- ALSA: hda/realtek - Add COEF workaround for ASUS ZenBook UX431DA (git-fixes).\n- ALSA: hda/realtek - Add HP new mute led supported for ALC236 (git-fixes).\n- ALSA: hda/realtek - Add more fixup entries for Clevo machines (git-fixes).\n- ALSA: hda/realtek - Add new codec supported for ALC245 (bsc#1051510).\n- ALSA: hda/realtek - Add new codec supported for ALC287 (git-fixes).\n- ALSA: hda/realtek: Add quirk for Samsung Notebook (git-fixes).\n- ALSA: hda/realtek - Add supported new mute Led for HP (git-fixes).\n- ALSA: hda/realtek - Enable headset mic of ASUS GL503VM with ALC295 (git-fixes).\n- ALSA: hda/realtek - Enable headset mic of ASUS UX550GE with ALC295 (git-fixes).\n- ALSA: hda/realtek: Enable headset mic of ASUS UX581LV with ALC295 (git-fixes).\n- ALSA: hda/realtek - Enable the headset mic on Asus FX505DT (bsc#1051510).\n- ALSA: hda/realtek - Fix S3 pop noise on Dell Wyse (git-fixes).\n- ALSA: hda/realtek - Fix silent output on Gigabyte X570 Aorus Xtreme (bsc#1111666).\n- ALSA: hda/realtek - Fix unexpected init_amp override (bsc#1051510).\n- ALSA: hda/realtek - Limit int mic boost for Thinkpad T530 (git-fixes bsc#1171293).\n- ALSA: hda/realtek - Two front mics on a Lenovo ThinkCenter (bsc#1051510).\n- ALSA: hda: Release resources at error in delayed probe (bsc#1051510).\n- ALSA: hda: Remove ASUS ROG Zenith from the blacklist (bsc#1051510).\n- ALSA: hda: Skip controller resume if not needed (bsc#1051510).\n- ALSA: hwdep: fix a left shifting 1 by 31 UB bug (git-fixes).\n- ALSA: iec1712: Initialize STDSP24 properly when using the model=staudio option (git-fixes).\n- ALSA: opti9xx: shut up gcc-10 range warning (bsc#1051510).\n- ALSA: pcm: fix incorrect hw_base increase (git-fixes).\n- ALSA: pcm: oss: Place the plugin buffer overflow checks correctly (bsc#1170522).\n- ALSA: rawmidi: Fix racy buffer resize under concurrent accesses (git-fixes).\n- ALSA: usb-audio: Add connector notifier delegation (bsc#1051510).\n- ALSA: usb-audio: Add control message quirk delay for Kingston HyperX headset (git-fixes).\n- ALSA: usb-audio: add mapping for ASRock TRX40 Creator (git-fixes).\n- ALSA: usb-audio: Add mixer workaround for TRX40 and co (bsc#1051510).\n- ALSA: usb-audio: Add quirk for Focusrite Scarlett 2i2 (bsc#1051510).\n- ALSA: usb-audio: Add static mapping table for ALC1220-VB-based mobos (bsc#1051510).\n- ALSA: usb-audio: Apply async workaround for Scarlett 2i4 2nd gen (bsc#1051510).\n- ALSA: usb-audio: Check mapping at creating connector controls, too (bsc#1051510).\n- ALSA: usb-audio: Correct a typo of NuPrime DAC-10 USB ID (bsc#1051510).\n- ALSA: usb-audio: Do not create jack controls for PCM terminals (bsc#1051510).\n- ALSA: usb-audio: Do not override ignore_ctl_error value from the map (bsc#1051510).\n- ALSA: usb-audio: Filter error from connector kctl ops, too (bsc#1051510).\n- ALSA: usb-audio: Fix usb audio refcnt leak when getting spdif (bsc#1051510).\n- ALSA: usb-audio: mixer: volume quirk for ESS Technology Asus USB DAC (git-fixes).\n- ALSA: usb-audio: Quirks for Gigabyte TRX40 Aorus Master onboard audio (git-fixes).\n- ALSA: usx2y: Fix potential NULL dereference (bsc#1051510).\n- ASoC: codecs: hdac_hdmi: Fix incorrect use of list_for_each_entry (bsc#1051510).\n- ASoC: dapm: connect virtual mux with default value (bsc#1051510).\n- ASoC: dapm: fixup dapm kcontrol widget (bsc#1051510).\n- ASoC: dpcm: allow start or stop during pause for backend (bsc#1051510).\n- ASoC: fix regwmask (bsc#1051510).\n- ASoC: msm8916-wcd-digital: Reset RX interpolation path after use (bsc#1051510).\n- ASoC: samsung: Prevent clk_get_rate() calls in atomic context (bsc#1111666).\n- ASoC: topology: Check return value of pcm_new_ver (bsc#1051510).\n- ASoC: topology: use name_prefix for new kcontrol (bsc#1051510).\n- b43legacy: Fix case where channel status is corrupted (bsc#1051510).\n- batman-adv: fix batadv_nc_random_weight_tq (git-fixes).\n- batman-adv: Fix refcnt leak in batadv_show_throughput_override (git-fixes).\n- batman-adv: Fix refcnt leak in batadv_store_throughput_override (git-fixes).\n- batman-adv: Fix refcnt leak in batadv_v_ogm_process (git-fixes).\n- bcache: avoid unnecessary btree nodes flushing in btree_flush_write() (git fixes (block drivers)).\n- bcache: fix incorrect data type usage in btree_flush_write() (git fixes (block drivers)).\n- bcache: Revert \u0027bcache: shrink btree node cache after bch_btree_check()\u0027 (git fixes (block drivers)).\n- blk-mq: honor IO scheduler for multiqueue devices (bsc#1165478).\n- blk-mq: simplify blk_mq_make_request() (bsc#1165478).\n- block/drbd: delete invalid function drbd_md_mark_dirty_ (bsc#1171527).\n- block: drbd: remove a stray unlock in __drbd_send_protocol() (bsc#1171599).\n- block: fix busy device checking in blk_drop_partitions again (bsc#1171948).\n- block: fix busy device checking in blk_drop_partitions (bsc#1171948).\n- block: fix memleak of bio integrity data (git fixes (block drivers)).\n- block: remove the bd_openers checks in blk_drop_partitions (bsc#1171948).\n- bnxt_en: fix memory leaks in bnxt_dcbnl_ieee_getets() (networking-stable-20_03_28).\n- bnxt_en: Reduce BNXT_MSIX_VEC_MAX value to supported CQs per PF (bsc#1104745).\n- bnxt_en: reinitialize IRQs when MTU is modified (networking-stable-20_03_14).\n- bnxt_en: Return error if bnxt_alloc_ctx_mem() fails (bsc#1104745 ).\n- bnxt_en: Return error when allocating zero size context memory (bsc#1104745).\n- bonding/alb: make sure arp header is pulled before accessing it (networking-stable-20_03_14).\n- bpf: Fix sk_psock refcnt leak when receiving message (bsc#1083647).\n- bpf: Forbid XADD on spilled pointers for unprivileged users (bsc#1083647).\n- brcmfmac: abort and release host after error (bsc#1051510).\n- btrfs: fix deadlock with memory reclaim during scrub (bsc#1172127).\n- btrfs: fix log context list corruption after rename whiteout error (bsc#1172342).\n- btrfs: fix partial loss of prealloc extent past i_size after fsync (bsc#1172343).\n- btrfs: relocation: add error injection points for cancelling balance (bsc#1171417).\n- btrfs: relocation: Check cancel request after each data page read (bsc#1171417).\n- btrfs: relocation: Check cancel request after each extent found (bsc#1171417).\n- btrfs: relocation: Clear the DEAD_RELOC_TREE bit for orphan roots to prevent runaway balance (bsc#1171417).\n- btrfs: relocation: Fix reloc root leakage and the NULL pointer reference caused by the leakage (bsc#1171417).\n- btrfs: relocation: Work around dead relocation stage loop (bsc#1171417).\n- btrfs: reloc: clear DEAD_RELOC_TREE bit for orphan roots to prevent runaway balance (bsc#1171417 bsc#1160947 bsc#1172366).\n- btrfs: reloc: fix reloc root leak and NULL pointer dereference (bsc#1171417 bsc#1160947 bsc#1172366).\n- btrfs: setup a nofs context for memory allocation at btrfs_create_tree() (bsc#1172127).\n- btrfs: setup a nofs context for memory allocation at __btrfs_set_acl (bsc#1172127).\n- btrfs: use nofs context when initializing security xattrs to avoid deadlock (bsc#1172127).\n- can: add missing attribute validation for termination (networking-stable-20_03_14).\n- cdc-acm: close race betrween suspend() and acm_softint (git-fixes).\n- cdc-acm: introduce a cool down (git-fixes).\n- ceph: check if file lock exists before sending unlock request (bsc#1168789).\n- ceph: demote quotarealm lookup warning to a debug message (bsc#1171692).\n- ceph: fix double unlock in handle_cap_export() (bsc#1171694).\n- ceph: fix endianness bug when handling MDS session feature bits (bsc#1171695).\n- cgroup, netclassid: periodically release file_lock on classid updating (networking-stable-20_03_14).\n- cifs: Allocate crypto structures on the fly for calculating signatures of incoming packets (bsc#1144333).\n- cifs: Allocate encryption header through kmalloc (bsc#1144333).\n- cifs: allow unlock flock and OFD lock across fork (bsc#1144333).\n- cifs: check new file size when extending file by fallocate (bsc#1144333).\n- cifs: cifspdu.h: Replace zero-length array with flexible-array member (bsc#1144333).\n- cifs: clear PF_MEMALLOC before exiting demultiplex thread (bsc#1144333).\n- cifs: do not share tcons with DFS (bsc#1144333).\n- cifs: dump the session id and keys also for SMB2 sessions (bsc#1144333).\n- cifs: ensure correct super block for DFS reconnect (bsc#1144333).\n- cifs: Fix bug which the return value by asynchronous read is error (bsc#1144333).\n- cifs: fix uninitialised lease_key in open_shroot() (bsc#1144333).\n- cifs: improve read performance for page size 64KB \u0026 cache=strict \u0026 vers=2.1+ (bsc#1144333).\n- cifs: Increment num_remote_opens stats counter even in case of smb2_query_dir_first (bsc#1144333).\n- cifs: minor update to comments around the cifs_tcp_ses_lock mutex (bsc#1144333).\n- cifs: protect updating server-\u003edstaddr with a spinlock (bsc#1144333).\n- cifs: smb2pdu.h: Replace zero-length array with flexible-array member (bsc#1144333).\n- cifs: smbd: Calculate the correct maximum packet size for segmented SMBDirect send/receive (bsc#1144333).\n- cifs: smbd: Check and extend sender credits in interrupt context (bsc#1144333).\n- cifs: smbd: Check send queue size before posting a send (bsc#1144333).\n- cifs: smbd: Do not schedule work to send immediate packet on every receive (bsc#1144333).\n- cifs: smbd: Merge code to track pending packets (bsc#1144333).\n- cifs: smbd: Properly process errors on ib_post_send (bsc#1144333).\n- cifs: smbd: Update receive credits before sending and deal with credits roll back on failure before sending (bsc#1144333).\n- cifs: Warn less noisily on default mount (bsc#1144333).\n- clk: Add clk_hw_unregister_composite helper function definition (bsc#1051510).\n- clk: imx6ull: use OSC clock during AXI rate change (bsc#1051510).\n- clk: imx: make mux parent strings const (bsc#1051510).\n- clk: mediatek: correct the clocks for MT2701 HDMI PHY module (bsc#1051510).\n- clk: sunxi-ng: a64: Fix gate bit of DSI DPHY (bsc#1051510).\n- clocksource/drivers/hyper-v: Set TSC clocksource as default w/ InvariantTSC (bsc#1170620, bsc#1170621).\n- clocksource: dw_apb_timer_of: Fix missing clockevent timers (bsc#1051510).\n- component: Silence bind error on -EPROBE_DEFER (bsc#1051510).\n- coresight: do not use the BIT() macro in the UAPI header (git fixes (block drivers)).\n- cpufreq: s3c64xx: Remove pointless NULL check in s3c64xx_cpufreq_driver_init (bsc#1051510).\n- crypto: ccp - AES CFB mode is a stream cipher (git-fixes).\n- crypto: ccp - Clean up and exit correctly on allocation failure (git-fixes).\n- crypto: ccp - Cleanup misc_dev on sev_exit() (bsc#1114279).\n- crypto: ccp - Cleanup sp_dev_master in psp_dev_destroy() (bsc#1114279).\n- cxgb4: fix MPS index overwrite when setting MAC address (bsc#1127355).\n- cxgb4: fix Txq restart check during backpressure (bsc#1127354 bsc#1127371).\n- debugfs: Add debugfs_create_xul() for hexadecimal unsigned long (git-fixes).\n- debugfs_lookup(): switch to lookup_one_len_unlocked() (bsc#1171979).\n- devlink: fix return value after hitting end in region read (bsc#1109837).\n- devlink: validate length of param values (bsc#1109837).\n- devlink: validate length of region addr/len (bsc#1109837).\n- dmaengine: dmatest: Fix iteration non-stop logic (bsc#1051510).\n- dm mpath: switch paths in dm_blk_ioctl() code path (bsc#1167574).\n- dm-raid1: fix invalid return value from dm_mirror (bsc#1172378).\n- dm writecache: fix data corruption when reloading the target (git fixes (block drivers)).\n- dm writecache: fix incorrect flush sequence when doing SSD mode commit (git fixes (block drivers)).\n- dm writecache: verify watermark during resume (git fixes (block drivers)).\n- dm zoned: fix invalid memory access (git fixes (block drivers)).\n- dm zoned: reduce overhead of backing device checks (git fixes (block drivers)).\n- dm zoned: remove duplicate nr_rnd_zones increase in dmz_init_zone() (git fixes (block drivers)).\n- dm zoned: support zone sizes smaller than 128MiB (git fixes (block drivers)).\n- dp83640: reverse arguments to list_add_tail (git-fixes).\n- drivers: hv: Add a module description line to the hv_vmbus driver (bsc#1172249, bsc#1172251).\n- drivers/net/ibmvnic: Update VNIC protocol version reporting (bsc#1065729).\n- drivers: w1: add hwmon support structures (jsc#SLE-11048).\n- drivers: w1: add hwmon temp support for w1_therm (jsc#SLE-11048).\n- drivers: w1: refactor w1_slave_show to make the temp reading functionality separate (jsc#SLE-11048).\n- drm: amd/acp: fix broken menu structure (bsc#1114279)\n- drm/amdgpu: Correctly initialize thermal controller for GPUs with Powerplay table v0 (e.g Hawaii) (bsc#1111666).\n- drm/amdgpu: Fix oops when pp_funcs is unset in ACPI event (bsc#1111666).\n- drm/amd/powerplay: force the trim of the mclk dpm_levels if OD is (bsc#1113956)\n- drm/atomic: Take the atomic toys away from X (bsc#1112178) \t* context changes\n- drm/crc: Actually allow to change the crc source (bsc#1114279) \t* offset changes\n- drm/dp_mst: Fix clearing payload state on topology disable (bsc#1051510).\n- drm/dp_mst: Reformat drm_dp_check_act_status() a bit (bsc#1051510).\n- drm/edid: Fix off-by-one in DispID DTD pixel clock (bsc#1114279)\n- drm/etnaviv: fix perfmon domain interation (bsc#1113956)\n- drm/etnaviv: rework perfmon query infrastructure (bsc#1112178)\n- drm/i915: Apply Wa_1406680159:icl,ehl as an engine workaround (bsc#1112178)\n- drm/i915/gvt: Init DPLL/DDI vreg for virtual display instead of (bsc#1114279)\n- drm/i915: HDCP: fix Ri prime check done during link check (bsc#1112178)\n- drm/i915: properly sanity check batch_start_offset (bsc#1114279)\n- drm/meson: Delete an error message in meson_dw_hdmi_bind() (bsc#1051510).\n- drm: NULL pointer dereference [null-pointer-deref] (CWE 476) problem (bsc#1114279)\n- drm/qxl: qxl_release leak in qxl_draw_dirty_fb() (bsc#1051510).\n- drm/qxl: qxl_release leak in qxl_hw_surface_alloc() (bsc#1051510).\n- drm/qxl: qxl_release use after free (bsc#1051510).\n- drm: Remove PageReserved manipulation from drm_pci_alloc (bsc#1114279)\n- drm/sun4i: dsi: Allow binding the host without a panel (bsc#1113956)\n- drm/sun4i: dsi: Avoid hotplug race with DRM driver bind (bsc#1113956)\n- drm/sun4i: dsi: Remove incorrect use of runtime PM (bsc#1113956)\n- drm/sun4i: dsi: Remove unused drv from driver context (bsc#1113956)\n- dump_stack: avoid the livelock of the dump_lock (git fixes (block drivers)).\n- EDAC, sb_edac: Add support for systems with segmented PCI buses (bsc#1169525).\n- ext4: do not zeroout extents beyond i_disksize (bsc#1167851).\n- ext4: fix extent_status fragmentation for plain files (bsc#1171949).\n- ext4: use non-movable memory for superblock readahead (bsc#1171952).\n- fanotify: fix merging marks masks with FAN_ONDIR (bsc#1171679).\n- fbcon: fix null-ptr-deref in fbcon_switch (bsc#1114279)\n- fib: add missing attribute validation for tun_id (networking-stable-20_03_14).\n- firmware: qcom: scm: fix compilation error when disabled (bsc#1051510).\n- Fix a backport bug, where btrfs_put_root() -\u003e btrfs_put_fs_root() modification is not needed due to missing dependency\n- Following two patches needs to be combined as one commit (one adds context, later removes which affects existing patch) else commit series cannot be sequenced.\n- fpga: dfl: afu: Corrected error handling levels (git-fixes).\n- fs/cifs: fix gcc warning in sid_to_id (bsc#1144333).\n- fs/seq_file.c: simplify seq_file iteration code and interface (bsc#1170125).\n- gpio: tegra: mask GPIO IRQs during IRQ shutdown (bsc#1051510).\n- gre: fix uninit-value in __iptunnel_pull_header (networking-stable-20_03_14).\n- HID: hid-input: clear unmapped usages (git-fixes).\n- HID: hyperv: Add a module description line (bsc#1172249, bsc#1172251).\n- HID: i2c-hid: add Trekstor Primebook C11B to descriptor override (git-fixes).\n- HID: i2c-hid: override HID descriptors for certain devices (git-fixes).\n- HID: multitouch: add eGalaxTouch P80H84 support (bsc#1051510).\n- HID: wacom: Read HID_DG_CONTACTMAX directly for non-generic devices (git-fixes).\n- hrtimer: Annotate lockless access to timer-\u003estate (git fixes (block drivers)).\n- hsr: add restart routine into hsr_get_node_list() (networking-stable-20_03_28).\n- hsr: check protocol version in hsr_newlink() (networking-stable-20_04_17).\n- hsr: fix general protection fault in hsr_addr_is_self() (networking-stable-20_03_28).\n- hsr: set .netnsok flag (networking-stable-20_03_28).\n- hsr: use rcu_read_lock() in hsr_get_node_{list/status}() (networking-stable-20_03_28).\n- i2c: acpi: Force bus speed to 400KHz if a Silead touchscreen is present (git-fixes).\n- i2c: acpi: put device when verifying client fails (git-fixes).\n- i2c: brcmstb: remove unused struct member (git-fixes).\n- i2c: core: Allow empty id_table in ACPI case as well (git-fixes).\n- i2c: core: decrease reference count of device node in i2c_unregister_device (git-fixes).\n- i2c: dev: Fix the race between the release of i2c_dev and cdev (bsc#1051510).\n- i2c: fix missing pm_runtime_put_sync in i2c_device_probe (git-fixes).\n- i2c-hid: properly terminate i2c_hid_dmi_desc_override_table array (git-fixes).\n- i2c: i801: Do not add ICH_RES_IO_SMI for the iTCO_wdt device (git-fixes).\n- i2c: iproc: Stop advertising support of SMBUS quick cmd (git-fixes).\n- i2c: isch: Remove unnecessary acpi.h include (git-fixes).\n- i2c: mux: demux-pinctrl: Fix an error handling path in \u0027i2c_demux_pinctrl_probe()\u0027 (bsc#1051510).\n- i2c: st: fix missing struct parameter description (bsc#1051510).\n- IB/mlx5: Fix missing congestion control debugfs on rep rdma device (bsc#1103991).\n- ibmvnic: Skip fatal error reset after passive init (bsc#1171078 ltc#184239).\n- iio:ad7797: Use correct attribute_group (bsc#1051510).\n- iio: adc: stm32-adc: fix device used to request dma (bsc#1051510).\n- iio: adc: stm32-adc: fix sleep in atomic context (git-fixes).\n- iio: adc: stm32-adc: Use dma_request_chan() instead dma_request_slave_channel() (bsc#1051510).\n- iio: dac: vf610: Fix an error handling path in \u0027vf610_dac_probe()\u0027 (bsc#1051510).\n- iio: sca3000: Remove an erroneous \u0027get_device()\u0027 (bsc#1051510).\n- iio: xilinx-xadc: Fix ADC-B powerdown (bsc#1051510).\n- iio: xilinx-xadc: Fix clearing interrupt when enabling trigger (bsc#1051510).\n- iio: xilinx-xadc: Fix sequencer configuration for aux channels in simultaneous mode (bsc#1051510).\n- ima: Fix return value of ima_write_policy() (git-fixes).\n- input: evdev - call input_flush_device() on release(), not flush() (bsc#1051510).\n- input: hyperv-keyboard - add module description (bsc#1172249, bsc#1172251).\n- input: i8042 - add Acer Aspire 5738z to nomux list (bsc#1051510).\n- input: i8042 - add ThinkPad S230u to i8042 reset list (bsc#1051510).\n- input: raydium_i2c_ts - use true and false for boolean values (bsc#1051510).\n- input: synaptics-rmi4 - fix error return code in rmi_driver_probe() (bsc#1051510).\n- input: synaptics-rmi4 - really fix attn_data use-after-free (git-fixes).\n- input: usbtouchscreen - add support for BonXeon TP (bsc#1051510).\n- input: xpad - add custom init packet for Xbox One S controllers (bsc#1051510).\n- iommu/amd: Call domain_flush_complete() in update_domain() (bsc#1172096).\n- iommu/amd: Do not flush Device Table in iommu_map_page() (bsc#1172097).\n- iommu/amd: Do not loop forever when trying to increase address space (bsc#1172098).\n- iommu/amd: Fix legacy interrupt remapping for x2APIC-enabled system (bsc#1172099).\n- iommu/amd: Fix over-read of ACPI UID from IVRS table (bsc#1172101).\n- iommu/amd: Fix race in increase_address_space()/fetch_pte() (bsc#1172102).\n- iommu/amd: Update Device Table in increase_address_space() (bsc#1172103).\n- iommu: Fix reference count leak in iommu_group_alloc (bsc#1172397).\n- ip6_tunnel: Allow rcv/xmit even if remote address is a local address (bsc#1166978).\n- ipmi: fix hung processes in __get_guid() (git-fixes).\n- ipv4: fix a RCU-list lock in fib_triestat_seq_show (networking-stable-20_04_02).\n- ipv6/addrconf: call ipv6_mc_up() for non-Ethernet interface (networking-stable-20_03_14).\n- ipv6: do not auto-add link-local address to lag ports (networking-stable-20_04_09).\n- ipv6: fix IPV6_ADDRFORM operation logic (bsc#1171662).\n- ipv6: Fix nlmsg_flags when splitting a multipath route (networking-stable-20_03_01).\n- ipv6: fix restrict IPV6_ADDRFORM operation (bsc#1171662).\n- ipv6: Fix route replacement with dev-only route (networking-stable-20_03_01).\n- ipvlan: add cond_resched_rcu() while processing muticast backlog (networking-stable-20_03_14).\n- ipvlan: do not deref eth hdr before checking it\u0027s set (networking-stable-20_03_14).\n- ipvlan: do not use cond_resched_rcu() in ipvlan_process_multicast() (networking-stable-20_03_14).\n- iwlwifi: pcie: actually release queue memory in TVQM (bsc#1051510).\n- ixgbe: do not check firmware errors (bsc#1170284).\n- kABI fix for early XHCI debug (git-fixes).\n- kabi for for md: improve handling of bio with REQ_PREFLUSH in md_flush_request() (git-fixes).\n- kabi/severities: Do not track KVM internal symbols.\n- kabi/severities: Ingnore get_dev_data() The function is internal to the AMD IOMMU driver and must not be called by any third party.\n- kABI workaround for snd_rawmidi buffer_ref field addition (git-fixes).\n- keys: reaching the keys quotas correctly (bsc#1051510).\n- KVM: arm64: Change hyp_panic()s dependency on tpidr_el2 (bsc#1133021).\n- KVM: arm64: Stop save/restoring host tpidr_el1 on VHE (bsc#1133021).\n- KVM: Check validity of resolved slot when searching memslots (bsc#1172104).\n- KVM: s390: vsie: Fix delivery of addressing exceptions (git-fixes).\n- KVM: s390: vsie: Fix possible race when shadowing region 3 tables (git-fixes).\n- KVM: s390: vsie: Fix region 1 ASCE sanity shadow address checks (git-fixes).\n- KVM: SVM: Fix potential memory leak in svm_cpu_init() (bsc#1171736).\n- KVM x86: Extend AMD specific guest behavior to Hygon virtual CPUs (bsc#1152489).\n- l2tp: Allow management of tunnels and session in user namespace (networking-stable-20_04_17).\n- libata: Remove extra scsi_host_put() in ata_scsi_add_hosts() (bsc#1051510).\n- libata: Return correct status in sata_pmp_eh_recover_pm() when ATA_DFLAG_DETACH is set (bsc#1051510).\n- lib: raid6: fix awk build warnings (git fixes (block drivers)).\n- lib/raid6/test: fix build on distros whose /bin/sh is not bash (git fixes (block drivers)).\n- lib/stackdepot.c: fix global out-of-bounds in stack_slabs (git fixes (block drivers)).\n- locks: print unsigned ino in /proc/locks (bsc#1171951).\n- mac80211: add ieee80211_is_any_nullfunc() (bsc#1051510).\n- mac80211_hwsim: Use kstrndup() in place of kasprintf() (bsc#1051510).\n- mac80211: mesh: fix discovery timer re-arming issue / crash (bsc#1051510).\n- macsec: avoid to set wrong mtu (bsc#1051510).\n- macsec: restrict to ethernet devices (networking-stable-20_03_28).\n- macvlan: add cond_resched() during multicast processing (networking-stable-20_03_14).\n- macvlan: fix null dereference in macvlan_device_event() (bsc#1051510).\n- md: improve handling of bio with REQ_PREFLUSH in md_flush_request() (git-fixes).\n- md/raid0: Fix an error message in raid0_make_request() (git fixes (block drivers)).\n- md/raid10: prevent access of uninitialized resync_pages offset (git-fixes).\n- media: dvb: return -EREMOTEIO on i2c transfer failure (bsc#1051510).\n- media: platform: fcp: Set appropriate DMA parameters (bsc#1051510).\n- media: ti-vpe: cal: fix disable_irqs to only the intended target (git-fixes).\n- mei: release me_cl object reference (bsc#1051510).\n- mlxsw: Fix some IS_ERR() vs NULL bugs (networking-stable-20_04_27).\n- mlxsw: spectrum_flower: Do not stop at FLOW_ACTION_VLAN_MANGLE (networking-stable-20_04_09).\n- mlxsw: spectrum_mr: Fix list iteration in error path (bsc#1112374).\n- mmc: atmel-mci: Fix debugfs on 64-bit platforms (git-fixes).\n- mmc: core: Check request type before completing the request (git-fixes).\n- mmc: core: Fix recursive locking issue in CQE recovery path (git-fixes).\n- mmc: cqhci: Avoid false \u0027cqhci: CQE stuck on\u0027 by not open-coding timeout loop (git-fixes).\n- mmc: dw_mmc: Fix debugfs on 64-bit platforms (git-fixes).\n- mmc: meson-gx: make sure the descriptor is stopped on errors (git-fixes).\n- mmc: meson-gx: simplify interrupt handler (git-fixes).\n- mmc: renesas_sdhi: limit block count to 16 bit for old revisions (git-fixes).\n- mmc: sdhci-esdhc-imx: fix the mask for tuning start point (bsc#1051510).\n- mmc: sdhci-msm: Clear tuning done flag while hs400 tuning (bsc#1051510).\n- mmc: sdhci-of-at91: fix memleak on clk_get failure (git-fixes).\n- mmc: sdhci-pci: Fix eMMC driver strength for BYT-based controllers (bsc#1051510).\n- mmc: sdhci: Update the tuning failed messages to pr_debug level (git-fixes).\n- mmc: sdhci-xenon: fix annoying 1.8V regulator warning (bsc#1051510).\n- mmc: sdio: Fix potential NULL pointer error in mmc_sdio_init_card() (bsc#1051510).\n- mmc: tmio: fix access width of Block Count Register (git-fixes).\n- mm: limit boost_watermark on small zones (git fixes (mm/pgalloc)).\n- mm: thp: handle page cache THP correctly in PageTransCompoundMap (git fixes (block drivers)).\n- mtd: cfi: fix deadloop in cfi_cmdset_0002.c do_write_buffer (bsc#1051510).\n- mtd: spi-nor: cadence-quadspi: add a delay in write sequence (git-fixes).\n- mtd: spi-nor: enable 4B opcodes for mx66l51235l (git-fixes).\n- mtd: spi-nor: fsl-quadspi: Do not let -EINVAL on the bus (git-fixes).\n- mwifiex: avoid -Wstringop-overflow warning (bsc#1051510).\n- mwifiex: Fix memory corruption in dump_station (bsc#1051510).\n- net: bcmgenet: correct per TX/RX ring statistics (networking-stable-20_04_27).\n- net: dsa: b53: Fix ARL register definitions (networking-stable-20_04_27).\n- net: dsa: b53: Rework ARL bin logic (networking-stable-20_04_27).\n- net: dsa: bcm_sf2: Do not register slave MDIO bus with OF (networking-stable-20_04_09).\n- net: dsa: bcm_sf2: Ensure correct sub-node is parsed (networking-stable-20_04_09).\n- net: dsa: bcm_sf2: Fix overflow checks (git-fixes).\n- net: dsa: Fix duplicate frames flooded by learning (networking-stable-20_03_28).\n- net: dsa: mv88e6xxx: fix lockup on warm boot (networking-stable-20_03_14).\n- net/ethernet: add Google GVE driver (jsc#SLE-10538)\n- net: fec: add phy_reset_after_clk_enable() support (git-fixes).\n- net: fec: validate the new settings in fec_enet_set_coalesce() (networking-stable-20_03_14).\n- net: fib_rules: Correctly set table field when table number exceeds 8 bits (networking-stable-20_03_01).\n- net: fix race condition in __inet_lookup_established() (bsc#1151794).\n- net: fq: add missing attribute validation for orphan mask (networking-stable-20_03_14).\n- net: hns3: fix \u0027tc qdisc del\u0027 failed issue (bsc#1109837).\n- net, ip_tunnel: fix interface lookup with no key (networking-stable-20_04_02).\n- net: ipv4: devinet: Fix crash when add/del multicast IP with autojoin (networking-stable-20_04_17).\n- net: ipv6: do not consider routes via gateways for anycast address check (networking-stable-20_04_17).\n- netlink: Use netlink header as base to calculate bad attribute offset (networking-stable-20_03_14).\n- net: macsec: update SCI upon MAC address change (networking-stable-20_03_14).\n- net: memcg: fix lockdep splat in inet_csk_accept() (networking-stable-20_03_14).\n- net: memcg: late association of sock to memcg (networking-stable-20_03_14).\n- net/mlx4_en: avoid indirect call in TX completion (networking-stable-20_04_27).\n- net/mlx5: Add new fields to Port Type and Speed register (bsc#1171118).\n- net/mlx5: Expose link speed directly (bsc#1171118).\n- net/mlx5: Expose port speed when possible (bsc#1171118).\n- net/mlx5: Fix failing fw tracer allocation on s390 (bsc#1103990 ).\n- net: mvneta: Fix the case where the last poll did not process all rx (networking-stable-20_03_28).\n- net: netrom: Fix potential nr_neigh refcnt leak in nr_add_node (networking-stable-20_04_27).\n- net/packet: tpacket_rcv: do not increment ring index on drop (networking-stable-20_03_14).\n- net: phy: restore mdio regs in the iproc mdio driver (networking-stable-20_03_01).\n- net: qmi_wwan: add support for ASKEY WWHC050 (networking-stable-20_03_28).\n- net: revert default NAPI poll timeout to 2 jiffies (networking-stable-20_04_17).\n- net_sched: cls_route: remove the right filter from hashtable (networking-stable-20_03_28).\n- net_sched: sch_skbprio: add message validation to skbprio_change() (bsc#1109837).\n- net/x25: Fix x25_neigh refcnt leak when receiving frame (networking-stable-20_04_27).\n- nfc: add missing attribute validation for SE API (networking-stable-20_03_14).\n- nfc: add missing attribute validation for vendor subcommand (networking-stable-20_03_14).\n- nfc: pn544: Fix occasional HW initialization failure (networking-stable-20_03_01).\n- NFC: st21nfca: add missed kfree_skb() in an error path (bsc#1051510).\n- nfp: abm: fix a memory leak bug (bsc#1109837).\n- nfsd4: fix up replay_matches_cache() (git-fixes).\n- nfsd: Ensure CLONE persists data and metadata changes to the target file (git-fixes).\n- nfsd: fix delay timer on 32-bit architectures (git-fixes).\n- nfsd: fix jiffies/time_t mixup in LRU list (git-fixes).\n- nfs: Directory page cache pages need to be locked when read (git-fixes).\n- nfsd: memory corruption in nfsd4_lock() (git-fixes).\n- nfs: Do not call generic_error_remove_page() while holding locks (bsc#1170457).\n- nfs: Fix memory leaks and corruption in readdir (git-fixes).\n- nfs: Fix O_DIRECT accounting of number of bytes read/written (git-fixes).\n- nfs: Fix potential posix_acl refcnt leak in nfs3_set_acl (git-fixes).\n- nfs: fix racey wait in nfs_set_open_stateid_locked (bsc#1170592).\n- NFS/flexfiles: Use the correct TCP timeout for flexfiles I/O (git-fixes).\n- NFS/pnfs: Fix pnfs_generic_prepare_to_resend_writes() (git-fixes).\n- nfs: Revalidate the file size on a fatal write error (git-fixes).\n- NFSv4.0: nfs4_do_fsinfo() should not do implicit lease renewals (git-fixes).\n- NFSv4: Do not allow a cached open with a revoked delegation (git-fixes).\n- NFSv4: Fix leak of clp-\u003ecl_acceptor string (git-fixes).\n- NFSv4-Fix-OPEN-CLOSE-race.patch\n- NFSv4/pnfs: Return valid stateids in nfs_layout_find_inode_by_stateid() (git-fixes).\n- NFSv4: try lease recovery on NFS4ERR_EXPIRED (git-fixes).\n- NFSv4.x: Drop the slot if nfs4_delegreturn_prepare waits for layoutreturn (git-fixes).\n- nl802154: add missing attribute validation for dev_type (networking-stable-20_03_14).\n- nl802154: add missing attribute validation (networking-stable-20_03_14).\n- nvme-fc: print proper nvme-fc devloss_tmo value (bsc#1172391).\n- objtool: Fix stack offset tracking for indirect CFAs (bsc#1169514).\n- objtool: Fix switch table detection in .text.unlikely (bsc#1169514).\n- objtool: Make BP scratch register warning more robust (bsc#1169514).\n- padata: Remove broken queue flushing (git-fixes).\n- Partially revert \u0027kfifo: fix kfifo_alloc() and kfifo_init()\u0027 (git fixes (block drivers)).\n- PCI: hv: Add support for protocol 1.3 and support PCI_BUS_RELATIONS2 (bsc#1172201, bsc#1172202).\n- PCI: hv: Decouple the func definition in hv_dr_state from VSP message (bsc#1172201, bsc#1172202).\n- PCI/PM: Call .bridge_d3() hook only if non-NULL (git-fixes).\n- perf: Allocate context task_ctx_data for child event (git-fixes).\n- perf/cgroup: Fix perf cgroup hierarchy support (git-fixes).\n- perf: Copy parent\u0027s address filter offsets on clone (git-fixes).\n- perf/core: Add sanity check to deal with pinned event failure (git-fixes).\n- perf/core: Avoid freeing static PMU contexts when PMU is unregistered (git-fixes).\n- perf/core: Correct event creation with PERF_FORMAT_GROUP (git-fixes).\n- perf/core: Do not WARN() for impossible ring-buffer sizes (git-fixes).\n- perf/core: Fix ctx_event_type in ctx_resched() (git-fixes).\n- perf/core: Fix error handling in perf_event_alloc() (git-fixes).\n- perf/core: Fix exclusive events\u0027 grouping (git-fixes).\n- perf/core: Fix group scheduling with mixed hw and sw events (git-fixes).\n- perf/core: Fix impossible ring-buffer sizes warning (git-fixes).\n- perf/core: Fix locking for children siblings group read (git-fixes).\n- perf/core: Fix lock inversion between perf,trace,cpuhp (git-fixes (dependent patch for 18736eef1213)).\n- perf/core: Fix perf_event_read_value() locking (git-fixes).\n- perf/core: Fix perf_pmu_unregister() locking (git-fixes).\n- perf/core: Fix __perf_read_group_add() locking (git-fixes (dependent patch)).\n- perf/core: Fix perf_sample_regs_user() mm check (git-fixes).\n- perf/core: Fix possible Spectre-v1 indexing for -\u003eaux_pages (git-fixes).\n- perf/core: Fix race between close() and fork() (git-fixes).\n- perf/core: Fix the address filtering fix (git-fixes).\n- perf/core: Fix use-after-free in uprobe_perf_close() (git-fixes).\n- perf/core: Force USER_DS when recording user stack data (git-fixes).\n- perf/core: Restore mmap record type correctly (git-fixes).\n- perf: Fix header.size for namespace events (git-fixes).\n- perf/ioctl: Add check for the sample_period value (git-fixes).\n- perf, pt, coresight: Fix address filters for vmas with non-zero offset (git-fixes).\n- perf: Return proper values for user stack errors (git-fixes).\n- pinctrl: baytrail: Enable pin configuration setting for GPIO chip (git-fixes).\n- pinctrl: cherryview: Add missing spinlock usage in chv_gpio_irq_handler (git-fixes).\n- pinctrl: sunrisepoint: Fix PAD lock register offset for SPT-H (git-fixes).\n- platform/x86: asus-nb-wmi: Do not load on Asus T100TA and T200TA (bsc#1051510).\n- pnfs: Ensure we do clear the return-on-close layout stateid on fatal errors (git-fixes).\n- powerpc: Add attributes for setjmp/longjmp (bsc#1065729).\n- powerpc/pci/of: Parse unassigned resources (bsc#1065729).\n- powerpc/setup_64: Set cache-line-size based on cache-block-size (bsc#1065729).\n- powerpc/sstep: Fix DS operand in ld encoding to appropriate value (bsc#1065729).\n- qede: Fix race between rdma destroy workqueue and link change event (networking-stable-20_03_01).\n- r8152: check disconnect status after long sleep (networking-stable-20_03_14).\n- raid6/ppc: Fix build for clang (git fixes (block drivers)).\n- random: always use batched entropy for get_random_u{32,64} (bsc#1164871).\n- rcu: locking and unlocking need to always be at least barriers (git fixes (block drivers)).\n- Redo patch for SLE15-SP1, based on feedback from IBM: patches.suse/s390-ftrace-fix-potential-crashes-when-switching-tracers (bsc#1171244 LTC#185785 git-fixes).\n- resolve KABI warning for perf-pt-coresight (git-fixes).\n- Revert \u0027ALSA: hda/realtek: Fix pop noise on ALC225\u0027 (git-fixes).\n- Revert \u0027drm/panel: simple: Add support for Sharp LQ150X1LG11 panels\u0027 (bsc#1114279) \t* offset changes\n- Revert \u0027HID: i2c-hid: add Trekstor Primebook C11B to descriptor override\u0027 Depends on 9b5c747685982d22efffeafc5ec601bd28f6d78b, which was also reverted.\n- Revert \u0027HID: i2c-hid: override HID descriptors for certain devices\u0027 This broke i2c-hid.ko\u0027s build, there is no way around it without a big file rename or renaming the kernel module.\n- Revert \u0027i2c-hid: properly terminate i2c_hid_dmi_desc_override_table\u0027 Fixed 9b5c747685982d22efffeafc5ec601bd28f6d78b, which was also reverted.\n- Revert \u0027ipc,sem: remove uneeded sem_undo_list lock usage in exit_sem()\u0027 (bsc#1172221).\n- Revert \u0027RDMA/cma: Simplify rdma_resolve_addr() error flow\u0027 (bsc#1103992).\n- rtlwifi: Fix a double free in _rtl_usb_tx_urb_setup() (bsc#1051510).\n- s390/cio: avoid duplicated \u0027ADD\u0027 uevents (git-fixes).\n- s390/cio: generate delayed uevent for vfio-ccw subchannels (git-fixes).\n- s390/cpuinfo: fix wrong output when CPU0 is offline (git-fixes).\n- s390/cpum_cf: Add new extended counters for IBM z15 (bsc#1169762 LTC#185291).\n- s390/diag: fix display of diagnose call statistics (git-fixes).\n- s390/ftrace: fix potential crashes when switching tracers (git-fixes).\n- s390/gmap: return proper error code on ksm unsharing (git-fixes).\n- s390/ism: fix error return code in ism_probe() (git-fixes).\n- s390/pci: do not set affinity for floating irqs (git-fixes).\n- s390/pci: Fix possible deadlock in recover_store() (bsc#1165183 LTC#184103).\n- s390/pci: Recover handle in clp_set_pci_fn() (bsc#1165183 LTC#184103).\n- s390/qeth: cancel RX reclaim work earlier (git-fixes).\n- s390/qeth: do not return -ENOTSUPP to userspace (git-fixes).\n- s390/qeth: do not warn for napi with 0 budget (git-fixes).\n- s390/qeth: fix off-by-one in RX copybreak check (git-fixes).\n- s390/qeth: fix promiscuous mode after reset (git-fixes).\n- s390/qeth: fix qdio teardown after early init error (git-fixes).\n- s390/qeth: handle error due to unsupported transport mode (git-fixes).\n- s390/qeth: handle error when backing RX buffer (git-fixes).\n- s390/qeth: lock the card while changing its hsuid (git-fixes).\n- s390/qeth: support net namespaces for L3 devices (git-fixes).\n- s390/time: Fix clk type in get_tod_clock (git-fixes).\n- scripts/decodecode: fix trapping instruction formatting (bsc#1065729).\n- scripts/dtc: Remove redundant YYLOC global declaration (bsc#1160388).\n- scsi: bnx2i: fix potential use after free (bsc#1171600).\n- scsi: core: Handle drivers which set sg_tablesize to zero (bsc#1171601)\n- scsi: core: save/restore command resid for error handling (bsc#1171602).\n- scsi: core: scsi_trace: Use get_unaligned_be*() (bsc#1171604).\n- scsi: core: try to get module before removing device (bsc#1171605).\n- scsi: csiostor: Adjust indentation in csio_device_reset (bsc#1171606).\n- scsi: csiostor: Do not enable IRQs too early (bsc#1171607).\n- scsi: esas2r: unlock on error in esas2r_nvram_read_direct() (bsc#1171608).\n- scsi: fnic: fix invalid stack access (bsc#1171609).\n- scsi: fnic: fix msix interrupt allocation (bsc#1171610).\n- scsi-ibmvfc-Don-t-send-implicit-logouts-prior-to-NPI.patch\n- scsi: ibmvscsi: Fix WARN_ON during event pool release (bsc#1170791 ltc#185128).\n- scsi-ibmvscsi-Fix-WARN_ON-during-event-pool-release.patch\n- scsi: iscsi: Avoid potential deadlock in iscsi_if_rx func (bsc#1171611).\n- scsi: iscsi: Fix a potential deadlock in the timeout handler (bsc#1171612).\n- scsi: iscsi: qla4xxx: fix double free in probe (bsc#1171613).\n- scsi: lpfc: Change default queue allocation for reduced memory consumption (bsc#1164780).\n- scsi: lpfc: fix: Coverity: lpfc_cmpl_els_rsp(): Null pointer dereferences (bsc#1171614).\n- scsi: lpfc: Fix crash in target side cable pulls hitting WAIT_FOR_UNREG (bsc#1171615).\n- scsi: lpfc: Fix lpfc_nodelist leak when processing unsolicited event (bsc#1164780).\n- scsi: lpfc: Fix MDS Diagnostic Enablement definition (bsc#1164780).\n- scsi: lpfc: Fix negation of else clause in lpfc_prep_node_fc4type (bsc#1164780).\n- scsi: lpfc: Fix noderef and address space warnings (bsc#1164780).\n- scsi: lpfc: Maintain atomic consistency of queue_claimed flag (bsc#1164780).\n- scsi: lpfc: remove duplicate unloading checks (bsc#1164780).\n- scsi: lpfc: Remove re-binding of nvme rport during registration (bsc#1164780).\n- scsi: lpfc: Remove redundant initialization to variable rc (bsc#1164780).\n- scsi: lpfc: Remove unnecessary lockdep_assert_held calls (bsc#1164780).\n- scsi: lpfc: Update lpfc version to 12.8.0.1 (bsc#1164780).\n- scsi: megaraid_sas: Do not initiate OCR if controller is not in ready state (bsc#1171616).\n- scsi: qla2xxx: add ring buffer for tracing debug logs (bsc#1157169).\n- scsi-qla2xxx-check-UNLOADING-before-posting-async-wo.patch\n- scsi: qla2xxx: check UNLOADING before posting async work (bsc#1157169).\n- scsi: qla2xxx: Delete all sessions before unregister local nvme port (bsc#1157169).\n- scsi: qla2xxx: Do not log message when reading port speed via sysfs (bsc#1157169).\n- scsi: qla2xxx: Fix hang when issuing nvme disconnect-all in NPIV (bsc#1157169).\n- scsi: qla2xxx: Fix regression warnings (bsc#1157169).\n- scsi: qla2xxx: Remove non functional code (bsc#1157169).\n- scsi: qla2xxx: set UNLOADING before waiting for session deletion (bsc#1157169).\n- scsi-qla2xxx-set-UNLOADING-before-waiting-for-sessio.patch\n- scsi: qla4xxx: Adjust indentation in qla4xxx_mem_free (bsc#1171617).\n- scsi: qla4xxx: fix double free bug (bsc#1171618).\n- scsi: sd: Clear sdkp-\u003eprotection_type if disk is reformatted without PI (bsc#1171619).\n- scsi: sg: add sg_remove_request in sg_common_write (bsc#1171620).\n- scsi: tracing: Fix handling of TRANSFER LENGTH == 0 for READ(6) and WRITE(6) (bsc#1171621).\n- scsi: ufs: change msleep to usleep_range (bsc#1171622).\n- scsi: ufs: Clean up ufshcd_scale_clks() and clock scaling error out path (bsc#1171623).\n- scsi: ufs: Fix ufshcd_hold() caused scheduling while atomic (bsc#1171624).\n- scsi: ufs: Fix ufshcd_probe_hba() reture value in case ufshcd_scsi_add_wlus() fails (bsc#1171625).\n- scsi: ufs: Recheck bkops level if bkops is disabled (bsc#1171626).\n- scsi: zfcp: fix missing erp_lock in port recovery trigger for point-to-point (git-fixes).\n- sctp: fix possibly using a bad saddr with a given dst (networking-stable-20_04_02).\n- sctp: fix refcount bug in sctp_wfree (networking-stable-20_04_02).\n- sctp: move the format error check out of __sctp_sf_do_9_1_abort (networking-stable-20_03_01).\n- selftests/powerpc: Fix build errors in powerpc ptrace selftests (boo#1124278).\n- seq_file: fix problem when seeking mid-record (bsc#1170125).\n- serial: uartps: Move the spinlock after the read of the tx empty (git-fixes).\n- sfc: detach from cb_page in efx_copy_channel() (networking-stable-20_03_14).\n- signal/pid_namespace: Fix reboot_pid_ns to use send_sig not force_sig (bsc#1172185).\n- slcan: not call free_netdev before rtnl_unlock in slcan_open (networking-stable-20_03_28).\n- slip: make slhc_compress() more robust against malicious packets (networking-stable-20_03_14).\n- smb3: Additional compression structures (bsc#1144333).\n- smb3: Add new compression flags (bsc#1144333).\n- smb3: change noisy error message to FYI (bsc#1144333).\n- smb3: enable swap on SMB3 mounts (bsc#1144333).\n- smb3-fix-performance-regression-with-setting-mtime.patch\n- smb3: Minor cleanup of protocol definitions (bsc#1144333).\n- smb3: remove overly noisy debug line in signing errors (bsc#1144333).\n- smb3: smbdirect support can be configured by default (bsc#1144333).\n- smb3: use SMB2_SIGNATURE_SIZE define (bsc#1144333).\n- spi: bcm2835: Fix 3-wire mode if DMA is enabled (git-fixes).\n- spi: bcm63xx-hsspi: Really keep pll clk enabled (bsc#1051510).\n- spi: bcm-qspi: when tx/rx buffer is NULL set to 0 (bsc#1051510).\n- spi: dw: Add SPI Rx-done wait method to DMA-based transfer (bsc#1051510).\n- spi: dw: Add SPI Tx-done wait method to DMA-based transfer (bsc#1051510).\n- spi: dw: Zero DMA Tx and Rx configurations on stack (bsc#1051510).\n- spi: fsl: do not map irq during probe (git-fixes).\n- spi: fsl: use platform_get_irq() instead of of_irq_to_resource() (git-fixes).\n- spi: pxa2xx: Add CS control clock quirk (bsc#1051510).\n- spi: qup: call spi_qup_pm_resume_runtime before suspending (bsc#1051510).\n- spi: spi-fsl-dspi: Replace interruptible wait queue with a simple completion (git-fixes).\n- spi: spi-s3c64xx: Fix system resume support (git-fixes).\n- spi/zynqmp: remove entry that causes a cs glitch (bsc#1051510).\n- staging: comedi: dt2815: fix writing hi byte of analog output (bsc#1051510).\n- staging: comedi: Fix comedi_device refcnt leak in comedi_open (bsc#1051510).\n- staging: iio: ad2s1210: Fix SPI reading (bsc#1051510).\n- staging: vt6656: Do not set RCR_MULTICAST or RCR_BROADCAST by default (git-fixes).\n- staging: vt6656: Fix drivers TBTT timing counter (git-fixes).\n- staging: vt6656: Fix pairwise key entry save (git-fixes).\n- sunrpc: expiry_time should be seconds not timeval (git-fixes).\n- sunrpc: Fix a potential buffer overflow in \u0027svc_print_xprts()\u0027 (git-fixes).\n- supported.conf: Add br_netfilter to base (bsc#1169020).\n- supported.conf: support w1 core and thermometer support\n- svcrdma: Fix double svc_rdma_send_ctxt_put() in an error path (bsc#1103992).\n- svcrdma: Fix leak of transport addresses (git-fixes).\n- svcrdma: Fix trace point use-after-free race (bsc#1103992 ).\n- taskstats: fix data-race (bsc#1172188).\n- tcp: cache line align MAX_TCP_HEADER (networking-stable-20_04_27).\n- tcp: repair: fix TCP_QUEUE_SEQ implementation (networking-stable-20_03_28).\n- team: add missing attribute validation for array index (networking-stable-20_03_14).\n- team: add missing attribute validation for port ifindex (networking-stable-20_03_14).\n- team: fix hang in team_mode_get() (networking-stable-20_04_27).\n- tools lib traceevent: Remove unneeded qsort and uses memmove instead (git-fixes).\n- tpm: ibmvtpm: retry on H_CLOSED in tpm_ibmvtpm_send() (bsc#1065729).\n- tpm/tpm_tis: Free IRQ if probing fails (bsc#1082555).\n- tpm/tpm_tis: Free IRQ if probing fails (git-fixes).\n- tracing: Add a vmalloc_sync_mappings() for safe measure (git-fixes).\n- tracing: Disable trace_printk() on post poned tests (git-fixes).\n- tracing: Fix the race between registering \u0027snapshot\u0027 event trigger and triggering \u0027snapshot\u0027 operation (git-fixes).\n- tty: rocket, avoid OOB access (git-fixes).\n- tun: Do not put_page() for all negative return values from XDP program (bsc#1109837).\n- UAS: fix deadlock in error handling and PM flushing work (git-fixes).\n- UAS: no use logging any details in case of ENODEV (git-fixes).\n- Update config files: Build w1 bus on arm64 (jsc#SLE-11048)\n- Update config files: re-enable CONFIG_HAMRADIO and co (bsc#1170740)\n- Update patches.suse/powerpc-pseries-ddw-Extend-upper-limit-for-huge-DMA-.patch (bsc#1142685 bsc#1167867 ltc#179509 ltc#184616).\n- Update patches.suse/x86-mm-split-vmalloc_sync_all.patch (bsc#1165741, bsc#1166969).\n- Update references: patches.suse/s390-pci-do-not-set-affinity-for-floating-irqs (bsc#1171817 LTC#185819 git-fixes).\n- usb: Add USB_QUIRK_DELAY_CTRL_MSG and USB_QUIRK_DELAY_INIT for Corsair K70 RGB RAPIDFIRE (git-fixes).\n- usb: cdc-acm: restore capability check order (git-fixes).\n- usb: core: Fix misleading driver bug report (bsc#1051510).\n- usb: dwc3: do not set gadget-\u003eis_otg flag (git-fixes).\n- usb: dwc3: gadget: Do link recovery for SS and SSP (git-fixes).\n- usb: early: Handle AMD\u0027s spec-compliant identifiers, too (git-fixes).\n- usb: f_fs: Clear OS Extended descriptor counts to zero in ffs_data_reset() (git-fixes).\n- usb: gadget: audio: Fix a missing error return value in audio_bind() (git-fixes).\n- usb: gadget: composite: Inform controller driver of self-powered (git-fixes).\n- usb: gadget: legacy: fix error return code in cdc_bind() (git-fixes).\n- usb: gadget: legacy: fix error return code in gncm_bind() (git-fixes).\n- usb: gadget: legacy: fix redundant initialization warnings (bsc#1051510).\n- usb: gadget: net2272: Fix a memory leak in an error handling path in \u0027net2272_plat_probe()\u0027 (git-fixes).\n- usb: gadget: udc: atmel: Fix vbus disconnect handling (git-fixes).\n- usb: gadget: udc: atmel: Make some symbols static (git-fixes).\n- usb: gadget: udc: bdc: Remove unnecessary NULL checks in bdc_req_complete (git-fixes).\n- usb: host: xhci-plat: keep runtime active when removing host (git-fixes).\n- usb: hub: Fix handling of connect changes during sleep (git-fixes).\n- usbnet: silence an unnecessary warning (bsc#1170770).\n- usb: serial: garmin_gps: add sanity checking for data length (git-fixes).\n- usb: serial: option: add BroadMobi BM806U (git-fixes).\n- usb: serial: option: add support for ASKEY WWHC050 (git-fixes).\n- usb: serial: option: add Wistron Neweb D19Q1 (git-fixes).\n- usb: serial: qcserial: Add DW5816e support (git-fixes).\n- usb: sisusbvga: Change port variable from signed to unsigned (git-fixes).\n- usb-storage: Add unusual_devs entry for JMicron JMS566 (git-fixes).\n- usb: uas: add quirk for LaCie 2Big Quadra (git-fixes).\n- usb: xhci: Fix NULL pointer dereference when enqueuing trbs from urb sg list (git-fixes).\n- video: fbdev: sis: Remove unnecessary parentheses and commented code (bsc#1114279)\n- video: fbdev: w100fb: Fix a potential double free (bsc#1051510).\n- vrf: Check skb for XFRM_TRANSFORMED flag (networking-stable-20_04_27).\n- vt: ioctl, switch VT_IS_IN_USE and VT_BUSY to inlines (git-fixes).\n- vt: selection, introduce vc_is_sel (git-fixes).\n- vt: vt_ioctl: fix race in VT_RESIZEX (git-fixes).\n- vt: vt_ioctl: fix use-after-free in vt_in_use() (git-fixes).\n- vt: vt_ioctl: fix VT_DISALLOCATE freeing in-use virtual console (git-fixes).\n- vxlan: check return value of gro_cells_init() (networking-stable-20_03_28).\n- w1: Add subsystem kernel public interface (jsc#SLE-11048).\n- w1: Fix slave count on 1-Wire bus (resend) (jsc#SLE-11048).\n- w1: keep balance of mutex locks and refcnts (jsc#SLE-11048).\n- w1: use put_device() if device_register() fail (jsc#SLE-11048).\n- watchdog: reset last_hw_keepalive time at start (git-fixes).\n- wcn36xx: Fix error handling path in \u0027wcn36xx_probe()\u0027 (bsc#1051510).\n- wil6210: remove reset file from debugfs (git-fixes).\n- wimax/i2400m: Fix potential urb refcnt leak (bsc#1051510).\n- workqueue: do not use wq_select_unbound_cpu() for bound works (bsc#1172130).\n- x86/entry/64: Fix unwind hints in kernel exit path (bsc#1058115).\n- x86/entry/64: Fix unwind hints in register clearing code (bsc#1058115).\n- x86/entry/64: Fix unwind hints in rewind_stack_do_exit() (bsc#1058115).\n- x86/entry/64: Fix unwind hints in __switch_to_asm() (bsc#1058115).\n- x86/hyperv: Allow guests to enable InvariantTSC (bsc#1170621, bsc#1170620).\n- x86/Hyper-V: Free hv_panic_page when fail to register kmsg dump (bsc#1170617, bsc#1170618).\n- x86/Hyper-V: Report crash data in die() when panic_on_oops is set (bsc#1170617, bsc#1170618).\n- x86/Hyper-V: Report crash register data or kmsg before running crash kernel (bsc#1170617, bsc#1170618).\n- x86/Hyper-V: Report crash register data when sysctl_record_panic_msg is not set (bsc#1170617, bsc#1170618).\n- x86: hyperv: report value of misc_features (git fixes).\n- x86/Hyper-V: Trigger crash enlightenment only once during system crash (bsc#1170617, bsc#1170618).\n- x86/Hyper-V: Unload vmbus channel in hv panic callback (bsc#1170617, bsc#1170618).\n- x86/kprobes: Avoid kretprobe recursion bug (bsc#1114279).\n- x86/resctrl: Fix invalid attempt at removing the default resource group (git-fixes).\n- x86/resctrl: Preserve CDP enable over CPU hotplug (bsc#1114279).\n- x86/unwind/orc: Do not skip the first frame for inactive tasks (bsc#1058115).\n- x86/unwind/orc: Fix error handling in __unwind_start() (bsc#1058115).\n- x86/unwind/orc: Fix error path for bad ORC entry type (bsc#1058115).\n- x86/unwind/orc: Fix unwind_get_return_address_ptr() for inactive tasks (bsc#1058115).\n- x86/unwind/orc: Prevent unwinding before ORC initialization (bsc#1058115).\n- x86/unwind: Prevent false warnings for non-current tasks (bsc#1058115).\n- x86/xen: fix booting 32-bit pv guest (bsc#1071995).\n- x86/xen: Make the boot CPU idle task reliable (bsc#1071995).\n- x86/xen: Make the secondary CPU idle tasks reliable (bsc#1071995).\n- xen/pci: reserve MCFG areas earlier (bsc#1170145).\n- xfrm: Always set XFRM_TRANSFORMED in xfrm{4,6}_output_finish (networking-stable-20_04_27).\n- xfs: clear PF_MEMALLOC before exiting xfsaild thread (git-fixes).\n- xfs: Correctly invert xfs_buftarg LRU isolation logic (git-fixes).\n- xfs: do not ever return a stale pointer from __xfs_dir3_free_read (git-fixes).\n- xprtrdma: Fix completion wait during device removal (git-fixes).\n", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-2020-801", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2020_0801-1.json" }, { "category": "self", "summary": "URL for openSUSE-SU-2020:0801-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BOYMLRUHWMVAOFIPZH7KANUUUY2YYNL3/" }, { "category": "self", "summary": "E-Mail link for openSUSE-SU-2020:0801-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BOYMLRUHWMVAOFIPZH7KANUUUY2YYNL3/" }, { "category": "self", "summary": "SUSE Bug 1051510", "url": "https://bugzilla.suse.com/1051510" }, { "category": "self", "summary": "SUSE Bug 1058115", "url": "https://bugzilla.suse.com/1058115" }, { "category": "self", "summary": "SUSE Bug 1065729", "url": "https://bugzilla.suse.com/1065729" }, { "category": "self", "summary": "SUSE Bug 1071995", "url": "https://bugzilla.suse.com/1071995" }, { "category": "self", "summary": "SUSE Bug 1082555", "url": "https://bugzilla.suse.com/1082555" }, { "category": "self", "summary": "SUSE Bug 1083647", "url": "https://bugzilla.suse.com/1083647" }, { "category": "self", "summary": "SUSE Bug 1089895", "url": "https://bugzilla.suse.com/1089895" }, { "category": "self", "summary": "SUSE Bug 1090036", "url": "https://bugzilla.suse.com/1090036" }, { "category": "self", "summary": "SUSE Bug 1103990", "url": "https://bugzilla.suse.com/1103990" }, { "category": "self", "summary": "SUSE Bug 1103991", "url": "https://bugzilla.suse.com/1103991" }, { "category": "self", "summary": "SUSE Bug 1103992", "url": "https://bugzilla.suse.com/1103992" }, { "category": "self", "summary": "SUSE Bug 1104745", "url": "https://bugzilla.suse.com/1104745" }, { "category": "self", "summary": "SUSE Bug 1109837", "url": "https://bugzilla.suse.com/1109837" }, { "category": "self", "summary": "SUSE Bug 1111666", "url": "https://bugzilla.suse.com/1111666" }, { "category": "self", "summary": "SUSE Bug 1112178", "url": "https://bugzilla.suse.com/1112178" }, { "category": "self", "summary": "SUSE Bug 1112374", "url": "https://bugzilla.suse.com/1112374" }, { "category": "self", "summary": "SUSE Bug 1113956", "url": "https://bugzilla.suse.com/1113956" }, { "category": "self", "summary": "SUSE Bug 1114279", "url": "https://bugzilla.suse.com/1114279" }, { "category": "self", "summary": "SUSE Bug 1124278", "url": "https://bugzilla.suse.com/1124278" }, { "category": "self", "summary": "SUSE Bug 1127354", "url": "https://bugzilla.suse.com/1127354" }, { "category": "self", "summary": "SUSE Bug 1127355", "url": "https://bugzilla.suse.com/1127355" }, { "category": "self", "summary": "SUSE Bug 1127371", "url": "https://bugzilla.suse.com/1127371" }, { "category": "self", "summary": "SUSE Bug 1133021", "url": "https://bugzilla.suse.com/1133021" }, { "category": "self", "summary": "SUSE Bug 1142685", "url": "https://bugzilla.suse.com/1142685" }, { "category": "self", "summary": "SUSE Bug 1144333", "url": "https://bugzilla.suse.com/1144333" }, { "category": "self", "summary": "SUSE Bug 1151794", "url": "https://bugzilla.suse.com/1151794" }, { "category": "self", "summary": "SUSE Bug 1152489", "url": "https://bugzilla.suse.com/1152489" }, { "category": "self", "summary": "SUSE Bug 1154824", "url": "https://bugzilla.suse.com/1154824" }, { "category": "self", "summary": "SUSE Bug 1157169", "url": "https://bugzilla.suse.com/1157169" }, { "category": "self", "summary": "SUSE Bug 1158265", "url": "https://bugzilla.suse.com/1158265" }, { "category": "self", "summary": "SUSE Bug 1160388", "url": "https://bugzilla.suse.com/1160388" }, { "category": "self", "summary": "SUSE Bug 1160947", "url": "https://bugzilla.suse.com/1160947" }, { "category": "self", "summary": "SUSE Bug 1164780", "url": "https://bugzilla.suse.com/1164780" }, { "category": "self", "summary": "SUSE Bug 1164871", "url": "https://bugzilla.suse.com/1164871" }, { "category": "self", "summary": "SUSE Bug 1165183", "url": "https://bugzilla.suse.com/1165183" }, { "category": "self", "summary": "SUSE Bug 1165478", "url": "https://bugzilla.suse.com/1165478" }, { "category": "self", "summary": "SUSE Bug 1165741", "url": "https://bugzilla.suse.com/1165741" }, { "category": "self", "summary": "SUSE Bug 1166969", "url": "https://bugzilla.suse.com/1166969" }, { "category": "self", "summary": "SUSE Bug 1166978", "url": "https://bugzilla.suse.com/1166978" }, { "category": "self", "summary": "SUSE Bug 1167574", "url": "https://bugzilla.suse.com/1167574" }, { "category": "self", "summary": "SUSE Bug 1167851", "url": "https://bugzilla.suse.com/1167851" }, { "category": "self", "summary": "SUSE Bug 1167867", "url": "https://bugzilla.suse.com/1167867" }, { "category": "self", "summary": "SUSE Bug 1168332", "url": "https://bugzilla.suse.com/1168332" }, { "category": "self", "summary": "SUSE Bug 1168670", "url": "https://bugzilla.suse.com/1168670" }, { "category": "self", "summary": "SUSE Bug 1168789", "url": "https://bugzilla.suse.com/1168789" }, { "category": "self", "summary": "SUSE Bug 1168829", "url": "https://bugzilla.suse.com/1168829" }, { "category": "self", "summary": "SUSE Bug 1168854", "url": "https://bugzilla.suse.com/1168854" }, { "category": "self", "summary": "SUSE Bug 1169020", "url": "https://bugzilla.suse.com/1169020" }, { "category": "self", "summary": "SUSE Bug 1169514", "url": "https://bugzilla.suse.com/1169514" }, { "category": "self", "summary": "SUSE Bug 1169525", "url": "https://bugzilla.suse.com/1169525" }, { "category": "self", "summary": "SUSE Bug 1169762", "url": "https://bugzilla.suse.com/1169762" }, { "category": "self", "summary": "SUSE Bug 1170056", "url": "https://bugzilla.suse.com/1170056" }, { "category": "self", "summary": "SUSE Bug 1170125", "url": "https://bugzilla.suse.com/1170125" }, { "category": "self", "summary": "SUSE Bug 1170145", "url": "https://bugzilla.suse.com/1170145" }, { "category": "self", "summary": "SUSE Bug 1170284", "url": "https://bugzilla.suse.com/1170284" }, { "category": "self", "summary": "SUSE Bug 1170345", "url": "https://bugzilla.suse.com/1170345" }, { "category": "self", "summary": "SUSE Bug 1170457", "url": "https://bugzilla.suse.com/1170457" }, { "category": "self", "summary": "SUSE Bug 1170522", "url": "https://bugzilla.suse.com/1170522" }, { "category": "self", "summary": "SUSE Bug 1170592", "url": "https://bugzilla.suse.com/1170592" }, { "category": "self", "summary": "SUSE Bug 1170617", "url": "https://bugzilla.suse.com/1170617" }, { "category": "self", "summary": "SUSE Bug 1170618", "url": "https://bugzilla.suse.com/1170618" }, { "category": "self", "summary": "SUSE Bug 1170620", "url": "https://bugzilla.suse.com/1170620" }, { "category": "self", "summary": "SUSE Bug 1170621", "url": "https://bugzilla.suse.com/1170621" }, { "category": "self", "summary": "SUSE Bug 1170740", "url": "https://bugzilla.suse.com/1170740" }, { "category": "self", "summary": "SUSE Bug 1170770", "url": "https://bugzilla.suse.com/1170770" }, { "category": "self", "summary": "SUSE Bug 1170778", "url": "https://bugzilla.suse.com/1170778" }, { "category": "self", "summary": "SUSE Bug 1170791", "url": "https://bugzilla.suse.com/1170791" }, { "category": "self", "summary": "SUSE Bug 1170901", "url": "https://bugzilla.suse.com/1170901" }, { "category": "self", "summary": "SUSE Bug 1171078", "url": "https://bugzilla.suse.com/1171078" }, { "category": "self", "summary": "SUSE Bug 1171098", "url": "https://bugzilla.suse.com/1171098" }, { "category": "self", "summary": "SUSE Bug 1171118", "url": "https://bugzilla.suse.com/1171118" }, { "category": "self", "summary": "SUSE Bug 1171189", "url": "https://bugzilla.suse.com/1171189" }, { "category": "self", "summary": "SUSE Bug 1171191", "url": "https://bugzilla.suse.com/1171191" }, { "category": "self", "summary": "SUSE Bug 1171195", "url": "https://bugzilla.suse.com/1171195" }, { "category": "self", "summary": "SUSE Bug 1171202", "url": "https://bugzilla.suse.com/1171202" }, { "category": "self", "summary": "SUSE Bug 1171205", "url": "https://bugzilla.suse.com/1171205" }, { "category": "self", "summary": "SUSE Bug 1171214", "url": "https://bugzilla.suse.com/1171214" }, { "category": "self", "summary": "SUSE Bug 1171217", "url": "https://bugzilla.suse.com/1171217" }, { "category": "self", "summary": "SUSE Bug 1171218", "url": "https://bugzilla.suse.com/1171218" }, { "category": "self", "summary": "SUSE Bug 1171219", "url": "https://bugzilla.suse.com/1171219" }, { "category": "self", "summary": "SUSE Bug 1171220", "url": "https://bugzilla.suse.com/1171220" }, { "category": "self", "summary": "SUSE Bug 1171244", "url": "https://bugzilla.suse.com/1171244" }, { "category": "self", "summary": "SUSE Bug 1171252", "url": "https://bugzilla.suse.com/1171252" }, { "category": "self", "summary": "SUSE Bug 1171254", "url": "https://bugzilla.suse.com/1171254" }, { "category": "self", "summary": "SUSE Bug 1171293", "url": "https://bugzilla.suse.com/1171293" }, { "category": "self", "summary": "SUSE Bug 1171417", "url": "https://bugzilla.suse.com/1171417" }, { "category": "self", "summary": "SUSE Bug 1171527", "url": "https://bugzilla.suse.com/1171527" }, { "category": "self", "summary": "SUSE Bug 1171599", "url": "https://bugzilla.suse.com/1171599" }, { "category": "self", "summary": "SUSE Bug 1171600", "url": "https://bugzilla.suse.com/1171600" }, { "category": "self", "summary": "SUSE Bug 1171601", "url": "https://bugzilla.suse.com/1171601" }, { "category": "self", "summary": "SUSE Bug 1171602", "url": "https://bugzilla.suse.com/1171602" }, { "category": "self", "summary": "SUSE Bug 1171604", "url": "https://bugzilla.suse.com/1171604" }, { "category": "self", "summary": "SUSE Bug 1171605", "url": "https://bugzilla.suse.com/1171605" }, { "category": "self", "summary": "SUSE Bug 1171606", "url": "https://bugzilla.suse.com/1171606" }, { "category": "self", "summary": "SUSE Bug 1171607", "url": "https://bugzilla.suse.com/1171607" }, { "category": "self", "summary": "SUSE Bug 1171608", "url": "https://bugzilla.suse.com/1171608" }, { "category": "self", "summary": "SUSE Bug 1171609", "url": "https://bugzilla.suse.com/1171609" }, { "category": "self", "summary": "SUSE Bug 1171610", "url": "https://bugzilla.suse.com/1171610" }, { "category": "self", "summary": "SUSE Bug 1171611", "url": "https://bugzilla.suse.com/1171611" }, { "category": "self", "summary": "SUSE Bug 1171612", "url": "https://bugzilla.suse.com/1171612" }, { "category": "self", "summary": "SUSE Bug 1171613", "url": "https://bugzilla.suse.com/1171613" }, { "category": "self", "summary": "SUSE Bug 1171614", "url": "https://bugzilla.suse.com/1171614" }, { "category": "self", "summary": "SUSE Bug 1171615", "url": "https://bugzilla.suse.com/1171615" }, { "category": "self", "summary": "SUSE Bug 1171616", "url": "https://bugzilla.suse.com/1171616" }, { "category": "self", "summary": "SUSE Bug 1171617", "url": "https://bugzilla.suse.com/1171617" }, { "category": "self", "summary": "SUSE Bug 1171618", "url": "https://bugzilla.suse.com/1171618" }, { "category": "self", "summary": "SUSE Bug 1171619", "url": "https://bugzilla.suse.com/1171619" }, { "category": "self", "summary": "SUSE Bug 1171620", "url": "https://bugzilla.suse.com/1171620" }, { "category": "self", "summary": "SUSE Bug 1171621", "url": "https://bugzilla.suse.com/1171621" }, { "category": "self", "summary": "SUSE Bug 1171622", "url": "https://bugzilla.suse.com/1171622" }, { "category": "self", "summary": "SUSE Bug 1171623", "url": "https://bugzilla.suse.com/1171623" }, { "category": "self", "summary": "SUSE Bug 1171624", "url": "https://bugzilla.suse.com/1171624" }, { "category": "self", "summary": "SUSE Bug 1171625", "url": "https://bugzilla.suse.com/1171625" }, { "category": "self", "summary": "SUSE Bug 1171626", "url": "https://bugzilla.suse.com/1171626" }, { "category": "self", "summary": "SUSE Bug 1171662", "url": "https://bugzilla.suse.com/1171662" }, { "category": "self", "summary": "SUSE Bug 1171679", "url": "https://bugzilla.suse.com/1171679" }, { "category": "self", "summary": "SUSE Bug 1171691", "url": "https://bugzilla.suse.com/1171691" }, { "category": "self", "summary": "SUSE Bug 1171692", "url": "https://bugzilla.suse.com/1171692" }, { "category": "self", "summary": "SUSE Bug 1171694", "url": "https://bugzilla.suse.com/1171694" }, { "category": "self", "summary": "SUSE Bug 1171695", "url": "https://bugzilla.suse.com/1171695" }, { "category": "self", "summary": "SUSE Bug 1171736", "url": "https://bugzilla.suse.com/1171736" }, { "category": "self", "summary": "SUSE Bug 1171817", "url": "https://bugzilla.suse.com/1171817" }, { "category": "self", "summary": "SUSE Bug 1171948", "url": "https://bugzilla.suse.com/1171948" }, { "category": "self", "summary": "SUSE Bug 1171949", "url": "https://bugzilla.suse.com/1171949" }, { "category": "self", "summary": "SUSE Bug 1171951", "url": "https://bugzilla.suse.com/1171951" }, { "category": "self", "summary": "SUSE Bug 1171952", "url": "https://bugzilla.suse.com/1171952" }, { "category": "self", "summary": "SUSE Bug 1171979", "url": "https://bugzilla.suse.com/1171979" }, { "category": "self", "summary": "SUSE Bug 1171982", "url": "https://bugzilla.suse.com/1171982" }, { "category": "self", "summary": "SUSE Bug 1171983", "url": "https://bugzilla.suse.com/1171983" }, { "category": "self", "summary": "SUSE Bug 1172017", "url": "https://bugzilla.suse.com/1172017" }, { "category": "self", "summary": "SUSE Bug 1172096", "url": "https://bugzilla.suse.com/1172096" }, { "category": "self", "summary": "SUSE Bug 1172097", "url": "https://bugzilla.suse.com/1172097" }, { "category": "self", "summary": "SUSE Bug 1172098", "url": "https://bugzilla.suse.com/1172098" }, { "category": "self", "summary": "SUSE Bug 1172099", "url": "https://bugzilla.suse.com/1172099" }, { "category": "self", "summary": "SUSE Bug 1172101", "url": "https://bugzilla.suse.com/1172101" }, { "category": "self", "summary": "SUSE Bug 1172102", "url": "https://bugzilla.suse.com/1172102" }, { "category": "self", "summary": "SUSE Bug 1172103", "url": "https://bugzilla.suse.com/1172103" }, { "category": "self", "summary": "SUSE Bug 1172104", "url": "https://bugzilla.suse.com/1172104" }, { "category": "self", "summary": "SUSE Bug 1172127", "url": "https://bugzilla.suse.com/1172127" }, { "category": "self", "summary": "SUSE Bug 1172130", "url": "https://bugzilla.suse.com/1172130" }, { "category": "self", "summary": "SUSE Bug 1172185", "url": "https://bugzilla.suse.com/1172185" }, { "category": "self", "summary": "SUSE Bug 1172188", "url": "https://bugzilla.suse.com/1172188" }, { "category": "self", "summary": "SUSE Bug 1172199", "url": "https://bugzilla.suse.com/1172199" }, { "category": "self", "summary": "SUSE Bug 1172201", "url": "https://bugzilla.suse.com/1172201" }, { "category": "self", "summary": "SUSE Bug 1172202", "url": "https://bugzilla.suse.com/1172202" }, { "category": "self", "summary": "SUSE Bug 1172221", "url": "https://bugzilla.suse.com/1172221" }, { "category": "self", "summary": "SUSE Bug 1172249", "url": "https://bugzilla.suse.com/1172249" }, { "category": "self", "summary": "SUSE Bug 1172251", "url": "https://bugzilla.suse.com/1172251" }, { "category": "self", "summary": "SUSE Bug 1172317", "url": "https://bugzilla.suse.com/1172317" }, { "category": "self", "summary": "SUSE Bug 1172342", "url": "https://bugzilla.suse.com/1172342" }, { "category": "self", "summary": "SUSE Bug 1172343", "url": "https://bugzilla.suse.com/1172343" }, { "category": "self", "summary": "SUSE Bug 1172344", "url": "https://bugzilla.suse.com/1172344" }, { "category": "self", "summary": "SUSE Bug 1172366", "url": "https://bugzilla.suse.com/1172366" }, { "category": "self", "summary": "SUSE Bug 1172378", "url": "https://bugzilla.suse.com/1172378" }, { "category": "self", "summary": "SUSE Bug 1172391", "url": "https://bugzilla.suse.com/1172391" }, { "category": "self", "summary": "SUSE Bug 1172397", "url": "https://bugzilla.suse.com/1172397" }, { "category": "self", "summary": "SUSE Bug 1172453", "url": "https://bugzilla.suse.com/1172453" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1000199 page", "url": "https://www.suse.com/security/cve/CVE-2018-1000199/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-19462 page", "url": "https://www.suse.com/security/cve/CVE-2019-19462/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-20806 page", "url": "https://www.suse.com/security/cve/CVE-2019-20806/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-20812 page", "url": "https://www.suse.com/security/cve/CVE-2019-20812/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9455 page", "url": "https://www.suse.com/security/cve/CVE-2019-9455/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-0543 page", "url": "https://www.suse.com/security/cve/CVE-2020-0543/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10690 page", "url": "https://www.suse.com/security/cve/CVE-2020-10690/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10711 page", "url": "https://www.suse.com/security/cve/CVE-2020-10711/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10720 page", "url": "https://www.suse.com/security/cve/CVE-2020-10720/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10732 page", "url": "https://www.suse.com/security/cve/CVE-2020-10732/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10751 page", "url": "https://www.suse.com/security/cve/CVE-2020-10751/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10757 page", "url": "https://www.suse.com/security/cve/CVE-2020-10757/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-11608 page", "url": "https://www.suse.com/security/cve/CVE-2020-11608/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-11609 page", "url": "https://www.suse.com/security/cve/CVE-2020-11609/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12114 page", "url": "https://www.suse.com/security/cve/CVE-2020-12114/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12464 page", "url": "https://www.suse.com/security/cve/CVE-2020-12464/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12652 page", "url": "https://www.suse.com/security/cve/CVE-2020-12652/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12653 page", "url": "https://www.suse.com/security/cve/CVE-2020-12653/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12654 page", "url": "https://www.suse.com/security/cve/CVE-2020-12654/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12655 page", "url": "https://www.suse.com/security/cve/CVE-2020-12655/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12656 page", "url": "https://www.suse.com/security/cve/CVE-2020-12656/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12657 page", "url": "https://www.suse.com/security/cve/CVE-2020-12657/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12659 page", "url": "https://www.suse.com/security/cve/CVE-2020-12659/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12769 page", "url": "https://www.suse.com/security/cve/CVE-2020-12769/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-13143 page", "url": "https://www.suse.com/security/cve/CVE-2020-13143/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2020-06-12T15:14:33Z", "generator": { "date": "2020-06-12T15:14:33Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2020:0801-1", "initial_release_date": "2020-06-12T15:14:33Z", "revision_history": [ { "date": "2020-06-12T15:14:33Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-devel-4.12.14-lp151.28.52.1.noarch", "product": { "name": "kernel-devel-4.12.14-lp151.28.52.1.noarch", "product_id": "kernel-devel-4.12.14-lp151.28.52.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-4.12.14-lp151.28.52.2.noarch", "product": { "name": "kernel-docs-4.12.14-lp151.28.52.2.noarch", "product_id": "kernel-docs-4.12.14-lp151.28.52.2.noarch" } }, { "category": "product_version", "name": "kernel-docs-html-4.12.14-lp151.28.52.2.noarch", "product": { "name": "kernel-docs-html-4.12.14-lp151.28.52.2.noarch", "product_id": "kernel-docs-html-4.12.14-lp151.28.52.2.noarch" } }, { "category": "product_version", "name": "kernel-macros-4.12.14-lp151.28.52.1.noarch", "product": { "name": "kernel-macros-4.12.14-lp151.28.52.1.noarch", "product_id": "kernel-macros-4.12.14-lp151.28.52.1.noarch" } }, { "category": "product_version", "name": "kernel-source-4.12.14-lp151.28.52.1.noarch", "product": { "name": "kernel-source-4.12.14-lp151.28.52.1.noarch", "product_id": "kernel-source-4.12.14-lp151.28.52.1.noarch" } }, { "category": "product_version", "name": "kernel-source-vanilla-4.12.14-lp151.28.52.1.noarch", "product": { "name": "kernel-source-vanilla-4.12.14-lp151.28.52.1.noarch", "product_id": "kernel-source-vanilla-4.12.14-lp151.28.52.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-debug-4.12.14-lp151.28.52.1.x86_64", "product": { "name": "kernel-debug-4.12.14-lp151.28.52.1.x86_64", "product_id": "kernel-debug-4.12.14-lp151.28.52.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-base-4.12.14-lp151.28.52.1.x86_64", "product": { "name": "kernel-debug-base-4.12.14-lp151.28.52.1.x86_64", "product_id": "kernel-debug-base-4.12.14-lp151.28.52.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-devel-4.12.14-lp151.28.52.1.x86_64", "product": { "name": "kernel-debug-devel-4.12.14-lp151.28.52.1.x86_64", "product_id": "kernel-debug-devel-4.12.14-lp151.28.52.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-4.12.14-lp151.28.52.1.x86_64", "product": { "name": "kernel-default-4.12.14-lp151.28.52.1.x86_64", "product_id": "kernel-default-4.12.14-lp151.28.52.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-lp151.28.52.1.x86_64", "product": { "name": "kernel-default-base-4.12.14-lp151.28.52.1.x86_64", "product_id": "kernel-default-base-4.12.14-lp151.28.52.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-lp151.28.52.1.x86_64", "product": { "name": "kernel-default-devel-4.12.14-lp151.28.52.1.x86_64", "product_id": "kernel-default-devel-4.12.14-lp151.28.52.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-4.12.14-lp151.28.52.1.x86_64", "product": { "name": "kernel-kvmsmall-4.12.14-lp151.28.52.1.x86_64", "product_id": "kernel-kvmsmall-4.12.14-lp151.28.52.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-base-4.12.14-lp151.28.52.1.x86_64", "product": { "name": "kernel-kvmsmall-base-4.12.14-lp151.28.52.1.x86_64", "product_id": "kernel-kvmsmall-base-4.12.14-lp151.28.52.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-devel-4.12.14-lp151.28.52.1.x86_64", "product": { "name": "kernel-kvmsmall-devel-4.12.14-lp151.28.52.1.x86_64", "product_id": "kernel-kvmsmall-devel-4.12.14-lp151.28.52.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-lp151.28.52.3.x86_64", "product": { "name": "kernel-obs-build-4.12.14-lp151.28.52.3.x86_64", "product_id": "kernel-obs-build-4.12.14-lp151.28.52.3.x86_64" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-lp151.28.52.3.x86_64", "product": { "name": "kernel-obs-qa-4.12.14-lp151.28.52.3.x86_64", "product_id": "kernel-obs-qa-4.12.14-lp151.28.52.3.x86_64" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-lp151.28.52.1.x86_64", "product": { "name": "kernel-syms-4.12.14-lp151.28.52.1.x86_64", "product_id": "kernel-syms-4.12.14-lp151.28.52.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-lp151.28.52.1.x86_64", "product": { "name": "kernel-vanilla-4.12.14-lp151.28.52.1.x86_64", "product_id": "kernel-vanilla-4.12.14-lp151.28.52.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-lp151.28.52.1.x86_64", "product": { "name": "kernel-vanilla-base-4.12.14-lp151.28.52.1.x86_64", "product_id": "kernel-vanilla-base-4.12.14-lp151.28.52.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-lp151.28.52.1.x86_64", "product": { "name": "kernel-vanilla-devel-4.12.14-lp151.28.52.1.x86_64", "product_id": "kernel-vanilla-devel-4.12.14-lp151.28.52.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Leap 15.1", "product": { "name": "openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap:15.1" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-4.12.14-lp151.28.52.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.52.1.x86_64" }, "product_reference": "kernel-debug-4.12.14-lp151.28.52.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-base-4.12.14-lp151.28.52.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.52.1.x86_64" }, "product_reference": "kernel-debug-base-4.12.14-lp151.28.52.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-4.12.14-lp151.28.52.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.52.1.x86_64" }, "product_reference": "kernel-debug-devel-4.12.14-lp151.28.52.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-lp151.28.52.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.52.1.x86_64" }, "product_reference": "kernel-default-4.12.14-lp151.28.52.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-lp151.28.52.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.52.1.x86_64" }, "product_reference": "kernel-default-base-4.12.14-lp151.28.52.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-lp151.28.52.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.52.1.x86_64" }, "product_reference": "kernel-default-devel-4.12.14-lp151.28.52.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.12.14-lp151.28.52.1.noarch as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.52.1.noarch" }, "product_reference": "kernel-devel-4.12.14-lp151.28.52.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-4.12.14-lp151.28.52.2.noarch as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.52.2.noarch" }, "product_reference": "kernel-docs-4.12.14-lp151.28.52.2.noarch", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-html-4.12.14-lp151.28.52.2.noarch as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.52.2.noarch" }, "product_reference": "kernel-docs-html-4.12.14-lp151.28.52.2.noarch", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kvmsmall-4.12.14-lp151.28.52.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.52.1.x86_64" }, "product_reference": "kernel-kvmsmall-4.12.14-lp151.28.52.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kvmsmall-base-4.12.14-lp151.28.52.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.52.1.x86_64" }, "product_reference": "kernel-kvmsmall-base-4.12.14-lp151.28.52.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kvmsmall-devel-4.12.14-lp151.28.52.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.52.1.x86_64" }, "product_reference": "kernel-kvmsmall-devel-4.12.14-lp151.28.52.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.12.14-lp151.28.52.1.noarch as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.52.1.noarch" }, "product_reference": "kernel-macros-4.12.14-lp151.28.52.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-lp151.28.52.3.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.52.3.x86_64" }, "product_reference": "kernel-obs-build-4.12.14-lp151.28.52.3.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-qa-4.12.14-lp151.28.52.3.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.52.3.x86_64" }, "product_reference": "kernel-obs-qa-4.12.14-lp151.28.52.3.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.12.14-lp151.28.52.1.noarch as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.52.1.noarch" }, "product_reference": "kernel-source-4.12.14-lp151.28.52.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-vanilla-4.12.14-lp151.28.52.1.noarch as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.52.1.noarch" }, "product_reference": "kernel-source-vanilla-4.12.14-lp151.28.52.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-lp151.28.52.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.52.1.x86_64" }, "product_reference": "kernel-syms-4.12.14-lp151.28.52.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-4.12.14-lp151.28.52.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.52.1.x86_64" }, "product_reference": "kernel-vanilla-4.12.14-lp151.28.52.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-base-4.12.14-lp151.28.52.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.52.1.x86_64" }, "product_reference": "kernel-vanilla-base-4.12.14-lp151.28.52.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-devel-4.12.14-lp151.28.52.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.52.1.x86_64" }, "product_reference": "kernel-vanilla-devel-4.12.14-lp151.28.52.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-1000199", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1000199" } ], "notes": [ { "category": "general", "text": "The Linux Kernel version 3.18 contains a dangerous feature vulnerability in modify_user_hw_breakpoint() that can result in crash and possibly memory corruption. This attack appear to be exploitable via local code execution and the ability to use ptrace. This vulnerability appears to have been fixed in git commit f67b15037a7a50c57f72e69a6d59941ad90a0f0f.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.52.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1000199", "url": "https://www.suse.com/security/cve/CVE-2018-1000199" }, { "category": "external", "summary": "SUSE Bug 1089895 for CVE-2018-1000199", "url": "https://bugzilla.suse.com/1089895" }, { "category": "external", "summary": "SUSE Bug 1090036 for CVE-2018-1000199", "url": "https://bugzilla.suse.com/1090036" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.52.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.52.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-12T15:14:33Z", "details": "important" } ], "title": "CVE-2018-1000199" }, { "cve": "CVE-2019-19462", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-19462" } ], "notes": [ { "category": "general", "text": "relay_open in kernel/relay.c in the Linux kernel through 5.4.1 allows local users to cause a denial of service (such as relay blockage) by triggering a NULL alloc_percpu result.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.52.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-19462", "url": "https://www.suse.com/security/cve/CVE-2019-19462" }, { "category": "external", "summary": "SUSE Bug 1158265 for CVE-2019-19462", "url": "https://bugzilla.suse.com/1158265" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.52.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.52.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-12T15:14:33Z", "details": "low" } ], "title": "CVE-2019-19462" }, { "cve": "CVE-2019-20806", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-20806" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.2. There is a NULL pointer dereference in tw5864_handle_frame() in drivers/media/pci/tw5864/tw5864-video.c, which may cause denial of service, aka CID-2e7682ebfc75.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.52.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-20806", "url": "https://www.suse.com/security/cve/CVE-2019-20806" }, { "category": "external", "summary": "SUSE Bug 1172199 for CVE-2019-20806", "url": "https://bugzilla.suse.com/1172199" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.52.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.9, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.52.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-12T15:14:33Z", "details": "low" } ], "title": "CVE-2019-20806" }, { "cve": "CVE-2019-20812", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-20812" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.4.7. The prb_calc_retire_blk_tmo() function in net/packet/af_packet.c can result in a denial of service (CPU consumption and soft lockup) in a certain failure case involving TPACKET_V3, aka CID-b43d1f9f7067.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.52.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-20812", "url": "https://www.suse.com/security/cve/CVE-2019-20812" }, { "category": "external", "summary": "SUSE Bug 1172453 for CVE-2019-20812", "url": "https://bugzilla.suse.com/1172453" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.52.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.52.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-12T15:14:33Z", "details": "moderate" } ], "title": "CVE-2019-20812" }, { "cve": "CVE-2019-9455", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9455" } ], "notes": [ { "category": "general", "text": "In the Android kernel in the video driver there is a kernel pointer leak due to a WARN_ON statement. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.52.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9455", "url": "https://www.suse.com/security/cve/CVE-2019-9455" }, { "category": "external", "summary": "SUSE Bug 1170345 for CVE-2019-9455", "url": "https://bugzilla.suse.com/1170345" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.52.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.52.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-12T15:14:33Z", "details": "moderate" } ], "title": "CVE-2019-9455" }, { "cve": "CVE-2020-0543", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-0543" } ], "notes": [ { "category": "general", "text": "Incomplete cleanup from specific special register read operations in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.52.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-0543", "url": "https://www.suse.com/security/cve/CVE-2020-0543" }, { "category": "external", "summary": "SUSE Bug 1154824 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1154824" }, { "category": "external", "summary": "SUSE Bug 1172205 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172205" }, { "category": "external", "summary": "SUSE Bug 1172206 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172206" }, { "category": "external", "summary": "SUSE Bug 1172207 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172207" }, { "category": "external", "summary": "SUSE Bug 1172770 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172770" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.52.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.52.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-12T15:14:33Z", "details": "moderate" } ], "title": "CVE-2020-0543" }, { "cve": "CVE-2020-10690", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10690" } ], "notes": [ { "category": "general", "text": "There is a use-after-free in kernel versions before 5.5 due to a race condition between the release of ptp_clock and cdev while resource deallocation. When a (high privileged) process allocates a ptp device file (like /dev/ptpX) and voluntarily goes to sleep. During this time if the underlying device is removed, it can cause an exploitable condition as the process wakes up to terminate and clean all attached files. The system crashes due to the cdev structure being invalid (as already freed) which is pointed to by the inode.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.52.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10690", "url": "https://www.suse.com/security/cve/CVE-2020-10690" }, { "category": "external", "summary": "SUSE Bug 1170056 for CVE-2020-10690", "url": "https://bugzilla.suse.com/1170056" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.52.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.52.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-12T15:14:33Z", "details": "moderate" } ], "title": "CVE-2020-10690" }, { "cve": "CVE-2020-10711", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10711" } ], "notes": [ { "category": "general", "text": "A NULL pointer dereference flaw was found in the Linux kernel\u0027s SELinux subsystem in versions before 5.7. This flaw occurs while importing the Commercial IP Security Option (CIPSO) protocol\u0027s category bitmap into the SELinux extensible bitmap via the\u0027 ebitmap_netlbl_import\u0027 routine. While processing the CIPSO restricted bitmap tag in the \u0027cipso_v4_parsetag_rbm\u0027 routine, it sets the security attribute to indicate that the category bitmap is present, even if it has not been allocated. This issue leads to a NULL pointer dereference issue while importing the same category bitmap into SELinux. This flaw allows a remote network user to crash the system kernel, resulting in a denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.52.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10711", "url": "https://www.suse.com/security/cve/CVE-2020-10711" }, { "category": "external", "summary": "SUSE Bug 1171191 for CVE-2020-10711", "url": "https://bugzilla.suse.com/1171191" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.52.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.52.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-12T15:14:33Z", "details": "moderate" } ], "title": "CVE-2020-10711" }, { "cve": "CVE-2020-10720", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10720" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s implementation of GRO in versions before 5.2. This flaw allows an attacker with local access to crash the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.52.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10720", "url": "https://www.suse.com/security/cve/CVE-2020-10720" }, { "category": "external", "summary": "SUSE Bug 1170778 for CVE-2020-10720", "url": "https://bugzilla.suse.com/1170778" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.52.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.52.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-12T15:14:33Z", "details": "moderate" } ], "title": "CVE-2020-10720" }, { "cve": "CVE-2020-10732", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10732" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s implementation of Userspace core dumps. This flaw allows an attacker with a local account to crash a trivial program and exfiltrate private kernel data.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.52.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10732", "url": "https://www.suse.com/security/cve/CVE-2020-10732" }, { "category": "external", "summary": "SUSE Bug 1171220 for CVE-2020-10732", "url": "https://bugzilla.suse.com/1171220" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.52.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.52.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-12T15:14:33Z", "details": "low" } ], "title": "CVE-2020-10732" }, { "cve": "CVE-2020-10751", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10751" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernels SELinux LSM hook implementation before version 5.7, where it incorrectly assumed that an skb would only contain a single netlink message. The hook would incorrectly only validate the first netlink message in the skb and allow or deny the rest of the messages within the skb with the granted permission without further processing.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.52.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10751", "url": "https://www.suse.com/security/cve/CVE-2020-10751" }, { "category": "external", "summary": "SUSE Bug 1171189 for CVE-2020-10751", "url": "https://bugzilla.suse.com/1171189" }, { "category": "external", "summary": "SUSE Bug 1174963 for CVE-2020-10751", "url": "https://bugzilla.suse.com/1174963" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.52.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.52.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-12T15:14:33Z", "details": "moderate" } ], "title": "CVE-2020-10751" }, { "cve": "CVE-2020-10757", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10757" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux Kernel in versions after 4.5-rc1 in the way mremap handled DAX Huge Pages. This flaw allows a local attacker with access to a DAX enabled storage to escalate their privileges on the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.52.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10757", "url": "https://www.suse.com/security/cve/CVE-2020-10757" }, { "category": "external", "summary": "SUSE Bug 1159281 for CVE-2020-10757", "url": "https://bugzilla.suse.com/1159281" }, { "category": "external", "summary": "SUSE Bug 1172317 for CVE-2020-10757", "url": "https://bugzilla.suse.com/1172317" }, { "category": "external", "summary": "SUSE Bug 1172437 for CVE-2020-10757", "url": "https://bugzilla.suse.com/1172437" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.52.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.52.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-12T15:14:33Z", "details": "important" } ], "title": "CVE-2020-10757" }, { "cve": "CVE-2020-11608", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-11608" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.6.1. drivers/media/usb/gspca/ov519.c allows NULL pointer dereferences in ov511_mode_init_regs and ov518_mode_init_regs when there are zero endpoints, aka CID-998912346c0d.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.52.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-11608", "url": "https://www.suse.com/security/cve/CVE-2020-11608" }, { "category": "external", "summary": "SUSE Bug 1168829 for CVE-2020-11608", "url": "https://bugzilla.suse.com/1168829" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.52.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.52.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-12T15:14:33Z", "details": "moderate" } ], "title": "CVE-2020-11608" }, { "cve": "CVE-2020-11609", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-11609" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the stv06xx subsystem in the Linux kernel before 5.6.1. drivers/media/usb/gspca/stv06xx/stv06xx.c and drivers/media/usb/gspca/stv06xx/stv06xx_pb0100.c mishandle invalid descriptors, as demonstrated by a NULL pointer dereference, aka CID-485b06aadb93.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.52.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-11609", "url": "https://www.suse.com/security/cve/CVE-2020-11609" }, { "category": "external", "summary": "SUSE Bug 1168854 for CVE-2020-11609", "url": "https://bugzilla.suse.com/1168854" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.52.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.52.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-12T15:14:33Z", "details": "moderate" } ], "title": "CVE-2020-11609" }, { "cve": "CVE-2020-12114", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12114" } ], "notes": [ { "category": "general", "text": "A pivot_root race condition in fs/namespace.c in the Linux kernel 4.4.x before 4.4.221, 4.9.x before 4.9.221, 4.14.x before 4.14.178, 4.19.x before 4.19.119, and 5.x before 5.3 allows local users to cause a denial of service (panic) by corrupting a mountpoint reference counter.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.52.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12114", "url": "https://www.suse.com/security/cve/CVE-2020-12114" }, { "category": "external", "summary": "SUSE Bug 1171098 for CVE-2020-12114", "url": "https://bugzilla.suse.com/1171098" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.52.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.52.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-12T15:14:33Z", "details": "moderate" } ], "title": "CVE-2020-12114" }, { "cve": "CVE-2020-12464", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12464" } ], "notes": [ { "category": "general", "text": "usb_sg_cancel in drivers/usb/core/message.c in the Linux kernel before 5.6.8 has a use-after-free because a transfer occurs without a reference, aka CID-056ad39ee925.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.52.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12464", "url": "https://www.suse.com/security/cve/CVE-2020-12464" }, { "category": "external", "summary": "SUSE Bug 1170901 for CVE-2020-12464", "url": "https://bugzilla.suse.com/1170901" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.52.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 1.8, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.52.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-12T15:14:33Z", "details": "low" } ], "title": "CVE-2020-12464" }, { "cve": "CVE-2020-12652", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12652" } ], "notes": [ { "category": "general", "text": "The __mptctl_ioctl function in drivers/message/fusion/mptctl.c in the Linux kernel before 5.4.14 allows local users to hold an incorrect lock during the ioctl operation and trigger a race condition, i.e., a \"double fetch\" vulnerability, aka CID-28d76df18f0a. NOTE: the vendor states \"The security impact of this bug is not as bad as it could have been because these operations are all privileged and root already has enormous destructive power.\"", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.52.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12652", "url": "https://www.suse.com/security/cve/CVE-2020-12652" }, { "category": "external", "summary": "SUSE Bug 1171218 for CVE-2020-12652", "url": "https://bugzilla.suse.com/1171218" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.52.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.52.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-12T15:14:33Z", "details": "moderate" } ], "title": "CVE-2020-12652" }, { "cve": "CVE-2020-12653", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12653" } ], "notes": [ { "category": "general", "text": "An issue was found in Linux kernel before 5.5.4. The mwifiex_cmd_append_vsie_tlv() function in drivers/net/wireless/marvell/mwifiex/scan.c allows local users to gain privileges or cause a denial of service because of an incorrect memcpy and buffer overflow, aka CID-b70261a288ea.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.52.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12653", "url": "https://www.suse.com/security/cve/CVE-2020-12653" }, { "category": "external", "summary": "SUSE Bug 1159281 for CVE-2020-12653", "url": "https://bugzilla.suse.com/1159281" }, { "category": "external", "summary": "SUSE Bug 1171195 for CVE-2020-12653", "url": "https://bugzilla.suse.com/1171195" }, { "category": "external", "summary": "SUSE Bug 1171254 for CVE-2020-12653", "url": "https://bugzilla.suse.com/1171254" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.52.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.52.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-12T15:14:33Z", "details": "important" } ], "title": "CVE-2020-12653" }, { "cve": "CVE-2020-12654", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12654" } ], "notes": [ { "category": "general", "text": "An issue was found in Linux kernel before 5.5.4. mwifiex_ret_wmm_get_status() in drivers/net/wireless/marvell/mwifiex/wmm.c allows a remote AP to trigger a heap-based buffer overflow because of an incorrect memcpy, aka CID-3a9b153c5591.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.52.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12654", "url": "https://www.suse.com/security/cve/CVE-2020-12654" }, { "category": "external", "summary": "SUSE Bug 1159281 for CVE-2020-12654", "url": "https://bugzilla.suse.com/1159281" }, { "category": "external", "summary": "SUSE Bug 1171202 for CVE-2020-12654", "url": "https://bugzilla.suse.com/1171202" }, { "category": "external", "summary": "SUSE Bug 1171252 for CVE-2020-12654", "url": "https://bugzilla.suse.com/1171252" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.52.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.52.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-12T15:14:33Z", "details": "important" } ], "title": "CVE-2020-12654" }, { "cve": "CVE-2020-12655", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12655" } ], "notes": [ { "category": "general", "text": "An issue was discovered in xfs_agf_verify in fs/xfs/libxfs/xfs_alloc.c in the Linux kernel through 5.6.10. Attackers may trigger a sync of excessive duration via an XFS v5 image with crafted metadata, aka CID-d0c7feaf8767.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.52.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12655", "url": "https://www.suse.com/security/cve/CVE-2020-12655" }, { "category": "external", "summary": "SUSE Bug 1171217 for CVE-2020-12655", "url": "https://bugzilla.suse.com/1171217" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.52.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.8, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.52.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-12T15:14:33Z", "details": "moderate" } ], "title": "CVE-2020-12655" }, { "cve": "CVE-2020-12656", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12656" } ], "notes": [ { "category": "general", "text": "gss_mech_free in net/sunrpc/auth_gss/gss_mech_switch.c in the rpcsec_gss_krb5 implementation in the Linux kernel through 5.6.10 lacks certain domain_release calls, leading to a memory leak. Note: This was disputed with the assertion that the issue does not grant any access not already available. It is a problem that on unloading a specific kernel module some memory is leaked, but loading kernel modules is a privileged operation. A user could also write a kernel module to consume any amount of memory they like and load that replicating the effect of this bug", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.52.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12656", "url": "https://www.suse.com/security/cve/CVE-2020-12656" }, { "category": "external", "summary": "SUSE Bug 1171219 for CVE-2020-12656", "url": "https://bugzilla.suse.com/1171219" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.52.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.9, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.52.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-12T15:14:33Z", "details": "low" } ], "title": "CVE-2020-12656" }, { "cve": "CVE-2020-12657", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12657" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.6.5. There is a use-after-free in block/bfq-iosched.c related to bfq_idle_slice_timer_body.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.52.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12657", "url": "https://www.suse.com/security/cve/CVE-2020-12657" }, { "category": "external", "summary": "SUSE Bug 1171205 for CVE-2020-12657", "url": "https://bugzilla.suse.com/1171205" }, { "category": "external", "summary": "SUSE Bug 1201585 for CVE-2020-12657", "url": "https://bugzilla.suse.com/1201585" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.52.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.52.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-12T15:14:33Z", "details": "important" } ], "title": "CVE-2020-12657" }, { "cve": "CVE-2020-12659", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12659" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.6.7. xdp_umem_reg in net/xdp/xdp_umem.c has an out-of-bounds write (by a user with the CAP_NET_ADMIN capability) because of a lack of headroom validation.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.52.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12659", "url": "https://www.suse.com/security/cve/CVE-2020-12659" }, { "category": "external", "summary": "SUSE Bug 1171214 for CVE-2020-12659", "url": "https://bugzilla.suse.com/1171214" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.52.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.52.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-12T15:14:33Z", "details": "moderate" } ], "title": "CVE-2020-12659" }, { "cve": "CVE-2020-12769", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12769" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.4.17. drivers/spi/spi-dw.c allows attackers to cause a panic via concurrent calls to dw_spi_irq and dw_spi_transfer_one, aka CID-19b61392c5a8.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.52.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12769", "url": "https://www.suse.com/security/cve/CVE-2020-12769" }, { "category": "external", "summary": "SUSE Bug 1171983 for CVE-2020-12769", "url": "https://bugzilla.suse.com/1171983" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.52.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.52.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-12T15:14:33Z", "details": "moderate" } ], "title": "CVE-2020-12769" }, { "cve": "CVE-2020-13143", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-13143" } ], "notes": [ { "category": "general", "text": "gadget_dev_desc_UDC_store in drivers/usb/gadget/configfs.c in the Linux kernel 3.16 through 5.6.13 relies on kstrdup without considering the possibility of an internal \u0027\\0\u0027 value, which allows attackers to trigger an out-of-bounds read, aka CID-15753588bcd4.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.52.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-13143", "url": "https://www.suse.com/security/cve/CVE-2020-13143" }, { "category": "external", "summary": "SUSE Bug 1171982 for CVE-2020-13143", "url": "https://bugzilla.suse.com/1171982" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.52.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.52.2.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.52.3.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.52.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.52.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.52.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-12T15:14:33Z", "details": "moderate" } ], "title": "CVE-2020-13143" } ] }
opensuse-su-2024:11520-1
Vulnerability from csaf_opensuse
Published
2024-06-15 00:00
Modified
2024-06-15 00:00
Summary
xen-4.15.1_01-1.2 on GA media
Notes
Title of the patch
xen-4.15.1_01-1.2 on GA media
Description of the patch
These are all security issues fixed in the xen-4.15.1_01-1.2 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2024-11520
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "xen-4.15.1_01-1.2 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the xen-4.15.1_01-1.2 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2024-11520", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_11520-1.json" }, { "category": "self", "summary": "SUSE CVE CVE-2007-1320 page", "url": "https://www.suse.com/security/cve/CVE-2007-1320/" }, { "category": "self", "summary": "SUSE CVE CVE-2007-1366 page", "url": "https://www.suse.com/security/cve/CVE-2007-1366/" }, { "category": "self", "summary": "SUSE CVE CVE-2007-3919 page", "url": "https://www.suse.com/security/cve/CVE-2007-3919/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-10013 page", "url": "https://www.suse.com/security/cve/CVE-2016-10013/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-10024 page", "url": "https://www.suse.com/security/cve/CVE-2016-10024/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-10025 page", "url": "https://www.suse.com/security/cve/CVE-2016-10025/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-7777 page", "url": "https://www.suse.com/security/cve/CVE-2016-7777/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-7908 page", "url": "https://www.suse.com/security/cve/CVE-2016-7908/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-7909 page", "url": "https://www.suse.com/security/cve/CVE-2016-7909/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-8667 page", "url": "https://www.suse.com/security/cve/CVE-2016-8667/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-8669 page", "url": "https://www.suse.com/security/cve/CVE-2016-8669/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-8910 page", "url": "https://www.suse.com/security/cve/CVE-2016-8910/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-9377 page", "url": "https://www.suse.com/security/cve/CVE-2016-9377/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-9379 page", "url": "https://www.suse.com/security/cve/CVE-2016-9379/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-9381 page", "url": "https://www.suse.com/security/cve/CVE-2016-9381/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-9382 page", "url": "https://www.suse.com/security/cve/CVE-2016-9382/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-9383 page", "url": "https://www.suse.com/security/cve/CVE-2016-9383/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-9384 page", "url": "https://www.suse.com/security/cve/CVE-2016-9384/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-9385 page", "url": "https://www.suse.com/security/cve/CVE-2016-9385/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-9386 page", "url": "https://www.suse.com/security/cve/CVE-2016-9386/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-9637 page", "url": "https://www.suse.com/security/cve/CVE-2016-9637/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-9921 page", "url": "https://www.suse.com/security/cve/CVE-2016-9921/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-9932 page", "url": "https://www.suse.com/security/cve/CVE-2016-9932/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-12135 page", "url": "https://www.suse.com/security/cve/CVE-2017-12135/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-12136 page", "url": "https://www.suse.com/security/cve/CVE-2017-12136/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-12137 page", "url": "https://www.suse.com/security/cve/CVE-2017-12137/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-2615 page", "url": "https://www.suse.com/security/cve/CVE-2017-2615/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-2620 page", "url": "https://www.suse.com/security/cve/CVE-2017-2620/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5753 page", "url": "https://www.suse.com/security/cve/CVE-2017-5753/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-6505 page", "url": "https://www.suse.com/security/cve/CVE-2017-6505/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-8309 page", "url": "https://www.suse.com/security/cve/CVE-2017-8309/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-9330 page", "url": "https://www.suse.com/security/cve/CVE-2017-9330/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10471 page", "url": "https://www.suse.com/security/cve/CVE-2018-10471/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10472 page", "url": "https://www.suse.com/security/cve/CVE-2018-10472/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10981 page", "url": "https://www.suse.com/security/cve/CVE-2018-10981/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10982 page", "url": "https://www.suse.com/security/cve/CVE-2018-10982/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-12126 page", "url": "https://www.suse.com/security/cve/CVE-2018-12126/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-12891 page", "url": "https://www.suse.com/security/cve/CVE-2018-12891/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-12892 page", "url": "https://www.suse.com/security/cve/CVE-2018-12892/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-12893 page", "url": "https://www.suse.com/security/cve/CVE-2018-12893/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-15468 page", "url": "https://www.suse.com/security/cve/CVE-2018-15468/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-15469 page", "url": "https://www.suse.com/security/cve/CVE-2018-15469/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-15470 page", "url": "https://www.suse.com/security/cve/CVE-2018-15470/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-18883 page", "url": "https://www.suse.com/security/cve/CVE-2018-18883/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-19961 page", "url": "https://www.suse.com/security/cve/CVE-2018-19961/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-19963 page", "url": "https://www.suse.com/security/cve/CVE-2018-19963/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-19964 page", "url": "https://www.suse.com/security/cve/CVE-2018-19964/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-19965 page", "url": "https://www.suse.com/security/cve/CVE-2018-19965/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-19966 page", "url": "https://www.suse.com/security/cve/CVE-2018-19966/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-19967 page", "url": "https://www.suse.com/security/cve/CVE-2018-19967/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3639 page", "url": "https://www.suse.com/security/cve/CVE-2018-3639/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3646 page", "url": "https://www.suse.com/security/cve/CVE-2018-3646/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3665 page", "url": "https://www.suse.com/security/cve/CVE-2018-3665/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-5244 page", "url": "https://www.suse.com/security/cve/CVE-2018-5244/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-7540 page", "url": "https://www.suse.com/security/cve/CVE-2018-7540/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-7541 page", "url": "https://www.suse.com/security/cve/CVE-2018-7541/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-7542 page", "url": "https://www.suse.com/security/cve/CVE-2018-7542/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8897 page", "url": "https://www.suse.com/security/cve/CVE-2018-8897/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-17349 page", "url": "https://www.suse.com/security/cve/CVE-2019-17349/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-0543 page", "url": "https://www.suse.com/security/cve/CVE-2020-0543/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-11739 page", "url": "https://www.suse.com/security/cve/CVE-2020-11739/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-11740 page", "url": "https://www.suse.com/security/cve/CVE-2020-11740/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-11742 page", "url": "https://www.suse.com/security/cve/CVE-2020-11742/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-11743 page", "url": "https://www.suse.com/security/cve/CVE-2020-11743/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-15563 page", "url": "https://www.suse.com/security/cve/CVE-2020-15563/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-15565 page", "url": "https://www.suse.com/security/cve/CVE-2020-15565/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-15566 page", "url": "https://www.suse.com/security/cve/CVE-2020-15566/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-15567 page", "url": "https://www.suse.com/security/cve/CVE-2020-15567/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25595 page", "url": "https://www.suse.com/security/cve/CVE-2020-25595/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25596 page", "url": "https://www.suse.com/security/cve/CVE-2020-25596/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25597 page", "url": "https://www.suse.com/security/cve/CVE-2020-25597/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25598 page", "url": "https://www.suse.com/security/cve/CVE-2020-25598/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25599 page", "url": "https://www.suse.com/security/cve/CVE-2020-25599/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25600 page", "url": "https://www.suse.com/security/cve/CVE-2020-25600/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25601 page", "url": "https://www.suse.com/security/cve/CVE-2020-25601/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25602 page", "url": "https://www.suse.com/security/cve/CVE-2020-25602/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25603 page", "url": "https://www.suse.com/security/cve/CVE-2020-25603/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25604 page", "url": "https://www.suse.com/security/cve/CVE-2020-25604/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-27670 page", "url": "https://www.suse.com/security/cve/CVE-2020-27670/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-27671 page", "url": "https://www.suse.com/security/cve/CVE-2020-27671/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-27672 page", "url": "https://www.suse.com/security/cve/CVE-2020-27672/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-27674 page", "url": "https://www.suse.com/security/cve/CVE-2020-27674/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-28368 page", "url": "https://www.suse.com/security/cve/CVE-2020-28368/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-29040 page", "url": "https://www.suse.com/security/cve/CVE-2020-29040/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-29480 page", "url": "https://www.suse.com/security/cve/CVE-2020-29480/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-29481 page", "url": "https://www.suse.com/security/cve/CVE-2020-29481/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-29483 page", "url": "https://www.suse.com/security/cve/CVE-2020-29483/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-29484 page", "url": "https://www.suse.com/security/cve/CVE-2020-29484/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-29566 page", "url": "https://www.suse.com/security/cve/CVE-2020-29566/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-29567 page", "url": "https://www.suse.com/security/cve/CVE-2020-29567/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-29570 page", "url": "https://www.suse.com/security/cve/CVE-2020-29570/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-29571 page", "url": "https://www.suse.com/security/cve/CVE-2020-29571/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-28687 page", "url": "https://www.suse.com/security/cve/CVE-2021-28687/" } ], "title": "xen-4.15.1_01-1.2 on GA media", "tracking": { "current_release_date": "2024-06-15T00:00:00Z", "generator": { "date": "2024-06-15T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2024:11520-1", "initial_release_date": "2024-06-15T00:00:00Z", "revision_history": [ { "date": "2024-06-15T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "xen-4.15.1_01-1.2.aarch64", "product": { "name": "xen-4.15.1_01-1.2.aarch64", "product_id": "xen-4.15.1_01-1.2.aarch64" } }, { "category": "product_version", "name": "xen-devel-4.15.1_01-1.2.aarch64", "product": { "name": "xen-devel-4.15.1_01-1.2.aarch64", "product_id": "xen-devel-4.15.1_01-1.2.aarch64" } }, { "category": "product_version", "name": "xen-doc-html-4.15.1_01-1.2.aarch64", "product": { "name": "xen-doc-html-4.15.1_01-1.2.aarch64", "product_id": "xen-doc-html-4.15.1_01-1.2.aarch64" } }, { "category": "product_version", "name": "xen-libs-4.15.1_01-1.2.aarch64", "product": { "name": "xen-libs-4.15.1_01-1.2.aarch64", "product_id": "xen-libs-4.15.1_01-1.2.aarch64" } }, { "category": "product_version", "name": "xen-libs-32bit-4.15.1_01-1.2.aarch64", "product": { "name": "xen-libs-32bit-4.15.1_01-1.2.aarch64", "product_id": "xen-libs-32bit-4.15.1_01-1.2.aarch64" } }, { "category": "product_version", "name": "xen-tools-4.15.1_01-1.2.aarch64", "product": { "name": "xen-tools-4.15.1_01-1.2.aarch64", "product_id": "xen-tools-4.15.1_01-1.2.aarch64" } }, { "category": "product_version", "name": "xen-tools-domU-4.15.1_01-1.2.aarch64", "product": { "name": "xen-tools-domU-4.15.1_01-1.2.aarch64", "product_id": "xen-tools-domU-4.15.1_01-1.2.aarch64" } }, { "category": "product_version", "name": "xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "product": { "name": "xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "product_id": "xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "xen-4.15.1_01-1.2.ppc64le", "product": { "name": "xen-4.15.1_01-1.2.ppc64le", "product_id": "xen-4.15.1_01-1.2.ppc64le" } }, { "category": "product_version", "name": "xen-devel-4.15.1_01-1.2.ppc64le", "product": { "name": "xen-devel-4.15.1_01-1.2.ppc64le", "product_id": "xen-devel-4.15.1_01-1.2.ppc64le" } }, { "category": "product_version", "name": "xen-doc-html-4.15.1_01-1.2.ppc64le", "product": { "name": "xen-doc-html-4.15.1_01-1.2.ppc64le", "product_id": "xen-doc-html-4.15.1_01-1.2.ppc64le" } }, { "category": "product_version", "name": "xen-libs-4.15.1_01-1.2.ppc64le", "product": { "name": "xen-libs-4.15.1_01-1.2.ppc64le", "product_id": "xen-libs-4.15.1_01-1.2.ppc64le" } }, { "category": "product_version", "name": "xen-libs-32bit-4.15.1_01-1.2.ppc64le", "product": { "name": "xen-libs-32bit-4.15.1_01-1.2.ppc64le", "product_id": "xen-libs-32bit-4.15.1_01-1.2.ppc64le" } }, { "category": "product_version", "name": "xen-tools-4.15.1_01-1.2.ppc64le", "product": { "name": "xen-tools-4.15.1_01-1.2.ppc64le", "product_id": "xen-tools-4.15.1_01-1.2.ppc64le" } }, { "category": "product_version", "name": "xen-tools-domU-4.15.1_01-1.2.ppc64le", "product": { "name": "xen-tools-domU-4.15.1_01-1.2.ppc64le", "product_id": "xen-tools-domU-4.15.1_01-1.2.ppc64le" } }, { "category": "product_version", "name": "xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "product": { "name": "xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "product_id": "xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "xen-4.15.1_01-1.2.s390x", "product": { "name": "xen-4.15.1_01-1.2.s390x", "product_id": "xen-4.15.1_01-1.2.s390x" } }, { "category": "product_version", "name": "xen-devel-4.15.1_01-1.2.s390x", "product": { "name": "xen-devel-4.15.1_01-1.2.s390x", "product_id": "xen-devel-4.15.1_01-1.2.s390x" } }, { "category": "product_version", "name": "xen-doc-html-4.15.1_01-1.2.s390x", "product": { "name": "xen-doc-html-4.15.1_01-1.2.s390x", "product_id": "xen-doc-html-4.15.1_01-1.2.s390x" } }, { "category": "product_version", "name": "xen-libs-4.15.1_01-1.2.s390x", "product": { "name": "xen-libs-4.15.1_01-1.2.s390x", "product_id": "xen-libs-4.15.1_01-1.2.s390x" } }, { "category": "product_version", "name": "xen-libs-32bit-4.15.1_01-1.2.s390x", "product": { "name": "xen-libs-32bit-4.15.1_01-1.2.s390x", "product_id": "xen-libs-32bit-4.15.1_01-1.2.s390x" } }, { "category": "product_version", "name": "xen-tools-4.15.1_01-1.2.s390x", "product": { "name": "xen-tools-4.15.1_01-1.2.s390x", "product_id": "xen-tools-4.15.1_01-1.2.s390x" } }, { "category": "product_version", "name": "xen-tools-domU-4.15.1_01-1.2.s390x", "product": { "name": "xen-tools-domU-4.15.1_01-1.2.s390x", "product_id": "xen-tools-domU-4.15.1_01-1.2.s390x" } }, { "category": "product_version", "name": "xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "product": { "name": "xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "product_id": "xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "xen-4.15.1_01-1.2.x86_64", "product": { "name": "xen-4.15.1_01-1.2.x86_64", "product_id": "xen-4.15.1_01-1.2.x86_64" } }, { "category": "product_version", "name": "xen-devel-4.15.1_01-1.2.x86_64", "product": { "name": "xen-devel-4.15.1_01-1.2.x86_64", "product_id": "xen-devel-4.15.1_01-1.2.x86_64" } }, { "category": "product_version", "name": "xen-doc-html-4.15.1_01-1.2.x86_64", "product": { "name": "xen-doc-html-4.15.1_01-1.2.x86_64", "product_id": "xen-doc-html-4.15.1_01-1.2.x86_64" } }, { "category": "product_version", "name": "xen-libs-4.15.1_01-1.2.x86_64", "product": { "name": "xen-libs-4.15.1_01-1.2.x86_64", "product_id": "xen-libs-4.15.1_01-1.2.x86_64" } }, { "category": "product_version", "name": "xen-libs-32bit-4.15.1_01-1.2.x86_64", "product": { "name": "xen-libs-32bit-4.15.1_01-1.2.x86_64", "product_id": "xen-libs-32bit-4.15.1_01-1.2.x86_64" } }, { "category": "product_version", "name": "xen-tools-4.15.1_01-1.2.x86_64", "product": { "name": "xen-tools-4.15.1_01-1.2.x86_64", "product_id": "xen-tools-4.15.1_01-1.2.x86_64" } }, { "category": "product_version", "name": "xen-tools-domU-4.15.1_01-1.2.x86_64", "product": { "name": "xen-tools-domU-4.15.1_01-1.2.x86_64", "product_id": "xen-tools-domU-4.15.1_01-1.2.x86_64" } }, { "category": "product_version", "name": "xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64", "product": { "name": "xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64", "product_id": "xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "xen-4.15.1_01-1.2.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64" }, "product_reference": "xen-4.15.1_01-1.2.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "xen-4.15.1_01-1.2.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le" }, "product_reference": "xen-4.15.1_01-1.2.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "xen-4.15.1_01-1.2.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x" }, "product_reference": "xen-4.15.1_01-1.2.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "xen-4.15.1_01-1.2.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64" }, "product_reference": "xen-4.15.1_01-1.2.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "xen-devel-4.15.1_01-1.2.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64" }, "product_reference": "xen-devel-4.15.1_01-1.2.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "xen-devel-4.15.1_01-1.2.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le" }, "product_reference": "xen-devel-4.15.1_01-1.2.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "xen-devel-4.15.1_01-1.2.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x" }, "product_reference": "xen-devel-4.15.1_01-1.2.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "xen-devel-4.15.1_01-1.2.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64" }, "product_reference": "xen-devel-4.15.1_01-1.2.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "xen-doc-html-4.15.1_01-1.2.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64" }, "product_reference": "xen-doc-html-4.15.1_01-1.2.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "xen-doc-html-4.15.1_01-1.2.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le" }, "product_reference": "xen-doc-html-4.15.1_01-1.2.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "xen-doc-html-4.15.1_01-1.2.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x" }, "product_reference": "xen-doc-html-4.15.1_01-1.2.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "xen-doc-html-4.15.1_01-1.2.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64" }, "product_reference": "xen-doc-html-4.15.1_01-1.2.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.15.1_01-1.2.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64" }, "product_reference": "xen-libs-4.15.1_01-1.2.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.15.1_01-1.2.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le" }, "product_reference": "xen-libs-4.15.1_01-1.2.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.15.1_01-1.2.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x" }, "product_reference": "xen-libs-4.15.1_01-1.2.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.15.1_01-1.2.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64" }, "product_reference": "xen-libs-4.15.1_01-1.2.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-32bit-4.15.1_01-1.2.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64" }, "product_reference": "xen-libs-32bit-4.15.1_01-1.2.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-32bit-4.15.1_01-1.2.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le" }, "product_reference": "xen-libs-32bit-4.15.1_01-1.2.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-32bit-4.15.1_01-1.2.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x" }, "product_reference": "xen-libs-32bit-4.15.1_01-1.2.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-32bit-4.15.1_01-1.2.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64" }, "product_reference": "xen-libs-32bit-4.15.1_01-1.2.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.15.1_01-1.2.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64" }, "product_reference": "xen-tools-4.15.1_01-1.2.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.15.1_01-1.2.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le" }, "product_reference": "xen-tools-4.15.1_01-1.2.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.15.1_01-1.2.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x" }, "product_reference": "xen-tools-4.15.1_01-1.2.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.15.1_01-1.2.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64" }, "product_reference": "xen-tools-4.15.1_01-1.2.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.15.1_01-1.2.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64" }, "product_reference": "xen-tools-domU-4.15.1_01-1.2.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.15.1_01-1.2.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le" }, "product_reference": "xen-tools-domU-4.15.1_01-1.2.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.15.1_01-1.2.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x" }, "product_reference": "xen-tools-domU-4.15.1_01-1.2.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.15.1_01-1.2.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64" }, "product_reference": "xen-tools-domU-4.15.1_01-1.2.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64" }, "product_reference": "xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le" }, "product_reference": "xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x" }, "product_reference": "xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" }, "product_reference": "xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2007-1320", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2007-1320" } ], "notes": [ { "category": "general", "text": "Multiple heap-based buffer overflows in the cirrus_invalidate_region function in the Cirrus VGA extension in QEMU 0.8.2, as used in Xen and possibly other products, might allow local users to execute arbitrary code via unspecified vectors related to \"attempting to mark non-existent regions as dirty,\" aka the \"bitblt\" heap overflow.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2007-1320", "url": "https://www.suse.com/security/cve/CVE-2007-1320" }, { "category": "external", "summary": "SUSE Bug 252519 for CVE-2007-1320", "url": "https://bugzilla.suse.com/252519" }, { "category": "external", "summary": "SUSE Bug 270621 for CVE-2007-1320", "url": "https://bugzilla.suse.com/270621" }, { "category": "external", "summary": "SUSE Bug 435135 for CVE-2007-1320", "url": "https://bugzilla.suse.com/435135" }, { "category": "external", "summary": "SUSE Bug 448551 for CVE-2007-1320", "url": "https://bugzilla.suse.com/448551" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2007-1320" }, { "cve": "CVE-2007-1366", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2007-1366" } ], "notes": [ { "category": "general", "text": "QEMU 0.8.2 allows local users to crash a virtual machine via the divisor operand to the aam instruction, as demonstrated by \"aam 0x0,\" which triggers a divide-by-zero error.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2007-1366", "url": "https://www.suse.com/security/cve/CVE-2007-1366" }, { "category": "external", "summary": "SUSE Bug 252519 for CVE-2007-1366", "url": "https://bugzilla.suse.com/252519" }, { "category": "external", "summary": "SUSE Bug 270621 for CVE-2007-1366", "url": "https://bugzilla.suse.com/270621" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2007-1366" }, { "cve": "CVE-2007-3919", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2007-3919" } ], "notes": [ { "category": "general", "text": "(1) xenbaked and (2) xenmon.py in Xen 3.1 and earlier allow local users to truncate arbitrary files via a symlink attack on /tmp/xenq-shm.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2007-3919", "url": "https://www.suse.com/security/cve/CVE-2007-3919" }, { "category": "external", "summary": "SUSE Bug 334445 for CVE-2007-3919", "url": "https://bugzilla.suse.com/334445" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2007-3919" }, { "cve": "CVE-2016-10013", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-10013" } ], "notes": [ { "category": "general", "text": "Xen through 4.8.x allows local 64-bit x86 HVM guest OS users to gain privileges by leveraging mishandling of SYSCALL singlestep during emulation.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-10013", "url": "https://www.suse.com/security/cve/CVE-2016-10013" }, { "category": "external", "summary": "SUSE Bug 1016340 for CVE-2016-10013", "url": "https://bugzilla.suse.com/1016340" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-10013" }, { "cve": "CVE-2016-10024", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-10024" } ], "notes": [ { "category": "general", "text": "Xen through 4.8.x allows local x86 PV guest OS kernel administrators to cause a denial of service (host hang or crash) by modifying the instruction stream asynchronously while performing certain kernel operations.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-10024", "url": "https://www.suse.com/security/cve/CVE-2016-10024" }, { "category": "external", "summary": "SUSE Bug 1014298 for CVE-2016-10024", "url": "https://bugzilla.suse.com/1014298" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2016-10024", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-10024" }, { "cve": "CVE-2016-10025", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-10025" } ], "notes": [ { "category": "general", "text": "VMFUNC emulation in Xen 4.6.x through 4.8.x on x86 systems using AMD virtualization extensions (aka SVM) allows local HVM guest OS users to cause a denial of service (hypervisor crash) by leveraging a missing NULL pointer check.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-10025", "url": "https://www.suse.com/security/cve/CVE-2016-10025" }, { "category": "external", "summary": "SUSE Bug 1014300 for CVE-2016-10025", "url": "https://bugzilla.suse.com/1014300" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-10025" }, { "cve": "CVE-2016-7777", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-7777" } ], "notes": [ { "category": "general", "text": "Xen 4.7.x and earlier does not properly honor CR0.TS and CR0.EM, which allows local x86 HVM guest OS users to read or modify FPU, MMX, or XMM register state information belonging to arbitrary tasks on the guest by modifying an instruction while the hypervisor is preparing to emulate it.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-7777", "url": "https://www.suse.com/security/cve/CVE-2016-7777" }, { "category": "external", "summary": "SUSE Bug 1000106 for CVE-2016-7777", "url": "https://bugzilla.suse.com/1000106" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-7777" }, { "cve": "CVE-2016-7908", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-7908" } ], "notes": [ { "category": "general", "text": "The mcf_fec_do_tx function in hw/net/mcf_fec.c in QEMU (aka Quick Emulator) does not properly limit the buffer descriptor count when transmitting packets, which allows local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) via vectors involving a buffer descriptor with a length of 0 and crafted values in bd.flags.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-7908", "url": "https://www.suse.com/security/cve/CVE-2016-7908" }, { "category": "external", "summary": "SUSE Bug 1002550 for CVE-2016-7908", "url": "https://bugzilla.suse.com/1002550" }, { "category": "external", "summary": "SUSE Bug 1003030 for CVE-2016-7908", "url": "https://bugzilla.suse.com/1003030" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-7908" }, { "cve": "CVE-2016-7909", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-7909" } ], "notes": [ { "category": "general", "text": "The pcnet_rdra_addr function in hw/net/pcnet.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) by setting the (1) receive or (2) transmit descriptor ring length to 0.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-7909", "url": "https://www.suse.com/security/cve/CVE-2016-7909" }, { "category": "external", "summary": "SUSE Bug 1002557 for CVE-2016-7909", "url": "https://bugzilla.suse.com/1002557" }, { "category": "external", "summary": "SUSE Bug 1003032 for CVE-2016-7909", "url": "https://bugzilla.suse.com/1003032" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-7909" }, { "cve": "CVE-2016-8667", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-8667" } ], "notes": [ { "category": "general", "text": "The rc4030_write function in hw/dma/rc4030.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (divide-by-zero error and QEMU process crash) via a large interval timer reload value.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-8667", "url": "https://www.suse.com/security/cve/CVE-2016-8667" }, { "category": "external", "summary": "SUSE Bug 1004702 for CVE-2016-8667", "url": "https://bugzilla.suse.com/1004702" }, { "category": "external", "summary": "SUSE Bug 1005004 for CVE-2016-8667", "url": "https://bugzilla.suse.com/1005004" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-8667" }, { "cve": "CVE-2016-8669", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-8669" } ], "notes": [ { "category": "general", "text": "The serial_update_parameters function in hw/char/serial.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (divide-by-zero error and QEMU process crash) via vectors involving a value of divider greater than baud base.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-8669", "url": "https://www.suse.com/security/cve/CVE-2016-8669" }, { "category": "external", "summary": "SUSE Bug 1004707 for CVE-2016-8669", "url": "https://bugzilla.suse.com/1004707" }, { "category": "external", "summary": "SUSE Bug 1005005 for CVE-2016-8669", "url": "https://bugzilla.suse.com/1005005" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-8669" }, { "cve": "CVE-2016-8910", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-8910" } ], "notes": [ { "category": "general", "text": "The rtl8139_cplus_transmit function in hw/net/rtl8139.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (infinite loop and CPU consumption) by leveraging failure to limit the ring descriptor count.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-8910", "url": "https://www.suse.com/security/cve/CVE-2016-8910" }, { "category": "external", "summary": "SUSE Bug 1006538 for CVE-2016-8910", "url": "https://bugzilla.suse.com/1006538" }, { "category": "external", "summary": "SUSE Bug 1007157 for CVE-2016-8910", "url": "https://bugzilla.suse.com/1007157" }, { "category": "external", "summary": "SUSE Bug 1024178 for CVE-2016-8910", "url": "https://bugzilla.suse.com/1024178" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2016-8910" }, { "cve": "CVE-2016-9377", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-9377" } ], "notes": [ { "category": "general", "text": "Xen 4.5.x through 4.7.x on AMD systems without the NRip feature, when emulating instructions that generate software interrupts, allows local HVM guest OS users to cause a denial of service (guest crash) by leveraging IDT entry miscalculation.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-9377", "url": "https://www.suse.com/security/cve/CVE-2016-9377" }, { "category": "external", "summary": "SUSE Bug 1009108 for CVE-2016-9377", "url": "https://bugzilla.suse.com/1009108" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-9377" }, { "cve": "CVE-2016-9379", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-9379" } ], "notes": [ { "category": "general", "text": "The pygrub boot loader emulator in Xen, when S-expression output format is requested, allows local pygrub-using guest OS administrators to read or delete arbitrary files on the host via string quotes and S-expressions in the bootloader configuration file.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-9379", "url": "https://www.suse.com/security/cve/CVE-2016-9379" }, { "category": "external", "summary": "SUSE Bug 1009111 for CVE-2016-9379", "url": "https://bugzilla.suse.com/1009111" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.9, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-9379" }, { "cve": "CVE-2016-9381", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-9381" } ], "notes": [ { "category": "general", "text": "Race condition in QEMU in Xen allows local x86 HVM guest OS administrators to gain privileges by changing certain data on shared rings, aka a \"double fetch\" vulnerability.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-9381", "url": "https://www.suse.com/security/cve/CVE-2016-9381" }, { "category": "external", "summary": "SUSE Bug 1009109 for CVE-2016-9381", "url": "https://bugzilla.suse.com/1009109" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2016-9381" }, { "cve": "CVE-2016-9382", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-9382" } ], "notes": [ { "category": "general", "text": "Xen 4.0.x through 4.7.x mishandle x86 task switches to VM86 mode, which allows local 32-bit x86 HVM guest OS users to gain privileges or cause a denial of service (guest OS crash) by leveraging a guest operating system that uses hardware task switching and allows a new task to start in VM86 mode.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-9382", "url": "https://www.suse.com/security/cve/CVE-2016-9382" }, { "category": "external", "summary": "SUSE Bug 1009103 for CVE-2016-9382", "url": "https://bugzilla.suse.com/1009103" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-9382" }, { "cve": "CVE-2016-9383", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-9383" } ], "notes": [ { "category": "general", "text": "Xen, when running on a 64-bit hypervisor, allows local x86 guest OS users to modify arbitrary memory and consequently obtain sensitive information, cause a denial of service (host crash), or execute arbitrary code on the host by leveraging broken emulation of bit test instructions.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-9383", "url": "https://www.suse.com/security/cve/CVE-2016-9383" }, { "category": "external", "summary": "SUSE Bug 1009107 for CVE-2016-9383", "url": "https://bugzilla.suse.com/1009107" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-9383" }, { "cve": "CVE-2016-9384", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-9384" } ], "notes": [ { "category": "general", "text": "Xen 4.7 allows local guest OS users to obtain sensitive host information by loading a 32-bit ELF symbol table.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-9384", "url": "https://www.suse.com/security/cve/CVE-2016-9384" }, { "category": "external", "summary": "SUSE Bug 1009105 for CVE-2016-9384", "url": "https://bugzilla.suse.com/1009105" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2016-9384" }, { "cve": "CVE-2016-9385", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-9385" } ], "notes": [ { "category": "general", "text": "The x86 segment base write emulation functionality in Xen 4.4.x through 4.7.x allows local x86 PV guest OS administrators to cause a denial of service (host crash) by leveraging lack of canonical address checks.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-9385", "url": "https://www.suse.com/security/cve/CVE-2016-9385" }, { "category": "external", "summary": "SUSE Bug 1009104 for CVE-2016-9385", "url": "https://bugzilla.suse.com/1009104" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-9385" }, { "cve": "CVE-2016-9386", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-9386" } ], "notes": [ { "category": "general", "text": "The x86 emulator in Xen does not properly treat x86 NULL segments as unusable when accessing memory, which might allow local HVM guest users to gain privileges via vectors involving \"unexpected\" base/limit values.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-9386", "url": "https://www.suse.com/security/cve/CVE-2016-9386" }, { "category": "external", "summary": "SUSE Bug 1009100 for CVE-2016-9386", "url": "https://bugzilla.suse.com/1009100" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-9386" }, { "cve": "CVE-2016-9637", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-9637" } ], "notes": [ { "category": "general", "text": "The (1) ioport_read and (2) ioport_write functions in Xen, when qemu is used as a device model within Xen, might allow local x86 HVM guest OS administrators to gain qemu process privileges via vectors involving an out-of-range ioport access.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-9637", "url": "https://www.suse.com/security/cve/CVE-2016-9637" }, { "category": "external", "summary": "SUSE Bug 1011652 for CVE-2016-9637", "url": "https://bugzilla.suse.com/1011652" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-9637" }, { "cve": "CVE-2016-9921", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-9921" } ], "notes": [ { "category": "general", "text": "Quick emulator (Qemu) built with the Cirrus CLGD 54xx VGA Emulator support is vulnerable to a divide by zero issue. It could occur while copying VGA data when cirrus graphics mode was set to be VGA. A privileged user inside guest could use this flaw to crash the Qemu process instance on the host, resulting in DoS.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-9921", "url": "https://www.suse.com/security/cve/CVE-2016-9921" }, { "category": "external", "summary": "SUSE Bug 1014702 for CVE-2016-9921", "url": "https://bugzilla.suse.com/1014702" }, { "category": "external", "summary": "SUSE Bug 1015169 for CVE-2016-9921", "url": "https://bugzilla.suse.com/1015169" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2016-9921", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2016-9921" }, { "cve": "CVE-2016-9932", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-9932" } ], "notes": [ { "category": "general", "text": "CMPXCHG8B emulation in Xen 3.3.x through 4.7.x on x86 systems allows local HVM guest OS users to obtain sensitive information from host stack memory via a \"supposedly-ignored\" operand size prefix.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-9932", "url": "https://www.suse.com/security/cve/CVE-2016-9932" }, { "category": "external", "summary": "SUSE Bug 1012651 for CVE-2016-9932", "url": "https://bugzilla.suse.com/1012651" }, { "category": "external", "summary": "SUSE Bug 1016340 for CVE-2016-9932", "url": "https://bugzilla.suse.com/1016340" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2016-9932" }, { "cve": "CVE-2017-12135", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-12135" } ], "notes": [ { "category": "general", "text": "Xen allows local OS guest users to cause a denial of service (crash) or possibly obtain sensitive information or gain privileges via vectors involving transitive grants.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-12135", "url": "https://www.suse.com/security/cve/CVE-2017-12135" }, { "category": "external", "summary": "SUSE Bug 1051787 for CVE-2017-12135", "url": "https://bugzilla.suse.com/1051787" }, { "category": "external", "summary": "SUSE Bug 1169392 for CVE-2017-12135", "url": "https://bugzilla.suse.com/1169392" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2017-12135", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2017-12135" }, { "cve": "CVE-2017-12136", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-12136" } ], "notes": [ { "category": "general", "text": "Race condition in the grant table code in Xen 4.6.x through 4.9.x allows local guest OS administrators to cause a denial of service (free list corruption and host crash) or gain privileges on the host via vectors involving maptrack free list handling.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-12136", "url": "https://www.suse.com/security/cve/CVE-2017-12136" }, { "category": "external", "summary": "SUSE Bug 1051789 for CVE-2017-12136", "url": "https://bugzilla.suse.com/1051789" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2017-12136" }, { "cve": "CVE-2017-12137", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-12137" } ], "notes": [ { "category": "general", "text": "arch/x86/mm.c in Xen allows local PV guest OS users to gain host OS privileges via vectors related to map_grant_ref.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-12137", "url": "https://www.suse.com/security/cve/CVE-2017-12137" }, { "category": "external", "summary": "SUSE Bug 1051788 for CVE-2017-12137", "url": "https://bugzilla.suse.com/1051788" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2017-12137", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2017-12137" }, { "cve": "CVE-2017-2615", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-2615" } ], "notes": [ { "category": "general", "text": "Quick emulator (QEMU) built with the Cirrus CLGD 54xx VGA emulator support is vulnerable to an out-of-bounds access issue. It could occur while copying VGA data via bitblt copy in backward mode. A privileged user inside a guest could use this flaw to crash the QEMU process resulting in DoS or potentially execute arbitrary code on the host with privileges of QEMU process on the host.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-2615", "url": "https://www.suse.com/security/cve/CVE-2017-2615" }, { "category": "external", "summary": "SUSE Bug 1023004 for CVE-2017-2615", "url": "https://bugzilla.suse.com/1023004" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2017-2615", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-2615" }, { "cve": "CVE-2017-2620", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-2620" } ], "notes": [ { "category": "general", "text": "Quick emulator (QEMU) before 2.8 built with the Cirrus CLGD 54xx VGA Emulator support is vulnerable to an out-of-bounds access issue. The issue could occur while copying VGA data in cirrus_bitblt_cputovideo. A privileged user inside guest could use this flaw to crash the QEMU process OR potentially execute arbitrary code on host with privileges of the QEMU process.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-2620", "url": "https://www.suse.com/security/cve/CVE-2017-2620" }, { "category": "external", "summary": "SUSE Bug 1024834 for CVE-2017-2620", "url": "https://bugzilla.suse.com/1024834" }, { "category": "external", "summary": "SUSE Bug 1024972 for CVE-2017-2620", "url": "https://bugzilla.suse.com/1024972" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2017-2620", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.9, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-2620" }, { "cve": "CVE-2017-5753", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-5753" } ], "notes": [ { "category": "general", "text": "Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-5753", "url": "https://www.suse.com/security/cve/CVE-2017-5753" }, { "category": "external", "summary": "SUSE Bug 1068032 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1068032" }, { "category": "external", "summary": "SUSE Bug 1074562 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1074562" }, { "category": "external", "summary": "SUSE Bug 1074578 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1074578" }, { "category": "external", "summary": "SUSE Bug 1074701 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1074701" }, { "category": "external", "summary": "SUSE Bug 1075006 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1075006" }, { "category": "external", "summary": "SUSE Bug 1075419 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1075419" }, { "category": "external", "summary": "SUSE Bug 1075748 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1075748" }, { "category": "external", "summary": "SUSE Bug 1080039 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1080039" }, { "category": "external", "summary": "SUSE Bug 1087084 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1087084" }, { "category": "external", "summary": "SUSE Bug 1087939 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1087939" }, { "category": "external", "summary": "SUSE Bug 1089055 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1089055" }, { "category": "external", "summary": "SUSE Bug 1136865 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1136865" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1201877" }, { "category": "external", "summary": "SUSE Bug 1209547 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1209547" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2017-5753" }, { "cve": "CVE-2017-6505", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-6505" } ], "notes": [ { "category": "general", "text": "The ohci_service_ed_list function in hw/usb/hcd-ohci.c in QEMU (aka Quick Emulator) before 2.9.0 allows local guest OS users to cause a denial of service (infinite loop) via vectors involving the number of link endpoint list descriptors, a different vulnerability than CVE-2017-9330.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-6505", "url": "https://www.suse.com/security/cve/CVE-2017-6505" }, { "category": "external", "summary": "SUSE Bug 1028184 for CVE-2017-6505", "url": "https://bugzilla.suse.com/1028184" }, { "category": "external", "summary": "SUSE Bug 1028235 for CVE-2017-6505", "url": "https://bugzilla.suse.com/1028235" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2017-6505", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2017-6505" }, { "cve": "CVE-2017-8309", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-8309" } ], "notes": [ { "category": "general", "text": "Memory leak in the audio/audio.c in QEMU (aka Quick Emulator) allows remote attackers to cause a denial of service (memory consumption) by repeatedly starting and stopping audio capture.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-8309", "url": "https://www.suse.com/security/cve/CVE-2017-8309" }, { "category": "external", "summary": "SUSE Bug 1037242 for CVE-2017-8309", "url": "https://bugzilla.suse.com/1037242" }, { "category": "external", "summary": "SUSE Bug 1037243 for CVE-2017-8309", "url": "https://bugzilla.suse.com/1037243" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2017-8309", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2017-8309" }, { "cve": "CVE-2017-9330", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-9330" } ], "notes": [ { "category": "general", "text": "QEMU (aka Quick Emulator) before 2.9.0, when built with the USB OHCI Emulation support, allows local guest OS users to cause a denial of service (infinite loop) by leveraging an incorrect return value, a different vulnerability than CVE-2017-6505.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-9330", "url": "https://www.suse.com/security/cve/CVE-2017-9330" }, { "category": "external", "summary": "SUSE Bug 1042159 for CVE-2017-9330", "url": "https://bugzilla.suse.com/1042159" }, { "category": "external", "summary": "SUSE Bug 1042160 for CVE-2017-9330", "url": "https://bugzilla.suse.com/1042160" }, { "category": "external", "summary": "SUSE Bug 1043157 for CVE-2017-9330", "url": "https://bugzilla.suse.com/1043157" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2017-9330", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.8, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2017-9330" }, { "cve": "CVE-2018-10471", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10471" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.10.x allowing x86 PV guest OS users to cause a denial of service (out-of-bounds zero write and hypervisor crash) via unexpected INT 80 processing, because of an incorrect fix for CVE-2017-5754.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10471", "url": "https://www.suse.com/security/cve/CVE-2018-10471" }, { "category": "external", "summary": "SUSE Bug 1089635 for CVE-2018-10471", "url": "https://bugzilla.suse.com/1089635" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-10471", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-10471" }, { "cve": "CVE-2018-10472", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10472" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.10.x allowing x86 HVM guest OS users (in certain configurations) to read arbitrary dom0 files via QMP live insertion of a CDROM, in conjunction with specifying the target file as the backing file of a snapshot.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10472", "url": "https://www.suse.com/security/cve/CVE-2018-10472" }, { "category": "external", "summary": "SUSE Bug 1089152 for CVE-2018-10472", "url": "https://bugzilla.suse.com/1089152" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-10472" }, { "cve": "CVE-2018-10981", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10981" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.10.x allowing x86 HVM guest OS users to cause a denial of service (host OS infinite loop) in situations where a QEMU device model attempts to make invalid transitions between states of a request.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10981", "url": "https://www.suse.com/security/cve/CVE-2018-10981" }, { "category": "external", "summary": "SUSE Bug 1090823 for CVE-2018-10981", "url": "https://bugzilla.suse.com/1090823" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-10981", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-10981" }, { "cve": "CVE-2018-10982", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10982" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.10.x allowing x86 HVM guest OS users to cause a denial of service (unexpectedly high interrupt number, array overrun, and hypervisor crash) or possibly gain hypervisor privileges by setting up an HPET timer to deliver interrupts in IO-APIC mode, aka vHPET interrupt injection.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10982", "url": "https://www.suse.com/security/cve/CVE-2018-10982" }, { "category": "external", "summary": "SUSE Bug 1090822 for CVE-2018-10982", "url": "https://bugzilla.suse.com/1090822" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-10982", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2018-10982" }, { "cve": "CVE-2018-12126", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-12126" } ], "notes": [ { "category": "general", "text": "Microarchitectural Store Buffer Data Sampling (MSBDS): Store buffers on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-12126", "url": "https://www.suse.com/security/cve/CVE-2018-12126" }, { "category": "external", "summary": "SUSE Bug 1103186 for CVE-2018-12126", "url": "https://bugzilla.suse.com/1103186" }, { "category": "external", "summary": "SUSE Bug 1111331 for CVE-2018-12126", "url": "https://bugzilla.suse.com/1111331" }, { "category": "external", "summary": "SUSE Bug 1132686 for CVE-2018-12126", "url": "https://bugzilla.suse.com/1132686" }, { "category": "external", "summary": "SUSE Bug 1135409 for CVE-2018-12126", "url": "https://bugzilla.suse.com/1135409" }, { "category": "external", "summary": "SUSE Bug 1135524 for CVE-2018-12126", "url": "https://bugzilla.suse.com/1135524" }, { "category": "external", "summary": "SUSE Bug 1137916 for CVE-2018-12126", "url": "https://bugzilla.suse.com/1137916" }, { "category": "external", "summary": "SUSE Bug 1138534 for CVE-2018-12126", "url": "https://bugzilla.suse.com/1138534" }, { "category": "external", "summary": "SUSE Bug 1141977 for CVE-2018-12126", "url": "https://bugzilla.suse.com/1141977" }, { "category": "external", "summary": "SUSE Bug 1149725 for CVE-2018-12126", "url": "https://bugzilla.suse.com/1149725" }, { "category": "external", "summary": "SUSE Bug 1149726 for CVE-2018-12126", "url": "https://bugzilla.suse.com/1149726" }, { "category": "external", "summary": "SUSE Bug 1149729 for CVE-2018-12126", "url": "https://bugzilla.suse.com/1149729" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-12126", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2018-12126", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.8, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-12126" }, { "cve": "CVE-2018-12891", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-12891" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.10.x. Certain PV MMU operations may take a long time to process. For that reason Xen explicitly checks for the need to preempt the current vCPU at certain points. A few rarely taken code paths did bypass such checks. By suitably enforcing the conditions through its own page table contents, a malicious guest may cause such bypasses to be used for an unbounded number of iterations. A malicious or buggy PV guest may cause a Denial of Service (DoS) affecting the entire host. Specifically, it may prevent use of a physical CPU for an indeterminate period of time. All Xen versions from 3.4 onwards are vulnerable. Xen versions 3.3 and earlier are vulnerable to an even wider class of attacks, due to them lacking preemption checks altogether in the affected code paths. Only x86 systems are affected. ARM systems are not affected. Only multi-vCPU x86 PV guests can leverage the vulnerability. x86 HVM or PVH guests as well as x86 single-vCPU PV ones cannot leverage the vulnerability.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-12891", "url": "https://www.suse.com/security/cve/CVE-2018-12891" }, { "category": "external", "summary": "SUSE Bug 1097521 for CVE-2018-12891", "url": "https://bugzilla.suse.com/1097521" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-12891", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.5, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2018-12891" }, { "cve": "CVE-2018-12892", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-12892" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen 4.7 through 4.10.x. libxl fails to pass the readonly flag to qemu when setting up a SCSI disk, due to what was probably an erroneous merge conflict resolution. Malicious guest administrators or (in some situations) users may be able to write to supposedly read-only disk images. Only emulated SCSI disks (specified as \"sd\" in the libxl disk configuration, or an equivalent) are affected. IDE disks (\"hd\") are not affected (because attempts to make them readonly are rejected). Additionally, CDROM devices (that is, devices specified to be presented to the guest as CDROMs, regardless of the nature of the backing storage on the host) are not affected; they are always read only. Only systems using qemu-xen (rather than qemu-xen-traditional) as the device model version are vulnerable. Only systems using libxl or libxl-based toolstacks are vulnerable. (This includes xl, and libvirt with the libxl driver.) The vulnerability is present in Xen versions 4.7 and later. (In earlier versions, provided that the patch for XSA-142 has been applied, attempts to create read only disks are rejected.) If the host and guest together usually support PVHVM, the issue is exploitable only if the malicious guest administrator has control of the guest kernel or guest kernel command line.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-12892", "url": "https://www.suse.com/security/cve/CVE-2018-12892" }, { "category": "external", "summary": "SUSE Bug 1097523 for CVE-2018-12892", "url": "https://bugzilla.suse.com/1097523" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2018-12892" }, { "cve": "CVE-2018-12893", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-12893" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.10.x. One of the fixes in XSA-260 added some safety checks to help prevent Xen livelocking with debug exceptions. Unfortunately, due to an oversight, at least one of these safety checks can be triggered by a guest. A malicious PV guest can crash Xen, leading to a Denial of Service. All Xen systems which have applied the XSA-260 fix are vulnerable. Only x86 systems are vulnerable. ARM systems are not vulnerable. Only x86 PV guests can exploit the vulnerability. x86 HVM and PVH guests cannot exploit the vulnerability. An attacker needs to be able to control hardware debugging facilities to exploit the vulnerability, but such permissions are typically available to unprivileged users.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-12893", "url": "https://www.suse.com/security/cve/CVE-2018-12893" }, { "category": "external", "summary": "SUSE Bug 1097522 for CVE-2018-12893", "url": "https://bugzilla.suse.com/1097522" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-12893", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2018-12893" }, { "cve": "CVE-2018-15468", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-15468" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.11.x. The DEBUGCTL MSR contains several debugging features, some of which virtualise cleanly, but some do not. In particular, Branch Trace Store is not virtualised by the processor, and software has to be careful to configure it suitably not to lock up the core. As a result, it must only be available to fully trusted guests. Unfortunately, in the case that vPMU is disabled, all value checking was skipped, allowing the guest to choose any MSR_DEBUGCTL setting it likes. A malicious or buggy guest administrator (on Intel x86 HVM or PVH) can lock up the entire host, causing a Denial of Service.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-15468", "url": "https://www.suse.com/security/cve/CVE-2018-15468" }, { "category": "external", "summary": "SUSE Bug 1103276 for CVE-2018-15468", "url": "https://bugzilla.suse.com/1103276" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-15468" }, { "cve": "CVE-2018-15469", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-15469" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.11.x. ARM never properly implemented grant table v2, either in the hypervisor or in Linux. Unfortunately, an ARM guest can still request v2 grant tables; they will simply not be properly set up, resulting in subsequent grant-related hypercalls hitting BUG() checks. An unprivileged guest can cause a BUG() check in the hypervisor, resulting in a denial-of-service (crash).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-15469", "url": "https://www.suse.com/security/cve/CVE-2018-15469" }, { "category": "external", "summary": "SUSE Bug 1103275 for CVE-2018-15469", "url": "https://bugzilla.suse.com/1103275" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-15469" }, { "cve": "CVE-2018-15470", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-15470" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.11.x. The logic in oxenstored for handling writes depended on the order of evaluation of expressions making up a tuple. As indicated in section 7.7.3 \"Operations on data structures\" of the OCaml manual, the order of evaluation of subexpressions is not specified. In practice, different implementations behave differently. Thus, oxenstored may not enforce the configured quota-maxentity. This allows a malicious or buggy guest to write as many xenstore entries as it wishes, causing unbounded memory usage in oxenstored. This can lead to a system-wide DoS.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-15470", "url": "https://www.suse.com/security/cve/CVE-2018-15470" }, { "category": "external", "summary": "SUSE Bug 1103279 for CVE-2018-15470", "url": "https://bugzilla.suse.com/1103279" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-15470" }, { "cve": "CVE-2018-18883", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-18883" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen 4.9.x through 4.11.x, on Intel x86 platforms, allowing x86 HVM and PVH guests to cause a host OS denial of service (NULL pointer dereference) or possibly have unspecified other impact because nested VT-x is not properly restricted.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-18883", "url": "https://www.suse.com/security/cve/CVE-2018-18883" }, { "category": "external", "summary": "SUSE Bug 1114405 for CVE-2018-18883", "url": "https://bugzilla.suse.com/1114405" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-18883" }, { "cve": "CVE-2018-19961", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-19961" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.11.x on AMD x86 platforms, possibly allowing guest OS users to gain host OS privileges because TLB flushes do not always occur after IOMMU mapping changes.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-19961", "url": "https://www.suse.com/security/cve/CVE-2018-19961" }, { "category": "external", "summary": "SUSE Bug 1115040 for CVE-2018-19961", "url": "https://bugzilla.suse.com/1115040" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-19961", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2018-19961" }, { "cve": "CVE-2018-19963", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-19963" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen 4.11 allowing HVM guest OS users to cause a denial of service (host OS crash) or possibly gain host OS privileges because x86 IOREQ server resource accounting (for external emulators) was mishandled.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-19963", "url": "https://www.suse.com/security/cve/CVE-2018-19963" }, { "category": "external", "summary": "SUSE Bug 1115043 for CVE-2018-19963", "url": "https://bugzilla.suse.com/1115043" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2018-19963" }, { "cve": "CVE-2018-19964", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-19964" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen 4.11.x allowing x86 guest OS users to cause a denial of service (host OS hang) because the p2m lock remains unavailable indefinitely in certain error conditions.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-19964", "url": "https://www.suse.com/security/cve/CVE-2018-19964" }, { "category": "external", "summary": "SUSE Bug 1115044 for CVE-2018-19964", "url": "https://bugzilla.suse.com/1115044" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-19964" }, { "cve": "CVE-2018-19965", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-19965" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.11.x allowing 64-bit PV guest OS users to cause a denial of service (host OS crash) because #GP[0] can occur after a non-canonical address is passed to the TLB flushing code. NOTE: this issue exists because of an incorrect CVE-2017-5754 (aka Meltdown) mitigation.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-19965", "url": "https://www.suse.com/security/cve/CVE-2018-19965" }, { "category": "external", "summary": "SUSE Bug 1115045 for CVE-2018-19965", "url": "https://bugzilla.suse.com/1115045" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-19965" }, { "cve": "CVE-2018-19966", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-19966" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.11.x allowing x86 PV guest OS users to cause a denial of service (host OS crash) or possibly gain host OS privileges because of an interpretation conflict for a union data structure associated with shadow paging. NOTE: this issue exists because of an incorrect fix for CVE-2017-15595.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-19966", "url": "https://www.suse.com/security/cve/CVE-2018-19966" }, { "category": "external", "summary": "SUSE Bug 1115047 for CVE-2018-19966", "url": "https://bugzilla.suse.com/1115047" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-19966", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-19966" }, { "cve": "CVE-2018-19967", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-19967" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.11.x on Intel x86 platforms allowing guest OS users to cause a denial of service (host OS hang) because Xen does not work around Intel\u0027s mishandling of certain HLE transactions associated with the KACQUIRE instruction prefix.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-19967", "url": "https://www.suse.com/security/cve/CVE-2018-19967" }, { "category": "external", "summary": "SUSE Bug 1114988 for CVE-2018-19967", "url": "https://bugzilla.suse.com/1114988" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-19967", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-19967" }, { "cve": "CVE-2018-3639", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3639" } ], "notes": [ { "category": "general", "text": "Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3639", "url": "https://www.suse.com/security/cve/CVE-2018-3639" }, { "category": "external", "summary": "SUSE Bug 1074701 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1074701" }, { "category": "external", "summary": "SUSE Bug 1085235 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1085235" }, { "category": "external", "summary": "SUSE Bug 1085308 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1085308" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1092631 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1092631" }, { "category": "external", "summary": "SUSE Bug 1092885 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1092885" }, { "category": "external", "summary": "SUSE Bug 1094912 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1094912" }, { "category": "external", "summary": "SUSE Bug 1098813 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1098813" }, { "category": "external", "summary": "SUSE Bug 1100394 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1100394" }, { "category": "external", "summary": "SUSE Bug 1102640 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1102640" }, { "category": "external", "summary": "SUSE Bug 1105412 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1105412" }, { "category": "external", "summary": "SUSE Bug 1111963 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1111963" }, { "category": "external", "summary": "SUSE Bug 1172781 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1172781" }, { "category": "external", "summary": "SUSE Bug 1172782 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1172782" }, { "category": "external", "summary": "SUSE Bug 1172783 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1172783" }, { "category": "external", "summary": "SUSE Bug 1173489 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1173489" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1201877" }, { "category": "external", "summary": "SUSE Bug 1215674 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1215674" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-3639" }, { "cve": "CVE-2018-3646", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3646" } ], "notes": [ { "category": "general", "text": "Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access with guest OS privilege via a terminal page fault and a side-channel analysis.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3646", "url": "https://www.suse.com/security/cve/CVE-2018-3646" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087081 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1087081" }, { "category": "external", "summary": "SUSE Bug 1089343 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1089343" }, { "category": "external", "summary": "SUSE Bug 1091107 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1091107" }, { "category": "external", "summary": "SUSE Bug 1099306 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1099306" }, { "category": "external", "summary": "SUSE Bug 1104365 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1104365" }, { "category": "external", "summary": "SUSE Bug 1104894 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1104894" }, { "category": "external", "summary": "SUSE Bug 1106548 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1106548" }, { "category": "external", "summary": "SUSE Bug 1113534 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1113534" }, { "category": "external", "summary": "SUSE Bug 1136865 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1136865" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2018-3646" }, { "cve": "CVE-2018-3665", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3665" } ], "notes": [ { "category": "general", "text": "System software utilizing Lazy FP state restore technique on systems using Intel Core-based microprocessors may potentially allow a local process to infer data from another process through a speculative execution side channel.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3665", "url": "https://www.suse.com/security/cve/CVE-2018-3665" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-3665", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-3665", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1087086 for CVE-2018-3665", "url": "https://bugzilla.suse.com/1087086" }, { "category": "external", "summary": "SUSE Bug 1090338 for CVE-2018-3665", "url": "https://bugzilla.suse.com/1090338" }, { "category": "external", "summary": "SUSE Bug 1095241 for CVE-2018-3665", "url": "https://bugzilla.suse.com/1095241" }, { "category": "external", "summary": "SUSE Bug 1095242 for CVE-2018-3665", "url": "https://bugzilla.suse.com/1095242" }, { "category": "external", "summary": "SUSE Bug 1096740 for CVE-2018-3665", "url": "https://bugzilla.suse.com/1096740" }, { "category": "external", "summary": "SUSE Bug 1100091 for CVE-2018-3665", "url": "https://bugzilla.suse.com/1100091" }, { "category": "external", "summary": "SUSE Bug 1100555 for CVE-2018-3665", "url": "https://bugzilla.suse.com/1100555" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-3665", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-3665" }, { "cve": "CVE-2018-5244", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-5244" } ], "notes": [ { "category": "general", "text": "In Xen 4.10, new infrastructure was introduced as part of an overhaul to how MSR emulation happens for guests. Unfortunately, one tracking structure isn\u0027t freed when a vcpu is destroyed. This allows guest OS administrators to cause a denial of service (host OS memory consumption) by rebooting many times.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-5244", "url": "https://www.suse.com/security/cve/CVE-2018-5244" }, { "category": "external", "summary": "SUSE Bug 1073961 for CVE-2018-5244", "url": "https://bugzilla.suse.com/1073961" }, { "category": "external", "summary": "SUSE Bug 1074966 for CVE-2018-5244", "url": "https://bugzilla.suse.com/1074966" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2018-5244" }, { "cve": "CVE-2018-7540", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-7540" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.10.x allowing x86 PV guest OS users to cause a denial of service (host OS CPU hang) via non-preemptable L3/L4 pagetable freeing.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-7540", "url": "https://www.suse.com/security/cve/CVE-2018-7540" }, { "category": "external", "summary": "SUSE Bug 1080635 for CVE-2018-7540", "url": "https://bugzilla.suse.com/1080635" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-7540", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-7540" }, { "cve": "CVE-2018-7541", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-7541" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.10.x allowing guest OS users to cause a denial of service (hypervisor crash) or gain privileges by triggering a grant-table transition from v2 to v1.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-7541", "url": "https://www.suse.com/security/cve/CVE-2018-7541" }, { "category": "external", "summary": "SUSE Bug 1080662 for CVE-2018-7541", "url": "https://bugzilla.suse.com/1080662" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-7541", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2018-7541" }, { "cve": "CVE-2018-7542", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-7542" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen 4.8.x through 4.10.x allowing x86 PVH guest OS users to cause a denial of service (NULL pointer dereference and hypervisor crash) by leveraging the mishandling of configurations that lack a Local APIC.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-7542", "url": "https://www.suse.com/security/cve/CVE-2018-7542" }, { "category": "external", "summary": "SUSE Bug 1080634 for CVE-2018-7542", "url": "https://bugzilla.suse.com/1080634" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2018-7542" }, { "cve": "CVE-2018-8897", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8897" } ], "notes": [ { "category": "general", "text": "A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer\u0027s Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL \u003c 3, the debug exception is delivered after the transfer to CPL \u003c 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8897", "url": "https://www.suse.com/security/cve/CVE-2018-8897" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087088 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1087088" }, { "category": "external", "summary": "SUSE Bug 1090368 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090368" }, { "category": "external", "summary": "SUSE Bug 1090820 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090820" }, { "category": "external", "summary": "SUSE Bug 1090869 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090869" }, { "category": "external", "summary": "SUSE Bug 1092497 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1092497" }, { "category": "external", "summary": "SUSE Bug 1093522 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1093522" }, { "category": "external", "summary": "SUSE Bug 1093524 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1093524" }, { "category": "external", "summary": "SUSE Bug 1098813 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1098813" }, { "category": "external", "summary": "SUSE Bug 1100835 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1100835" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2018-8897" }, { "cve": "CVE-2019-17349", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-17349" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.12.x allowing Arm domU attackers to cause a denial of service (infinite loop) involving a LoadExcl or StoreExcl operation.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-17349", "url": "https://www.suse.com/security/cve/CVE-2019-17349" }, { "category": "external", "summary": "SUSE Bug 1138294 for CVE-2019-17349", "url": "https://bugzilla.suse.com/1138294" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-17349" }, { "cve": "CVE-2020-0543", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-0543" } ], "notes": [ { "category": "general", "text": "Incomplete cleanup from specific special register read operations in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-0543", "url": "https://www.suse.com/security/cve/CVE-2020-0543" }, { "category": "external", "summary": "SUSE Bug 1154824 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1154824" }, { "category": "external", "summary": "SUSE Bug 1172205 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172205" }, { "category": "external", "summary": "SUSE Bug 1172206 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172206" }, { "category": "external", "summary": "SUSE Bug 1172207 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172207" }, { "category": "external", "summary": "SUSE Bug 1172770 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172770" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-0543" }, { "cve": "CVE-2020-11739", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-11739" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.13.x, allowing guest OS users to cause a denial of service or possibly gain privileges because of missing memory barriers in read-write unlock paths. The read-write unlock paths don\u0027t contain a memory barrier. On Arm, this means a processor is allowed to re-order the memory access with the preceding ones. In other words, the unlock may be seen by another processor before all the memory accesses within the \"critical\" section. As a consequence, it may be possible to have a writer executing a critical section at the same time as readers or another writer. In other words, many of the assumptions (e.g., a variable cannot be modified after a check) in the critical sections are not safe anymore. The read-write locks are used in hypercalls (such as grant-table ones), so a malicious guest could exploit the race. For instance, there is a small window where Xen can leak memory if XENMAPSPACE_grant_table is used concurrently. A malicious guest may be able to leak memory, or cause a hypervisor crash resulting in a Denial of Service (DoS). Information leak and privilege escalation cannot be excluded.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-11739", "url": "https://www.suse.com/security/cve/CVE-2020-11739" }, { "category": "external", "summary": "SUSE Bug 1168142 for CVE-2020-11739", "url": "https://bugzilla.suse.com/1168142" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-11739" }, { "cve": "CVE-2020-11740", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-11740" } ], "notes": [ { "category": "general", "text": "An issue was discovered in xenoprof in Xen through 4.13.x, allowing guest OS users (without active profiling) to obtain sensitive information about other guests. Unprivileged guests can request to map xenoprof buffers, even if profiling has not been enabled for those guests. These buffers were not scrubbed.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-11740", "url": "https://www.suse.com/security/cve/CVE-2020-11740" }, { "category": "external", "summary": "SUSE Bug 1168140 for CVE-2020-11740", "url": "https://bugzilla.suse.com/1168140" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2020-11740", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-11740" }, { "cve": "CVE-2020-11742", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-11742" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.13.x, allowing guest OS users to cause a denial of service because of bad continuation handling in GNTTABOP_copy. Grant table operations are expected to return 0 for success, and a negative number for errors. The fix for CVE-2017-12135 introduced a path through grant copy handling where success may be returned to the caller without any action taken. In particular, the status fields of individual operations are left uninitialised, and may result in errant behaviour in the caller of GNTTABOP_copy. A buggy or malicious guest can construct its grant table in such a way that, when a backend domain tries to copy a grant, it hits the incorrect exit path. This returns success to the caller without doing anything, which may cause crashes or other incorrect behaviour.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-11742", "url": "https://www.suse.com/security/cve/CVE-2020-11742" }, { "category": "external", "summary": "SUSE Bug 1169392 for CVE-2020-11742", "url": "https://bugzilla.suse.com/1169392" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2020-11742", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-11742" }, { "cve": "CVE-2020-11743", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-11743" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.13.x, allowing guest OS users to cause a denial of service because of a bad error path in GNTTABOP_map_grant. Grant table operations are expected to return 0 for success, and a negative number for errors. Some misplaced brackets cause one error path to return 1 instead of a negative value. The grant table code in Linux treats this condition as success, and proceeds with incorrectly initialised state. A buggy or malicious guest can construct its grant table in such a way that, when a backend domain tries to map a grant, it hits the incorrect error path. This will crash a Linux based dom0 or backend domain.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-11743", "url": "https://www.suse.com/security/cve/CVE-2020-11743" }, { "category": "external", "summary": "SUSE Bug 1168143 for CVE-2020-11743", "url": "https://bugzilla.suse.com/1168143" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-11743" }, { "cve": "CVE-2020-15563", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-15563" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.13.x, allowing x86 HVM guest OS users to cause a hypervisor crash. An inverted conditional in x86 HVM guests\u0027 dirty video RAM tracking code allows such guests to make Xen de-reference a pointer guaranteed to point at unmapped space. A malicious or buggy HVM guest may cause the hypervisor to crash, resulting in Denial of Service (DoS) affecting the entire host. Xen versions from 4.8 onwards are affected. Xen versions 4.7 and earlier are not affected. Only x86 systems are affected. Arm systems are not affected. Only x86 HVM guests using shadow paging can leverage the vulnerability. In addition, there needs to be an entity actively monitoring a guest\u0027s video frame buffer (typically for display purposes) in order for such a guest to be able to leverage the vulnerability. x86 PV guests, as well as x86 HVM guests using hardware assisted paging (HAP), cannot leverage the vulnerability.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-15563", "url": "https://www.suse.com/security/cve/CVE-2020-15563" }, { "category": "external", "summary": "SUSE Bug 1173377 for CVE-2020-15563", "url": "https://bugzilla.suse.com/1173377" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-15563" }, { "cve": "CVE-2020-15565", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-15565" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.13.x, allowing x86 Intel HVM guest OS users to cause a host OS denial of service or possibly gain privileges because of insufficient cache write-back under VT-d. When page tables are shared between IOMMU and CPU, changes to them require flushing of both TLBs. Furthermore, IOMMUs may be non-coherent, and hence prior to flushing IOMMU TLBs, a CPU cache also needs writing back to memory after changes were made. Such writing back of cached data was missing in particular when splitting large page mappings into smaller granularity ones. A malicious guest may be able to retain read/write DMA access to frames returned to Xen\u0027s free pool, and later reused for another purpose. Host crashes (leading to a Denial of Service) and privilege escalation cannot be ruled out. Xen versions from at least 3.2 onwards are affected. Only x86 Intel systems are affected. x86 AMD as well as Arm systems are not affected. Only x86 HVM guests using hardware assisted paging (HAP), having a passed through PCI device assigned, and having page table sharing enabled can leverage the vulnerability. Note that page table sharing will be enabled (by default) only if Xen considers IOMMU and CPU large page size support compatible.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-15565", "url": "https://www.suse.com/security/cve/CVE-2020-15565" }, { "category": "external", "summary": "SUSE Bug 1173378 for CVE-2020-15565", "url": "https://bugzilla.suse.com/1173378" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.9, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-15565" }, { "cve": "CVE-2020-15566", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-15566" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.13.x, allowing guest OS users to cause a host OS crash because of incorrect error handling in event-channel port allocation. The allocation of an event-channel port may fail for multiple reasons: (1) port is already in use, (2) the memory allocation failed, or (3) the port we try to allocate is higher than what is supported by the ABI (e.g., 2L or FIFO) used by the guest or the limit set by an administrator (max_event_channels in xl cfg). Due to the missing error checks, only (1) will be considered an error. All the other cases will provide a valid port and will result in a crash when trying to access the event channel. When the administrator configured a guest to allow more than 1023 event channels, that guest may be able to crash the host. When Xen is out-of-memory, allocation of new event channels will result in crashing the host rather than reporting an error. Xen versions 4.10 and later are affected. All architectures are affected. The default configuration, when guests are created with xl/libxl, is not vulnerable, because of the default event-channel limit.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-15566", "url": "https://www.suse.com/security/cve/CVE-2020-15566" }, { "category": "external", "summary": "SUSE Bug 1173376 for CVE-2020-15566", "url": "https://bugzilla.suse.com/1173376" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-15566" }, { "cve": "CVE-2020-15567", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-15567" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.13.x, allowing Intel guest OS users to gain privileges or cause a denial of service because of non-atomic modification of a live EPT PTE. When mapping guest EPT (nested paging) tables, Xen would in some circumstances use a series of non-atomic bitfield writes. Depending on the compiler version and optimisation flags, Xen might expose a dangerous partially written PTE to the hardware, which an attacker might be able to race to exploit. A guest administrator or perhaps even an unprivileged guest user might be able to cause denial of service, data corruption, or privilege escalation. Only systems using Intel CPUs are vulnerable. Systems using AMD CPUs, and Arm systems, are not vulnerable. Only systems using nested paging (hap, aka nested paging, aka in this case Intel EPT) are vulnerable. Only HVM and PVH guests can exploit the vulnerability. The presence and scope of the vulnerability depends on the precise optimisations performed by the compiler used to build Xen. If the compiler generates (a) a single 64-bit write, or (b) a series of read-modify-write operations in the same order as the source code, the hypervisor is not vulnerable. For example, in one test build using GCC 8.3 with normal settings, the compiler generated multiple (unlocked) read-modify-write operations in source-code order, which did not constitute a vulnerability. We have not been able to survey compilers; consequently we cannot say which compiler(s) might produce vulnerable code (with which code-generation options). The source code clearly violates the C rules, and thus should be considered vulnerable.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-15567", "url": "https://www.suse.com/security/cve/CVE-2020-15567" }, { "category": "external", "summary": "SUSE Bug 1173380 for CVE-2020-15567", "url": "https://bugzilla.suse.com/1173380" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2020-15567", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-15567" }, { "cve": "CVE-2020-25595", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25595" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.14.x. The PCI passthrough code improperly uses register data. Code paths in Xen\u0027s MSI handling have been identified that act on unsanitized values read back from device hardware registers. While devices strictly compliant with PCI specifications shouldn\u0027t be able to affect these registers, experience shows that it\u0027s very common for devices to have out-of-spec \"backdoor\" operations that can affect the result of these reads. A not fully trusted guest may be able to crash Xen, leading to a Denial of Service (DoS) for the entire system. Privilege escalation and information leaks cannot be excluded. All versions of Xen supporting PCI passthrough are affected. Only x86 systems are vulnerable. Arm systems are not vulnerable. Only guests with passed through PCI devices may be able to leverage the vulnerability. Only systems passing through devices with out-of-spec (\"backdoor\") functionality can cause issues. Experience shows that such out-of-spec functionality is common; unless you have reason to believe that your device does not have such functionality, it\u0027s better to assume that it does.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25595", "url": "https://www.suse.com/security/cve/CVE-2020-25595" }, { "category": "external", "summary": "SUSE Bug 1176344 for CVE-2020-25595", "url": "https://bugzilla.suse.com/1176344" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2020-25595", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-25595" }, { "cve": "CVE-2020-25596", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25596" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.14.x. x86 PV guest kernels can experience denial of service via SYSENTER. The SYSENTER instruction leaves various state sanitization activities to software. One of Xen\u0027s sanitization paths injects a #GP fault, and incorrectly delivers it twice to the guest. This causes the guest kernel to observe a kernel-privilege #GP fault (typically fatal) rather than a user-privilege #GP fault (usually converted into SIGSEGV/etc.). Malicious or buggy userspace can crash the guest kernel, resulting in a VM Denial of Service. All versions of Xen from 3.2 onwards are vulnerable. Only x86 systems are vulnerable. ARM platforms are not vulnerable. Only x86 systems that support the SYSENTER instruction in 64bit mode are vulnerable. This is believed to be Intel, Centaur, and Shanghai CPUs. AMD and Hygon CPUs are not believed to be vulnerable. Only x86 PV guests can exploit the vulnerability. x86 PVH / HVM guests cannot exploit the vulnerability.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25596", "url": "https://www.suse.com/security/cve/CVE-2020-25596" }, { "category": "external", "summary": "SUSE Bug 1176345 for CVE-2020-25596", "url": "https://bugzilla.suse.com/1176345" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2020-25596", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-25596" }, { "cve": "CVE-2020-25597", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25597" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.14.x. There is mishandling of the constraint that once-valid event channels may not turn invalid. Logic in the handling of event channel operations in Xen assumes that an event channel, once valid, will not become invalid over the life time of a guest. However, operations like the resetting of all event channels may involve decreasing one of the bounds checked when determining validity. This may lead to bug checks triggering, crashing the host. An unprivileged guest may be able to crash Xen, leading to a Denial of Service (DoS) for the entire system. All Xen versions from 4.4 onwards are vulnerable. Xen versions 4.3 and earlier are not vulnerable. Only systems with untrusted guests permitted to create more than the default number of event channels are vulnerable. This number depends on the architecture and type of guest. For 32-bit x86 PV guests, this is 1023; for 64-bit x86 PV guests, and for all ARM guests, this number is 4095. Systems where untrusted guests are limited to fewer than this number are not vulnerable. Note that xl and libxl limit max_event_channels to 1023 by default, so systems using exclusively xl, libvirt+libxl, or their own toolstack based on libxl, and not explicitly setting max_event_channels, are not vulnerable.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25597", "url": "https://www.suse.com/security/cve/CVE-2020-25597" }, { "category": "external", "summary": "SUSE Bug 1176346 for CVE-2020-25597", "url": "https://bugzilla.suse.com/1176346" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-25597" }, { "cve": "CVE-2020-25598", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25598" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen 4.14.x. There is a missing unlock in the XENMEM_acquire_resource error path. The RCU (Read, Copy, Update) mechanism is a synchronisation primitive. A buggy error path in the XENMEM_acquire_resource exits without releasing an RCU reference, which is conceptually similar to forgetting to unlock a spinlock. A buggy or malicious HVM stubdomain can cause an RCU reference to be leaked. This causes subsequent administration operations, (e.g., CPU offline) to livelock, resulting in a host Denial of Service. The buggy codepath has been present since Xen 4.12. Xen 4.14 and later are vulnerable to the DoS. The side effects are believed to be benign on Xen 4.12 and 4.13, but patches are provided nevertheless. The vulnerability can generally only be exploited by x86 HVM VMs, as these are generally the only type of VM that have a Qemu stubdomain. x86 PV and PVH domains, as well as ARM VMs, typically don\u0027t use a stubdomain. Only VMs using HVM stubdomains can exploit the vulnerability. VMs using PV stubdomains, or with emulators running in dom0, cannot exploit the vulnerability.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25598", "url": "https://www.suse.com/security/cve/CVE-2020-25598" }, { "category": "external", "summary": "SUSE Bug 1176341 for CVE-2020-25598", "url": "https://bugzilla.suse.com/1176341" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-25598" }, { "cve": "CVE-2020-25599", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25599" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.14.x. There are evtchn_reset() race conditions. Uses of EVTCHNOP_reset (potentially by a guest on itself) or XEN_DOMCTL_soft_reset (by itself covered by XSA-77) can lead to the violation of various internal assumptions. This may lead to out of bounds memory accesses or triggering of bug checks. In particular, x86 PV guests may be able to elevate their privilege to that of the host. Host and guest crashes are also possible, leading to a Denial of Service (DoS). Information leaks cannot be ruled out. All Xen versions from 4.5 onwards are vulnerable. Xen versions 4.4 and earlier are not vulnerable.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25599", "url": "https://www.suse.com/security/cve/CVE-2020-25599" }, { "category": "external", "summary": "SUSE Bug 1176349 for CVE-2020-25599", "url": "https://bugzilla.suse.com/1176349" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.2, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-25599" }, { "cve": "CVE-2020-25600", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25600" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.14.x. Out of bounds event channels are available to 32-bit x86 domains. The so called 2-level event channel model imposes different limits on the number of usable event channels for 32-bit x86 domains vs 64-bit or Arm (either bitness) ones. 32-bit x86 domains can use only 1023 channels, due to limited space in their shared (between guest and Xen) information structure, whereas all other domains can use up to 4095 in this model. The recording of the respective limit during domain initialization, however, has occurred at a time where domains are still deemed to be 64-bit ones, prior to actually honoring respective domain properties. At the point domains get recognized as 32-bit ones, the limit didn\u0027t get updated accordingly. Due to this misbehavior in Xen, 32-bit domains (including Domain 0) servicing other domains may observe event channel allocations to succeed when they should really fail. Subsequent use of such event channels would then possibly lead to corruption of other parts of the shared info structure. An unprivileged guest may cause another domain, in particular Domain 0, to misbehave. This may lead to a Denial of Service (DoS) for the entire system. All Xen versions from 4.4 onwards are vulnerable. Xen versions 4.3 and earlier are not vulnerable. Only x86 32-bit domains servicing other domains are vulnerable. Arm systems, as well as x86 64-bit domains, are not vulnerable.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25600", "url": "https://www.suse.com/security/cve/CVE-2020-25600" }, { "category": "external", "summary": "SUSE Bug 1176348 for CVE-2020-25600", "url": "https://bugzilla.suse.com/1176348" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-25600" }, { "cve": "CVE-2020-25601", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25601" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.14.x. There is a lack of preemption in evtchn_reset() / evtchn_destroy(). In particular, the FIFO event channel model allows guests to have a large number of event channels active at a time. Closing all of these (when resetting all event channels or when cleaning up after the guest) may take extended periods of time. So far, there was no arrangement for preemption at suitable intervals, allowing a CPU to spend an almost unbounded amount of time in the processing of these operations. Malicious or buggy guest kernels can mount a Denial of Service (DoS) attack affecting the entire system. All Xen versions are vulnerable in principle. Whether versions 4.3 and older are vulnerable depends on underlying hardware characteristics.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25601", "url": "https://www.suse.com/security/cve/CVE-2020-25601" }, { "category": "external", "summary": "SUSE Bug 1176350 for CVE-2020-25601", "url": "https://bugzilla.suse.com/1176350" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-25601" }, { "cve": "CVE-2020-25602", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25602" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.14.x. An x86 PV guest can trigger a host OS crash when handling guest access to MSR_MISC_ENABLE. When a guest accesses certain Model Specific Registers, Xen first reads the value from hardware to use as the basis for auditing the guest access. For the MISC_ENABLE MSR, which is an Intel specific MSR, this MSR read is performed without error handling for a #GP fault, which is the consequence of trying to read this MSR on non-Intel hardware. A buggy or malicious PV guest administrator can crash Xen, resulting in a host Denial of Service. Only x86 systems are vulnerable. ARM systems are not vulnerable. Only Xen versions 4.11 and onwards are vulnerable. 4.10 and earlier are not vulnerable. Only x86 systems that do not implement the MISC_ENABLE MSR (0x1a0) are vulnerable. AMD and Hygon systems do not implement this MSR and are vulnerable. Intel systems do implement this MSR and are not vulnerable. Other manufacturers have not been checked. Only x86 PV guests can exploit the vulnerability. x86 HVM/PVH guests cannot exploit the vulnerability.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25602", "url": "https://www.suse.com/security/cve/CVE-2020-25602" }, { "category": "external", "summary": "SUSE Bug 1176339 for CVE-2020-25602", "url": "https://bugzilla.suse.com/1176339" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-25602" }, { "cve": "CVE-2020-25603", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25603" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.14.x. There are missing memory barriers when accessing/allocating an event channel. Event channels control structures can be accessed lockless as long as the port is considered to be valid. Such a sequence is missing an appropriate memory barrier (e.g., smp_*mb()) to prevent both the compiler and CPU from re-ordering access. A malicious guest may be able to cause a hypervisor crash resulting in a Denial of Service (DoS). Information leak and privilege escalation cannot be excluded. Systems running all versions of Xen are affected. Whether a system is vulnerable will depend on the CPU and compiler used to build Xen. For all systems, the presence and the scope of the vulnerability depend on the precise re-ordering performed by the compiler used to build Xen. We have not been able to survey compilers; consequently we cannot say which compiler(s) might produce vulnerable code (with which code generation options). GCC documentation clearly suggests that re-ordering is possible. Arm systems will also be vulnerable if the CPU is able to re-order memory access. Please consult your CPU vendor. x86 systems are only vulnerable if a compiler performs re-ordering.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25603", "url": "https://www.suse.com/security/cve/CVE-2020-25603" }, { "category": "external", "summary": "SUSE Bug 1176347 for CVE-2020-25603", "url": "https://bugzilla.suse.com/1176347" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2020-25603", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-25603" }, { "cve": "CVE-2020-25604", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25604" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.14.x. There is a race condition when migrating timers between x86 HVM vCPUs. When migrating timers of x86 HVM guests between its vCPUs, the locking model used allows for a second vCPU of the same guest (also operating on the timers) to release a lock that it didn\u0027t acquire. The most likely effect of the issue is a hang or crash of the hypervisor, i.e., a Denial of Service (DoS). All versions of Xen are affected. Only x86 systems are vulnerable. Arm systems are not vulnerable. Only x86 HVM guests can leverage the vulnerability. x86 PV and PVH cannot leverage the vulnerability. Only guests with more than one vCPU can exploit the vulnerability.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25604", "url": "https://www.suse.com/security/cve/CVE-2020-25604" }, { "category": "external", "summary": "SUSE Bug 1176343 for CVE-2020-25604", "url": "https://bugzilla.suse.com/1176343" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2020-25604", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-25604" }, { "cve": "CVE-2020-27670", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-27670" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.14.x allowing x86 guest OS users to cause a denial of service (data corruption), cause a data leak, or possibly gain privileges because an AMD IOMMU page-table entry can be half-updated.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-27670", "url": "https://www.suse.com/security/cve/CVE-2020-27670" }, { "category": "external", "summary": "SUSE Bug 1177414 for CVE-2020-27670", "url": "https://bugzilla.suse.com/1177414" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2020-27670", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1183925 for CVE-2020-27670", "url": "https://bugzilla.suse.com/1183925" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-27670" }, { "cve": "CVE-2020-27671", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-27671" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.14.x allowing x86 HVM and PVH guest OS users to cause a denial of service (data corruption), cause a data leak, or possibly gain privileges because coalescing of per-page IOMMU TLB flushes is mishandled.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-27671", "url": "https://www.suse.com/security/cve/CVE-2020-27671" }, { "category": "external", "summary": "SUSE Bug 1177413 for CVE-2020-27671", "url": "https://bugzilla.suse.com/1177413" }, { "category": "external", "summary": "SUSE Bug 1183925 for CVE-2020-27671", "url": "https://bugzilla.suse.com/1183925" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-27671" }, { "cve": "CVE-2020-27672", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-27672" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.14.x allowing x86 guest OS users to cause a host OS denial of service, achieve data corruption, or possibly gain privileges by exploiting a race condition that leads to a use-after-free involving 2MiB and 1GiB superpages.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-27672", "url": "https://www.suse.com/security/cve/CVE-2020-27672" }, { "category": "external", "summary": "SUSE Bug 1177412 for CVE-2020-27672", "url": "https://bugzilla.suse.com/1177412" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2020-27672", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1183925 for CVE-2020-27672", "url": "https://bugzilla.suse.com/1183925" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-27672" }, { "cve": "CVE-2020-27674", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-27674" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.14.x allowing x86 PV guest OS users to gain guest OS privileges by modifying kernel memory contents, because invalidation of TLB entries is mishandled during use of an INVLPG-like attack technique.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-27674", "url": "https://www.suse.com/security/cve/CVE-2020-27674" }, { "category": "external", "summary": "SUSE Bug 1177409 for CVE-2020-27674", "url": "https://bugzilla.suse.com/1177409" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2020-27674", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-27674" }, { "cve": "CVE-2020-28368", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-28368" } ], "notes": [ { "category": "general", "text": "Xen through 4.14.x allows guest OS administrators to obtain sensitive information (such as AES keys from outside the guest) via a side-channel attack on a power/energy monitoring interface, aka a \"Platypus\" attack. NOTE: there is only one logically independent fix: to change the access control for each such interface in Xen.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-28368", "url": "https://www.suse.com/security/cve/CVE-2020-28368" }, { "category": "external", "summary": "SUSE Bug 1178591 for CVE-2020-28368", "url": "https://bugzilla.suse.com/1178591" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2020-28368", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-28368" }, { "cve": "CVE-2020-29040", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-29040" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.14.x allowing x86 HVM guest OS users to cause a denial of service (stack corruption), cause a data leak, or possibly gain privileges because of an off-by-one error. NOTE: this issue is caused by an incorrect fix for CVE-2020-27671.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-29040", "url": "https://www.suse.com/security/cve/CVE-2020-29040" }, { "category": "external", "summary": "SUSE Bug 1178963 for CVE-2020-29040", "url": "https://bugzilla.suse.com/1178963" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.9, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-29040" }, { "cve": "CVE-2020-29480", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-29480" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.14.x. Neither xenstore implementation does any permission checks when reporting a xenstore watch event. A guest administrator can watch the root xenstored node, which will cause notifications for every created, modified, and deleted key. A guest administrator can also use the special watches, which will cause a notification every time a domain is created and destroyed. Data may include: number, type, and domids of other VMs; existence and domids of driver domains; numbers of virtual interfaces, block devices, vcpus; existence of virtual framebuffers and their backend style (e.g., existence of VNC service); Xen VM UUIDs for other domains; timing information about domain creation and device setup; and some hints at the backend provisioning of VMs and their devices. The watch events do not contain values stored in xenstore, only key names. A guest administrator can observe non-sensitive domain and device lifecycle events relating to other guests. This information allows some insight into overall system configuration (including the number and general nature of other guests), and configuration of other guests (including the number and general nature of other guests\u0027 devices). This information might be commercially interesting or might make other attacks easier. There is not believed to be exposure of sensitive data. Specifically, there is no exposure of VNC passwords, port numbers, pathnames in host and guest filesystems, cryptographic keys, or within-guest data.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-29480", "url": "https://www.suse.com/security/cve/CVE-2020-29480" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2020-29480", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1179496 for CVE-2020-29480", "url": "https://bugzilla.suse.com/1179496" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.8, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2020-29480" }, { "cve": "CVE-2020-29481", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-29481" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.14.x. Access rights of Xenstore nodes are per domid. Unfortunately, existing granted access rights are not removed when a domain is being destroyed. This means that a new domain created with the same domid will inherit the access rights to Xenstore nodes from the previous domain(s) with the same domid. Because all Xenstore entries of a guest below /local/domain/\u003cdomid\u003e are being deleted by Xen tools when a guest is destroyed, only Xenstore entries of other guests still running are affected. For example, a newly created guest domain might be able to read sensitive information that had belonged to a previously existing guest domain. Both Xenstore implementations (C and Ocaml) are vulnerable.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-29481", "url": "https://www.suse.com/security/cve/CVE-2020-29481" }, { "category": "external", "summary": "SUSE Bug 1176349 for CVE-2020-29481", "url": "https://bugzilla.suse.com/1176349" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2020-29481", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1179498 for CVE-2020-29481", "url": "https://bugzilla.suse.com/1179498" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-29481" }, { "cve": "CVE-2020-29483", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-29483" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.14.x. Xenstored and guests communicate via a shared memory page using a specific protocol. When a guest violates this protocol, xenstored will drop the connection to that guest. Unfortunately, this is done by just removing the guest from xenstored\u0027s internal management, resulting in the same actions as if the guest had been destroyed, including sending an @releaseDomain event. @releaseDomain events do not say that the guest has been removed. All watchers of this event must look at the states of all guests to find the guest that has been removed. When an @releaseDomain is generated due to a domain xenstored protocol violation, because the guest is still running, the watchers will not react. Later, when the guest is actually destroyed, xenstored will no longer have it stored in its internal data base, so no further @releaseDomain event will be sent. This can lead to a zombie domain; memory mappings of that guest\u0027s memory will not be removed, due to the missing event. This zombie domain will be cleaned up only after another domain is destroyed, as that will trigger another @releaseDomain event. If the device model of the guest that violated the Xenstore protocol is running in a stub-domain, a use-after-free case could happen in xenstored, after having removed the guest from its internal data base, possibly resulting in a crash of xenstored. A malicious guest can block resources of the host for a period after its own death. Guests with a stub domain device model can eventually crash xenstored, resulting in a more serious denial of service (the prevention of any further domain management operations). Only the C variant of Xenstore is affected; the Ocaml variant is not affected. Only HVM guests with a stubdom device model can cause a serious DoS.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-29483", "url": "https://www.suse.com/security/cve/CVE-2020-29483" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2020-29483", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1179502 for CVE-2020-29483", "url": "https://bugzilla.suse.com/1179502" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-29483" }, { "cve": "CVE-2020-29484", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-29484" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.14.x. When a Xenstore watch fires, the xenstore client that registered the watch will receive a Xenstore message containing the path of the modified Xenstore entry that triggered the watch, and the tag that was specified when registering the watch. Any communication with xenstored is done via Xenstore messages, consisting of a message header and the payload. The payload length is limited to 4096 bytes. Any request to xenstored resulting in a response with a payload longer than 4096 bytes will result in an error. When registering a watch, the payload length limit applies to the combined length of the watched path and the specified tag. Because watches for a specific path are also triggered for all nodes below that path, the payload of a watch event message can be longer than the payload needed to register the watch. A malicious guest that registers a watch using a very large tag (i.e., with a registration operation payload length close to the 4096 byte limit) can cause the generation of watch events with a payload length larger than 4096 bytes, by writing to Xenstore entries below the watched path. This will result in an error condition in xenstored. This error can result in a NULL pointer dereference, leading to a crash of xenstored. A malicious guest administrator can cause xenstored to crash, leading to a denial of service. Following a xenstored crash, domains may continue to run, but management operations will be impossible. Only C xenstored is affected, oxenstored is not affected.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-29484", "url": "https://www.suse.com/security/cve/CVE-2020-29484" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2020-29484", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1179501 for CVE-2020-29484", "url": "https://bugzilla.suse.com/1179501" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-29484" }, { "cve": "CVE-2020-29566", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-29566" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.14.x. When they require assistance from the device model, x86 HVM guests must be temporarily de-scheduled. The device model will signal Xen when it has completed its operation, via an event channel, so that the relevant vCPU is rescheduled. If the device model were to signal Xen without having actually completed the operation, the de-schedule / re-schedule cycle would repeat. If, in addition, Xen is resignalled very quickly, the re-schedule may occur before the de-schedule was fully complete, triggering a shortcut. This potentially repeating process uses ordinary recursive function calls, and thus could result in a stack overflow. A malicious or buggy stubdomain serving a HVM guest can cause Xen to crash, resulting in a Denial of Service (DoS) to the entire host. Only x86 systems are affected. Arm systems are not affected. Only x86 stubdomains serving HVM guests can exploit the vulnerability.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-29566", "url": "https://www.suse.com/security/cve/CVE-2020-29566" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2020-29566", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1179506 for CVE-2020-29566", "url": "https://bugzilla.suse.com/1179506" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-29566" }, { "cve": "CVE-2020-29567", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-29567" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen 4.14.x. When moving IRQs between CPUs to distribute the load of IRQ handling, IRQ vectors are dynamically allocated and de-allocated on the relevant CPUs. De-allocation has to happen when certain constraints are met. If these conditions are not met when first checked, the checking CPU may send an interrupt to itself, in the expectation that this IRQ will be delivered only after the condition preventing the cleanup has cleared. For two specific IRQ vectors, this expectation was violated, resulting in a continuous stream of self-interrupts, which renders the CPU effectively unusable. A domain with a passed through PCI device can cause lockup of a physical CPU, resulting in a Denial of Service (DoS) to the entire host. Only x86 systems are vulnerable. Arm systems are not vulnerable. Only guests with physical PCI devices passed through to them can exploit the vulnerability.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-29567", "url": "https://www.suse.com/security/cve/CVE-2020-29567" }, { "category": "external", "summary": "SUSE Bug 1179513 for CVE-2020-29567", "url": "https://bugzilla.suse.com/1179513" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-29567" }, { "cve": "CVE-2020-29570", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-29570" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.14.x. Recording of the per-vCPU control block mapping maintained by Xen and that of pointers into the control block is reversed. The consumer assumes, seeing the former initialized, that the latter are also ready for use. Malicious or buggy guest kernels can mount a Denial of Service (DoS) attack affecting the entire system.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-29570", "url": "https://www.suse.com/security/cve/CVE-2020-29570" }, { "category": "external", "summary": "SUSE Bug 1179514 for CVE-2020-29570", "url": "https://bugzilla.suse.com/1179514" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-29570" }, { "cve": "CVE-2020-29571", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-29571" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.14.x. A bounds check common to most operation time functions specific to FIFO event channels depends on the CPU observing consistent state. While the producer side uses appropriately ordered writes, the consumer side isn\u0027t protected against re-ordered reads, and may hence end up de-referencing a NULL pointer. Malicious or buggy guest kernels can mount a Denial of Service (DoS) attack affecting the entire system. Only Arm systems may be vulnerable. Whether a system is vulnerable depends on the specific CPU. x86 systems are not vulnerable.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-29571", "url": "https://www.suse.com/security/cve/CVE-2020-29571" }, { "category": "external", "summary": "SUSE Bug 1179516 for CVE-2020-29571", "url": "https://bugzilla.suse.com/1179516" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-29571" }, { "cve": "CVE-2021-28687", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-28687" } ], "notes": [ { "category": "general", "text": "HVM soft-reset crashes toolstack libxl requires all data structures passed across its public interface to be initialized before use and disposed of afterwards by calling a specific set of functions. Many internal data structures also require this initialize / dispose discipline, but not all of them. When the \"soft reset\" feature was implemented, the libxl__domain_suspend_state structure didn\u0027t require any initialization or disposal. At some point later, an initialization function was introduced for the structure; but the \"soft reset\" path wasn\u0027t refactored to call the initialization function. When a guest nwo initiates a \"soft reboot\", uninitialized data structure leads to an assert() when later code finds the structure in an unexpected state. The effect of this is to crash the process monitoring the guest. How this affects the system depends on the structure of the toolstack. For xl, this will have no security-relevant effect: every VM has its own independent monitoring process, which contains no state. The domain in question will hang in a crashed state, but can be destroyed by `xl destroy` just like any other non-cooperating domain. For daemon-based toolstacks linked against libxl, such as libvirt, this will crash the toolstack, losing the state of any in-progress operations (localized DoS), and preventing further administrator operations unless the daemon is configured to restart automatically (system-wide DoS). If crashes \"leak\" resources, then repeated crashes could use up resources, also causing a system-wide DoS.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-28687", "url": "https://www.suse.com/security/cve/CVE-2021-28687" }, { "category": "external", "summary": "SUSE Bug 1183072 for CVE-2021-28687", "url": "https://bugzilla.suse.com/1183072" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2021-28687" } ] }
opensuse-su-2020:0965-1
Vulnerability from csaf_opensuse
Published
2020-07-15 12:42
Modified
2020-07-15 12:42
Summary
Security update for xen
Notes
Title of the patch
Security update for xen
Description of the patch
This update for xen fixes the following issues:
- CVE-2020-15563: Fixed inverted code paths in x86 dirty VRAM tracking (bsc#1173377).
- CVE-2020-15565: Fixed insufficient cache write-back under VT-d (bsc#1173378).
- CVE-2020-15566: Fixed incorrect error handling in event channel port allocation (bsc#1173376).
- CVE-2020-15567: Fixed non-atomic modification of live EPT PTE (bsc#1173380).
- CVE-2020-0543: Special Register Buffer Data Sampling (SRBDS) aka 'CrossTalk' (bsc#1172205).
Additional upstream bug fixes (bsc#1027519)
This update was imported from the SUSE:SLE-15-SP1:Update update project.
Patchnames
openSUSE-2020-965
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for xen", "title": "Title of the patch" }, { "category": "description", "text": "This update for xen fixes the following issues:\n\n- CVE-2020-15563: Fixed inverted code paths in x86 dirty VRAM tracking (bsc#1173377).\n- CVE-2020-15565: Fixed insufficient cache write-back under VT-d (bsc#1173378).\n- CVE-2020-15566: Fixed incorrect error handling in event channel port allocation (bsc#1173376).\n- CVE-2020-15567: Fixed non-atomic modification of live EPT PTE (bsc#1173380).\n- CVE-2020-0543: Special Register Buffer Data Sampling (SRBDS) aka \u0027CrossTalk\u0027 (bsc#1172205).\n\nAdditional upstream bug fixes (bsc#1027519)\n\nThis update was imported from the SUSE:SLE-15-SP1:Update update project.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-2020-965", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2020_0965-1.json" }, { "category": "self", "summary": "URL for openSUSE-SU-2020:0965-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/INF4LPB5UI4GVQ3GIB2BQFBCEWY7ANGZ/" }, { "category": "self", "summary": "E-Mail link for openSUSE-SU-2020:0965-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/INF4LPB5UI4GVQ3GIB2BQFBCEWY7ANGZ/" }, { "category": "self", "summary": "SUSE Bug 1027519", "url": "https://bugzilla.suse.com/1027519" }, { "category": "self", "summary": "SUSE Bug 1172205", "url": "https://bugzilla.suse.com/1172205" }, { "category": "self", "summary": "SUSE Bug 1173376", "url": "https://bugzilla.suse.com/1173376" }, { "category": "self", "summary": "SUSE Bug 1173377", "url": "https://bugzilla.suse.com/1173377" }, { "category": "self", "summary": "SUSE Bug 1173378", "url": "https://bugzilla.suse.com/1173378" }, { "category": "self", "summary": "SUSE Bug 1173380", "url": "https://bugzilla.suse.com/1173380" }, { "category": "self", "summary": "SUSE CVE CVE-2020-0543 page", "url": "https://www.suse.com/security/cve/CVE-2020-0543/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-15563 page", "url": "https://www.suse.com/security/cve/CVE-2020-15563/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-15565 page", "url": "https://www.suse.com/security/cve/CVE-2020-15565/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-15566 page", "url": "https://www.suse.com/security/cve/CVE-2020-15566/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-15567 page", "url": "https://www.suse.com/security/cve/CVE-2020-15567/" } ], "title": "Security update for xen", "tracking": { "current_release_date": "2020-07-15T12:42:14Z", "generator": { "date": "2020-07-15T12:42:14Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2020:0965-1", "initial_release_date": "2020-07-15T12:42:14Z", "revision_history": [ { "date": "2020-07-15T12:42:14Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "xen-devel-4.12.3_04-lp151.2.21.1.i586", "product": { "name": "xen-devel-4.12.3_04-lp151.2.21.1.i586", "product_id": "xen-devel-4.12.3_04-lp151.2.21.1.i586" } }, { "category": "product_version", "name": "xen-libs-4.12.3_04-lp151.2.21.1.i586", "product": { "name": "xen-libs-4.12.3_04-lp151.2.21.1.i586", "product_id": "xen-libs-4.12.3_04-lp151.2.21.1.i586" } }, { "category": "product_version", "name": "xen-tools-domU-4.12.3_04-lp151.2.21.1.i586", "product": { "name": "xen-tools-domU-4.12.3_04-lp151.2.21.1.i586", "product_id": "xen-tools-domU-4.12.3_04-lp151.2.21.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "xen-4.12.3_04-lp151.2.21.1.x86_64", "product": { "name": "xen-4.12.3_04-lp151.2.21.1.x86_64", "product_id": "xen-4.12.3_04-lp151.2.21.1.x86_64" } }, { "category": "product_version", "name": "xen-devel-4.12.3_04-lp151.2.21.1.x86_64", "product": { "name": "xen-devel-4.12.3_04-lp151.2.21.1.x86_64", "product_id": "xen-devel-4.12.3_04-lp151.2.21.1.x86_64" } }, { "category": "product_version", "name": "xen-doc-html-4.12.3_04-lp151.2.21.1.x86_64", "product": { "name": "xen-doc-html-4.12.3_04-lp151.2.21.1.x86_64", "product_id": "xen-doc-html-4.12.3_04-lp151.2.21.1.x86_64" } }, { "category": "product_version", "name": "xen-libs-4.12.3_04-lp151.2.21.1.x86_64", "product": { "name": "xen-libs-4.12.3_04-lp151.2.21.1.x86_64", "product_id": "xen-libs-4.12.3_04-lp151.2.21.1.x86_64" } }, { "category": "product_version", "name": "xen-libs-32bit-4.12.3_04-lp151.2.21.1.x86_64", "product": { "name": "xen-libs-32bit-4.12.3_04-lp151.2.21.1.x86_64", "product_id": "xen-libs-32bit-4.12.3_04-lp151.2.21.1.x86_64" } }, { "category": "product_version", "name": "xen-tools-4.12.3_04-lp151.2.21.1.x86_64", "product": { "name": "xen-tools-4.12.3_04-lp151.2.21.1.x86_64", "product_id": "xen-tools-4.12.3_04-lp151.2.21.1.x86_64" } }, { "category": "product_version", "name": "xen-tools-domU-4.12.3_04-lp151.2.21.1.x86_64", "product": { "name": "xen-tools-domU-4.12.3_04-lp151.2.21.1.x86_64", "product_id": "xen-tools-domU-4.12.3_04-lp151.2.21.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Leap 15.1", "product": { "name": "openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap:15.1" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "xen-4.12.3_04-lp151.2.21.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:xen-4.12.3_04-lp151.2.21.1.x86_64" }, "product_reference": "xen-4.12.3_04-lp151.2.21.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "xen-devel-4.12.3_04-lp151.2.21.1.i586 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:xen-devel-4.12.3_04-lp151.2.21.1.i586" }, "product_reference": "xen-devel-4.12.3_04-lp151.2.21.1.i586", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "xen-devel-4.12.3_04-lp151.2.21.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:xen-devel-4.12.3_04-lp151.2.21.1.x86_64" }, "product_reference": "xen-devel-4.12.3_04-lp151.2.21.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "xen-doc-html-4.12.3_04-lp151.2.21.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:xen-doc-html-4.12.3_04-lp151.2.21.1.x86_64" }, "product_reference": "xen-doc-html-4.12.3_04-lp151.2.21.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.12.3_04-lp151.2.21.1.i586 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:xen-libs-4.12.3_04-lp151.2.21.1.i586" }, "product_reference": "xen-libs-4.12.3_04-lp151.2.21.1.i586", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.12.3_04-lp151.2.21.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:xen-libs-4.12.3_04-lp151.2.21.1.x86_64" }, "product_reference": "xen-libs-4.12.3_04-lp151.2.21.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-32bit-4.12.3_04-lp151.2.21.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:xen-libs-32bit-4.12.3_04-lp151.2.21.1.x86_64" }, "product_reference": "xen-libs-32bit-4.12.3_04-lp151.2.21.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.12.3_04-lp151.2.21.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:xen-tools-4.12.3_04-lp151.2.21.1.x86_64" }, "product_reference": "xen-tools-4.12.3_04-lp151.2.21.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.12.3_04-lp151.2.21.1.i586 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:xen-tools-domU-4.12.3_04-lp151.2.21.1.i586" }, "product_reference": "xen-tools-domU-4.12.3_04-lp151.2.21.1.i586", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.12.3_04-lp151.2.21.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:xen-tools-domU-4.12.3_04-lp151.2.21.1.x86_64" }, "product_reference": "xen-tools-domU-4.12.3_04-lp151.2.21.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-0543", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-0543" } ], "notes": [ { "category": "general", "text": "Incomplete cleanup from specific special register read operations in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:xen-4.12.3_04-lp151.2.21.1.x86_64", "openSUSE Leap 15.1:xen-devel-4.12.3_04-lp151.2.21.1.i586", "openSUSE Leap 15.1:xen-devel-4.12.3_04-lp151.2.21.1.x86_64", "openSUSE Leap 15.1:xen-doc-html-4.12.3_04-lp151.2.21.1.x86_64", "openSUSE Leap 15.1:xen-libs-32bit-4.12.3_04-lp151.2.21.1.x86_64", "openSUSE Leap 15.1:xen-libs-4.12.3_04-lp151.2.21.1.i586", "openSUSE Leap 15.1:xen-libs-4.12.3_04-lp151.2.21.1.x86_64", "openSUSE Leap 15.1:xen-tools-4.12.3_04-lp151.2.21.1.x86_64", "openSUSE Leap 15.1:xen-tools-domU-4.12.3_04-lp151.2.21.1.i586", "openSUSE Leap 15.1:xen-tools-domU-4.12.3_04-lp151.2.21.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-0543", "url": "https://www.suse.com/security/cve/CVE-2020-0543" }, { "category": "external", "summary": "SUSE Bug 1154824 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1154824" }, { "category": "external", "summary": "SUSE Bug 1172205 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172205" }, { "category": "external", "summary": "SUSE Bug 1172206 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172206" }, { "category": "external", "summary": "SUSE Bug 1172207 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172207" }, { "category": "external", "summary": "SUSE Bug 1172770 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172770" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:xen-4.12.3_04-lp151.2.21.1.x86_64", "openSUSE Leap 15.1:xen-devel-4.12.3_04-lp151.2.21.1.i586", "openSUSE Leap 15.1:xen-devel-4.12.3_04-lp151.2.21.1.x86_64", "openSUSE Leap 15.1:xen-doc-html-4.12.3_04-lp151.2.21.1.x86_64", "openSUSE Leap 15.1:xen-libs-32bit-4.12.3_04-lp151.2.21.1.x86_64", "openSUSE Leap 15.1:xen-libs-4.12.3_04-lp151.2.21.1.i586", "openSUSE Leap 15.1:xen-libs-4.12.3_04-lp151.2.21.1.x86_64", "openSUSE Leap 15.1:xen-tools-4.12.3_04-lp151.2.21.1.x86_64", "openSUSE Leap 15.1:xen-tools-domU-4.12.3_04-lp151.2.21.1.i586", "openSUSE Leap 15.1:xen-tools-domU-4.12.3_04-lp151.2.21.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.1:xen-4.12.3_04-lp151.2.21.1.x86_64", "openSUSE Leap 15.1:xen-devel-4.12.3_04-lp151.2.21.1.i586", "openSUSE Leap 15.1:xen-devel-4.12.3_04-lp151.2.21.1.x86_64", "openSUSE Leap 15.1:xen-doc-html-4.12.3_04-lp151.2.21.1.x86_64", "openSUSE Leap 15.1:xen-libs-32bit-4.12.3_04-lp151.2.21.1.x86_64", "openSUSE Leap 15.1:xen-libs-4.12.3_04-lp151.2.21.1.i586", "openSUSE Leap 15.1:xen-libs-4.12.3_04-lp151.2.21.1.x86_64", "openSUSE Leap 15.1:xen-tools-4.12.3_04-lp151.2.21.1.x86_64", "openSUSE Leap 15.1:xen-tools-domU-4.12.3_04-lp151.2.21.1.i586", "openSUSE Leap 15.1:xen-tools-domU-4.12.3_04-lp151.2.21.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-07-15T12:42:14Z", "details": "moderate" } ], "title": "CVE-2020-0543" }, { "cve": "CVE-2020-15563", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-15563" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.13.x, allowing x86 HVM guest OS users to cause a hypervisor crash. An inverted conditional in x86 HVM guests\u0027 dirty video RAM tracking code allows such guests to make Xen de-reference a pointer guaranteed to point at unmapped space. A malicious or buggy HVM guest may cause the hypervisor to crash, resulting in Denial of Service (DoS) affecting the entire host. Xen versions from 4.8 onwards are affected. Xen versions 4.7 and earlier are not affected. Only x86 systems are affected. Arm systems are not affected. Only x86 HVM guests using shadow paging can leverage the vulnerability. In addition, there needs to be an entity actively monitoring a guest\u0027s video frame buffer (typically for display purposes) in order for such a guest to be able to leverage the vulnerability. x86 PV guests, as well as x86 HVM guests using hardware assisted paging (HAP), cannot leverage the vulnerability.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:xen-4.12.3_04-lp151.2.21.1.x86_64", "openSUSE Leap 15.1:xen-devel-4.12.3_04-lp151.2.21.1.i586", "openSUSE Leap 15.1:xen-devel-4.12.3_04-lp151.2.21.1.x86_64", "openSUSE Leap 15.1:xen-doc-html-4.12.3_04-lp151.2.21.1.x86_64", "openSUSE Leap 15.1:xen-libs-32bit-4.12.3_04-lp151.2.21.1.x86_64", "openSUSE Leap 15.1:xen-libs-4.12.3_04-lp151.2.21.1.i586", "openSUSE Leap 15.1:xen-libs-4.12.3_04-lp151.2.21.1.x86_64", "openSUSE Leap 15.1:xen-tools-4.12.3_04-lp151.2.21.1.x86_64", "openSUSE Leap 15.1:xen-tools-domU-4.12.3_04-lp151.2.21.1.i586", "openSUSE Leap 15.1:xen-tools-domU-4.12.3_04-lp151.2.21.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-15563", "url": "https://www.suse.com/security/cve/CVE-2020-15563" }, { "category": "external", "summary": "SUSE Bug 1173377 for CVE-2020-15563", "url": "https://bugzilla.suse.com/1173377" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:xen-4.12.3_04-lp151.2.21.1.x86_64", "openSUSE Leap 15.1:xen-devel-4.12.3_04-lp151.2.21.1.i586", "openSUSE Leap 15.1:xen-devel-4.12.3_04-lp151.2.21.1.x86_64", "openSUSE Leap 15.1:xen-doc-html-4.12.3_04-lp151.2.21.1.x86_64", "openSUSE Leap 15.1:xen-libs-32bit-4.12.3_04-lp151.2.21.1.x86_64", "openSUSE Leap 15.1:xen-libs-4.12.3_04-lp151.2.21.1.i586", "openSUSE Leap 15.1:xen-libs-4.12.3_04-lp151.2.21.1.x86_64", "openSUSE Leap 15.1:xen-tools-4.12.3_04-lp151.2.21.1.x86_64", "openSUSE Leap 15.1:xen-tools-domU-4.12.3_04-lp151.2.21.1.i586", "openSUSE Leap 15.1:xen-tools-domU-4.12.3_04-lp151.2.21.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.1:xen-4.12.3_04-lp151.2.21.1.x86_64", "openSUSE Leap 15.1:xen-devel-4.12.3_04-lp151.2.21.1.i586", "openSUSE Leap 15.1:xen-devel-4.12.3_04-lp151.2.21.1.x86_64", "openSUSE Leap 15.1:xen-doc-html-4.12.3_04-lp151.2.21.1.x86_64", "openSUSE Leap 15.1:xen-libs-32bit-4.12.3_04-lp151.2.21.1.x86_64", "openSUSE Leap 15.1:xen-libs-4.12.3_04-lp151.2.21.1.i586", "openSUSE Leap 15.1:xen-libs-4.12.3_04-lp151.2.21.1.x86_64", "openSUSE Leap 15.1:xen-tools-4.12.3_04-lp151.2.21.1.x86_64", "openSUSE Leap 15.1:xen-tools-domU-4.12.3_04-lp151.2.21.1.i586", "openSUSE Leap 15.1:xen-tools-domU-4.12.3_04-lp151.2.21.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-07-15T12:42:14Z", "details": "moderate" } ], "title": "CVE-2020-15563" }, { "cve": "CVE-2020-15565", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-15565" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.13.x, allowing x86 Intel HVM guest OS users to cause a host OS denial of service or possibly gain privileges because of insufficient cache write-back under VT-d. When page tables are shared between IOMMU and CPU, changes to them require flushing of both TLBs. Furthermore, IOMMUs may be non-coherent, and hence prior to flushing IOMMU TLBs, a CPU cache also needs writing back to memory after changes were made. Such writing back of cached data was missing in particular when splitting large page mappings into smaller granularity ones. A malicious guest may be able to retain read/write DMA access to frames returned to Xen\u0027s free pool, and later reused for another purpose. Host crashes (leading to a Denial of Service) and privilege escalation cannot be ruled out. Xen versions from at least 3.2 onwards are affected. Only x86 Intel systems are affected. x86 AMD as well as Arm systems are not affected. Only x86 HVM guests using hardware assisted paging (HAP), having a passed through PCI device assigned, and having page table sharing enabled can leverage the vulnerability. Note that page table sharing will be enabled (by default) only if Xen considers IOMMU and CPU large page size support compatible.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:xen-4.12.3_04-lp151.2.21.1.x86_64", "openSUSE Leap 15.1:xen-devel-4.12.3_04-lp151.2.21.1.i586", "openSUSE Leap 15.1:xen-devel-4.12.3_04-lp151.2.21.1.x86_64", "openSUSE Leap 15.1:xen-doc-html-4.12.3_04-lp151.2.21.1.x86_64", "openSUSE Leap 15.1:xen-libs-32bit-4.12.3_04-lp151.2.21.1.x86_64", "openSUSE Leap 15.1:xen-libs-4.12.3_04-lp151.2.21.1.i586", "openSUSE Leap 15.1:xen-libs-4.12.3_04-lp151.2.21.1.x86_64", "openSUSE Leap 15.1:xen-tools-4.12.3_04-lp151.2.21.1.x86_64", "openSUSE Leap 15.1:xen-tools-domU-4.12.3_04-lp151.2.21.1.i586", "openSUSE Leap 15.1:xen-tools-domU-4.12.3_04-lp151.2.21.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-15565", "url": "https://www.suse.com/security/cve/CVE-2020-15565" }, { "category": "external", "summary": "SUSE Bug 1173378 for CVE-2020-15565", "url": "https://bugzilla.suse.com/1173378" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:xen-4.12.3_04-lp151.2.21.1.x86_64", "openSUSE Leap 15.1:xen-devel-4.12.3_04-lp151.2.21.1.i586", "openSUSE Leap 15.1:xen-devel-4.12.3_04-lp151.2.21.1.x86_64", "openSUSE Leap 15.1:xen-doc-html-4.12.3_04-lp151.2.21.1.x86_64", "openSUSE Leap 15.1:xen-libs-32bit-4.12.3_04-lp151.2.21.1.x86_64", "openSUSE Leap 15.1:xen-libs-4.12.3_04-lp151.2.21.1.i586", "openSUSE Leap 15.1:xen-libs-4.12.3_04-lp151.2.21.1.x86_64", "openSUSE Leap 15.1:xen-tools-4.12.3_04-lp151.2.21.1.x86_64", "openSUSE Leap 15.1:xen-tools-domU-4.12.3_04-lp151.2.21.1.i586", "openSUSE Leap 15.1:xen-tools-domU-4.12.3_04-lp151.2.21.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.9, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.1:xen-4.12.3_04-lp151.2.21.1.x86_64", "openSUSE Leap 15.1:xen-devel-4.12.3_04-lp151.2.21.1.i586", "openSUSE Leap 15.1:xen-devel-4.12.3_04-lp151.2.21.1.x86_64", "openSUSE Leap 15.1:xen-doc-html-4.12.3_04-lp151.2.21.1.x86_64", "openSUSE Leap 15.1:xen-libs-32bit-4.12.3_04-lp151.2.21.1.x86_64", "openSUSE Leap 15.1:xen-libs-4.12.3_04-lp151.2.21.1.i586", "openSUSE Leap 15.1:xen-libs-4.12.3_04-lp151.2.21.1.x86_64", "openSUSE Leap 15.1:xen-tools-4.12.3_04-lp151.2.21.1.x86_64", "openSUSE Leap 15.1:xen-tools-domU-4.12.3_04-lp151.2.21.1.i586", "openSUSE Leap 15.1:xen-tools-domU-4.12.3_04-lp151.2.21.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-07-15T12:42:14Z", "details": "important" } ], "title": "CVE-2020-15565" }, { "cve": "CVE-2020-15566", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-15566" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.13.x, allowing guest OS users to cause a host OS crash because of incorrect error handling in event-channel port allocation. The allocation of an event-channel port may fail for multiple reasons: (1) port is already in use, (2) the memory allocation failed, or (3) the port we try to allocate is higher than what is supported by the ABI (e.g., 2L or FIFO) used by the guest or the limit set by an administrator (max_event_channels in xl cfg). Due to the missing error checks, only (1) will be considered an error. All the other cases will provide a valid port and will result in a crash when trying to access the event channel. When the administrator configured a guest to allow more than 1023 event channels, that guest may be able to crash the host. When Xen is out-of-memory, allocation of new event channels will result in crashing the host rather than reporting an error. Xen versions 4.10 and later are affected. All architectures are affected. The default configuration, when guests are created with xl/libxl, is not vulnerable, because of the default event-channel limit.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:xen-4.12.3_04-lp151.2.21.1.x86_64", "openSUSE Leap 15.1:xen-devel-4.12.3_04-lp151.2.21.1.i586", "openSUSE Leap 15.1:xen-devel-4.12.3_04-lp151.2.21.1.x86_64", "openSUSE Leap 15.1:xen-doc-html-4.12.3_04-lp151.2.21.1.x86_64", "openSUSE Leap 15.1:xen-libs-32bit-4.12.3_04-lp151.2.21.1.x86_64", "openSUSE Leap 15.1:xen-libs-4.12.3_04-lp151.2.21.1.i586", "openSUSE Leap 15.1:xen-libs-4.12.3_04-lp151.2.21.1.x86_64", "openSUSE Leap 15.1:xen-tools-4.12.3_04-lp151.2.21.1.x86_64", "openSUSE Leap 15.1:xen-tools-domU-4.12.3_04-lp151.2.21.1.i586", "openSUSE Leap 15.1:xen-tools-domU-4.12.3_04-lp151.2.21.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-15566", "url": "https://www.suse.com/security/cve/CVE-2020-15566" }, { "category": "external", "summary": "SUSE Bug 1173376 for CVE-2020-15566", "url": "https://bugzilla.suse.com/1173376" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:xen-4.12.3_04-lp151.2.21.1.x86_64", "openSUSE Leap 15.1:xen-devel-4.12.3_04-lp151.2.21.1.i586", "openSUSE Leap 15.1:xen-devel-4.12.3_04-lp151.2.21.1.x86_64", "openSUSE Leap 15.1:xen-doc-html-4.12.3_04-lp151.2.21.1.x86_64", "openSUSE Leap 15.1:xen-libs-32bit-4.12.3_04-lp151.2.21.1.x86_64", "openSUSE Leap 15.1:xen-libs-4.12.3_04-lp151.2.21.1.i586", "openSUSE Leap 15.1:xen-libs-4.12.3_04-lp151.2.21.1.x86_64", "openSUSE Leap 15.1:xen-tools-4.12.3_04-lp151.2.21.1.x86_64", "openSUSE Leap 15.1:xen-tools-domU-4.12.3_04-lp151.2.21.1.i586", "openSUSE Leap 15.1:xen-tools-domU-4.12.3_04-lp151.2.21.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.1:xen-4.12.3_04-lp151.2.21.1.x86_64", "openSUSE Leap 15.1:xen-devel-4.12.3_04-lp151.2.21.1.i586", "openSUSE Leap 15.1:xen-devel-4.12.3_04-lp151.2.21.1.x86_64", "openSUSE Leap 15.1:xen-doc-html-4.12.3_04-lp151.2.21.1.x86_64", "openSUSE Leap 15.1:xen-libs-32bit-4.12.3_04-lp151.2.21.1.x86_64", "openSUSE Leap 15.1:xen-libs-4.12.3_04-lp151.2.21.1.i586", "openSUSE Leap 15.1:xen-libs-4.12.3_04-lp151.2.21.1.x86_64", "openSUSE Leap 15.1:xen-tools-4.12.3_04-lp151.2.21.1.x86_64", "openSUSE Leap 15.1:xen-tools-domU-4.12.3_04-lp151.2.21.1.i586", "openSUSE Leap 15.1:xen-tools-domU-4.12.3_04-lp151.2.21.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-07-15T12:42:14Z", "details": "moderate" } ], "title": "CVE-2020-15566" }, { "cve": "CVE-2020-15567", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-15567" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.13.x, allowing Intel guest OS users to gain privileges or cause a denial of service because of non-atomic modification of a live EPT PTE. When mapping guest EPT (nested paging) tables, Xen would in some circumstances use a series of non-atomic bitfield writes. Depending on the compiler version and optimisation flags, Xen might expose a dangerous partially written PTE to the hardware, which an attacker might be able to race to exploit. A guest administrator or perhaps even an unprivileged guest user might be able to cause denial of service, data corruption, or privilege escalation. Only systems using Intel CPUs are vulnerable. Systems using AMD CPUs, and Arm systems, are not vulnerable. Only systems using nested paging (hap, aka nested paging, aka in this case Intel EPT) are vulnerable. Only HVM and PVH guests can exploit the vulnerability. The presence and scope of the vulnerability depends on the precise optimisations performed by the compiler used to build Xen. If the compiler generates (a) a single 64-bit write, or (b) a series of read-modify-write operations in the same order as the source code, the hypervisor is not vulnerable. For example, in one test build using GCC 8.3 with normal settings, the compiler generated multiple (unlocked) read-modify-write operations in source-code order, which did not constitute a vulnerability. We have not been able to survey compilers; consequently we cannot say which compiler(s) might produce vulnerable code (with which code-generation options). The source code clearly violates the C rules, and thus should be considered vulnerable.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:xen-4.12.3_04-lp151.2.21.1.x86_64", "openSUSE Leap 15.1:xen-devel-4.12.3_04-lp151.2.21.1.i586", "openSUSE Leap 15.1:xen-devel-4.12.3_04-lp151.2.21.1.x86_64", "openSUSE Leap 15.1:xen-doc-html-4.12.3_04-lp151.2.21.1.x86_64", "openSUSE Leap 15.1:xen-libs-32bit-4.12.3_04-lp151.2.21.1.x86_64", "openSUSE Leap 15.1:xen-libs-4.12.3_04-lp151.2.21.1.i586", "openSUSE Leap 15.1:xen-libs-4.12.3_04-lp151.2.21.1.x86_64", "openSUSE Leap 15.1:xen-tools-4.12.3_04-lp151.2.21.1.x86_64", "openSUSE Leap 15.1:xen-tools-domU-4.12.3_04-lp151.2.21.1.i586", "openSUSE Leap 15.1:xen-tools-domU-4.12.3_04-lp151.2.21.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-15567", "url": "https://www.suse.com/security/cve/CVE-2020-15567" }, { "category": "external", "summary": "SUSE Bug 1173380 for CVE-2020-15567", "url": "https://bugzilla.suse.com/1173380" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2020-15567", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:xen-4.12.3_04-lp151.2.21.1.x86_64", "openSUSE Leap 15.1:xen-devel-4.12.3_04-lp151.2.21.1.i586", "openSUSE Leap 15.1:xen-devel-4.12.3_04-lp151.2.21.1.x86_64", "openSUSE Leap 15.1:xen-doc-html-4.12.3_04-lp151.2.21.1.x86_64", "openSUSE Leap 15.1:xen-libs-32bit-4.12.3_04-lp151.2.21.1.x86_64", "openSUSE Leap 15.1:xen-libs-4.12.3_04-lp151.2.21.1.i586", "openSUSE Leap 15.1:xen-libs-4.12.3_04-lp151.2.21.1.x86_64", "openSUSE Leap 15.1:xen-tools-4.12.3_04-lp151.2.21.1.x86_64", "openSUSE Leap 15.1:xen-tools-domU-4.12.3_04-lp151.2.21.1.i586", "openSUSE Leap 15.1:xen-tools-domU-4.12.3_04-lp151.2.21.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.1:xen-4.12.3_04-lp151.2.21.1.x86_64", "openSUSE Leap 15.1:xen-devel-4.12.3_04-lp151.2.21.1.i586", "openSUSE Leap 15.1:xen-devel-4.12.3_04-lp151.2.21.1.x86_64", "openSUSE Leap 15.1:xen-doc-html-4.12.3_04-lp151.2.21.1.x86_64", "openSUSE Leap 15.1:xen-libs-32bit-4.12.3_04-lp151.2.21.1.x86_64", "openSUSE Leap 15.1:xen-libs-4.12.3_04-lp151.2.21.1.i586", "openSUSE Leap 15.1:xen-libs-4.12.3_04-lp151.2.21.1.x86_64", "openSUSE Leap 15.1:xen-tools-4.12.3_04-lp151.2.21.1.x86_64", "openSUSE Leap 15.1:xen-tools-domU-4.12.3_04-lp151.2.21.1.i586", "openSUSE Leap 15.1:xen-tools-domU-4.12.3_04-lp151.2.21.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-07-15T12:42:14Z", "details": "moderate" } ], "title": "CVE-2020-15567" } ] }
opensuse-su-2021:0242-1
Vulnerability from csaf_opensuse
Published
2021-02-05 15:16
Modified
2021-02-05 15:16
Summary
Security update for RT kernel
Notes
Title of the patch
Security update for RT kernel
Description of the patch
This update syncs the RT kernel from the SUSE Linux Enterprise 15-SP2 codestream.
This update was imported from the SUSE:SLE-15-SP2:Update update project.
Patchnames
openSUSE-2021-242
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for RT kernel", "title": "Title of the patch" }, { "category": "description", "text": "\nThis update syncs the RT kernel from the SUSE Linux Enterprise 15-SP2 codestream.\n \nThis update was imported from the SUSE:SLE-15-SP2:Update update project.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-2021-242", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2021_0242-1.json" }, { "category": "self", "summary": "URL for openSUSE-SU-2021:0242-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" }, { "category": "self", "summary": "E-Mail link for openSUSE-SU-2021:0242-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" }, { "category": "self", "summary": "SUSE Bug 1034995", "url": "https://bugzilla.suse.com/1034995" }, { "category": "self", "summary": "SUSE Bug 1040855", "url": "https://bugzilla.suse.com/1040855" }, { "category": "self", "summary": "SUSE Bug 1043347", "url": "https://bugzilla.suse.com/1043347" }, { "category": "self", "summary": "SUSE Bug 1044120", "url": "https://bugzilla.suse.com/1044120" }, { "category": "self", "summary": "SUSE Bug 1044767", "url": "https://bugzilla.suse.com/1044767" }, { "category": "self", "summary": "SUSE Bug 1055014", "url": "https://bugzilla.suse.com/1055014" }, { "category": "self", "summary": "SUSE Bug 1055117", "url": "https://bugzilla.suse.com/1055117" }, { "category": "self", "summary": "SUSE Bug 1055186", "url": "https://bugzilla.suse.com/1055186" }, { "category": "self", "summary": "SUSE Bug 1058115", "url": "https://bugzilla.suse.com/1058115" }, { "category": "self", "summary": "SUSE Bug 1061843", "url": "https://bugzilla.suse.com/1061843" }, { "category": "self", "summary": "SUSE Bug 1065600", "url": "https://bugzilla.suse.com/1065600" }, { "category": "self", "summary": "SUSE Bug 1065729", "url": "https://bugzilla.suse.com/1065729" }, { "category": "self", "summary": "SUSE Bug 1066382", "url": "https://bugzilla.suse.com/1066382" }, { "category": "self", "summary": "SUSE Bug 1071995", "url": "https://bugzilla.suse.com/1071995" }, { "category": "self", "summary": "SUSE Bug 1077428", "url": "https://bugzilla.suse.com/1077428" }, { "category": "self", "summary": "SUSE Bug 1085030", "url": "https://bugzilla.suse.com/1085030" }, { "category": "self", "summary": "SUSE Bug 1094244", "url": "https://bugzilla.suse.com/1094244" }, { "category": "self", "summary": "SUSE Bug 1094840", "url": "https://bugzilla.suse.com/1094840" }, { "category": "self", "summary": "SUSE Bug 1109695", "url": "https://bugzilla.suse.com/1109695" }, { "category": "self", "summary": "SUSE Bug 1115431", "url": "https://bugzilla.suse.com/1115431" }, { "category": "self", "summary": "SUSE Bug 1120163", "url": "https://bugzilla.suse.com/1120163" }, { "category": "self", "summary": "SUSE Bug 1129923", "url": "https://bugzilla.suse.com/1129923" }, { "category": "self", "summary": "SUSE Bug 1133021", "url": "https://bugzilla.suse.com/1133021" }, { "category": "self", "summary": "SUSE Bug 1134760", "url": "https://bugzilla.suse.com/1134760" }, { "category": "self", "summary": "SUSE Bug 1136666", "url": "https://bugzilla.suse.com/1136666" }, { "category": "self", "summary": "SUSE Bug 1138374", "url": "https://bugzilla.suse.com/1138374" }, { "category": "self", "summary": "SUSE Bug 1139944", "url": "https://bugzilla.suse.com/1139944" }, { "category": "self", "summary": "SUSE Bug 1148868", "url": "https://bugzilla.suse.com/1148868" }, { "category": "self", "summary": "SUSE Bug 1149032", "url": "https://bugzilla.suse.com/1149032" }, { "category": "self", "summary": "SUSE Bug 1152148", "url": "https://bugzilla.suse.com/1152148" }, { "category": "self", "summary": "SUSE Bug 1152457", "url": "https://bugzilla.suse.com/1152457" }, { "category": "self", "summary": "SUSE Bug 1152472", "url": "https://bugzilla.suse.com/1152472" }, { "category": "self", "summary": "SUSE Bug 1152489", "url": "https://bugzilla.suse.com/1152489" }, { "category": "self", "summary": "SUSE Bug 1153274", "url": "https://bugzilla.suse.com/1153274" }, { "category": "self", "summary": "SUSE Bug 1154353", "url": "https://bugzilla.suse.com/1154353" }, { "category": "self", "summary": "SUSE Bug 1154488", "url": "https://bugzilla.suse.com/1154488" }, { "category": "self", "summary": "SUSE Bug 1154492", "url": "https://bugzilla.suse.com/1154492" }, { "category": "self", "summary": "SUSE Bug 1154824", "url": "https://bugzilla.suse.com/1154824" }, { "category": "self", "summary": "SUSE Bug 1155518", "url": "https://bugzilla.suse.com/1155518" }, { "category": "self", "summary": "SUSE Bug 1155798", "url": "https://bugzilla.suse.com/1155798" }, { "category": "self", "summary": "SUSE Bug 1156315", "url": "https://bugzilla.suse.com/1156315" }, { "category": "self", "summary": "SUSE Bug 1156395", "url": "https://bugzilla.suse.com/1156395" }, { "category": "self", "summary": "SUSE Bug 1157169", "url": "https://bugzilla.suse.com/1157169" }, { "category": "self", "summary": "SUSE Bug 1158050", "url": "https://bugzilla.suse.com/1158050" }, { "category": "self", "summary": "SUSE Bug 1158242", "url": "https://bugzilla.suse.com/1158242" }, { "category": "self", "summary": "SUSE Bug 1158265", "url": "https://bugzilla.suse.com/1158265" }, { "category": "self", "summary": "SUSE Bug 1158748", "url": "https://bugzilla.suse.com/1158748" }, { "category": "self", "summary": "SUSE Bug 1158765", "url": "https://bugzilla.suse.com/1158765" }, { "category": "self", "summary": "SUSE Bug 1158775", "url": "https://bugzilla.suse.com/1158775" }, { "category": "self", "summary": "SUSE Bug 1158983", "url": "https://bugzilla.suse.com/1158983" }, { "category": "self", "summary": "SUSE Bug 1159058", "url": "https://bugzilla.suse.com/1159058" }, { "category": "self", "summary": "SUSE Bug 1159781", "url": "https://bugzilla.suse.com/1159781" }, { "category": "self", "summary": "SUSE Bug 1159867", "url": "https://bugzilla.suse.com/1159867" }, { "category": "self", "summary": "SUSE Bug 1159886", "url": "https://bugzilla.suse.com/1159886" }, { "category": "self", "summary": "SUSE Bug 1160388", "url": "https://bugzilla.suse.com/1160388" }, { "category": "self", "summary": "SUSE Bug 1160634", "url": "https://bugzilla.suse.com/1160634" }, { "category": "self", "summary": "SUSE Bug 1160947", "url": "https://bugzilla.suse.com/1160947" }, { "category": "self", "summary": "SUSE Bug 1161099", "url": "https://bugzilla.suse.com/1161099" }, { "category": "self", "summary": "SUSE Bug 1161495", "url": "https://bugzilla.suse.com/1161495" }, { "category": "self", "summary": "SUSE Bug 1162002", "url": "https://bugzilla.suse.com/1162002" }, { "category": "self", "summary": "SUSE Bug 1162063", "url": "https://bugzilla.suse.com/1162063" }, { "category": "self", "summary": "SUSE Bug 1162209", "url": "https://bugzilla.suse.com/1162209" }, { "category": "self", "summary": "SUSE Bug 1162400", "url": "https://bugzilla.suse.com/1162400" }, { "category": "self", "summary": "SUSE Bug 1162702", "url": "https://bugzilla.suse.com/1162702" }, { "category": "self", "summary": "SUSE Bug 1163592", "url": "https://bugzilla.suse.com/1163592" }, { "category": "self", "summary": "SUSE Bug 1163727", "url": "https://bugzilla.suse.com/1163727" }, { "category": "self", "summary": "SUSE Bug 1164648", "url": "https://bugzilla.suse.com/1164648" }, { "category": "self", "summary": "SUSE Bug 1164777", "url": "https://bugzilla.suse.com/1164777" }, { "category": "self", "summary": "SUSE Bug 1164780", "url": "https://bugzilla.suse.com/1164780" }, { "category": "self", "summary": "SUSE Bug 1165211", "url": "https://bugzilla.suse.com/1165211" }, { "category": "self", "summary": "SUSE Bug 1165455", "url": "https://bugzilla.suse.com/1165455" }, { "category": "self", "summary": "SUSE Bug 1165629", "url": "https://bugzilla.suse.com/1165629" }, { "category": "self", "summary": "SUSE Bug 1165692", "url": "https://bugzilla.suse.com/1165692" }, { "category": "self", "summary": "SUSE Bug 1165933", "url": "https://bugzilla.suse.com/1165933" }, { "category": "self", "summary": "SUSE Bug 1165975", "url": "https://bugzilla.suse.com/1165975" }, { "category": "self", "summary": "SUSE Bug 1166146", "url": "https://bugzilla.suse.com/1166146" }, { "category": "self", "summary": "SUSE Bug 1166166", "url": "https://bugzilla.suse.com/1166166" }, { "category": "self", "summary": "SUSE Bug 1166340", "url": "https://bugzilla.suse.com/1166340" }, { "category": "self", "summary": "SUSE Bug 1166965", "url": "https://bugzilla.suse.com/1166965" }, { "category": "self", "summary": "SUSE Bug 1166985", "url": "https://bugzilla.suse.com/1166985" }, { "category": "self", "summary": "SUSE Bug 1167030", "url": "https://bugzilla.suse.com/1167030" }, { "category": "self", "summary": "SUSE Bug 1167104", "url": "https://bugzilla.suse.com/1167104" }, { "category": "self", "summary": "SUSE Bug 1167527", "url": "https://bugzilla.suse.com/1167527" }, { "category": "self", "summary": "SUSE Bug 1167651", "url": "https://bugzilla.suse.com/1167651" }, { "category": "self", "summary": "SUSE Bug 1167657", "url": "https://bugzilla.suse.com/1167657" }, { "category": "self", "summary": "SUSE Bug 1167773", "url": "https://bugzilla.suse.com/1167773" }, { "category": "self", "summary": "SUSE Bug 1167851", "url": "https://bugzilla.suse.com/1167851" }, { "category": "self", "summary": "SUSE Bug 1168230", "url": "https://bugzilla.suse.com/1168230" }, { "category": "self", "summary": "SUSE Bug 1168461", "url": "https://bugzilla.suse.com/1168461" }, { "category": "self", "summary": "SUSE Bug 1168468", "url": "https://bugzilla.suse.com/1168468" }, { "category": "self", "summary": "SUSE Bug 1168779", "url": "https://bugzilla.suse.com/1168779" }, { "category": "self", "summary": "SUSE Bug 1168838", "url": "https://bugzilla.suse.com/1168838" }, { "category": "self", "summary": "SUSE Bug 1168952", "url": "https://bugzilla.suse.com/1168952" }, { "category": "self", "summary": "SUSE Bug 1168959", "url": "https://bugzilla.suse.com/1168959" }, { "category": "self", "summary": "SUSE Bug 1169021", "url": "https://bugzilla.suse.com/1169021" }, { "category": "self", "summary": "SUSE Bug 1169094", "url": "https://bugzilla.suse.com/1169094" }, { "category": "self", "summary": "SUSE Bug 1169194", "url": "https://bugzilla.suse.com/1169194" }, { "category": "self", "summary": "SUSE Bug 1169263", "url": "https://bugzilla.suse.com/1169263" }, { "category": "self", "summary": "SUSE Bug 1169514", "url": "https://bugzilla.suse.com/1169514" }, { "category": "self", "summary": "SUSE Bug 1169681", "url": "https://bugzilla.suse.com/1169681" }, { "category": "self", "summary": "SUSE Bug 1169763", "url": "https://bugzilla.suse.com/1169763" }, { "category": "self", "summary": "SUSE Bug 1169771", "url": "https://bugzilla.suse.com/1169771" }, { "category": "self", "summary": "SUSE Bug 1169790", "url": "https://bugzilla.suse.com/1169790" }, { "category": "self", "summary": "SUSE Bug 1169795", "url": "https://bugzilla.suse.com/1169795" }, { "category": "self", "summary": "SUSE Bug 1170011", "url": "https://bugzilla.suse.com/1170011" }, { "category": "self", "summary": "SUSE Bug 1170139", "url": "https://bugzilla.suse.com/1170139" }, { "category": "self", "summary": "SUSE Bug 1170232", "url": "https://bugzilla.suse.com/1170232" }, { "category": "self", "summary": "SUSE Bug 1170284", "url": "https://bugzilla.suse.com/1170284" }, { "category": "self", "summary": "SUSE Bug 1170415", "url": "https://bugzilla.suse.com/1170415" }, { "category": "self", "summary": "SUSE Bug 1170442", "url": "https://bugzilla.suse.com/1170442" }, { "category": "self", "summary": "SUSE Bug 1170617", "url": "https://bugzilla.suse.com/1170617" }, { "category": "self", "summary": "SUSE Bug 1170621", "url": "https://bugzilla.suse.com/1170621" }, { "category": "self", "summary": "SUSE Bug 1170774", "url": "https://bugzilla.suse.com/1170774" }, { "category": "self", "summary": "SUSE Bug 1170879", "url": "https://bugzilla.suse.com/1170879" }, { "category": "self", "summary": "SUSE Bug 1170891", "url": "https://bugzilla.suse.com/1170891" }, { "category": "self", "summary": "SUSE Bug 1170895", "url": "https://bugzilla.suse.com/1170895" }, { "category": "self", "summary": "SUSE Bug 1171000", "url": "https://bugzilla.suse.com/1171000" }, { "category": "self", "summary": "SUSE Bug 1171068", "url": "https://bugzilla.suse.com/1171068" }, { "category": "self", "summary": "SUSE Bug 1171073", "url": "https://bugzilla.suse.com/1171073" }, { "category": "self", "summary": "SUSE Bug 1171078", "url": "https://bugzilla.suse.com/1171078" }, { "category": "self", "summary": "SUSE Bug 1171117", "url": "https://bugzilla.suse.com/1171117" }, { "category": "self", "summary": "SUSE Bug 1171150", "url": "https://bugzilla.suse.com/1171150" }, { "category": "self", "summary": "SUSE Bug 1171156", "url": "https://bugzilla.suse.com/1171156" }, { "category": "self", "summary": "SUSE Bug 1171189", "url": "https://bugzilla.suse.com/1171189" }, { "category": "self", "summary": "SUSE Bug 1171191", "url": "https://bugzilla.suse.com/1171191" }, { "category": "self", "summary": "SUSE Bug 1171218", "url": "https://bugzilla.suse.com/1171218" }, { "category": "self", "summary": "SUSE Bug 1171219", "url": "https://bugzilla.suse.com/1171219" }, { "category": "self", "summary": "SUSE Bug 1171220", "url": "https://bugzilla.suse.com/1171220" }, { "category": "self", "summary": "SUSE Bug 1171236", "url": "https://bugzilla.suse.com/1171236" }, { "category": "self", "summary": "SUSE Bug 1171242", "url": "https://bugzilla.suse.com/1171242" }, { "category": "self", "summary": "SUSE Bug 1171246", "url": "https://bugzilla.suse.com/1171246" }, { "category": "self", "summary": "SUSE Bug 1171285", "url": "https://bugzilla.suse.com/1171285" }, { "category": "self", "summary": "SUSE Bug 1171293", "url": "https://bugzilla.suse.com/1171293" }, { "category": "self", "summary": "SUSE Bug 1171374", "url": "https://bugzilla.suse.com/1171374" }, { "category": "self", "summary": "SUSE Bug 1171390", "url": "https://bugzilla.suse.com/1171390" }, { "category": "self", "summary": "SUSE Bug 1171391", "url": "https://bugzilla.suse.com/1171391" }, { "category": "self", "summary": "SUSE Bug 1171392", "url": "https://bugzilla.suse.com/1171392" }, { "category": "self", "summary": "SUSE Bug 1171417", "url": "https://bugzilla.suse.com/1171417" }, { "category": "self", "summary": "SUSE Bug 1171426", "url": "https://bugzilla.suse.com/1171426" }, { "category": "self", "summary": "SUSE Bug 1171507", "url": "https://bugzilla.suse.com/1171507" }, { "category": "self", "summary": "SUSE Bug 1171513", "url": "https://bugzilla.suse.com/1171513" }, { "category": "self", "summary": "SUSE Bug 1171514", "url": "https://bugzilla.suse.com/1171514" }, { "category": "self", "summary": "SUSE Bug 1171529", "url": "https://bugzilla.suse.com/1171529" }, { "category": "self", "summary": "SUSE Bug 1171530", "url": "https://bugzilla.suse.com/1171530" }, { "category": "self", "summary": "SUSE Bug 1171558", "url": "https://bugzilla.suse.com/1171558" }, { "category": "self", "summary": "SUSE Bug 1171634", "url": "https://bugzilla.suse.com/1171634" }, { "category": "self", "summary": "SUSE Bug 1171644", "url": "https://bugzilla.suse.com/1171644" }, { "category": "self", "summary": "SUSE Bug 1171662", "url": "https://bugzilla.suse.com/1171662" }, { "category": "self", "summary": "SUSE Bug 1171675", "url": "https://bugzilla.suse.com/1171675" }, { "category": "self", "summary": "SUSE Bug 1171688", "url": "https://bugzilla.suse.com/1171688" }, { "category": "self", "summary": "SUSE Bug 1171699", "url": "https://bugzilla.suse.com/1171699" }, { "category": "self", "summary": "SUSE Bug 1171709", "url": "https://bugzilla.suse.com/1171709" }, { "category": "self", "summary": "SUSE Bug 1171730", "url": "https://bugzilla.suse.com/1171730" }, { "category": "self", "summary": "SUSE Bug 1171732", "url": "https://bugzilla.suse.com/1171732" }, { "category": "self", "summary": "SUSE Bug 1171736", "url": "https://bugzilla.suse.com/1171736" }, { "category": "self", "summary": "SUSE Bug 1171739", "url": "https://bugzilla.suse.com/1171739" }, { "category": "self", "summary": "SUSE Bug 1171742", "url": "https://bugzilla.suse.com/1171742" }, { "category": "self", "summary": "SUSE Bug 1171743", "url": "https://bugzilla.suse.com/1171743" }, { "category": "self", "summary": "SUSE Bug 1171759", "url": "https://bugzilla.suse.com/1171759" }, { "category": "self", "summary": "SUSE Bug 1171773", "url": "https://bugzilla.suse.com/1171773" }, { "category": "self", "summary": "SUSE Bug 1171774", "url": "https://bugzilla.suse.com/1171774" }, { "category": "self", "summary": "SUSE Bug 1171775", "url": "https://bugzilla.suse.com/1171775" }, { "category": "self", "summary": "SUSE Bug 1171776", "url": "https://bugzilla.suse.com/1171776" }, { "category": "self", "summary": "SUSE Bug 1171777", "url": "https://bugzilla.suse.com/1171777" }, { "category": "self", "summary": "SUSE Bug 1171778", "url": "https://bugzilla.suse.com/1171778" }, { "category": "self", "summary": "SUSE Bug 1171779", "url": "https://bugzilla.suse.com/1171779" }, { "category": "self", "summary": "SUSE Bug 1171780", "url": "https://bugzilla.suse.com/1171780" }, { "category": "self", "summary": "SUSE Bug 1171781", "url": "https://bugzilla.suse.com/1171781" }, { "category": "self", "summary": "SUSE Bug 1171782", "url": "https://bugzilla.suse.com/1171782" }, { "category": "self", "summary": "SUSE Bug 1171783", "url": "https://bugzilla.suse.com/1171783" }, { "category": "self", "summary": "SUSE Bug 1171784", "url": "https://bugzilla.suse.com/1171784" }, { "category": "self", "summary": "SUSE Bug 1171785", "url": "https://bugzilla.suse.com/1171785" }, { "category": "self", "summary": "SUSE Bug 1171786", "url": "https://bugzilla.suse.com/1171786" }, { "category": "self", "summary": "SUSE Bug 1171787", "url": "https://bugzilla.suse.com/1171787" }, { "category": "self", "summary": "SUSE Bug 1171788", "url": "https://bugzilla.suse.com/1171788" }, { "category": "self", "summary": "SUSE Bug 1171789", "url": "https://bugzilla.suse.com/1171789" }, { "category": "self", "summary": "SUSE Bug 1171790", "url": "https://bugzilla.suse.com/1171790" }, { "category": "self", "summary": "SUSE Bug 1171791", "url": "https://bugzilla.suse.com/1171791" }, { "category": "self", "summary": "SUSE Bug 1171792", "url": "https://bugzilla.suse.com/1171792" }, { "category": "self", "summary": "SUSE Bug 1171793", "url": "https://bugzilla.suse.com/1171793" }, { "category": "self", "summary": "SUSE Bug 1171794", "url": "https://bugzilla.suse.com/1171794" }, { "category": "self", "summary": "SUSE Bug 1171795", "url": "https://bugzilla.suse.com/1171795" }, { "category": "self", "summary": "SUSE Bug 1171796", "url": "https://bugzilla.suse.com/1171796" }, { "category": "self", "summary": "SUSE Bug 1171797", "url": "https://bugzilla.suse.com/1171797" }, { "category": "self", "summary": "SUSE Bug 1171798", "url": "https://bugzilla.suse.com/1171798" }, { "category": "self", "summary": "SUSE Bug 1171799", "url": "https://bugzilla.suse.com/1171799" }, { "category": "self", "summary": "SUSE Bug 1171810", "url": "https://bugzilla.suse.com/1171810" }, { "category": "self", "summary": "SUSE Bug 1171827", "url": "https://bugzilla.suse.com/1171827" }, { "category": "self", "summary": "SUSE Bug 1171828", "url": "https://bugzilla.suse.com/1171828" }, { "category": "self", "summary": "SUSE Bug 1171832", "url": "https://bugzilla.suse.com/1171832" }, { "category": "self", "summary": "SUSE Bug 1171833", "url": "https://bugzilla.suse.com/1171833" }, { "category": "self", "summary": "SUSE Bug 1171834", "url": "https://bugzilla.suse.com/1171834" }, { "category": "self", "summary": "SUSE Bug 1171835", "url": "https://bugzilla.suse.com/1171835" }, { "category": "self", "summary": "SUSE Bug 1171839", "url": "https://bugzilla.suse.com/1171839" }, { "category": "self", "summary": "SUSE Bug 1171840", "url": "https://bugzilla.suse.com/1171840" }, { "category": "self", "summary": "SUSE Bug 1171841", "url": "https://bugzilla.suse.com/1171841" }, { "category": "self", "summary": "SUSE Bug 1171842", "url": "https://bugzilla.suse.com/1171842" }, { "category": "self", "summary": "SUSE Bug 1171843", "url": "https://bugzilla.suse.com/1171843" }, { "category": "self", "summary": "SUSE Bug 1171844", "url": "https://bugzilla.suse.com/1171844" }, { "category": "self", "summary": "SUSE Bug 1171849", "url": "https://bugzilla.suse.com/1171849" }, { "category": "self", "summary": "SUSE Bug 1171857", "url": "https://bugzilla.suse.com/1171857" }, { "category": "self", "summary": "SUSE Bug 1171868", "url": "https://bugzilla.suse.com/1171868" }, { "category": "self", "summary": "SUSE Bug 1171904", "url": "https://bugzilla.suse.com/1171904" }, { "category": "self", "summary": "SUSE Bug 1171915", "url": "https://bugzilla.suse.com/1171915" }, { "category": "self", "summary": "SUSE Bug 1171982", "url": "https://bugzilla.suse.com/1171982" }, { "category": "self", "summary": "SUSE Bug 1171983", "url": "https://bugzilla.suse.com/1171983" }, { "category": "self", "summary": "SUSE Bug 1171988", "url": "https://bugzilla.suse.com/1171988" }, { "category": "self", "summary": "SUSE Bug 1172017", "url": "https://bugzilla.suse.com/1172017" }, { "category": "self", "summary": "SUSE Bug 1172046", "url": "https://bugzilla.suse.com/1172046" }, { "category": "self", "summary": "SUSE Bug 1172061", "url": "https://bugzilla.suse.com/1172061" }, { "category": "self", "summary": "SUSE Bug 1172062", "url": "https://bugzilla.suse.com/1172062" }, { "category": "self", "summary": "SUSE Bug 1172063", "url": "https://bugzilla.suse.com/1172063" }, { "category": "self", "summary": "SUSE Bug 1172064", "url": "https://bugzilla.suse.com/1172064" }, { "category": "self", "summary": "SUSE Bug 1172065", "url": "https://bugzilla.suse.com/1172065" }, { "category": "self", "summary": "SUSE Bug 1172066", "url": "https://bugzilla.suse.com/1172066" }, { "category": "self", "summary": "SUSE Bug 1172067", "url": "https://bugzilla.suse.com/1172067" }, { "category": "self", "summary": "SUSE Bug 1172068", "url": "https://bugzilla.suse.com/1172068" }, { "category": "self", "summary": "SUSE Bug 1172069", "url": "https://bugzilla.suse.com/1172069" }, { "category": "self", "summary": "SUSE Bug 1172073", "url": "https://bugzilla.suse.com/1172073" }, { "category": "self", "summary": "SUSE Bug 1172086", "url": "https://bugzilla.suse.com/1172086" }, { "category": "self", "summary": "SUSE Bug 1172095", "url": "https://bugzilla.suse.com/1172095" }, { "category": "self", "summary": "SUSE Bug 1172108", "url": "https://bugzilla.suse.com/1172108" }, { "category": "self", "summary": "SUSE Bug 1172145", "url": "https://bugzilla.suse.com/1172145" }, { "category": "self", "summary": "SUSE Bug 1172169", "url": "https://bugzilla.suse.com/1172169" }, { "category": "self", "summary": "SUSE Bug 1172170", "url": "https://bugzilla.suse.com/1172170" }, { "category": "self", "summary": "SUSE Bug 1172197", "url": "https://bugzilla.suse.com/1172197" }, { "category": "self", "summary": "SUSE Bug 1172201", "url": "https://bugzilla.suse.com/1172201" }, { "category": "self", "summary": "SUSE Bug 1172208", "url": "https://bugzilla.suse.com/1172208" }, { "category": "self", "summary": "SUSE Bug 1172223", "url": "https://bugzilla.suse.com/1172223" }, { "category": "self", "summary": "SUSE Bug 1172247", "url": "https://bugzilla.suse.com/1172247" }, { "category": "self", "summary": "SUSE Bug 1172317", "url": "https://bugzilla.suse.com/1172317" }, { "category": "self", "summary": "SUSE Bug 1172342", "url": "https://bugzilla.suse.com/1172342" }, { "category": "self", "summary": "SUSE Bug 1172343", "url": "https://bugzilla.suse.com/1172343" }, { "category": "self", "summary": "SUSE Bug 1172344", "url": "https://bugzilla.suse.com/1172344" }, { "category": "self", "summary": "SUSE Bug 1172365", "url": "https://bugzilla.suse.com/1172365" }, { "category": "self", "summary": "SUSE Bug 1172366", "url": "https://bugzilla.suse.com/1172366" }, { "category": "self", "summary": "SUSE Bug 1172374", "url": "https://bugzilla.suse.com/1172374" }, { "category": "self", "summary": "SUSE Bug 1172391", "url": "https://bugzilla.suse.com/1172391" }, { "category": "self", "summary": "SUSE Bug 1172393", "url": "https://bugzilla.suse.com/1172393" }, { "category": "self", "summary": "SUSE Bug 1172394", "url": "https://bugzilla.suse.com/1172394" }, { "category": "self", "summary": "SUSE Bug 1172418", "url": "https://bugzilla.suse.com/1172418" }, { "category": "self", "summary": "SUSE Bug 1172419", "url": "https://bugzilla.suse.com/1172419" }, { "category": "self", "summary": "SUSE Bug 1172453", "url": "https://bugzilla.suse.com/1172453" }, { "category": "self", "summary": "SUSE Bug 1172458", "url": "https://bugzilla.suse.com/1172458" }, { "category": "self", "summary": "SUSE Bug 1172467", "url": "https://bugzilla.suse.com/1172467" }, { "category": "self", "summary": "SUSE Bug 1172484", "url": "https://bugzilla.suse.com/1172484" }, { "category": "self", "summary": "SUSE Bug 1172537", "url": "https://bugzilla.suse.com/1172537" }, { "category": "self", "summary": "SUSE Bug 1172543", "url": "https://bugzilla.suse.com/1172543" }, { "category": "self", "summary": "SUSE Bug 1172687", "url": "https://bugzilla.suse.com/1172687" }, { "category": "self", "summary": "SUSE Bug 1172719", "url": "https://bugzilla.suse.com/1172719" }, { "category": "self", "summary": "SUSE Bug 1172733", "url": "https://bugzilla.suse.com/1172733" }, { "category": "self", "summary": "SUSE Bug 1172739", "url": "https://bugzilla.suse.com/1172739" }, { "category": "self", "summary": "SUSE Bug 1172751", "url": "https://bugzilla.suse.com/1172751" }, { "category": "self", "summary": "SUSE Bug 1172757", "url": "https://bugzilla.suse.com/1172757" }, { "category": "self", "summary": "SUSE Bug 1172759", "url": "https://bugzilla.suse.com/1172759" }, { "category": "self", "summary": "SUSE Bug 1172775", "url": "https://bugzilla.suse.com/1172775" }, { "category": "self", "summary": "SUSE Bug 1172781", "url": "https://bugzilla.suse.com/1172781" }, { "category": "self", "summary": "SUSE Bug 1172782", "url": "https://bugzilla.suse.com/1172782" }, { "category": "self", "summary": "SUSE Bug 1172783", "url": "https://bugzilla.suse.com/1172783" }, { "category": "self", "summary": "SUSE Bug 1172814", "url": "https://bugzilla.suse.com/1172814" }, { "category": "self", "summary": "SUSE Bug 1172823", "url": "https://bugzilla.suse.com/1172823" }, { "category": "self", "summary": "SUSE Bug 1172841", "url": "https://bugzilla.suse.com/1172841" }, { "category": "self", "summary": "SUSE Bug 1172871", "url": "https://bugzilla.suse.com/1172871" }, { "category": "self", "summary": "SUSE Bug 1172873", "url": "https://bugzilla.suse.com/1172873" }, { "category": "self", "summary": "SUSE Bug 1172938", "url": "https://bugzilla.suse.com/1172938" }, { "category": "self", "summary": "SUSE Bug 1172939", "url": "https://bugzilla.suse.com/1172939" }, { "category": "self", "summary": "SUSE Bug 1172940", "url": "https://bugzilla.suse.com/1172940" }, { "category": "self", "summary": "SUSE Bug 1172956", "url": "https://bugzilla.suse.com/1172956" }, { "category": "self", "summary": "SUSE Bug 1172963", "url": "https://bugzilla.suse.com/1172963" }, { "category": "self", "summary": "SUSE Bug 1172983", "url": "https://bugzilla.suse.com/1172983" }, { "category": "self", "summary": "SUSE Bug 1172984", "url": "https://bugzilla.suse.com/1172984" }, { "category": "self", "summary": "SUSE Bug 1172985", "url": "https://bugzilla.suse.com/1172985" }, { "category": "self", "summary": "SUSE Bug 1172986", "url": "https://bugzilla.suse.com/1172986" }, { "category": "self", "summary": "SUSE Bug 1172987", "url": "https://bugzilla.suse.com/1172987" }, { "category": "self", "summary": "SUSE Bug 1172988", "url": "https://bugzilla.suse.com/1172988" }, { "category": "self", "summary": "SUSE Bug 1172989", "url": "https://bugzilla.suse.com/1172989" }, { "category": "self", "summary": "SUSE Bug 1172990", "url": "https://bugzilla.suse.com/1172990" }, { "category": "self", "summary": "SUSE Bug 1172999", "url": "https://bugzilla.suse.com/1172999" }, { "category": "self", "summary": "SUSE Bug 1173017", "url": "https://bugzilla.suse.com/1173017" }, { "category": "self", "summary": "SUSE Bug 1173068", "url": "https://bugzilla.suse.com/1173068" }, { "category": "self", "summary": "SUSE Bug 1173074", "url": "https://bugzilla.suse.com/1173074" }, { "category": "self", "summary": "SUSE Bug 1173085", "url": "https://bugzilla.suse.com/1173085" }, { "category": "self", "summary": "SUSE Bug 1173115", "url": "https://bugzilla.suse.com/1173115" }, { "category": "self", "summary": "SUSE Bug 1173139", "url": "https://bugzilla.suse.com/1173139" }, { "category": "self", "summary": "SUSE Bug 1173206", "url": "https://bugzilla.suse.com/1173206" }, { "category": "self", "summary": "SUSE Bug 1173267", "url": "https://bugzilla.suse.com/1173267" }, { "category": "self", "summary": "SUSE Bug 1173271", "url": "https://bugzilla.suse.com/1173271" }, { "category": "self", "summary": "SUSE Bug 1173280", "url": "https://bugzilla.suse.com/1173280" }, { "category": "self", "summary": "SUSE Bug 1173284", "url": "https://bugzilla.suse.com/1173284" }, { "category": "self", "summary": "SUSE Bug 1173428", "url": "https://bugzilla.suse.com/1173428" }, { "category": "self", "summary": "SUSE Bug 1173438", "url": "https://bugzilla.suse.com/1173438" }, { "category": "self", "summary": "SUSE Bug 1173461", "url": "https://bugzilla.suse.com/1173461" }, { "category": "self", "summary": "SUSE Bug 1173468", "url": "https://bugzilla.suse.com/1173468" }, { "category": "self", "summary": "SUSE Bug 1173485", "url": "https://bugzilla.suse.com/1173485" }, { "category": "self", "summary": "SUSE Bug 1173514", "url": "https://bugzilla.suse.com/1173514" }, { "category": "self", "summary": "SUSE Bug 1173552", "url": "https://bugzilla.suse.com/1173552" }, { "category": "self", "summary": "SUSE Bug 1173573", "url": "https://bugzilla.suse.com/1173573" }, { "category": "self", "summary": "SUSE Bug 1173625", "url": "https://bugzilla.suse.com/1173625" }, { "category": "self", "summary": "SUSE Bug 1173746", "url": "https://bugzilla.suse.com/1173746" }, { "category": "self", "summary": "SUSE Bug 1173776", "url": "https://bugzilla.suse.com/1173776" }, { "category": "self", "summary": "SUSE Bug 1173798", "url": "https://bugzilla.suse.com/1173798" }, { "category": "self", "summary": "SUSE Bug 1173813", "url": "https://bugzilla.suse.com/1173813" }, { "category": "self", "summary": "SUSE Bug 1173817", "url": "https://bugzilla.suse.com/1173817" }, { "category": "self", "summary": "SUSE Bug 1173818", "url": "https://bugzilla.suse.com/1173818" }, { "category": "self", "summary": "SUSE Bug 1173820", "url": "https://bugzilla.suse.com/1173820" }, { "category": "self", "summary": "SUSE Bug 1173822", "url": "https://bugzilla.suse.com/1173822" }, { "category": "self", "summary": "SUSE Bug 1173823", "url": "https://bugzilla.suse.com/1173823" }, { "category": "self", "summary": "SUSE Bug 1173824", "url": "https://bugzilla.suse.com/1173824" }, { "category": "self", "summary": "SUSE Bug 1173825", "url": "https://bugzilla.suse.com/1173825" }, { "category": "self", "summary": "SUSE Bug 1173826", "url": "https://bugzilla.suse.com/1173826" }, { "category": "self", "summary": "SUSE Bug 1173827", "url": "https://bugzilla.suse.com/1173827" }, { "category": "self", "summary": "SUSE Bug 1173828", "url": "https://bugzilla.suse.com/1173828" }, { "category": "self", "summary": "SUSE Bug 1173830", "url": "https://bugzilla.suse.com/1173830" }, { "category": "self", "summary": "SUSE Bug 1173831", "url": "https://bugzilla.suse.com/1173831" }, { "category": "self", "summary": "SUSE Bug 1173832", "url": "https://bugzilla.suse.com/1173832" }, { "category": "self", "summary": "SUSE Bug 1173833", "url": "https://bugzilla.suse.com/1173833" }, { "category": "self", "summary": "SUSE Bug 1173834", "url": "https://bugzilla.suse.com/1173834" }, { "category": "self", "summary": "SUSE Bug 1173836", "url": "https://bugzilla.suse.com/1173836" }, { "category": "self", "summary": "SUSE Bug 1173837", "url": "https://bugzilla.suse.com/1173837" }, { "category": "self", "summary": "SUSE Bug 1173838", "url": "https://bugzilla.suse.com/1173838" }, { "category": "self", "summary": "SUSE Bug 1173839", "url": "https://bugzilla.suse.com/1173839" }, { "category": "self", "summary": "SUSE Bug 1173841", "url": "https://bugzilla.suse.com/1173841" }, { "category": "self", "summary": "SUSE Bug 1173843", "url": "https://bugzilla.suse.com/1173843" }, { "category": "self", "summary": "SUSE Bug 1173844", "url": "https://bugzilla.suse.com/1173844" }, { "category": "self", "summary": "SUSE Bug 1173845", "url": "https://bugzilla.suse.com/1173845" }, { "category": "self", "summary": "SUSE Bug 1173847", "url": "https://bugzilla.suse.com/1173847" }, { "category": "self", "summary": "SUSE Bug 1173849", "url": "https://bugzilla.suse.com/1173849" }, { "category": "self", "summary": "SUSE Bug 1173860", "url": "https://bugzilla.suse.com/1173860" }, { "category": "self", "summary": "SUSE Bug 1173894", "url": "https://bugzilla.suse.com/1173894" }, { "category": "self", "summary": "SUSE Bug 1173941", "url": "https://bugzilla.suse.com/1173941" }, { "category": "self", "summary": "SUSE Bug 1173954", "url": "https://bugzilla.suse.com/1173954" }, { "category": "self", "summary": "SUSE Bug 1174002", "url": "https://bugzilla.suse.com/1174002" }, { "category": "self", "summary": "SUSE Bug 1174003", "url": "https://bugzilla.suse.com/1174003" }, { "category": "self", "summary": "SUSE Bug 1174018", "url": "https://bugzilla.suse.com/1174018" }, { "category": "self", "summary": "SUSE Bug 1174026", "url": "https://bugzilla.suse.com/1174026" }, { "category": "self", "summary": "SUSE Bug 1174029", "url": "https://bugzilla.suse.com/1174029" }, { "category": "self", "summary": "SUSE Bug 1174072", "url": "https://bugzilla.suse.com/1174072" }, { "category": "self", "summary": "SUSE Bug 1174098", "url": "https://bugzilla.suse.com/1174098" }, { "category": "self", "summary": "SUSE Bug 1174110", "url": "https://bugzilla.suse.com/1174110" }, { "category": "self", "summary": "SUSE Bug 1174111", "url": "https://bugzilla.suse.com/1174111" }, { "category": "self", "summary": "SUSE Bug 1174116", "url": "https://bugzilla.suse.com/1174116" }, { "category": "self", "summary": "SUSE Bug 1174126", "url": "https://bugzilla.suse.com/1174126" }, { "category": "self", "summary": "SUSE Bug 1174127", "url": "https://bugzilla.suse.com/1174127" }, { "category": "self", "summary": "SUSE Bug 1174128", "url": "https://bugzilla.suse.com/1174128" }, { "category": "self", "summary": "SUSE Bug 1174129", "url": "https://bugzilla.suse.com/1174129" }, { "category": "self", "summary": "SUSE Bug 1174146", "url": "https://bugzilla.suse.com/1174146" }, { "category": "self", "summary": "SUSE Bug 1174185", "url": "https://bugzilla.suse.com/1174185" }, { "category": "self", "summary": "SUSE Bug 1174205", "url": "https://bugzilla.suse.com/1174205" }, { "category": "self", "summary": "SUSE Bug 1174244", "url": "https://bugzilla.suse.com/1174244" }, { "category": "self", "summary": "SUSE Bug 1174263", "url": "https://bugzilla.suse.com/1174263" }, { "category": "self", "summary": "SUSE Bug 1174264", "url": "https://bugzilla.suse.com/1174264" }, { "category": "self", "summary": "SUSE Bug 1174331", "url": "https://bugzilla.suse.com/1174331" }, { "category": "self", "summary": "SUSE Bug 1174332", "url": "https://bugzilla.suse.com/1174332" }, { "category": "self", "summary": "SUSE Bug 1174333", "url": "https://bugzilla.suse.com/1174333" }, { "category": "self", "summary": "SUSE Bug 1174345", "url": "https://bugzilla.suse.com/1174345" }, { "category": "self", "summary": "SUSE Bug 1174356", "url": "https://bugzilla.suse.com/1174356" }, { "category": "self", "summary": "SUSE Bug 1174358", "url": "https://bugzilla.suse.com/1174358" }, { "category": "self", "summary": "SUSE Bug 1174362", "url": "https://bugzilla.suse.com/1174362" }, { "category": "self", "summary": "SUSE Bug 1174387", "url": "https://bugzilla.suse.com/1174387" }, { "category": "self", "summary": "SUSE Bug 1174396", "url": "https://bugzilla.suse.com/1174396" }, { "category": "self", "summary": "SUSE Bug 1174398", "url": "https://bugzilla.suse.com/1174398" }, { "category": "self", "summary": "SUSE Bug 1174407", "url": "https://bugzilla.suse.com/1174407" }, { "category": "self", "summary": "SUSE Bug 1174409", "url": "https://bugzilla.suse.com/1174409" }, { "category": "self", "summary": "SUSE Bug 1174411", "url": "https://bugzilla.suse.com/1174411" }, { "category": "self", "summary": "SUSE Bug 1174438", "url": "https://bugzilla.suse.com/1174438" }, { "category": "self", "summary": "SUSE Bug 1174462", "url": "https://bugzilla.suse.com/1174462" }, { "category": "self", "summary": "SUSE Bug 1174484", "url": "https://bugzilla.suse.com/1174484" }, { "category": "self", "summary": "SUSE Bug 1174486", "url": "https://bugzilla.suse.com/1174486" }, { "category": "self", "summary": "SUSE Bug 1174513", "url": "https://bugzilla.suse.com/1174513" }, { "category": "self", "summary": "SUSE Bug 1174527", "url": "https://bugzilla.suse.com/1174527" }, { "category": "self", "summary": "SUSE Bug 1174625", "url": "https://bugzilla.suse.com/1174625" }, { "category": "self", "summary": "SUSE Bug 1174627", "url": "https://bugzilla.suse.com/1174627" }, { "category": "self", "summary": "SUSE Bug 1174645", "url": "https://bugzilla.suse.com/1174645" }, { "category": "self", "summary": "SUSE Bug 1174689", "url": "https://bugzilla.suse.com/1174689" }, { "category": "self", "summary": "SUSE Bug 1174699", "url": "https://bugzilla.suse.com/1174699" }, { "category": "self", "summary": "SUSE Bug 1174737", "url": "https://bugzilla.suse.com/1174737" }, { "category": "self", "summary": "SUSE Bug 1174748", "url": "https://bugzilla.suse.com/1174748" }, { "category": "self", "summary": "SUSE Bug 1174757", "url": "https://bugzilla.suse.com/1174757" }, { "category": "self", "summary": "SUSE Bug 1174762", "url": "https://bugzilla.suse.com/1174762" }, { "category": "self", "summary": "SUSE Bug 1174770", "url": "https://bugzilla.suse.com/1174770" }, { "category": "self", "summary": "SUSE Bug 1174771", "url": "https://bugzilla.suse.com/1174771" }, { "category": "self", "summary": "SUSE Bug 1174777", "url": "https://bugzilla.suse.com/1174777" }, { "category": "self", "summary": "SUSE Bug 1174805", "url": "https://bugzilla.suse.com/1174805" }, { "category": "self", "summary": "SUSE Bug 1174824", "url": "https://bugzilla.suse.com/1174824" }, { "category": "self", "summary": "SUSE Bug 1174825", "url": "https://bugzilla.suse.com/1174825" }, { "category": "self", "summary": "SUSE Bug 1174852", "url": "https://bugzilla.suse.com/1174852" }, { "category": "self", "summary": "SUSE Bug 1174865", "url": "https://bugzilla.suse.com/1174865" }, { "category": "self", "summary": "SUSE Bug 1174880", "url": "https://bugzilla.suse.com/1174880" }, { "category": "self", "summary": "SUSE Bug 1174897", "url": "https://bugzilla.suse.com/1174897" }, { "category": "self", "summary": "SUSE Bug 1174899", "url": "https://bugzilla.suse.com/1174899" }, { "category": "self", "summary": "SUSE Bug 1174906", "url": "https://bugzilla.suse.com/1174906" }, { "category": "self", "summary": "SUSE Bug 1174969", "url": "https://bugzilla.suse.com/1174969" }, { "category": "self", "summary": "SUSE Bug 1175009", "url": "https://bugzilla.suse.com/1175009" }, { "category": "self", "summary": "SUSE Bug 1175010", "url": "https://bugzilla.suse.com/1175010" }, { "category": "self", "summary": "SUSE Bug 1175011", "url": "https://bugzilla.suse.com/1175011" }, { "category": "self", "summary": "SUSE Bug 1175012", "url": "https://bugzilla.suse.com/1175012" }, { "category": "self", "summary": "SUSE Bug 1175013", "url": "https://bugzilla.suse.com/1175013" }, { "category": "self", "summary": "SUSE Bug 1175014", "url": "https://bugzilla.suse.com/1175014" }, { "category": "self", "summary": "SUSE Bug 1175015", "url": "https://bugzilla.suse.com/1175015" }, { "category": "self", "summary": "SUSE Bug 1175016", "url": "https://bugzilla.suse.com/1175016" }, { "category": "self", "summary": "SUSE Bug 1175017", "url": "https://bugzilla.suse.com/1175017" }, { "category": "self", "summary": "SUSE Bug 1175018", "url": "https://bugzilla.suse.com/1175018" }, { "category": "self", "summary": "SUSE Bug 1175019", "url": "https://bugzilla.suse.com/1175019" }, { "category": "self", "summary": "SUSE Bug 1175020", "url": "https://bugzilla.suse.com/1175020" }, { "category": "self", "summary": "SUSE Bug 1175021", "url": "https://bugzilla.suse.com/1175021" }, { "category": "self", "summary": "SUSE Bug 1175052", "url": "https://bugzilla.suse.com/1175052" }, { "category": "self", "summary": "SUSE Bug 1175079", "url": "https://bugzilla.suse.com/1175079" }, { "category": "self", "summary": "SUSE Bug 1175112", "url": "https://bugzilla.suse.com/1175112" }, { "category": "self", "summary": "SUSE Bug 1175116", "url": "https://bugzilla.suse.com/1175116" }, { "category": "self", "summary": "SUSE Bug 1175128", "url": "https://bugzilla.suse.com/1175128" }, { "category": "self", "summary": "SUSE Bug 1175149", "url": "https://bugzilla.suse.com/1175149" }, { "category": "self", "summary": "SUSE Bug 1175175", "url": "https://bugzilla.suse.com/1175175" }, { "category": "self", "summary": "SUSE Bug 1175176", "url": "https://bugzilla.suse.com/1175176" }, { "category": "self", "summary": "SUSE Bug 1175180", "url": "https://bugzilla.suse.com/1175180" }, { "category": "self", "summary": "SUSE Bug 1175181", "url": "https://bugzilla.suse.com/1175181" }, { "category": "self", "summary": "SUSE Bug 1175182", "url": "https://bugzilla.suse.com/1175182" }, { "category": "self", "summary": "SUSE Bug 1175183", "url": "https://bugzilla.suse.com/1175183" }, { "category": "self", "summary": "SUSE Bug 1175184", "url": "https://bugzilla.suse.com/1175184" }, { "category": "self", "summary": "SUSE Bug 1175185", "url": "https://bugzilla.suse.com/1175185" }, { "category": "self", "summary": "SUSE Bug 1175186", "url": "https://bugzilla.suse.com/1175186" }, { "category": "self", "summary": "SUSE Bug 1175187", "url": "https://bugzilla.suse.com/1175187" }, { "category": "self", "summary": "SUSE Bug 1175188", "url": "https://bugzilla.suse.com/1175188" }, { "category": "self", "summary": "SUSE Bug 1175189", "url": "https://bugzilla.suse.com/1175189" }, { "category": "self", "summary": "SUSE Bug 1175190", "url": "https://bugzilla.suse.com/1175190" }, { "category": "self", "summary": "SUSE Bug 1175191", "url": "https://bugzilla.suse.com/1175191" }, { "category": "self", "summary": "SUSE Bug 1175192", "url": "https://bugzilla.suse.com/1175192" }, { "category": "self", "summary": "SUSE Bug 1175195", "url": "https://bugzilla.suse.com/1175195" }, { "category": "self", "summary": "SUSE Bug 1175199", "url": "https://bugzilla.suse.com/1175199" }, { "category": "self", "summary": "SUSE Bug 1175213", "url": "https://bugzilla.suse.com/1175213" }, { "category": "self", "summary": "SUSE Bug 1175232", "url": "https://bugzilla.suse.com/1175232" }, { "category": "self", "summary": "SUSE Bug 1175263", "url": "https://bugzilla.suse.com/1175263" }, { "category": "self", "summary": "SUSE Bug 1175284", "url": "https://bugzilla.suse.com/1175284" }, { "category": "self", "summary": "SUSE Bug 1175296", "url": "https://bugzilla.suse.com/1175296" }, { "category": "self", "summary": "SUSE Bug 1175306", "url": "https://bugzilla.suse.com/1175306" }, { "category": "self", "summary": "SUSE Bug 1175344", "url": "https://bugzilla.suse.com/1175344" }, { "category": "self", "summary": "SUSE Bug 1175345", "url": "https://bugzilla.suse.com/1175345" }, { "category": "self", "summary": "SUSE Bug 1175346", "url": "https://bugzilla.suse.com/1175346" }, { "category": "self", "summary": "SUSE Bug 1175347", "url": "https://bugzilla.suse.com/1175347" }, { "category": "self", "summary": "SUSE Bug 1175367", "url": "https://bugzilla.suse.com/1175367" }, { "category": "self", "summary": "SUSE Bug 1175377", "url": "https://bugzilla.suse.com/1175377" }, { "category": "self", "summary": "SUSE Bug 1175440", "url": "https://bugzilla.suse.com/1175440" }, { "category": "self", "summary": "SUSE Bug 1175480", "url": "https://bugzilla.suse.com/1175480" }, { "category": "self", "summary": "SUSE Bug 1175493", "url": "https://bugzilla.suse.com/1175493" }, { "category": "self", "summary": "SUSE Bug 1175546", "url": "https://bugzilla.suse.com/1175546" }, { "category": "self", "summary": "SUSE Bug 1175550", "url": "https://bugzilla.suse.com/1175550" }, { "category": "self", "summary": "SUSE Bug 1175599", "url": "https://bugzilla.suse.com/1175599" }, { "category": "self", "summary": "SUSE Bug 1175621", "url": "https://bugzilla.suse.com/1175621" }, { "category": "self", "summary": "SUSE Bug 1175654", "url": "https://bugzilla.suse.com/1175654" }, { "category": "self", "summary": "SUSE Bug 1175667", "url": "https://bugzilla.suse.com/1175667" }, { "category": "self", "summary": "SUSE Bug 1175691", "url": "https://bugzilla.suse.com/1175691" }, { "category": "self", "summary": "SUSE Bug 1175718", "url": "https://bugzilla.suse.com/1175718" }, { "category": "self", "summary": "SUSE Bug 1175721", "url": "https://bugzilla.suse.com/1175721" }, { "category": "self", "summary": "SUSE Bug 1175749", "url": "https://bugzilla.suse.com/1175749" }, { "category": "self", "summary": "SUSE Bug 1175768", "url": "https://bugzilla.suse.com/1175768" }, { "category": "self", "summary": "SUSE Bug 1175769", "url": "https://bugzilla.suse.com/1175769" }, { "category": "self", "summary": "SUSE Bug 1175770", "url": "https://bugzilla.suse.com/1175770" }, { "category": "self", "summary": "SUSE Bug 1175771", "url": "https://bugzilla.suse.com/1175771" }, { "category": "self", "summary": "SUSE Bug 1175772", "url": "https://bugzilla.suse.com/1175772" }, { "category": "self", "summary": "SUSE Bug 1175774", "url": "https://bugzilla.suse.com/1175774" }, { "category": "self", "summary": "SUSE Bug 1175775", "url": "https://bugzilla.suse.com/1175775" }, { "category": "self", "summary": "SUSE Bug 1175787", "url": "https://bugzilla.suse.com/1175787" }, { "category": "self", "summary": "SUSE Bug 1175807", "url": "https://bugzilla.suse.com/1175807" }, { "category": "self", "summary": "SUSE Bug 1175834", "url": "https://bugzilla.suse.com/1175834" }, { "category": "self", "summary": "SUSE Bug 1175873", "url": "https://bugzilla.suse.com/1175873" }, { "category": "self", "summary": "SUSE Bug 1175882", "url": "https://bugzilla.suse.com/1175882" }, { "category": "self", "summary": "SUSE Bug 1175898", "url": "https://bugzilla.suse.com/1175898" }, { "category": "self", "summary": "SUSE Bug 1175918", "url": "https://bugzilla.suse.com/1175918" }, { "category": "self", "summary": "SUSE Bug 1175952", "url": "https://bugzilla.suse.com/1175952" }, { "category": "self", "summary": "SUSE Bug 1175995", "url": "https://bugzilla.suse.com/1175995" }, { "category": "self", "summary": "SUSE Bug 1175996", "url": "https://bugzilla.suse.com/1175996" }, { "category": "self", "summary": "SUSE Bug 1175997", "url": "https://bugzilla.suse.com/1175997" }, { "category": "self", "summary": "SUSE Bug 1175998", "url": "https://bugzilla.suse.com/1175998" }, { "category": "self", "summary": "SUSE Bug 1175999", "url": "https://bugzilla.suse.com/1175999" }, { "category": "self", "summary": "SUSE Bug 1176000", "url": "https://bugzilla.suse.com/1176000" }, { "category": "self", "summary": "SUSE Bug 1176001", "url": "https://bugzilla.suse.com/1176001" }, { "category": "self", "summary": "SUSE Bug 1176019", "url": "https://bugzilla.suse.com/1176019" }, { "category": "self", "summary": "SUSE Bug 1176022", "url": "https://bugzilla.suse.com/1176022" }, { "category": "self", "summary": "SUSE Bug 1176038", "url": "https://bugzilla.suse.com/1176038" }, { "category": "self", "summary": "SUSE Bug 1176063", "url": "https://bugzilla.suse.com/1176063" }, { "category": "self", "summary": "SUSE Bug 1176069", "url": "https://bugzilla.suse.com/1176069" }, { "category": "self", "summary": "SUSE Bug 1176109", "url": "https://bugzilla.suse.com/1176109" }, { "category": "self", "summary": "SUSE Bug 1176137", "url": "https://bugzilla.suse.com/1176137" }, { "category": "self", "summary": "SUSE Bug 1176180", "url": "https://bugzilla.suse.com/1176180" }, { "category": "self", "summary": "SUSE Bug 1176200", "url": "https://bugzilla.suse.com/1176200" }, { "category": "self", "summary": "SUSE Bug 1176235", "url": "https://bugzilla.suse.com/1176235" }, { "category": "self", "summary": "SUSE Bug 1176236", "url": "https://bugzilla.suse.com/1176236" }, { "category": "self", "summary": "SUSE Bug 1176237", "url": "https://bugzilla.suse.com/1176237" }, { "category": "self", "summary": "SUSE Bug 1176242", "url": "https://bugzilla.suse.com/1176242" }, { "category": "self", "summary": "SUSE Bug 1176354", "url": "https://bugzilla.suse.com/1176354" }, { "category": "self", "summary": "SUSE Bug 1176357", "url": "https://bugzilla.suse.com/1176357" }, { "category": "self", "summary": "SUSE Bug 1176358", "url": "https://bugzilla.suse.com/1176358" }, { "category": "self", "summary": "SUSE Bug 1176359", "url": "https://bugzilla.suse.com/1176359" }, { "category": "self", "summary": "SUSE Bug 1176360", "url": "https://bugzilla.suse.com/1176360" }, { "category": "self", "summary": "SUSE Bug 1176361", "url": "https://bugzilla.suse.com/1176361" }, { "category": "self", "summary": "SUSE Bug 1176362", "url": "https://bugzilla.suse.com/1176362" }, { "category": "self", "summary": "SUSE Bug 1176363", "url": "https://bugzilla.suse.com/1176363" }, { "category": "self", "summary": "SUSE Bug 1176364", "url": "https://bugzilla.suse.com/1176364" }, { "category": "self", "summary": "SUSE Bug 1176365", "url": "https://bugzilla.suse.com/1176365" }, { "category": "self", "summary": "SUSE Bug 1176366", "url": "https://bugzilla.suse.com/1176366" }, { "category": "self", "summary": "SUSE Bug 1176367", "url": "https://bugzilla.suse.com/1176367" }, { "category": "self", "summary": "SUSE Bug 1176381", "url": "https://bugzilla.suse.com/1176381" }, { "category": "self", "summary": "SUSE Bug 1176396", "url": "https://bugzilla.suse.com/1176396" }, { "category": "self", "summary": "SUSE Bug 1176400", "url": "https://bugzilla.suse.com/1176400" }, { "category": "self", "summary": "SUSE Bug 1176423", "url": "https://bugzilla.suse.com/1176423" }, { "category": "self", "summary": "SUSE Bug 1176449", "url": "https://bugzilla.suse.com/1176449" }, { "category": "self", "summary": "SUSE Bug 1176481", "url": "https://bugzilla.suse.com/1176481" }, { "category": "self", "summary": "SUSE Bug 1176485", "url": "https://bugzilla.suse.com/1176485" }, { "category": "self", "summary": "SUSE Bug 1176486", "url": "https://bugzilla.suse.com/1176486" }, { "category": "self", "summary": "SUSE Bug 1176507", "url": "https://bugzilla.suse.com/1176507" }, { "category": "self", "summary": "SUSE Bug 1176536", "url": "https://bugzilla.suse.com/1176536" }, { "category": "self", "summary": "SUSE Bug 1176537", "url": "https://bugzilla.suse.com/1176537" }, { "category": "self", "summary": "SUSE Bug 1176538", "url": "https://bugzilla.suse.com/1176538" }, { "category": "self", "summary": "SUSE Bug 1176539", "url": "https://bugzilla.suse.com/1176539" }, { "category": "self", "summary": "SUSE Bug 1176540", "url": "https://bugzilla.suse.com/1176540" }, { "category": "self", "summary": "SUSE Bug 1176541", "url": "https://bugzilla.suse.com/1176541" }, { "category": "self", "summary": "SUSE Bug 1176542", "url": "https://bugzilla.suse.com/1176542" }, { "category": "self", "summary": "SUSE Bug 1176543", "url": "https://bugzilla.suse.com/1176543" }, { "category": "self", "summary": "SUSE Bug 1176544", "url": "https://bugzilla.suse.com/1176544" }, { "category": "self", "summary": "SUSE Bug 1176545", "url": "https://bugzilla.suse.com/1176545" }, { "category": "self", "summary": "SUSE Bug 1176546", "url": "https://bugzilla.suse.com/1176546" }, { "category": "self", "summary": "SUSE Bug 1176548", "url": "https://bugzilla.suse.com/1176548" }, { "category": "self", "summary": "SUSE Bug 1176558", "url": "https://bugzilla.suse.com/1176558" }, { "category": "self", "summary": "SUSE Bug 1176559", "url": "https://bugzilla.suse.com/1176559" }, { "category": "self", "summary": "SUSE Bug 1176564", "url": "https://bugzilla.suse.com/1176564" }, { "category": "self", "summary": "SUSE Bug 1176586", "url": "https://bugzilla.suse.com/1176586" }, { "category": "self", "summary": "SUSE Bug 1176587", "url": "https://bugzilla.suse.com/1176587" }, { "category": "self", "summary": "SUSE Bug 1176588", "url": "https://bugzilla.suse.com/1176588" }, { "category": "self", "summary": "SUSE Bug 1176659", "url": "https://bugzilla.suse.com/1176659" }, { "category": "self", "summary": "SUSE Bug 1176698", "url": "https://bugzilla.suse.com/1176698" }, { "category": "self", "summary": "SUSE Bug 1176699", "url": "https://bugzilla.suse.com/1176699" }, { "category": "self", "summary": "SUSE Bug 1176700", "url": "https://bugzilla.suse.com/1176700" }, { "category": "self", "summary": "SUSE Bug 1176713", "url": "https://bugzilla.suse.com/1176713" }, { "category": "self", "summary": "SUSE Bug 1176721", "url": "https://bugzilla.suse.com/1176721" }, { "category": "self", "summary": "SUSE Bug 1176722", "url": "https://bugzilla.suse.com/1176722" }, { "category": "self", "summary": "SUSE Bug 1176725", "url": "https://bugzilla.suse.com/1176725" }, { "category": "self", "summary": "SUSE Bug 1176732", "url": "https://bugzilla.suse.com/1176732" }, { "category": "self", "summary": "SUSE Bug 1176763", "url": "https://bugzilla.suse.com/1176763" }, { "category": "self", "summary": "SUSE Bug 1176775", "url": "https://bugzilla.suse.com/1176775" }, { "category": "self", "summary": "SUSE Bug 1176788", "url": "https://bugzilla.suse.com/1176788" }, { "category": "self", "summary": "SUSE Bug 1176789", "url": "https://bugzilla.suse.com/1176789" }, { "category": "self", "summary": "SUSE Bug 1176833", "url": "https://bugzilla.suse.com/1176833" }, { "category": "self", "summary": "SUSE Bug 1176855", "url": "https://bugzilla.suse.com/1176855" }, { "category": "self", "summary": "SUSE Bug 1176869", "url": "https://bugzilla.suse.com/1176869" }, { "category": "self", "summary": "SUSE Bug 1176877", "url": "https://bugzilla.suse.com/1176877" }, { "category": "self", "summary": "SUSE Bug 1176907", "url": "https://bugzilla.suse.com/1176907" }, { "category": "self", "summary": "SUSE Bug 1176925", "url": "https://bugzilla.suse.com/1176925" }, { "category": "self", "summary": "SUSE Bug 1176942", "url": "https://bugzilla.suse.com/1176942" }, { "category": "self", "summary": "SUSE Bug 1176956", "url": "https://bugzilla.suse.com/1176956" }, { "category": "self", "summary": "SUSE Bug 1176962", "url": "https://bugzilla.suse.com/1176962" }, { "category": "self", "summary": "SUSE Bug 1176979", "url": "https://bugzilla.suse.com/1176979" }, { "category": "self", "summary": "SUSE Bug 1176980", "url": "https://bugzilla.suse.com/1176980" }, { "category": "self", "summary": "SUSE Bug 1176983", "url": "https://bugzilla.suse.com/1176983" }, { "category": "self", "summary": "SUSE Bug 1176990", "url": "https://bugzilla.suse.com/1176990" }, { "category": "self", "summary": "SUSE Bug 1177021", "url": "https://bugzilla.suse.com/1177021" }, { "category": "self", "summary": "SUSE Bug 1177030", "url": "https://bugzilla.suse.com/1177030" }, { "category": "self", "summary": "SUSE Bug 1177066", "url": "https://bugzilla.suse.com/1177066" }, { "category": "self", "summary": "SUSE Bug 1177070", "url": "https://bugzilla.suse.com/1177070" }, { "category": "self", "summary": "SUSE Bug 1177086", "url": "https://bugzilla.suse.com/1177086" }, { "category": "self", "summary": "SUSE Bug 1177090", "url": "https://bugzilla.suse.com/1177090" }, { "category": "self", "summary": "SUSE Bug 1177109", "url": "https://bugzilla.suse.com/1177109" }, { "category": "self", "summary": "SUSE Bug 1177121", "url": "https://bugzilla.suse.com/1177121" }, { "category": "self", "summary": "SUSE Bug 1177193", "url": "https://bugzilla.suse.com/1177193" }, { "category": "self", "summary": "SUSE Bug 1177194", "url": "https://bugzilla.suse.com/1177194" }, { "category": "self", "summary": "SUSE Bug 1177206", "url": "https://bugzilla.suse.com/1177206" }, { "category": "self", "summary": "SUSE Bug 1177258", "url": "https://bugzilla.suse.com/1177258" }, { "category": "self", "summary": "SUSE Bug 1177271", "url": "https://bugzilla.suse.com/1177271" }, { "category": "self", "summary": "SUSE Bug 1177281", "url": "https://bugzilla.suse.com/1177281" }, { "category": "self", "summary": "SUSE Bug 1177283", "url": "https://bugzilla.suse.com/1177283" }, { "category": "self", "summary": "SUSE Bug 1177284", "url": "https://bugzilla.suse.com/1177284" }, { "category": "self", "summary": "SUSE Bug 1177285", "url": "https://bugzilla.suse.com/1177285" }, { "category": "self", "summary": "SUSE Bug 1177286", "url": "https://bugzilla.suse.com/1177286" }, { "category": "self", "summary": "SUSE Bug 1177297", "url": "https://bugzilla.suse.com/1177297" }, { "category": "self", "summary": "SUSE Bug 1177326", "url": "https://bugzilla.suse.com/1177326" }, { "category": "self", "summary": "SUSE Bug 1177353", "url": "https://bugzilla.suse.com/1177353" }, { "category": "self", "summary": "SUSE Bug 1177384", "url": "https://bugzilla.suse.com/1177384" }, { "category": "self", "summary": "SUSE Bug 1177397", "url": "https://bugzilla.suse.com/1177397" }, { "category": "self", "summary": "SUSE Bug 1177410", "url": "https://bugzilla.suse.com/1177410" }, { "category": "self", "summary": "SUSE Bug 1177411", "url": "https://bugzilla.suse.com/1177411" }, { "category": "self", "summary": "SUSE Bug 1177470", "url": "https://bugzilla.suse.com/1177470" }, { "category": "self", "summary": "SUSE Bug 1177500", "url": "https://bugzilla.suse.com/1177500" }, { "category": "self", "summary": "SUSE Bug 1177511", "url": "https://bugzilla.suse.com/1177511" }, { "category": "self", "summary": "SUSE Bug 1177617", "url": "https://bugzilla.suse.com/1177617" }, { "category": "self", "summary": "SUSE Bug 1177666", "url": "https://bugzilla.suse.com/1177666" }, { "category": "self", "summary": "SUSE Bug 1177679", "url": "https://bugzilla.suse.com/1177679" }, { "category": "self", "summary": "SUSE Bug 1177681", "url": "https://bugzilla.suse.com/1177681" }, { "category": "self", "summary": "SUSE Bug 1177683", "url": "https://bugzilla.suse.com/1177683" }, { "category": "self", "summary": "SUSE Bug 1177687", "url": "https://bugzilla.suse.com/1177687" }, { "category": "self", "summary": "SUSE Bug 1177694", "url": "https://bugzilla.suse.com/1177694" }, { "category": "self", "summary": "SUSE Bug 1177697", "url": "https://bugzilla.suse.com/1177697" }, { "category": "self", "summary": "SUSE Bug 1177698", "url": "https://bugzilla.suse.com/1177698" }, { "category": "self", "summary": "SUSE Bug 1177703", "url": "https://bugzilla.suse.com/1177703" }, { "category": "self", "summary": "SUSE Bug 1177719", "url": "https://bugzilla.suse.com/1177719" }, { "category": "self", "summary": "SUSE Bug 1177724", "url": "https://bugzilla.suse.com/1177724" }, { "category": "self", "summary": "SUSE Bug 1177725", "url": "https://bugzilla.suse.com/1177725" }, { "category": "self", "summary": "SUSE Bug 1177726", "url": "https://bugzilla.suse.com/1177726" }, { "category": "self", "summary": "SUSE Bug 1177733", "url": "https://bugzilla.suse.com/1177733" }, { "category": "self", "summary": "SUSE Bug 1177739", "url": "https://bugzilla.suse.com/1177739" }, { "category": "self", "summary": "SUSE Bug 1177749", "url": "https://bugzilla.suse.com/1177749" }, { "category": "self", "summary": "SUSE Bug 1177750", "url": "https://bugzilla.suse.com/1177750" }, { "category": "self", "summary": "SUSE Bug 1177754", "url": "https://bugzilla.suse.com/1177754" }, { "category": "self", "summary": "SUSE Bug 1177755", "url": "https://bugzilla.suse.com/1177755" }, { "category": "self", "summary": "SUSE Bug 1177765", "url": "https://bugzilla.suse.com/1177765" }, { "category": "self", "summary": "SUSE Bug 1177766", "url": "https://bugzilla.suse.com/1177766" }, { "category": "self", "summary": "SUSE Bug 1177799", "url": "https://bugzilla.suse.com/1177799" }, { "category": "self", "summary": "SUSE Bug 1177801", "url": "https://bugzilla.suse.com/1177801" }, { "category": "self", "summary": "SUSE Bug 1177814", "url": "https://bugzilla.suse.com/1177814" }, { "category": "self", "summary": "SUSE Bug 1177817", "url": "https://bugzilla.suse.com/1177817" }, { "category": "self", "summary": "SUSE Bug 1177820", "url": "https://bugzilla.suse.com/1177820" }, { "category": "self", "summary": "SUSE Bug 1177854", "url": "https://bugzilla.suse.com/1177854" }, { "category": "self", "summary": "SUSE Bug 1177855", "url": "https://bugzilla.suse.com/1177855" }, { "category": "self", "summary": "SUSE Bug 1177856", "url": "https://bugzilla.suse.com/1177856" }, { "category": "self", "summary": "SUSE Bug 1177861", "url": "https://bugzilla.suse.com/1177861" }, { "category": "self", "summary": "SUSE Bug 1178002", "url": "https://bugzilla.suse.com/1178002" }, { "category": "self", "summary": "SUSE Bug 1178049", "url": "https://bugzilla.suse.com/1178049" }, { "category": "self", "summary": "SUSE Bug 1178079", "url": "https://bugzilla.suse.com/1178079" }, { "category": "self", "summary": "SUSE Bug 1178123", "url": "https://bugzilla.suse.com/1178123" }, { "category": "self", "summary": "SUSE Bug 1178166", "url": "https://bugzilla.suse.com/1178166" }, { "category": "self", "summary": "SUSE Bug 1178173", "url": "https://bugzilla.suse.com/1178173" }, { "category": "self", "summary": "SUSE Bug 1178175", "url": "https://bugzilla.suse.com/1178175" }, { "category": "self", "summary": "SUSE Bug 1178176", "url": "https://bugzilla.suse.com/1178176" }, { "category": "self", "summary": "SUSE Bug 1178177", "url": "https://bugzilla.suse.com/1178177" }, { "category": "self", "summary": "SUSE Bug 1178182", "url": "https://bugzilla.suse.com/1178182" }, { "category": "self", "summary": "SUSE Bug 1178183", "url": "https://bugzilla.suse.com/1178183" }, { "category": "self", "summary": "SUSE Bug 1178184", "url": "https://bugzilla.suse.com/1178184" }, { "category": "self", "summary": "SUSE Bug 1178185", "url": "https://bugzilla.suse.com/1178185" }, { "category": "self", "summary": "SUSE Bug 1178186", "url": "https://bugzilla.suse.com/1178186" }, { "category": "self", "summary": "SUSE Bug 1178190", "url": "https://bugzilla.suse.com/1178190" }, { "category": "self", "summary": "SUSE Bug 1178191", "url": "https://bugzilla.suse.com/1178191" }, { "category": "self", "summary": "SUSE Bug 1178203", "url": "https://bugzilla.suse.com/1178203" }, { "category": "self", "summary": "SUSE Bug 1178227", "url": "https://bugzilla.suse.com/1178227" }, { "category": "self", "summary": "SUSE Bug 1178246", "url": "https://bugzilla.suse.com/1178246" }, { "category": "self", "summary": "SUSE Bug 1178255", "url": "https://bugzilla.suse.com/1178255" }, { "category": "self", "summary": "SUSE Bug 1178270", "url": "https://bugzilla.suse.com/1178270" }, { "category": "self", "summary": "SUSE Bug 1178286", "url": "https://bugzilla.suse.com/1178286" }, { "category": "self", "summary": "SUSE Bug 1178307", "url": "https://bugzilla.suse.com/1178307" }, { "category": "self", "summary": "SUSE Bug 1178330", "url": "https://bugzilla.suse.com/1178330" }, { "category": "self", "summary": "SUSE Bug 1178393", "url": "https://bugzilla.suse.com/1178393" }, { "category": "self", "summary": "SUSE Bug 1178395", "url": "https://bugzilla.suse.com/1178395" }, { "category": "self", "summary": "SUSE Bug 1178401", "url": "https://bugzilla.suse.com/1178401" }, { "category": "self", "summary": "SUSE Bug 1178426", "url": "https://bugzilla.suse.com/1178426" }, { "category": "self", "summary": "SUSE Bug 1178461", "url": "https://bugzilla.suse.com/1178461" }, { "category": "self", "summary": "SUSE Bug 1178579", "url": "https://bugzilla.suse.com/1178579" }, { "category": "self", "summary": "SUSE Bug 1178581", "url": "https://bugzilla.suse.com/1178581" }, { "category": "self", "summary": "SUSE Bug 1178584", "url": "https://bugzilla.suse.com/1178584" }, { "category": "self", "summary": "SUSE Bug 1178585", "url": "https://bugzilla.suse.com/1178585" }, { "category": "self", "summary": "SUSE Bug 1178589", "url": "https://bugzilla.suse.com/1178589" }, { "category": "self", "summary": "SUSE Bug 1178590", "url": "https://bugzilla.suse.com/1178590" }, { "category": "self", "summary": "SUSE Bug 1178612", "url": "https://bugzilla.suse.com/1178612" }, { "category": "self", "summary": "SUSE Bug 1178634", "url": "https://bugzilla.suse.com/1178634" }, { "category": "self", "summary": "SUSE Bug 1178635", "url": "https://bugzilla.suse.com/1178635" }, { "category": "self", "summary": "SUSE Bug 1178653", "url": "https://bugzilla.suse.com/1178653" }, { "category": "self", "summary": "SUSE Bug 1178659", "url": "https://bugzilla.suse.com/1178659" }, { "category": "self", "summary": "SUSE Bug 1178660", "url": "https://bugzilla.suse.com/1178660" }, { "category": "self", "summary": "SUSE Bug 1178661", "url": "https://bugzilla.suse.com/1178661" }, { "category": "self", "summary": "SUSE Bug 1178669", "url": "https://bugzilla.suse.com/1178669" }, { "category": "self", "summary": "SUSE Bug 1178686", "url": "https://bugzilla.suse.com/1178686" }, { "category": "self", "summary": "SUSE Bug 1178740", "url": "https://bugzilla.suse.com/1178740" }, { "category": "self", "summary": "SUSE Bug 1178755", "url": "https://bugzilla.suse.com/1178755" }, { "category": "self", "summary": "SUSE Bug 1178756", "url": "https://bugzilla.suse.com/1178756" }, { "category": "self", "summary": "SUSE Bug 1178762", "url": "https://bugzilla.suse.com/1178762" }, { "category": "self", "summary": "SUSE Bug 1178780", "url": "https://bugzilla.suse.com/1178780" }, { "category": "self", "summary": "SUSE Bug 1178838", "url": "https://bugzilla.suse.com/1178838" }, { "category": "self", "summary": "SUSE Bug 1178853", "url": "https://bugzilla.suse.com/1178853" }, { "category": "self", "summary": "SUSE Bug 1178886", "url": "https://bugzilla.suse.com/1178886" }, { "category": "self", "summary": "SUSE Bug 1179001", "url": "https://bugzilla.suse.com/1179001" }, { "category": "self", "summary": "SUSE Bug 1179012", "url": "https://bugzilla.suse.com/1179012" }, { "category": "self", "summary": "SUSE Bug 1179014", "url": "https://bugzilla.suse.com/1179014" }, { "category": "self", "summary": "SUSE Bug 1179015", "url": "https://bugzilla.suse.com/1179015" }, { "category": "self", "summary": "SUSE Bug 1179045", "url": "https://bugzilla.suse.com/1179045" }, { "category": "self", "summary": "SUSE Bug 1179076", "url": "https://bugzilla.suse.com/1179076" }, { "category": "self", "summary": "SUSE Bug 1179082", "url": "https://bugzilla.suse.com/1179082" }, { "category": "self", "summary": "SUSE Bug 1179107", "url": "https://bugzilla.suse.com/1179107" }, { "category": "self", "summary": "SUSE Bug 1179140", "url": "https://bugzilla.suse.com/1179140" }, { "category": "self", "summary": "SUSE Bug 1179141", "url": "https://bugzilla.suse.com/1179141" }, { "category": "self", "summary": "SUSE Bug 1179160", "url": "https://bugzilla.suse.com/1179160" }, { "category": "self", "summary": "SUSE Bug 1179201", "url": "https://bugzilla.suse.com/1179201" }, { "category": "self", "summary": "SUSE Bug 1179204", "url": "https://bugzilla.suse.com/1179204" }, { "category": "self", "summary": "SUSE Bug 1179211", "url": "https://bugzilla.suse.com/1179211" }, { "category": "self", "summary": "SUSE Bug 1179217", "url": "https://bugzilla.suse.com/1179217" }, { "category": "self", "summary": "SUSE Bug 1179419", "url": "https://bugzilla.suse.com/1179419" }, { "category": "self", "summary": "SUSE Bug 1179424", "url": "https://bugzilla.suse.com/1179424" }, { "category": "self", "summary": "SUSE Bug 1179425", "url": "https://bugzilla.suse.com/1179425" }, { "category": "self", "summary": "SUSE Bug 1179426", "url": "https://bugzilla.suse.com/1179426" }, { "category": "self", "summary": "SUSE Bug 1179427", "url": "https://bugzilla.suse.com/1179427" }, { "category": "self", "summary": "SUSE Bug 1179429", "url": "https://bugzilla.suse.com/1179429" }, { "category": "self", "summary": "SUSE Bug 1179432", "url": "https://bugzilla.suse.com/1179432" }, { "category": "self", "summary": "SUSE Bug 1179434", "url": "https://bugzilla.suse.com/1179434" }, { "category": "self", "summary": "SUSE Bug 1179435", "url": "https://bugzilla.suse.com/1179435" }, { "category": "self", "summary": "SUSE Bug 1179442", "url": "https://bugzilla.suse.com/1179442" }, { "category": "self", "summary": "SUSE Bug 1179519", "url": "https://bugzilla.suse.com/1179519" }, { "category": "self", "summary": "SUSE Bug 1179550", "url": "https://bugzilla.suse.com/1179550" }, { "category": "self", "summary": "SUSE Bug 1179575", "url": "https://bugzilla.suse.com/1179575" }, { "category": "self", "summary": "SUSE Bug 1179578", "url": "https://bugzilla.suse.com/1179578" }, { "category": "self", "summary": "SUSE Bug 1179601", "url": "https://bugzilla.suse.com/1179601" }, { "category": "self", "summary": "SUSE Bug 1179604", "url": "https://bugzilla.suse.com/1179604" }, { "category": "self", "summary": "SUSE Bug 1179639", "url": "https://bugzilla.suse.com/1179639" }, { "category": "self", "summary": "SUSE Bug 1179652", "url": "https://bugzilla.suse.com/1179652" }, { "category": "self", "summary": "SUSE Bug 1179656", "url": "https://bugzilla.suse.com/1179656" }, { "category": "self", "summary": "SUSE Bug 1179670", "url": "https://bugzilla.suse.com/1179670" }, { "category": "self", "summary": "SUSE Bug 1179671", "url": "https://bugzilla.suse.com/1179671" }, { "category": "self", "summary": "SUSE Bug 1179672", "url": "https://bugzilla.suse.com/1179672" }, { "category": "self", "summary": "SUSE Bug 1179673", "url": "https://bugzilla.suse.com/1179673" }, { "category": "self", "summary": "SUSE Bug 1179675", "url": "https://bugzilla.suse.com/1179675" }, { "category": "self", "summary": "SUSE Bug 1179676", "url": "https://bugzilla.suse.com/1179676" }, { "category": "self", "summary": "SUSE Bug 1179677", "url": "https://bugzilla.suse.com/1179677" }, { "category": "self", "summary": "SUSE Bug 1179678", "url": "https://bugzilla.suse.com/1179678" }, { "category": "self", "summary": "SUSE Bug 1179679", "url": "https://bugzilla.suse.com/1179679" }, { "category": "self", "summary": "SUSE Bug 1179680", "url": "https://bugzilla.suse.com/1179680" }, { "category": "self", "summary": "SUSE Bug 1179681", "url": "https://bugzilla.suse.com/1179681" }, { "category": "self", "summary": "SUSE Bug 1179682", "url": "https://bugzilla.suse.com/1179682" }, { "category": "self", "summary": "SUSE Bug 1179683", "url": "https://bugzilla.suse.com/1179683" }, { "category": "self", "summary": "SUSE Bug 1179684", "url": "https://bugzilla.suse.com/1179684" }, { "category": "self", "summary": "SUSE Bug 1179685", "url": "https://bugzilla.suse.com/1179685" }, { "category": "self", "summary": "SUSE Bug 1179687", "url": "https://bugzilla.suse.com/1179687" }, { "category": "self", "summary": "SUSE Bug 1179688", "url": "https://bugzilla.suse.com/1179688" }, { "category": "self", "summary": "SUSE Bug 1179689", "url": "https://bugzilla.suse.com/1179689" }, { "category": "self", "summary": "SUSE Bug 1179690", "url": "https://bugzilla.suse.com/1179690" }, { "category": "self", "summary": "SUSE Bug 1179703", "url": "https://bugzilla.suse.com/1179703" }, { "category": "self", "summary": "SUSE Bug 1179704", "url": "https://bugzilla.suse.com/1179704" }, { "category": "self", "summary": "SUSE Bug 1179707", "url": "https://bugzilla.suse.com/1179707" }, { "category": "self", "summary": "SUSE Bug 1179709", "url": "https://bugzilla.suse.com/1179709" }, { "category": "self", "summary": "SUSE Bug 1179710", "url": "https://bugzilla.suse.com/1179710" }, { "category": "self", "summary": "SUSE Bug 1179711", "url": "https://bugzilla.suse.com/1179711" }, { "category": "self", "summary": "SUSE Bug 1179712", "url": "https://bugzilla.suse.com/1179712" }, { "category": "self", "summary": "SUSE Bug 1179713", "url": "https://bugzilla.suse.com/1179713" }, { "category": "self", "summary": "SUSE Bug 1179714", "url": "https://bugzilla.suse.com/1179714" }, { "category": "self", "summary": "SUSE Bug 1179715", "url": "https://bugzilla.suse.com/1179715" }, { "category": "self", "summary": "SUSE Bug 1179716", "url": "https://bugzilla.suse.com/1179716" }, { "category": "self", "summary": "SUSE Bug 1179745", "url": "https://bugzilla.suse.com/1179745" }, { "category": "self", "summary": "SUSE Bug 1179763", "url": "https://bugzilla.suse.com/1179763" }, { "category": "self", "summary": "SUSE Bug 1179887", "url": "https://bugzilla.suse.com/1179887" }, { "category": "self", "summary": "SUSE Bug 1179888", "url": "https://bugzilla.suse.com/1179888" }, { "category": "self", "summary": "SUSE Bug 1179892", "url": "https://bugzilla.suse.com/1179892" }, { "category": "self", "summary": "SUSE Bug 1179896", "url": "https://bugzilla.suse.com/1179896" }, { "category": "self", "summary": "SUSE Bug 1179960", "url": "https://bugzilla.suse.com/1179960" }, { "category": "self", "summary": "SUSE Bug 1179963", "url": "https://bugzilla.suse.com/1179963" }, { "category": "self", "summary": "SUSE Bug 1180027", "url": "https://bugzilla.suse.com/1180027" }, { "category": "self", "summary": "SUSE Bug 1180029", "url": "https://bugzilla.suse.com/1180029" }, { "category": "self", "summary": "SUSE Bug 1180031", "url": "https://bugzilla.suse.com/1180031" }, { "category": "self", "summary": "SUSE Bug 1180052", "url": "https://bugzilla.suse.com/1180052" }, { "category": "self", "summary": "SUSE Bug 1180056", "url": "https://bugzilla.suse.com/1180056" }, { "category": "self", "summary": "SUSE Bug 1180086", "url": "https://bugzilla.suse.com/1180086" }, { "category": "self", "summary": "SUSE Bug 1180117", "url": "https://bugzilla.suse.com/1180117" }, { "category": "self", "summary": "SUSE Bug 1180258", "url": "https://bugzilla.suse.com/1180258" }, { "category": "self", "summary": "SUSE Bug 1180261", "url": "https://bugzilla.suse.com/1180261" }, { "category": "self", "summary": "SUSE Bug 1180349", "url": "https://bugzilla.suse.com/1180349" }, { "category": "self", "summary": "SUSE Bug 1180506", "url": "https://bugzilla.suse.com/1180506" }, { "category": "self", "summary": "SUSE Bug 1180541", "url": "https://bugzilla.suse.com/1180541" }, { "category": "self", "summary": "SUSE Bug 1180559", "url": "https://bugzilla.suse.com/1180559" }, { "category": "self", "summary": "SUSE Bug 1180566", "url": "https://bugzilla.suse.com/1180566" }, { "category": "self", "summary": "SUSE Bug 173030", "url": "https://bugzilla.suse.com/173030" }, { "category": "self", "summary": "SUSE Bug 744692", "url": "https://bugzilla.suse.com/744692" }, { "category": "self", "summary": "SUSE Bug 789311", "url": "https://bugzilla.suse.com/789311" }, { "category": "self", "summary": "SUSE Bug 954532", "url": "https://bugzilla.suse.com/954532" }, { "category": "self", "summary": "SUSE Bug 995541", "url": "https://bugzilla.suse.com/995541" }, { "category": "self", "summary": "SUSE CVE CVE-2019-19462 page", "url": "https://www.suse.com/security/cve/CVE-2019-19462/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-20810 page", "url": "https://www.suse.com/security/cve/CVE-2019-20810/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-20812 page", "url": "https://www.suse.com/security/cve/CVE-2019-20812/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-0110 page", "url": "https://www.suse.com/security/cve/CVE-2020-0110/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-0305 page", "url": "https://www.suse.com/security/cve/CVE-2020-0305/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-0404 page", "url": "https://www.suse.com/security/cve/CVE-2020-0404/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-0427 page", "url": "https://www.suse.com/security/cve/CVE-2020-0427/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-0431 page", "url": "https://www.suse.com/security/cve/CVE-2020-0431/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-0432 page", "url": "https://www.suse.com/security/cve/CVE-2020-0432/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-0444 page", "url": "https://www.suse.com/security/cve/CVE-2020-0444/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-0465 page", "url": "https://www.suse.com/security/cve/CVE-2020-0465/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-0466 page", "url": "https://www.suse.com/security/cve/CVE-2020-0466/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-0543 page", "url": "https://www.suse.com/security/cve/CVE-2020-0543/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10135 page", "url": "https://www.suse.com/security/cve/CVE-2020-10135/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10711 page", "url": "https://www.suse.com/security/cve/CVE-2020-10711/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10732 page", "url": "https://www.suse.com/security/cve/CVE-2020-10732/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10751 page", "url": "https://www.suse.com/security/cve/CVE-2020-10751/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10757 page", "url": "https://www.suse.com/security/cve/CVE-2020-10757/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10766 page", "url": "https://www.suse.com/security/cve/CVE-2020-10766/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10767 page", "url": "https://www.suse.com/security/cve/CVE-2020-10767/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10768 page", "url": "https://www.suse.com/security/cve/CVE-2020-10768/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10773 page", "url": "https://www.suse.com/security/cve/CVE-2020-10773/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10781 page", "url": "https://www.suse.com/security/cve/CVE-2020-10781/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-11668 page", "url": "https://www.suse.com/security/cve/CVE-2020-11668/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12351 page", "url": "https://www.suse.com/security/cve/CVE-2020-12351/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12352 page", "url": "https://www.suse.com/security/cve/CVE-2020-12352/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12652 page", "url": "https://www.suse.com/security/cve/CVE-2020-12652/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12656 page", "url": "https://www.suse.com/security/cve/CVE-2020-12656/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12769 page", "url": "https://www.suse.com/security/cve/CVE-2020-12769/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12771 page", "url": "https://www.suse.com/security/cve/CVE-2020-12771/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12888 page", "url": "https://www.suse.com/security/cve/CVE-2020-12888/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-13143 page", "url": "https://www.suse.com/security/cve/CVE-2020-13143/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-13974 page", "url": "https://www.suse.com/security/cve/CVE-2020-13974/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14314 page", "url": "https://www.suse.com/security/cve/CVE-2020-14314/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14331 page", "url": "https://www.suse.com/security/cve/CVE-2020-14331/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14351 page", "url": "https://www.suse.com/security/cve/CVE-2020-14351/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14356 page", "url": "https://www.suse.com/security/cve/CVE-2020-14356/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14385 page", "url": "https://www.suse.com/security/cve/CVE-2020-14385/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14386 page", "url": "https://www.suse.com/security/cve/CVE-2020-14386/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14390 page", "url": "https://www.suse.com/security/cve/CVE-2020-14390/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14416 page", "url": "https://www.suse.com/security/cve/CVE-2020-14416/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-15393 page", "url": "https://www.suse.com/security/cve/CVE-2020-15393/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-15436 page", "url": "https://www.suse.com/security/cve/CVE-2020-15436/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-15437 page", "url": "https://www.suse.com/security/cve/CVE-2020-15437/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-15780 page", "url": "https://www.suse.com/security/cve/CVE-2020-15780/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-16120 page", "url": "https://www.suse.com/security/cve/CVE-2020-16120/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-16166 page", "url": "https://www.suse.com/security/cve/CVE-2020-16166/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-1749 page", "url": "https://www.suse.com/security/cve/CVE-2020-1749/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-24490 page", "url": "https://www.suse.com/security/cve/CVE-2020-24490/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25212 page", "url": "https://www.suse.com/security/cve/CVE-2020-25212/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25284 page", "url": "https://www.suse.com/security/cve/CVE-2020-25284/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25285 page", "url": "https://www.suse.com/security/cve/CVE-2020-25285/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25641 page", "url": "https://www.suse.com/security/cve/CVE-2020-25641/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25643 page", "url": "https://www.suse.com/security/cve/CVE-2020-25643/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25645 page", "url": "https://www.suse.com/security/cve/CVE-2020-25645/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25656 page", "url": "https://www.suse.com/security/cve/CVE-2020-25656/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25668 page", "url": "https://www.suse.com/security/cve/CVE-2020-25668/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25669 page", "url": "https://www.suse.com/security/cve/CVE-2020-25669/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25704 page", "url": "https://www.suse.com/security/cve/CVE-2020-25704/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25705 page", "url": "https://www.suse.com/security/cve/CVE-2020-25705/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-26088 page", "url": "https://www.suse.com/security/cve/CVE-2020-26088/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-27068 page", "url": "https://www.suse.com/security/cve/CVE-2020-27068/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-27777 page", "url": "https://www.suse.com/security/cve/CVE-2020-27777/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-27786 page", "url": "https://www.suse.com/security/cve/CVE-2020-27786/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-27825 page", "url": "https://www.suse.com/security/cve/CVE-2020-27825/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-27830 page", "url": "https://www.suse.com/security/cve/CVE-2020-27830/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-28915 page", "url": "https://www.suse.com/security/cve/CVE-2020-28915/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-28941 page", "url": "https://www.suse.com/security/cve/CVE-2020-28941/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-28974 page", "url": "https://www.suse.com/security/cve/CVE-2020-28974/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-29369 page", "url": "https://www.suse.com/security/cve/CVE-2020-29369/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-29370 page", "url": "https://www.suse.com/security/cve/CVE-2020-29370/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-29371 page", "url": "https://www.suse.com/security/cve/CVE-2020-29371/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-29373 page", "url": "https://www.suse.com/security/cve/CVE-2020-29373/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-29660 page", "url": "https://www.suse.com/security/cve/CVE-2020-29660/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-29661 page", "url": "https://www.suse.com/security/cve/CVE-2020-29661/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-36158 page", "url": "https://www.suse.com/security/cve/CVE-2020-36158/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-4788 page", "url": "https://www.suse.com/security/cve/CVE-2020-4788/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-8694 page", "url": "https://www.suse.com/security/cve/CVE-2020-8694/" } ], "title": "Security update for RT kernel", "tracking": { "current_release_date": "2021-02-05T15:16:03Z", "generator": { "date": "2021-02-05T15:16:03Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2021:0242-1", "initial_release_date": "2021-02-05T15:16:03Z", "revision_history": [ { "date": "2021-02-05T15:16:03Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "product": { "name": "kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "product_id": "kernel-devel-rt-5.3.18-lp152.3.5.1.noarch" } }, { "category": "product_version", "name": "kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "product": { "name": "kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "product_id": "kernel-source-rt-5.3.18-lp152.3.5.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "product": { "name": "cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "product_id": "cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64" } }, { "category": "product_version", "name": "cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "product": { "name": "cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "product_id": "cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "product": { "name": "dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "product_id": "dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "product": { "name": "dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "product_id": "dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "product": { "name": "gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "product_id": "gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "product": { "name": "gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "product_id": "gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-5.3.18-lp152.3.5.1.x86_64", "product": { "name": "kernel-rt-5.3.18-lp152.3.5.1.x86_64", "product_id": "kernel-rt-5.3.18-lp152.3.5.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "product": { "name": "kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "product_id": "kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "product": { "name": "kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "product_id": "kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "product": { "name": "kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "product_id": "kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "product": { "name": "kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "product_id": "kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "product": { "name": "kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "product_id": "kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "product": { "name": "kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "product_id": "kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "product": { "name": "kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "product_id": "kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "product": { "name": "kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "product_id": "kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "product": { "name": "ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "product_id": "ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "product": { "name": "ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "product_id": "ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" } }, { "category": "product_version", "name": "reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "product": { "name": "reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "product_id": "reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64" } }, { "category": "product_version", "name": "reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "product": { "name": "reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "product_id": "reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Leap 15.2", "product": { "name": "openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap:15.2" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64" }, "product_reference": "cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" }, "product_reference": "cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64" }, "product_reference": "dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" }, "product_reference": "dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64" }, "product_reference": "gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" }, "product_reference": "gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-rt-5.3.18-lp152.3.5.1.noarch as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch" }, "product_reference": "kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-5.3.18-lp152.3.5.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64" }, "product_reference": "kernel-rt-5.3.18-lp152.3.5.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64" }, "product_reference": "kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64" }, "product_reference": "kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64" }, "product_reference": "kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64" }, "product_reference": "kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64" }, "product_reference": "kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-rt-5.3.18-lp152.3.5.1.noarch as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch" }, "product_reference": "kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64" }, "product_reference": "kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64" }, "product_reference": "kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" }, "product_reference": "kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64" }, "product_reference": "ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" }, "product_reference": "ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64" }, "product_reference": "reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" }, "product_reference": "reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-19462", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-19462" } ], "notes": [ { "category": "general", "text": "relay_open in kernel/relay.c in the Linux kernel through 5.4.1 allows local users to cause a denial of service (such as relay blockage) by triggering a NULL alloc_percpu result.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-19462", "url": "https://www.suse.com/security/cve/CVE-2019-19462" }, { "category": "external", "summary": "SUSE Bug 1158265 for CVE-2019-19462", "url": "https://bugzilla.suse.com/1158265" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "low" } ], "title": "CVE-2019-19462" }, { "cve": "CVE-2019-20810", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-20810" } ], "notes": [ { "category": "general", "text": "go7007_snd_init in drivers/media/usb/go7007/snd-go7007.c in the Linux kernel before 5.6 does not call snd_card_free for a failure path, which causes a memory leak, aka CID-9453264ef586.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-20810", "url": "https://www.suse.com/security/cve/CVE-2019-20810" }, { "category": "external", "summary": "SUSE Bug 1172458 for CVE-2019-20810", "url": "https://bugzilla.suse.com/1172458" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "low" } ], "title": "CVE-2019-20810" }, { "cve": "CVE-2019-20812", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-20812" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.4.7. The prb_calc_retire_blk_tmo() function in net/packet/af_packet.c can result in a denial of service (CPU consumption and soft lockup) in a certain failure case involving TPACKET_V3, aka CID-b43d1f9f7067.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-20812", "url": "https://www.suse.com/security/cve/CVE-2019-20812" }, { "category": "external", "summary": "SUSE Bug 1172453 for CVE-2019-20812", "url": "https://bugzilla.suse.com/1172453" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2019-20812" }, { "cve": "CVE-2020-0110", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-0110" } ], "notes": [ { "category": "general", "text": "In psi_write of psi.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-148159562References: Upstream kernel", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-0110", "url": "https://www.suse.com/security/cve/CVE-2020-0110" }, { "category": "external", "summary": "SUSE Bug 1171374 for CVE-2020-0110", "url": "https://bugzilla.suse.com/1171374" }, { "category": "external", "summary": "SUSE Bug 1174874 for CVE-2020-0110", "url": "https://bugzilla.suse.com/1174874" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "important" } ], "title": "CVE-2020-0110" }, { "cve": "CVE-2020-0305", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-0305" } ], "notes": [ { "category": "general", "text": "In cdev_get of char_dev.c, there is a possible use-after-free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-153467744", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-0305", "url": "https://www.suse.com/security/cve/CVE-2020-0305" }, { "category": "external", "summary": "SUSE Bug 1174462 for CVE-2020-0305", "url": "https://bugzilla.suse.com/1174462" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-0305" }, { "cve": "CVE-2020-0404", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-0404" } ], "notes": [ { "category": "general", "text": "In uvc_scan_chain_forward of uvc_driver.c, there is a possible linked list corruption due to an unusual root cause. This could lead to local escalation of privilege in the kernel with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-111893654References: Upstream kernel", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-0404", "url": "https://www.suse.com/security/cve/CVE-2020-0404" }, { "category": "external", "summary": "SUSE Bug 1176423 for CVE-2020-0404", "url": "https://bugzilla.suse.com/1176423" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-0404" }, { "cve": "CVE-2020-0427", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-0427" } ], "notes": [ { "category": "general", "text": "In create_pinctrl of core.c, there is a possible out of bounds read due to a use after free. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-140550171", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-0427", "url": "https://www.suse.com/security/cve/CVE-2020-0427" }, { "category": "external", "summary": "SUSE Bug 1176725 for CVE-2020-0427", "url": "https://bugzilla.suse.com/1176725" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-0427" }, { "cve": "CVE-2020-0431", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-0431" } ], "notes": [ { "category": "general", "text": "In kbd_keycode of keyboard.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-144161459", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-0431", "url": "https://www.suse.com/security/cve/CVE-2020-0431" }, { "category": "external", "summary": "SUSE Bug 1176722 for CVE-2020-0431", "url": "https://bugzilla.suse.com/1176722" }, { "category": "external", "summary": "SUSE Bug 1176896 for CVE-2020-0431", "url": "https://bugzilla.suse.com/1176896" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "important" } ], "title": "CVE-2020-0431" }, { "cve": "CVE-2020-0432", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-0432" } ], "notes": [ { "category": "general", "text": "In skb_to_mamac of networking.c, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-143560807", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-0432", "url": "https://www.suse.com/security/cve/CVE-2020-0432" }, { "category": "external", "summary": "SUSE Bug 1176721 for CVE-2020-0432", "url": "https://bugzilla.suse.com/1176721" }, { "category": "external", "summary": "SUSE Bug 1177165 for CVE-2020-0432", "url": "https://bugzilla.suse.com/1177165" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "important" } ], "title": "CVE-2020-0432" }, { "cve": "CVE-2020-0444", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-0444" } ], "notes": [ { "category": "general", "text": "In audit_free_lsm_field of auditfilter.c, there is a possible bad kfree due to a logic error in audit_data_to_entry. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-150693166References: Upstream kernel", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-0444", "url": "https://www.suse.com/security/cve/CVE-2020-0444" }, { "category": "external", "summary": "SUSE Bug 1180027 for CVE-2020-0444", "url": "https://bugzilla.suse.com/1180027" }, { "category": "external", "summary": "SUSE Bug 1180028 for CVE-2020-0444", "url": "https://bugzilla.suse.com/1180028" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-0444" }, { "cve": "CVE-2020-0465", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-0465" } ], "notes": [ { "category": "general", "text": "In various methods of hid-multitouch.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-162844689References: Upstream kernel", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-0465", "url": "https://www.suse.com/security/cve/CVE-2020-0465" }, { "category": "external", "summary": "SUSE Bug 1180029 for CVE-2020-0465", "url": "https://bugzilla.suse.com/1180029" }, { "category": "external", "summary": "SUSE Bug 1180030 for CVE-2020-0465", "url": "https://bugzilla.suse.com/1180030" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "important" } ], "title": "CVE-2020-0465" }, { "cve": "CVE-2020-0466", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-0466" } ], "notes": [ { "category": "general", "text": "In do_epoll_ctl and ep_loop_check_proc of eventpoll.c, there is a possible use after free due to a logic error. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-147802478References: Upstream kernel", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-0466", "url": "https://www.suse.com/security/cve/CVE-2020-0466" }, { "category": "external", "summary": "SUSE Bug 1180031 for CVE-2020-0466", "url": "https://bugzilla.suse.com/1180031" }, { "category": "external", "summary": "SUSE Bug 1180032 for CVE-2020-0466", "url": "https://bugzilla.suse.com/1180032" }, { "category": "external", "summary": "SUSE Bug 1199255 for CVE-2020-0466", "url": "https://bugzilla.suse.com/1199255" }, { "category": "external", "summary": "SUSE Bug 1200084 for CVE-2020-0466", "url": "https://bugzilla.suse.com/1200084" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "important" } ], "title": "CVE-2020-0466" }, { "cve": "CVE-2020-0543", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-0543" } ], "notes": [ { "category": "general", "text": "Incomplete cleanup from specific special register read operations in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-0543", "url": "https://www.suse.com/security/cve/CVE-2020-0543" }, { "category": "external", "summary": "SUSE Bug 1154824 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1154824" }, { "category": "external", "summary": "SUSE Bug 1172205 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172205" }, { "category": "external", "summary": "SUSE Bug 1172206 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172206" }, { "category": "external", "summary": "SUSE Bug 1172207 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172207" }, { "category": "external", "summary": "SUSE Bug 1172770 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172770" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-0543" }, { "cve": "CVE-2020-10135", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10135" } ], "notes": [ { "category": "general", "text": "Legacy pairing and secure-connections pairing authentication in Bluetooth BR/EDR Core Specification v5.2 and earlier may allow an unauthenticated user to complete authentication without pairing credentials via adjacent access. An unauthenticated, adjacent attacker could impersonate a Bluetooth BR/EDR master or slave to pair with a previously paired remote device to successfully complete the authentication procedure without knowing the link key.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10135", "url": "https://www.suse.com/security/cve/CVE-2020-10135" }, { "category": "external", "summary": "SUSE Bug 1171988 for CVE-2020-10135", "url": "https://bugzilla.suse.com/1171988" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-10135" }, { "cve": "CVE-2020-10711", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10711" } ], "notes": [ { "category": "general", "text": "A NULL pointer dereference flaw was found in the Linux kernel\u0027s SELinux subsystem in versions before 5.7. This flaw occurs while importing the Commercial IP Security Option (CIPSO) protocol\u0027s category bitmap into the SELinux extensible bitmap via the\u0027 ebitmap_netlbl_import\u0027 routine. While processing the CIPSO restricted bitmap tag in the \u0027cipso_v4_parsetag_rbm\u0027 routine, it sets the security attribute to indicate that the category bitmap is present, even if it has not been allocated. This issue leads to a NULL pointer dereference issue while importing the same category bitmap into SELinux. This flaw allows a remote network user to crash the system kernel, resulting in a denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10711", "url": "https://www.suse.com/security/cve/CVE-2020-10711" }, { "category": "external", "summary": "SUSE Bug 1171191 for CVE-2020-10711", "url": "https://bugzilla.suse.com/1171191" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-10711" }, { "cve": "CVE-2020-10732", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10732" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s implementation of Userspace core dumps. This flaw allows an attacker with a local account to crash a trivial program and exfiltrate private kernel data.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10732", "url": "https://www.suse.com/security/cve/CVE-2020-10732" }, { "category": "external", "summary": "SUSE Bug 1171220 for CVE-2020-10732", "url": "https://bugzilla.suse.com/1171220" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "low" } ], "title": "CVE-2020-10732" }, { "cve": "CVE-2020-10751", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10751" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernels SELinux LSM hook implementation before version 5.7, where it incorrectly assumed that an skb would only contain a single netlink message. The hook would incorrectly only validate the first netlink message in the skb and allow or deny the rest of the messages within the skb with the granted permission without further processing.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10751", "url": "https://www.suse.com/security/cve/CVE-2020-10751" }, { "category": "external", "summary": "SUSE Bug 1171189 for CVE-2020-10751", "url": "https://bugzilla.suse.com/1171189" }, { "category": "external", "summary": "SUSE Bug 1174963 for CVE-2020-10751", "url": "https://bugzilla.suse.com/1174963" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-10751" }, { "cve": "CVE-2020-10757", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10757" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux Kernel in versions after 4.5-rc1 in the way mremap handled DAX Huge Pages. This flaw allows a local attacker with access to a DAX enabled storage to escalate their privileges on the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10757", "url": "https://www.suse.com/security/cve/CVE-2020-10757" }, { "category": "external", "summary": "SUSE Bug 1159281 for CVE-2020-10757", "url": "https://bugzilla.suse.com/1159281" }, { "category": "external", "summary": "SUSE Bug 1172317 for CVE-2020-10757", "url": "https://bugzilla.suse.com/1172317" }, { "category": "external", "summary": "SUSE Bug 1172437 for CVE-2020-10757", "url": "https://bugzilla.suse.com/1172437" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "important" } ], "title": "CVE-2020-10757" }, { "cve": "CVE-2020-10766", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10766" } ], "notes": [ { "category": "general", "text": "A logic bug flaw was found in Linux kernel before 5.8-rc1 in the implementation of SSBD. A bug in the logic handling allows an attacker with a local account to disable SSBD protection during a context switch when additional speculative execution mitigations are in place. This issue was introduced when the per task/process conditional STIPB switching was added on top of the existing SSBD switching. The highest threat from this vulnerability is to confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10766", "url": "https://www.suse.com/security/cve/CVE-2020-10766" }, { "category": "external", "summary": "SUSE Bug 1159281 for CVE-2020-10766", "url": "https://bugzilla.suse.com/1159281" }, { "category": "external", "summary": "SUSE Bug 1172781 for CVE-2020-10766", "url": "https://bugzilla.suse.com/1172781" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-10766" }, { "cve": "CVE-2020-10767", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10767" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel before 5.8-rc1 in the implementation of the Enhanced IBPB (Indirect Branch Prediction Barrier). The IBPB mitigation will be disabled when STIBP is not available or when the Enhanced Indirect Branch Restricted Speculation (IBRS) is available. This flaw allows a local attacker to perform a Spectre V2 style attack when this configuration is active. The highest threat from this vulnerability is to confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10767", "url": "https://www.suse.com/security/cve/CVE-2020-10767" }, { "category": "external", "summary": "SUSE Bug 1159281 for CVE-2020-10767", "url": "https://bugzilla.suse.com/1159281" }, { "category": "external", "summary": "SUSE Bug 1172782 for CVE-2020-10767", "url": "https://bugzilla.suse.com/1172782" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-10767" }, { "cve": "CVE-2020-10768", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10768" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux Kernel before 5.8-rc1 in the prctl() function, where it can be used to enable indirect branch speculation after it has been disabled. This call incorrectly reports it as being \u0027force disabled\u0027 when it is not and opens the system to Spectre v2 attacks. The highest threat from this vulnerability is to confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10768", "url": "https://www.suse.com/security/cve/CVE-2020-10768" }, { "category": "external", "summary": "SUSE Bug 1159281 for CVE-2020-10768", "url": "https://bugzilla.suse.com/1159281" }, { "category": "external", "summary": "SUSE Bug 1172783 for CVE-2020-10768", "url": "https://bugzilla.suse.com/1172783" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-10768" }, { "cve": "CVE-2020-10773", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10773" } ], "notes": [ { "category": "general", "text": "A stack information leak flaw was found in s390/s390x in the Linux kernel\u0027s memory manager functionality, where it incorrectly writes to the /proc/sys/vm/cmm_timeout file. This flaw allows a local user to see the kernel data.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10773", "url": "https://www.suse.com/security/cve/CVE-2020-10773" }, { "category": "external", "summary": "SUSE Bug 1172999 for CVE-2020-10773", "url": "https://bugzilla.suse.com/1172999" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.5, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "low" } ], "title": "CVE-2020-10773" }, { "cve": "CVE-2020-10781", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10781" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux Kernel before 5.8-rc6 in the ZRAM kernel module, where a user with a local account and the ability to read the /sys/class/zram-control/hot_add file can create ZRAM device nodes in the /dev/ directory. This read allocates kernel memory and is not accounted for a user that triggers the creation of that ZRAM device. With this vulnerability, continually reading the device may consume a large amount of system memory and cause the Out-of-Memory (OOM) killer to activate and terminate random userspace processes, possibly making the system inoperable.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10781", "url": "https://www.suse.com/security/cve/CVE-2020-10781" }, { "category": "external", "summary": "SUSE Bug 1173074 for CVE-2020-10781", "url": "https://bugzilla.suse.com/1173074" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-10781" }, { "cve": "CVE-2020-11668", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-11668" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 5.6.1, drivers/media/usb/gspca/xirlink_cit.c (aka the Xirlink camera USB driver) mishandles invalid descriptors, aka CID-a246b4d54770.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-11668", "url": "https://www.suse.com/security/cve/CVE-2020-11668" }, { "category": "external", "summary": "SUSE Bug 1168952 for CVE-2020-11668", "url": "https://bugzilla.suse.com/1168952" }, { "category": "external", "summary": "SUSE Bug 1173942 for CVE-2020-11668", "url": "https://bugzilla.suse.com/1173942" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "important" } ], "title": "CVE-2020-11668" }, { "cve": "CVE-2020-12351", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12351" } ], "notes": [ { "category": "general", "text": "Improper input validation in BlueZ may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12351", "url": "https://www.suse.com/security/cve/CVE-2020-12351" }, { "category": "external", "summary": "SUSE Bug 1177724 for CVE-2020-12351", "url": "https://bugzilla.suse.com/1177724" }, { "category": "external", "summary": "SUSE Bug 1177729 for CVE-2020-12351", "url": "https://bugzilla.suse.com/1177729" }, { "category": "external", "summary": "SUSE Bug 1178397 for CVE-2020-12351", "url": "https://bugzilla.suse.com/1178397" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "important" } ], "title": "CVE-2020-12351" }, { "cve": "CVE-2020-12352", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12352" } ], "notes": [ { "category": "general", "text": "Improper access control in BlueZ may allow an unauthenticated user to potentially enable information disclosure via adjacent access.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12352", "url": "https://www.suse.com/security/cve/CVE-2020-12352" }, { "category": "external", "summary": "SUSE Bug 1177725 for CVE-2020-12352", "url": "https://bugzilla.suse.com/1177725" }, { "category": "external", "summary": "SUSE Bug 1178398 for CVE-2020-12352", "url": "https://bugzilla.suse.com/1178398" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-12352" }, { "cve": "CVE-2020-12652", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12652" } ], "notes": [ { "category": "general", "text": "The __mptctl_ioctl function in drivers/message/fusion/mptctl.c in the Linux kernel before 5.4.14 allows local users to hold an incorrect lock during the ioctl operation and trigger a race condition, i.e., a \"double fetch\" vulnerability, aka CID-28d76df18f0a. NOTE: the vendor states \"The security impact of this bug is not as bad as it could have been because these operations are all privileged and root already has enormous destructive power.\"", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12652", "url": "https://www.suse.com/security/cve/CVE-2020-12652" }, { "category": "external", "summary": "SUSE Bug 1171218 for CVE-2020-12652", "url": "https://bugzilla.suse.com/1171218" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-12652" }, { "cve": "CVE-2020-12656", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12656" } ], "notes": [ { "category": "general", "text": "gss_mech_free in net/sunrpc/auth_gss/gss_mech_switch.c in the rpcsec_gss_krb5 implementation in the Linux kernel through 5.6.10 lacks certain domain_release calls, leading to a memory leak. Note: This was disputed with the assertion that the issue does not grant any access not already available. It is a problem that on unloading a specific kernel module some memory is leaked, but loading kernel modules is a privileged operation. A user could also write a kernel module to consume any amount of memory they like and load that replicating the effect of this bug", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12656", "url": "https://www.suse.com/security/cve/CVE-2020-12656" }, { "category": "external", "summary": "SUSE Bug 1171219 for CVE-2020-12656", "url": "https://bugzilla.suse.com/1171219" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.9, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "low" } ], "title": "CVE-2020-12656" }, { "cve": "CVE-2020-12769", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12769" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.4.17. drivers/spi/spi-dw.c allows attackers to cause a panic via concurrent calls to dw_spi_irq and dw_spi_transfer_one, aka CID-19b61392c5a8.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12769", "url": "https://www.suse.com/security/cve/CVE-2020-12769" }, { "category": "external", "summary": "SUSE Bug 1171983 for CVE-2020-12769", "url": "https://bugzilla.suse.com/1171983" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-12769" }, { "cve": "CVE-2020-12771", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12771" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel through 5.6.11. btree_gc_coalesce in drivers/md/bcache/btree.c has a deadlock if a coalescing operation fails.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12771", "url": "https://www.suse.com/security/cve/CVE-2020-12771" }, { "category": "external", "summary": "SUSE Bug 1171732 for CVE-2020-12771", "url": "https://bugzilla.suse.com/1171732" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-12771" }, { "cve": "CVE-2020-12888", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12888" } ], "notes": [ { "category": "general", "text": "The VFIO PCI driver in the Linux kernel through 5.6.13 mishandles attempts to access disabled memory space.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12888", "url": "https://www.suse.com/security/cve/CVE-2020-12888" }, { "category": "external", "summary": "SUSE Bug 1159281 for CVE-2020-12888", "url": "https://bugzilla.suse.com/1159281" }, { "category": "external", "summary": "SUSE Bug 1171868 for CVE-2020-12888", "url": "https://bugzilla.suse.com/1171868" }, { "category": "external", "summary": "SUSE Bug 1176979 for CVE-2020-12888", "url": "https://bugzilla.suse.com/1176979" }, { "category": "external", "summary": "SUSE Bug 1179612 for CVE-2020-12888", "url": "https://bugzilla.suse.com/1179612" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-12888" }, { "cve": "CVE-2020-13143", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-13143" } ], "notes": [ { "category": "general", "text": "gadget_dev_desc_UDC_store in drivers/usb/gadget/configfs.c in the Linux kernel 3.16 through 5.6.13 relies on kstrdup without considering the possibility of an internal \u0027\\0\u0027 value, which allows attackers to trigger an out-of-bounds read, aka CID-15753588bcd4.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-13143", "url": "https://www.suse.com/security/cve/CVE-2020-13143" }, { "category": "external", "summary": "SUSE Bug 1171982 for CVE-2020-13143", "url": "https://bugzilla.suse.com/1171982" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-13143" }, { "cve": "CVE-2020-13974", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-13974" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel 4.4 through 5.7.1. drivers/tty/vt/keyboard.c has an integer overflow if k_ascii is called several times in a row, aka CID-b86dab054059. NOTE: Members in the community argue that the integer overflow does not lead to a security issue in this case.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-13974", "url": "https://www.suse.com/security/cve/CVE-2020-13974" }, { "category": "external", "summary": "SUSE Bug 1172775 for CVE-2020-13974", "url": "https://bugzilla.suse.com/1172775" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-13974" }, { "cve": "CVE-2020-14314", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14314" } ], "notes": [ { "category": "general", "text": "A memory out-of-bounds read flaw was found in the Linux kernel before 5.9-rc2 with the ext3/ext4 file system, in the way it accesses a directory with broken indexing. This flaw allows a local user to crash the system if the directory exists. The highest threat from this vulnerability is to system availability.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14314", "url": "https://www.suse.com/security/cve/CVE-2020-14314" }, { "category": "external", "summary": "SUSE Bug 1173798 for CVE-2020-14314", "url": "https://bugzilla.suse.com/1173798" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.8, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-14314" }, { "cve": "CVE-2020-14331", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14331" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s implementation of the invert video code on VGA consoles when a local attacker attempts to resize the console, calling an ioctl VT_RESIZE, which causes an out-of-bounds write to occur. This flaw allows a local user with access to the VGA console to crash the system, potentially escalating their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14331", "url": "https://www.suse.com/security/cve/CVE-2020-14331" }, { "category": "external", "summary": "SUSE Bug 1174205 for CVE-2020-14331", "url": "https://bugzilla.suse.com/1174205" }, { "category": "external", "summary": "SUSE Bug 1174247 for CVE-2020-14331", "url": "https://bugzilla.suse.com/1174247" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "important" } ], "title": "CVE-2020-14331" }, { "cve": "CVE-2020-14351", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14351" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel. A use-after-free memory flaw was found in the perf subsystem allowing a local attacker with permission to monitor perf events to corrupt memory and possibly escalate privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14351", "url": "https://www.suse.com/security/cve/CVE-2020-14351" }, { "category": "external", "summary": "SUSE Bug 1177086 for CVE-2020-14351", "url": "https://bugzilla.suse.com/1177086" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-14351" }, { "cve": "CVE-2020-14356", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14356" } ], "notes": [ { "category": "general", "text": "A flaw null pointer dereference in the Linux kernel cgroupv2 subsystem in versions before 5.7.10 was found in the way when reboot the system. A local user could use this flaw to crash the system or escalate their privileges on the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14356", "url": "https://www.suse.com/security/cve/CVE-2020-14356" }, { "category": "external", "summary": "SUSE Bug 1175213 for CVE-2020-14356", "url": "https://bugzilla.suse.com/1175213" }, { "category": "external", "summary": "SUSE Bug 1176392 for CVE-2020-14356", "url": "https://bugzilla.suse.com/1176392" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-14356" }, { "cve": "CVE-2020-14385", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14385" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel before 5.9-rc4. A failure of the file system metadata validator in XFS can cause an inode with a valid, user-creatable extended attribute to be flagged as corrupt. This can lead to the filesystem being shutdown, or otherwise rendered inaccessible until it is remounted, leading to a denial of service. The highest threat from this vulnerability is to system availability.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14385", "url": "https://www.suse.com/security/cve/CVE-2020-14385" }, { "category": "external", "summary": "SUSE Bug 1176137 for CVE-2020-14385", "url": "https://bugzilla.suse.com/1176137" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-14385" }, { "cve": "CVE-2020-14386", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14386" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel before 5.9-rc4. Memory corruption can be exploited to gain root privileges from unprivileged processes. The highest threat from this vulnerability is to data confidentiality and integrity.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14386", "url": "https://www.suse.com/security/cve/CVE-2020-14386" }, { "category": "external", "summary": "SUSE Bug 1176069 for CVE-2020-14386", "url": "https://bugzilla.suse.com/1176069" }, { "category": "external", "summary": "SUSE Bug 1176072 for CVE-2020-14386", "url": "https://bugzilla.suse.com/1176072" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "important" } ], "title": "CVE-2020-14386" }, { "cve": "CVE-2020-14390", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14390" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel in versions before 5.9-rc6. When changing screen size, an out-of-bounds memory write can occur leading to memory corruption or a denial of service. Due to the nature of the flaw, privilege escalation cannot be fully ruled out.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14390", "url": "https://www.suse.com/security/cve/CVE-2020-14390" }, { "category": "external", "summary": "SUSE Bug 1176235 for CVE-2020-14390", "url": "https://bugzilla.suse.com/1176235" }, { "category": "external", "summary": "SUSE Bug 1176253 for CVE-2020-14390", "url": "https://bugzilla.suse.com/1176253" }, { "category": "external", "summary": "SUSE Bug 1176278 for CVE-2020-14390", "url": "https://bugzilla.suse.com/1176278" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "important" } ], "title": "CVE-2020-14390" }, { "cve": "CVE-2020-14416", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14416" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 5.4.16, a race condition in tty-\u003edisc_data handling in the slip and slcan line discipline could lead to a use-after-free, aka CID-0ace17d56824. This affects drivers/net/slip/slip.c and drivers/net/can/slcan.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14416", "url": "https://www.suse.com/security/cve/CVE-2020-14416" }, { "category": "external", "summary": "SUSE Bug 1162002 for CVE-2020-14416", "url": "https://bugzilla.suse.com/1162002" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-14416" }, { "cve": "CVE-2020-15393", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-15393" } ], "notes": [ { "category": "general", "text": "In the Linux kernel 4.4 through 5.7.6, usbtest_disconnect in drivers/usb/misc/usbtest.c has a memory leak, aka CID-28ebeb8db770.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-15393", "url": "https://www.suse.com/security/cve/CVE-2020-15393" }, { "category": "external", "summary": "SUSE Bug 1173514 for CVE-2020-15393", "url": "https://bugzilla.suse.com/1173514" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-15393" }, { "cve": "CVE-2020-15436", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-15436" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in fs/block_dev.c in the Linux kernel before 5.8 allows local users to gain privileges or cause a denial of service by leveraging improper access to a certain error field.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-15436", "url": "https://www.suse.com/security/cve/CVE-2020-15436" }, { "category": "external", "summary": "SUSE Bug 1179141 for CVE-2020-15436", "url": "https://bugzilla.suse.com/1179141" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-15436" }, { "cve": "CVE-2020-15437", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-15437" } ], "notes": [ { "category": "general", "text": "The Linux kernel before version 5.8 is vulnerable to a NULL pointer dereference in drivers/tty/serial/8250/8250_core.c:serial8250_isa_init_ports() that allows local users to cause a denial of service by using the p-\u003eserial_in pointer which uninitialized.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-15437", "url": "https://www.suse.com/security/cve/CVE-2020-15437" }, { "category": "external", "summary": "SUSE Bug 1179140 for CVE-2020-15437", "url": "https://bugzilla.suse.com/1179140" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-15437" }, { "cve": "CVE-2020-15780", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-15780" } ], "notes": [ { "category": "general", "text": "An issue was discovered in drivers/acpi/acpi_configfs.c in the Linux kernel before 5.7.7. Injection of malicious ACPI tables via configfs could be used by attackers to bypass lockdown and secure boot restrictions, aka CID-75b0cea7bf30.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-15780", "url": "https://www.suse.com/security/cve/CVE-2020-15780" }, { "category": "external", "summary": "SUSE Bug 1173573 for CVE-2020-15780", "url": "https://bugzilla.suse.com/1173573" }, { "category": "external", "summary": "SUSE Bug 1174186 for CVE-2020-15780", "url": "https://bugzilla.suse.com/1174186" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:H/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "important" } ], "title": "CVE-2020-15780" }, { "cve": "CVE-2020-16120", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-16120" } ], "notes": [ { "category": "general", "text": "Overlayfs did not properly perform permission checking when copying up files in an overlayfs and could be exploited from within a user namespace, if, for example, unprivileged user namespaces were allowed. It was possible to have a file not readable by an unprivileged user to be copied to a mountpoint controlled by the user, like a removable device. This was introduced in kernel version 4.19 by commit d1d04ef (\"ovl: stack file ops\"). This was fixed in kernel version 5.8 by commits 56230d9 (\"ovl: verify permissions in ovl_path_open()\"), 48bd024 (\"ovl: switch to mounter creds in readdir\") and 05acefb (\"ovl: check permission to open real file\"). Additionally, commits 130fdbc (\"ovl: pass correct flags for opening real directory\") and 292f902 (\"ovl: call secutiry hook in ovl_real_ioctl()\") in kernel 5.8 might also be desired or necessary. These additional commits introduced a regression in overlay mounts within user namespaces which prevented access to files with ownership outside of the user namespace. This regression was mitigated by subsequent commit b6650da (\"ovl: do not fail because of O_NOATIMEi\") in kernel 5.11.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-16120", "url": "https://www.suse.com/security/cve/CVE-2020-16120" }, { "category": "external", "summary": "SUSE Bug 1177470 for CVE-2020-16120", "url": "https://bugzilla.suse.com/1177470" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-16120" }, { "cve": "CVE-2020-16166", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-16166" } ], "notes": [ { "category": "general", "text": "The Linux kernel through 5.7.11 allows remote attackers to make observations that help to obtain sensitive information about the internal state of the network RNG, aka CID-f227e3ec3b5c. This is related to drivers/char/random.c and kernel/time/timer.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-16166", "url": "https://www.suse.com/security/cve/CVE-2020-16166" }, { "category": "external", "summary": "SUSE Bug 1174757 for CVE-2020-16166", "url": "https://bugzilla.suse.com/1174757" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-16166" }, { "cve": "CVE-2020-1749", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-1749" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s implementation of some networking protocols in IPsec, such as VXLAN and GENEVE tunnels over IPv6. When an encrypted tunnel is created between two hosts, the kernel isn\u0027t correctly routing tunneled data over the encrypted link; rather sending the data unencrypted. This would allow anyone in between the two endpoints to read the traffic unencrypted. The main threat from this vulnerability is to data confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-1749", "url": "https://www.suse.com/security/cve/CVE-2020-1749" }, { "category": "external", "summary": "SUSE Bug 1165629 for CVE-2020-1749", "url": "https://bugzilla.suse.com/1165629" }, { "category": "external", "summary": "SUSE Bug 1165631 for CVE-2020-1749", "url": "https://bugzilla.suse.com/1165631" }, { "category": "external", "summary": "SUSE Bug 1177511 for CVE-2020-1749", "url": "https://bugzilla.suse.com/1177511" }, { "category": "external", "summary": "SUSE Bug 1177513 for CVE-2020-1749", "url": "https://bugzilla.suse.com/1177513" }, { "category": "external", "summary": "SUSE Bug 1189302 for CVE-2020-1749", "url": "https://bugzilla.suse.com/1189302" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "important" } ], "title": "CVE-2020-1749" }, { "cve": "CVE-2020-24490", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-24490" } ], "notes": [ { "category": "general", "text": "Improper buffer restrictions in BlueZ may allow an unauthenticated user to potentially enable denial of service via adjacent access. This affects all Linux kernel versions that support BlueZ.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-24490", "url": "https://www.suse.com/security/cve/CVE-2020-24490" }, { "category": "external", "summary": "SUSE Bug 1177726 for CVE-2020-24490", "url": "https://bugzilla.suse.com/1177726" }, { "category": "external", "summary": "SUSE Bug 1177727 for CVE-2020-24490", "url": "https://bugzilla.suse.com/1177727" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "important" } ], "title": "CVE-2020-24490" }, { "cve": "CVE-2020-25212", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25212" } ], "notes": [ { "category": "general", "text": "A TOCTOU mismatch in the NFS client code in the Linux kernel before 5.8.3 could be used by local attackers to corrupt memory or possibly have unspecified other impact because a size check is in fs/nfs/nfs4proc.c instead of fs/nfs/nfs4xdr.c, aka CID-b4487b935452.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25212", "url": "https://www.suse.com/security/cve/CVE-2020-25212" }, { "category": "external", "summary": "SUSE Bug 1176381 for CVE-2020-25212", "url": "https://bugzilla.suse.com/1176381" }, { "category": "external", "summary": "SUSE Bug 1176382 for CVE-2020-25212", "url": "https://bugzilla.suse.com/1176382" }, { "category": "external", "summary": "SUSE Bug 1177027 for CVE-2020-25212", "url": "https://bugzilla.suse.com/1177027" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "important" } ], "title": "CVE-2020-25212" }, { "cve": "CVE-2020-25284", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25284" } ], "notes": [ { "category": "general", "text": "The rbd block device driver in drivers/block/rbd.c in the Linux kernel through 5.8.9 used incomplete permission checking for access to rbd devices, which could be leveraged by local attackers to map or unmap rbd block devices, aka CID-f44d04e696fe.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25284", "url": "https://www.suse.com/security/cve/CVE-2020-25284" }, { "category": "external", "summary": "SUSE Bug 1176482 for CVE-2020-25284", "url": "https://bugzilla.suse.com/1176482" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-25284" }, { "cve": "CVE-2020-25285", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25285" } ], "notes": [ { "category": "general", "text": "A race condition between hugetlb sysctl handlers in mm/hugetlb.c in the Linux kernel before 5.8.8 could be used by local attackers to corrupt memory, cause a NULL pointer dereference, or possibly have unspecified other impact, aka CID-17743798d812.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25285", "url": "https://www.suse.com/security/cve/CVE-2020-25285" }, { "category": "external", "summary": "SUSE Bug 1176485 for CVE-2020-25285", "url": "https://bugzilla.suse.com/1176485" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-25285" }, { "cve": "CVE-2020-25641", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25641" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s implementation of biovecs in versions before 5.9-rc7. A zero-length biovec request issued by the block subsystem could cause the kernel to enter an infinite loop, causing a denial of service. This flaw allows a local attacker with basic privileges to issue requests to a block device, resulting in a denial of service. The highest threat from this vulnerability is to system availability.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25641", "url": "https://www.suse.com/security/cve/CVE-2020-25641" }, { "category": "external", "summary": "SUSE Bug 1177121 for CVE-2020-25641", "url": "https://bugzilla.suse.com/1177121" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-25641" }, { "cve": "CVE-2020-25643", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25643" } ], "notes": [ { "category": "general", "text": "A flaw was found in the HDLC_PPP module of the Linux kernel in versions before 5.9-rc7. Memory corruption and a read overflow is caused by improper input validation in the ppp_cp_parse_cr function which can cause the system to crash or cause a denial of service. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25643", "url": "https://www.suse.com/security/cve/CVE-2020-25643" }, { "category": "external", "summary": "SUSE Bug 1177206 for CVE-2020-25643", "url": "https://bugzilla.suse.com/1177206" }, { "category": "external", "summary": "SUSE Bug 1177226 for CVE-2020-25643", "url": "https://bugzilla.suse.com/1177226" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "important" } ], "title": "CVE-2020-25643" }, { "cve": "CVE-2020-25645", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25645" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel in versions before 5.9-rc7. Traffic between two Geneve endpoints may be unencrypted when IPsec is configured to encrypt traffic for the specific UDP port used by the GENEVE tunnel allowing anyone between the two endpoints to read the traffic unencrypted. The main threat from this vulnerability is to data confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25645", "url": "https://www.suse.com/security/cve/CVE-2020-25645" }, { "category": "external", "summary": "SUSE Bug 1177511 for CVE-2020-25645", "url": "https://bugzilla.suse.com/1177511" }, { "category": "external", "summary": "SUSE Bug 1177513 for CVE-2020-25645", "url": "https://bugzilla.suse.com/1177513" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "important" } ], "title": "CVE-2020-25645" }, { "cve": "CVE-2020-25656", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25656" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel. A use-after-free was found in the way the console subsystem was using ioctls KDGKBSENT and KDSKBSENT. A local user could use this flaw to get read memory access out of bounds. The highest threat from this vulnerability is to data confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25656", "url": "https://www.suse.com/security/cve/CVE-2020-25656" }, { "category": "external", "summary": "SUSE Bug 1177766 for CVE-2020-25656", "url": "https://bugzilla.suse.com/1177766" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-25656" }, { "cve": "CVE-2020-25668", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25668" } ], "notes": [ { "category": "general", "text": "A flaw was found in Linux Kernel because access to the global variable fg_console is not properly synchronized leading to a use after free in con_font_op.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25668", "url": "https://www.suse.com/security/cve/CVE-2020-25668" }, { "category": "external", "summary": "SUSE Bug 1178123 for CVE-2020-25668", "url": "https://bugzilla.suse.com/1178123" }, { "category": "external", "summary": "SUSE Bug 1178622 for CVE-2020-25668", "url": "https://bugzilla.suse.com/1178622" }, { "category": "external", "summary": "SUSE Bug 1196914 for CVE-2020-25668", "url": "https://bugzilla.suse.com/1196914" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "important" } ], "title": "CVE-2020-25668" }, { "cve": "CVE-2020-25669", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25669" } ], "notes": [ { "category": "general", "text": "A vulnerability was found in the Linux Kernel where the function sunkbd_reinit having been scheduled by sunkbd_interrupt before sunkbd being freed. Though the dangling pointer is set to NULL in sunkbd_disconnect, there is still an alias in sunkbd_reinit causing Use After Free.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25669", "url": "https://www.suse.com/security/cve/CVE-2020-25669" }, { "category": "external", "summary": "SUSE Bug 1178182 for CVE-2020-25669", "url": "https://bugzilla.suse.com/1178182" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-25669" }, { "cve": "CVE-2020-25704", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25704" } ], "notes": [ { "category": "general", "text": "A flaw memory leak in the Linux kernel performance monitoring subsystem was found in the way if using PERF_EVENT_IOC_SET_FILTER. A local user could use this flaw to starve the resources causing denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25704", "url": "https://www.suse.com/security/cve/CVE-2020-25704" }, { "category": "external", "summary": "SUSE Bug 1178393 for CVE-2020-25704", "url": "https://bugzilla.suse.com/1178393" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-25704" }, { "cve": "CVE-2020-25705", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25705" } ], "notes": [ { "category": "general", "text": "A flaw in ICMP packets in the Linux kernel may allow an attacker to quickly scan open UDP ports. This flaw allows an off-path remote attacker to effectively bypass source port UDP randomization. Software that relies on UDP source port randomization are indirectly affected as well on the Linux Based Products (RUGGEDCOM RM1224: All versions between v5.0 and v6.4, SCALANCE M-800: All versions between v5.0 and v6.4, SCALANCE S615: All versions between v5.0 and v6.4, SCALANCE SC-600: All versions prior to v2.1.3, SCALANCE W1750D: v8.3.0.1, v8.6.0, and v8.7.0, SIMATIC Cloud Connect 7: All versions, SIMATIC MV500 Family: All versions, SIMATIC NET CP 1243-1 (incl. SIPLUS variants): Versions 3.1.39 and later, SIMATIC NET CP 1243-7 LTE EU: Version", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25705", "url": "https://www.suse.com/security/cve/CVE-2020-25705" }, { "category": "external", "summary": "SUSE Bug 1175721 for CVE-2020-25705", "url": "https://bugzilla.suse.com/1175721" }, { "category": "external", "summary": "SUSE Bug 1178782 for CVE-2020-25705", "url": "https://bugzilla.suse.com/1178782" }, { "category": "external", "summary": "SUSE Bug 1178783 for CVE-2020-25705", "url": "https://bugzilla.suse.com/1178783" }, { "category": "external", "summary": "SUSE Bug 1191790 for CVE-2020-25705", "url": "https://bugzilla.suse.com/1191790" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "important" } ], "title": "CVE-2020-25705" }, { "cve": "CVE-2020-26088", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-26088" } ], "notes": [ { "category": "general", "text": "A missing CAP_NET_RAW check in NFC socket creation in net/nfc/rawsock.c in the Linux kernel before 5.8.2 could be used by local attackers to create raw sockets, bypassing security mechanisms, aka CID-26896f01467a.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-26088", "url": "https://www.suse.com/security/cve/CVE-2020-26088" }, { "category": "external", "summary": "SUSE Bug 1176990 for CVE-2020-26088", "url": "https://bugzilla.suse.com/1176990" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-26088" }, { "cve": "CVE-2020-27068", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-27068" } ], "notes": [ { "category": "general", "text": "Product: AndroidVersions: Android kernelAndroid ID: A-127973231References: Upstream kernel", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-27068", "url": "https://www.suse.com/security/cve/CVE-2020-27068" }, { "category": "external", "summary": "SUSE Bug 1180086 for CVE-2020-27068", "url": "https://bugzilla.suse.com/1180086" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-27068" }, { "cve": "CVE-2020-27777", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-27777" } ], "notes": [ { "category": "general", "text": "A flaw was found in the way RTAS handled memory accesses in userspace to kernel communication. On a locked down (usually due to Secure Boot) guest system running on top of PowerVM or KVM hypervisors (pseries platform) a root like local user could use this flaw to further increase their privileges to that of a running kernel.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-27777", "url": "https://www.suse.com/security/cve/CVE-2020-27777" }, { "category": "external", "summary": "SUSE Bug 1179107 for CVE-2020-27777", "url": "https://bugzilla.suse.com/1179107" }, { "category": "external", "summary": "SUSE Bug 1179419 for CVE-2020-27777", "url": "https://bugzilla.suse.com/1179419" }, { "category": "external", "summary": "SUSE Bug 1200343 for CVE-2020-27777", "url": "https://bugzilla.suse.com/1200343" }, { "category": "external", "summary": "SUSE Bug 1220060 for CVE-2020-27777", "url": "https://bugzilla.suse.com/1220060" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-27777" }, { "cve": "CVE-2020-27786", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-27786" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s implementation of MIDI, where an attacker with a local account and the permissions to issue ioctl commands to midi devices could trigger a use-after-free issue. A write to this specific memory while freed and before use causes the flow of execution to change and possibly allow for memory corruption or privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-27786", "url": "https://www.suse.com/security/cve/CVE-2020-27786" }, { "category": "external", "summary": "SUSE Bug 1179601 for CVE-2020-27786", "url": "https://bugzilla.suse.com/1179601" }, { "category": "external", "summary": "SUSE Bug 1179616 for CVE-2020-27786", "url": "https://bugzilla.suse.com/1179616" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "important" } ], "title": "CVE-2020-27786" }, { "cve": "CVE-2020-27825", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-27825" } ], "notes": [ { "category": "general", "text": "A use-after-free flaw was found in kernel/trace/ring_buffer.c in Linux kernel (before 5.10-rc1). There was a race problem in trace_open and resize of cpu buffer running parallely on different cpus, may cause a denial of service problem (DOS). This flaw could even allow a local attacker with special user privilege to a kernel information leak threat.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-27825", "url": "https://www.suse.com/security/cve/CVE-2020-27825" }, { "category": "external", "summary": "SUSE Bug 1179960 for CVE-2020-27825", "url": "https://bugzilla.suse.com/1179960" }, { "category": "external", "summary": "SUSE Bug 1179961 for CVE-2020-27825", "url": "https://bugzilla.suse.com/1179961" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "important" } ], "title": "CVE-2020-27825" }, { "cve": "CVE-2020-27830", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-27830" } ], "notes": [ { "category": "general", "text": "A vulnerability was found in Linux Kernel where in the spk_ttyio_receive_buf2() function, it would dereference spk_ttyio_synth without checking whether it is NULL or not, and may lead to a NULL-ptr deref crash.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-27830", "url": "https://www.suse.com/security/cve/CVE-2020-27830" }, { "category": "external", "summary": "SUSE Bug 1179656 for CVE-2020-27830", "url": "https://bugzilla.suse.com/1179656" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-27830" }, { "cve": "CVE-2020-28915", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-28915" } ], "notes": [ { "category": "general", "text": "A buffer over-read (at the framebuffer layer) in the fbcon code in the Linux kernel before 5.8.15 could be used by local attackers to read kernel memory, aka CID-6735b4632def.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-28915", "url": "https://www.suse.com/security/cve/CVE-2020-28915" }, { "category": "external", "summary": "SUSE Bug 1178886 for CVE-2020-28915", "url": "https://bugzilla.suse.com/1178886" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-28915" }, { "cve": "CVE-2020-28941", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-28941" } ], "notes": [ { "category": "general", "text": "An issue was discovered in drivers/accessibility/speakup/spk_ttyio.c in the Linux kernel through 5.9.9. Local attackers on systems with the speakup driver could cause a local denial of service attack, aka CID-d41227544427. This occurs because of an invalid free when the line discipline is used more than once.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-28941", "url": "https://www.suse.com/security/cve/CVE-2020-28941" }, { "category": "external", "summary": "SUSE Bug 1178740 for CVE-2020-28941", "url": "https://bugzilla.suse.com/1178740" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-28941" }, { "cve": "CVE-2020-28974", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-28974" } ], "notes": [ { "category": "general", "text": "A slab-out-of-bounds read in fbcon in the Linux kernel before 5.9.7 could be used by local attackers to read privileged information or potentially crash the kernel, aka CID-3c4e0dff2095. This occurs because KD_FONT_OP_COPY in drivers/tty/vt/vt.c can be used for manipulations such as font height.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-28974", "url": "https://www.suse.com/security/cve/CVE-2020-28974" }, { "category": "external", "summary": "SUSE Bug 1178589 for CVE-2020-28974", "url": "https://bugzilla.suse.com/1178589" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-28974" }, { "cve": "CVE-2020-29369", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-29369" } ], "notes": [ { "category": "general", "text": "An issue was discovered in mm/mmap.c in the Linux kernel before 5.7.11. There is a race condition between certain expand functions (expand_downwards and expand_upwards) and page-table free operations from an munmap call, aka CID-246c320a8cfe.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-29369", "url": "https://www.suse.com/security/cve/CVE-2020-29369" }, { "category": "external", "summary": "SUSE Bug 1173504 for CVE-2020-29369", "url": "https://bugzilla.suse.com/1173504" }, { "category": "external", "summary": "SUSE Bug 1179432 for CVE-2020-29369", "url": "https://bugzilla.suse.com/1179432" }, { "category": "external", "summary": "SUSE Bug 1179646 for CVE-2020-29369", "url": "https://bugzilla.suse.com/1179646" }, { "category": "external", "summary": "SUSE Bug 1182109 for CVE-2020-29369", "url": "https://bugzilla.suse.com/1182109" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "important" } ], "title": "CVE-2020-29369" }, { "cve": "CVE-2020-29370", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-29370" } ], "notes": [ { "category": "general", "text": "An issue was discovered in kmem_cache_alloc_bulk in mm/slub.c in the Linux kernel before 5.5.11. The slowpath lacks the required TID increment, aka CID-fd4d9c7d0c71.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-29370", "url": "https://www.suse.com/security/cve/CVE-2020-29370" }, { "category": "external", "summary": "SUSE Bug 1179435 for CVE-2020-29370", "url": "https://bugzilla.suse.com/1179435" }, { "category": "external", "summary": "SUSE Bug 1179648 for CVE-2020-29370", "url": "https://bugzilla.suse.com/1179648" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "important" } ], "title": "CVE-2020-29370" }, { "cve": "CVE-2020-29371", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-29371" } ], "notes": [ { "category": "general", "text": "An issue was discovered in romfs_dev_read in fs/romfs/storage.c in the Linux kernel before 5.8.4. Uninitialized memory leaks to userspace, aka CID-bcf85fcedfdd.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-29371", "url": "https://www.suse.com/security/cve/CVE-2020-29371" }, { "category": "external", "summary": "SUSE Bug 1179429 for CVE-2020-29371", "url": "https://bugzilla.suse.com/1179429" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-29371" }, { "cve": "CVE-2020-29373", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-29373" } ], "notes": [ { "category": "general", "text": "An issue was discovered in fs/io_uring.c in the Linux kernel before 5.6. It unsafely handles the root directory during path lookups, and thus a process inside a mount namespace can escape to unintended filesystem locations, aka CID-ff002b30181d.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-29373", "url": "https://www.suse.com/security/cve/CVE-2020-29373" }, { "category": "external", "summary": "SUSE Bug 1179434 for CVE-2020-29373", "url": "https://bugzilla.suse.com/1179434" }, { "category": "external", "summary": "SUSE Bug 1179779 for CVE-2020-29373", "url": "https://bugzilla.suse.com/1179779" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "important" } ], "title": "CVE-2020-29373" }, { "cve": "CVE-2020-29660", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-29660" } ], "notes": [ { "category": "general", "text": "A locking inconsistency issue was discovered in the tty subsystem of the Linux kernel through 5.9.13. drivers/tty/tty_io.c and drivers/tty/tty_jobctrl.c may allow a read-after-free attack against TIOCGSID, aka CID-c8bcd9c5be24.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-29660", "url": "https://www.suse.com/security/cve/CVE-2020-29660" }, { "category": "external", "summary": "SUSE Bug 1179745 for CVE-2020-29660", "url": "https://bugzilla.suse.com/1179745" }, { "category": "external", "summary": "SUSE Bug 1179877 for CVE-2020-29660", "url": "https://bugzilla.suse.com/1179877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "important" } ], "title": "CVE-2020-29660" }, { "cve": "CVE-2020-29661", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-29661" } ], "notes": [ { "category": "general", "text": "A locking issue was discovered in the tty subsystem of the Linux kernel through 5.9.13. drivers/tty/tty_jobctrl.c allows a use-after-free attack against TIOCSPGRP, aka CID-54ffccbf053b.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-29661", "url": "https://www.suse.com/security/cve/CVE-2020-29661" }, { "category": "external", "summary": "SUSE Bug 1179745 for CVE-2020-29661", "url": "https://bugzilla.suse.com/1179745" }, { "category": "external", "summary": "SUSE Bug 1179877 for CVE-2020-29661", "url": "https://bugzilla.suse.com/1179877" }, { "category": "external", "summary": "SUSE Bug 1214268 for CVE-2020-29661", "url": "https://bugzilla.suse.com/1214268" }, { "category": "external", "summary": "SUSE Bug 1218966 for CVE-2020-29661", "url": "https://bugzilla.suse.com/1218966" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "important" } ], "title": "CVE-2020-29661" }, { "cve": "CVE-2020-36158", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-36158" } ], "notes": [ { "category": "general", "text": "mwifiex_cmd_802_11_ad_hoc_start in drivers/net/wireless/marvell/mwifiex/join.c in the Linux kernel through 5.10.4 might allow remote attackers to execute arbitrary code via a long SSID value, aka CID-5c455c5ab332.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-36158", "url": "https://www.suse.com/security/cve/CVE-2020-36158" }, { "category": "external", "summary": "SUSE Bug 1180559 for CVE-2020-36158", "url": "https://bugzilla.suse.com/1180559" }, { "category": "external", "summary": "SUSE Bug 1180562 for CVE-2020-36158", "url": "https://bugzilla.suse.com/1180562" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "important" } ], "title": "CVE-2020-36158" }, { "cve": "CVE-2020-4788", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-4788" } ], "notes": [ { "category": "general", "text": "IBM Power9 (AIX 7.1, 7.2, and VIOS 3.1) processors could allow a local user to obtain sensitive information from the data in the L1 cache under extenuating circumstances. IBM X-Force ID: 189296.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-4788", "url": "https://www.suse.com/security/cve/CVE-2020-4788" }, { "category": "external", "summary": "SUSE Bug 1177666 for CVE-2020-4788", "url": "https://bugzilla.suse.com/1177666" }, { "category": "external", "summary": "SUSE Bug 1181158 for CVE-2020-4788", "url": "https://bugzilla.suse.com/1181158" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-4788" }, { "cve": "CVE-2020-8694", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-8694" } ], "notes": [ { "category": "general", "text": "Insufficient access control in the Linux kernel driver for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-8694", "url": "https://www.suse.com/security/cve/CVE-2020-8694" }, { "category": "external", "summary": "SUSE Bug 1170415 for CVE-2020-8694", "url": "https://bugzilla.suse.com/1170415" }, { "category": "external", "summary": "SUSE Bug 1170446 for CVE-2020-8694", "url": "https://bugzilla.suse.com/1170446" }, { "category": "external", "summary": "SUSE Bug 1178591 for CVE-2020-8694", "url": "https://bugzilla.suse.com/1178591" }, { "category": "external", "summary": "SUSE Bug 1178700 for CVE-2020-8694", "url": "https://bugzilla.suse.com/1178700" }, { "category": "external", "summary": "SUSE Bug 1179661 for CVE-2020-8694", "url": "https://bugzilla.suse.com/1179661" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-8694" } ] }
opensuse-su-2020:0818-1
Vulnerability from csaf_opensuse
Published
2020-06-14 16:26
Modified
2020-06-14 16:26
Summary
Security update for xen
Notes
Title of the patch
Security update for xen
Description of the patch
This update for xen to version 4.12.3 fixes the following issues:
- CVE-2020-0543: Fixed a side channel attack against special registers which could have resulted in leaking of read values to cores other than the one which called it.
This attack is known as Special Register Buffer Data Sampling (SRBDS) or 'CrossTalk' (bsc#1172205).
- Added support for new 64bit libxl memory API (bsc#1167007 and bsc#1157490).
This update was imported from the SUSE:SLE-15-SP1:Update update project.
Patchnames
openSUSE-2020-818
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for xen", "title": "Title of the patch" }, { "category": "description", "text": "This update for xen to version 4.12.3 fixes the following issues:\n\t \n- CVE-2020-0543: Fixed a side channel attack against special registers which could have resulted in leaking of read values to cores other than the one which called it.\n This attack is known as Special Register Buffer Data Sampling (SRBDS) or \u0027CrossTalk\u0027 (bsc#1172205).\n- Added support for new 64bit libxl memory API (bsc#1167007 and bsc#1157490).\n\nThis update was imported from the SUSE:SLE-15-SP1:Update update project.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-2020-818", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2020_0818-1.json" }, { "category": "self", "summary": "URL for openSUSE-SU-2020:0818-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GRJJ64XQBFNSNFR6IVUVZQQYKIPTZY7K/" }, { "category": "self", "summary": "E-Mail link for openSUSE-SU-2020:0818-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GRJJ64XQBFNSNFR6IVUVZQQYKIPTZY7K/" }, { "category": "self", "summary": "SUSE Bug 1027519", "url": "https://bugzilla.suse.com/1027519" }, { "category": "self", "summary": "SUSE Bug 1157490", "url": "https://bugzilla.suse.com/1157490" }, { "category": "self", "summary": "SUSE Bug 1167007", "url": "https://bugzilla.suse.com/1167007" }, { "category": "self", "summary": "SUSE Bug 1172205", "url": "https://bugzilla.suse.com/1172205" }, { "category": "self", "summary": "SUSE CVE CVE-2020-0543 page", "url": "https://www.suse.com/security/cve/CVE-2020-0543/" } ], "title": "Security update for xen", "tracking": { "current_release_date": "2020-06-14T16:26:57Z", "generator": { "date": "2020-06-14T16:26:57Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2020:0818-1", "initial_release_date": "2020-06-14T16:26:57Z", "revision_history": [ { "date": "2020-06-14T16:26:57Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "xen-devel-4.12.3_02-lp151.2.18.2.i586", "product": { "name": "xen-devel-4.12.3_02-lp151.2.18.2.i586", "product_id": "xen-devel-4.12.3_02-lp151.2.18.2.i586" } }, { "category": "product_version", "name": "xen-libs-4.12.3_02-lp151.2.18.2.i586", "product": { "name": "xen-libs-4.12.3_02-lp151.2.18.2.i586", "product_id": "xen-libs-4.12.3_02-lp151.2.18.2.i586" } }, { "category": "product_version", "name": "xen-tools-domU-4.12.3_02-lp151.2.18.2.i586", "product": { "name": "xen-tools-domU-4.12.3_02-lp151.2.18.2.i586", "product_id": "xen-tools-domU-4.12.3_02-lp151.2.18.2.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "xen-4.12.3_02-lp151.2.18.2.x86_64", "product": { "name": "xen-4.12.3_02-lp151.2.18.2.x86_64", "product_id": "xen-4.12.3_02-lp151.2.18.2.x86_64" } }, { "category": "product_version", "name": "xen-devel-4.12.3_02-lp151.2.18.2.x86_64", "product": { "name": "xen-devel-4.12.3_02-lp151.2.18.2.x86_64", "product_id": "xen-devel-4.12.3_02-lp151.2.18.2.x86_64" } }, { "category": "product_version", "name": "xen-doc-html-4.12.3_02-lp151.2.18.2.x86_64", "product": { "name": "xen-doc-html-4.12.3_02-lp151.2.18.2.x86_64", "product_id": "xen-doc-html-4.12.3_02-lp151.2.18.2.x86_64" } }, { "category": "product_version", "name": "xen-libs-4.12.3_02-lp151.2.18.2.x86_64", "product": { "name": "xen-libs-4.12.3_02-lp151.2.18.2.x86_64", "product_id": "xen-libs-4.12.3_02-lp151.2.18.2.x86_64" } }, { "category": "product_version", "name": "xen-libs-32bit-4.12.3_02-lp151.2.18.2.x86_64", "product": { "name": "xen-libs-32bit-4.12.3_02-lp151.2.18.2.x86_64", "product_id": "xen-libs-32bit-4.12.3_02-lp151.2.18.2.x86_64" } }, { "category": "product_version", "name": "xen-tools-4.12.3_02-lp151.2.18.2.x86_64", "product": { "name": "xen-tools-4.12.3_02-lp151.2.18.2.x86_64", "product_id": "xen-tools-4.12.3_02-lp151.2.18.2.x86_64" } }, { "category": "product_version", "name": "xen-tools-domU-4.12.3_02-lp151.2.18.2.x86_64", "product": { "name": "xen-tools-domU-4.12.3_02-lp151.2.18.2.x86_64", "product_id": "xen-tools-domU-4.12.3_02-lp151.2.18.2.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Leap 15.1", "product": { "name": "openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap:15.1" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "xen-4.12.3_02-lp151.2.18.2.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:xen-4.12.3_02-lp151.2.18.2.x86_64" }, "product_reference": "xen-4.12.3_02-lp151.2.18.2.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "xen-devel-4.12.3_02-lp151.2.18.2.i586 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:xen-devel-4.12.3_02-lp151.2.18.2.i586" }, "product_reference": "xen-devel-4.12.3_02-lp151.2.18.2.i586", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "xen-devel-4.12.3_02-lp151.2.18.2.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:xen-devel-4.12.3_02-lp151.2.18.2.x86_64" }, "product_reference": "xen-devel-4.12.3_02-lp151.2.18.2.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "xen-doc-html-4.12.3_02-lp151.2.18.2.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:xen-doc-html-4.12.3_02-lp151.2.18.2.x86_64" }, "product_reference": "xen-doc-html-4.12.3_02-lp151.2.18.2.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.12.3_02-lp151.2.18.2.i586 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:xen-libs-4.12.3_02-lp151.2.18.2.i586" }, "product_reference": "xen-libs-4.12.3_02-lp151.2.18.2.i586", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.12.3_02-lp151.2.18.2.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:xen-libs-4.12.3_02-lp151.2.18.2.x86_64" }, "product_reference": "xen-libs-4.12.3_02-lp151.2.18.2.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-32bit-4.12.3_02-lp151.2.18.2.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:xen-libs-32bit-4.12.3_02-lp151.2.18.2.x86_64" }, "product_reference": "xen-libs-32bit-4.12.3_02-lp151.2.18.2.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.12.3_02-lp151.2.18.2.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:xen-tools-4.12.3_02-lp151.2.18.2.x86_64" }, "product_reference": "xen-tools-4.12.3_02-lp151.2.18.2.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.12.3_02-lp151.2.18.2.i586 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:xen-tools-domU-4.12.3_02-lp151.2.18.2.i586" }, "product_reference": "xen-tools-domU-4.12.3_02-lp151.2.18.2.i586", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.12.3_02-lp151.2.18.2.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:xen-tools-domU-4.12.3_02-lp151.2.18.2.x86_64" }, "product_reference": "xen-tools-domU-4.12.3_02-lp151.2.18.2.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-0543", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-0543" } ], "notes": [ { "category": "general", "text": "Incomplete cleanup from specific special register read operations in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:xen-4.12.3_02-lp151.2.18.2.x86_64", "openSUSE Leap 15.1:xen-devel-4.12.3_02-lp151.2.18.2.i586", "openSUSE Leap 15.1:xen-devel-4.12.3_02-lp151.2.18.2.x86_64", "openSUSE Leap 15.1:xen-doc-html-4.12.3_02-lp151.2.18.2.x86_64", "openSUSE Leap 15.1:xen-libs-32bit-4.12.3_02-lp151.2.18.2.x86_64", "openSUSE Leap 15.1:xen-libs-4.12.3_02-lp151.2.18.2.i586", "openSUSE Leap 15.1:xen-libs-4.12.3_02-lp151.2.18.2.x86_64", "openSUSE Leap 15.1:xen-tools-4.12.3_02-lp151.2.18.2.x86_64", "openSUSE Leap 15.1:xen-tools-domU-4.12.3_02-lp151.2.18.2.i586", "openSUSE Leap 15.1:xen-tools-domU-4.12.3_02-lp151.2.18.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-0543", "url": "https://www.suse.com/security/cve/CVE-2020-0543" }, { "category": "external", "summary": "SUSE Bug 1154824 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1154824" }, { "category": "external", "summary": "SUSE Bug 1172205 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172205" }, { "category": "external", "summary": "SUSE Bug 1172206 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172206" }, { "category": "external", "summary": "SUSE Bug 1172207 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172207" }, { "category": "external", "summary": "SUSE Bug 1172770 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172770" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:xen-4.12.3_02-lp151.2.18.2.x86_64", "openSUSE Leap 15.1:xen-devel-4.12.3_02-lp151.2.18.2.i586", "openSUSE Leap 15.1:xen-devel-4.12.3_02-lp151.2.18.2.x86_64", "openSUSE Leap 15.1:xen-doc-html-4.12.3_02-lp151.2.18.2.x86_64", "openSUSE Leap 15.1:xen-libs-32bit-4.12.3_02-lp151.2.18.2.x86_64", "openSUSE Leap 15.1:xen-libs-4.12.3_02-lp151.2.18.2.i586", "openSUSE Leap 15.1:xen-libs-4.12.3_02-lp151.2.18.2.x86_64", "openSUSE Leap 15.1:xen-tools-4.12.3_02-lp151.2.18.2.x86_64", "openSUSE Leap 15.1:xen-tools-domU-4.12.3_02-lp151.2.18.2.i586", "openSUSE Leap 15.1:xen-tools-domU-4.12.3_02-lp151.2.18.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.1:xen-4.12.3_02-lp151.2.18.2.x86_64", "openSUSE Leap 15.1:xen-devel-4.12.3_02-lp151.2.18.2.i586", "openSUSE Leap 15.1:xen-devel-4.12.3_02-lp151.2.18.2.x86_64", "openSUSE Leap 15.1:xen-doc-html-4.12.3_02-lp151.2.18.2.x86_64", "openSUSE Leap 15.1:xen-libs-32bit-4.12.3_02-lp151.2.18.2.x86_64", "openSUSE Leap 15.1:xen-libs-4.12.3_02-lp151.2.18.2.i586", "openSUSE Leap 15.1:xen-libs-4.12.3_02-lp151.2.18.2.x86_64", "openSUSE Leap 15.1:xen-tools-4.12.3_02-lp151.2.18.2.x86_64", "openSUSE Leap 15.1:xen-tools-domU-4.12.3_02-lp151.2.18.2.i586", "openSUSE Leap 15.1:xen-tools-domU-4.12.3_02-lp151.2.18.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-14T16:26:57Z", "details": "moderate" } ], "title": "CVE-2020-0543" } ] }
rhsa-2020:2433
Vulnerability from csaf_redhat
Published
2020-06-09 19:30
Modified
2025-02-28 01:27
Summary
Red Hat Security Advisory: microcode_ctl security, bug fix and enhancement update
Notes
Topic
An update for microcode_ctl is now available for Red Hat Enterprise Linux 6.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The microcode_ctl packages provide microcode updates for Intel and AMD processors.
Security Fix(es):
* hw: Special Register Buffer Data Sampling (SRBDS) (CVE-2020-0543)
* hw: L1D Cache Eviction Sampling (CVE-2020-0549)
* hw: Vector Register Data Sampling (CVE-2020-0548)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es) and Enhancement(s):
* Update Intel CPU microcode to microcode-20200602 release, addresses:
- Update of 06-3c-03/0x32 (HSW C0) microcode from revision 0x27 up to 0x28;
- Update of 06-3d-04/0xc0 (BDW-U/Y E0/F0) microcode from revision 0x2e
up to 0x2f;
- Update of 06-45-01/0x72 (HSW-U C0/D0) microcode from revision 0x25
up to 0x26;
- Update of 06-46-01/0x32 (HSW-H C0) microcode from revision 0x1b up to 0x1c;
- Update of 06-47-01/0x22 (BDW-H/Xeon E3 E0/G0) microcode from revision 0x21
up to 0x22;
- Update of 06-4e-03/0xc0 (SKL-U/Y D0) microcode from revision 0xd6
up to 0xdc;
- Update of 06-55-03/0x97 (SKX-SP B1) microcode from revision 0x1000151
up to 0x1000157;
- Update of 06-55-04/0xb7 (SKX-SP H0/M0/U0, SKX-D M1) microcode
(in intel-06-55-04/intel-ucode/06-55-04) from revision 0x2000065
up to 0x2006906;
- Update of 06-55-06/0xbf (CLX-SP B0) microcode from revision 0x400002c
up to 0x4002f01;
- Update of 06-55-07/0xbf (CLX-SP B1) microcode from revision 0x500002c
up to 0x5002f01;
- Update of 06-5e-03/0x36 (SKL-H/S R0/N0) microcode from revision 0xd6
up to 0xdc;
- Update of 06-8e-09/0x10 (AML-Y22 H0) microcode from revision 0xca
up to 0xd6;
- Update of 06-8e-09/0xc0 (KBL-U/Y H0) microcode from revision 0xca
up to 0xd6;
- Update of 06-8e-0a/0xc0 (CFL-U43e D0) microcode from revision 0xca
up to 0xd6;
- Update of 06-8e-0b/0xd0 (WHL-U W0) microcode from revision 0xca
up to 0xd6;
- Update of 06-8e-0c/0x94 (AML-Y42 V0, CML-Y42 V0, WHL-U V0) microcode
from revision 0xca up to 0xd6;
- Update of 06-9e-09/0x2a (KBL-G/H/S/X/Xeon E3 B0) microcode from revision
0xca up to 0xd6;
- Update of 06-9e-0a/0x22 (CFL-H/S/Xeon E3 U0) microcode from revision 0xca
up to 0xd6;
- Update of 06-9e-0b/0x02 (CFL-S B0) microcode from revision 0xca up to 0xd6;
- Update of 06-9e-0c/0x22 (CFL-H/S P0) microcode from revision 0xca
up to 0xd6;
- Update of 06-9e-0d/0x22 (CFL-H R0) microcode from revision 0xca up to 0xd6.
* Update Intel CPU microcode to microcode-20200520 release:
- Update of 06-2d-06/0x6d (SNB-E/EN/EP C1/M0) microcode from revision 0x61f
up to 0x621;
- Update of 06-2d-07/0x6d (SNB-E/EN/EP C2/M1) microcode from revision 0x718
up to 0x71a;
- Update of 06-7e-05/0x80 (ICL-U/Y D1) microcode from revision 0x46
up to 0x78.
(BZ#1839193)
* Narrow down SKL-SP/W/X blacklist to exclude Server/FPGA/Fabric segment
models. (BZ#1835555)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for microcode_ctl is now available for Red Hat Enterprise Linux 6.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The microcode_ctl packages provide microcode updates for Intel and AMD processors.\n\nSecurity Fix(es):\n\n* hw: Special Register Buffer Data Sampling (SRBDS) (CVE-2020-0543)\n\n* hw: L1D Cache Eviction Sampling (CVE-2020-0549)\n\n* hw: Vector Register Data Sampling (CVE-2020-0548)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es) and Enhancement(s):\n\n* Update Intel CPU microcode to microcode-20200602 release, addresses:\n - Update of 06-3c-03/0x32 (HSW C0) microcode from revision 0x27 up to 0x28;\n - Update of 06-3d-04/0xc0 (BDW-U/Y E0/F0) microcode from revision 0x2e\n up to 0x2f;\n - Update of 06-45-01/0x72 (HSW-U C0/D0) microcode from revision 0x25\n up to 0x26;\n - Update of 06-46-01/0x32 (HSW-H C0) microcode from revision 0x1b up to 0x1c;\n - Update of 06-47-01/0x22 (BDW-H/Xeon E3 E0/G0) microcode from revision 0x21\n up to 0x22;\n - Update of 06-4e-03/0xc0 (SKL-U/Y D0) microcode from revision 0xd6\n up to 0xdc;\n - Update of 06-55-03/0x97 (SKX-SP B1) microcode from revision 0x1000151\n up to 0x1000157;\n - Update of 06-55-04/0xb7 (SKX-SP H0/M0/U0, SKX-D M1) microcode\n (in intel-06-55-04/intel-ucode/06-55-04) from revision 0x2000065\n up to 0x2006906;\n - Update of 06-55-06/0xbf (CLX-SP B0) microcode from revision 0x400002c\n up to 0x4002f01;\n - Update of 06-55-07/0xbf (CLX-SP B1) microcode from revision 0x500002c\n up to 0x5002f01;\n - Update of 06-5e-03/0x36 (SKL-H/S R0/N0) microcode from revision 0xd6\n up to 0xdc;\n - Update of 06-8e-09/0x10 (AML-Y22 H0) microcode from revision 0xca\n up to 0xd6;\n - Update of 06-8e-09/0xc0 (KBL-U/Y H0) microcode from revision 0xca\n up to 0xd6;\n - Update of 06-8e-0a/0xc0 (CFL-U43e D0) microcode from revision 0xca\n up to 0xd6;\n - Update of 06-8e-0b/0xd0 (WHL-U W0) microcode from revision 0xca\n up to 0xd6;\n - Update of 06-8e-0c/0x94 (AML-Y42 V0, CML-Y42 V0, WHL-U V0) microcode\n from revision 0xca up to 0xd6;\n - Update of 06-9e-09/0x2a (KBL-G/H/S/X/Xeon E3 B0) microcode from revision\n 0xca up to 0xd6;\n - Update of 06-9e-0a/0x22 (CFL-H/S/Xeon E3 U0) microcode from revision 0xca\n up to 0xd6;\n - Update of 06-9e-0b/0x02 (CFL-S B0) microcode from revision 0xca up to 0xd6;\n - Update of 06-9e-0c/0x22 (CFL-H/S P0) microcode from revision 0xca\n up to 0xd6;\n - Update of 06-9e-0d/0x22 (CFL-H R0) microcode from revision 0xca up to 0xd6.\n\n* Update Intel CPU microcode to microcode-20200520 release:\n - Update of 06-2d-06/0x6d (SNB-E/EN/EP C1/M0) microcode from revision 0x61f\n up to 0x621;\n - Update of 06-2d-07/0x6d (SNB-E/EN/EP C2/M1) microcode from revision 0x718\n up to 0x71a;\n - Update of 06-7e-05/0x80 (ICL-U/Y D1) microcode from revision 0x46\n up to 0x78.\n\n(BZ#1839193)\n\n* Narrow down SKL-SP/W/X blacklist to exclude Server/FPGA/Fabric segment\n models. (BZ#1835555)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2020:2433", "url": "https://access.redhat.com/errata/RHSA-2020:2433" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "https://access.redhat.com/solutions/5142751", "url": "https://access.redhat.com/solutions/5142751" }, { "category": "external", "summary": "https://access.redhat.com/solutions/5142691", "url": "https://access.redhat.com/solutions/5142691" }, { "category": "external", "summary": "1788786", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1788786" }, { "category": "external", "summary": "1788788", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1788788" }, { "category": "external", "summary": "1827165", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1827165" }, { "category": "external", "summary": "1835555", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1835555" }, { "category": "external", "summary": "1839193", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1839193" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_2433.json" } ], "title": "Red Hat Security Advisory: microcode_ctl security, bug fix and enhancement update", "tracking": { "current_release_date": "2025-02-28T01:27:46+00:00", "generator": { "date": "2025-02-28T01:27:46+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.3.1" } }, "id": "RHSA-2020:2433", "initial_release_date": "2020-06-09T19:30:27+00:00", "revision_history": [ { "date": "2020-06-09T19:30:27+00:00", "number": "1", "summary": "Initial version" }, { "date": "2020-06-09T19:30:27+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-02-28T01:27:46+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node (v. 6)", "product": { "name": "Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::workstation" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "microcode_ctl-2:1.17-33.26.el6_10.i686", "product": { "name": "microcode_ctl-2:1.17-33.26.el6_10.i686", "product_id": "microcode_ctl-2:1.17-33.26.el6_10.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/microcode_ctl@1.17-33.26.el6_10?arch=i686\u0026epoch=2" } } }, { "category": "product_version", "name": "microcode_ctl-debuginfo-2:1.17-33.26.el6_10.i686", "product": { "name": "microcode_ctl-debuginfo-2:1.17-33.26.el6_10.i686", "product_id": "microcode_ctl-debuginfo-2:1.17-33.26.el6_10.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/microcode_ctl-debuginfo@1.17-33.26.el6_10?arch=i686\u0026epoch=2" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "microcode_ctl-2:1.17-33.26.el6_10.x86_64", "product": { "name": "microcode_ctl-2:1.17-33.26.el6_10.x86_64", "product_id": "microcode_ctl-2:1.17-33.26.el6_10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/microcode_ctl@1.17-33.26.el6_10?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "microcode_ctl-debuginfo-2:1.17-33.26.el6_10.x86_64", "product": { "name": "microcode_ctl-debuginfo-2:1.17-33.26.el6_10.x86_64", "product_id": "microcode_ctl-debuginfo-2:1.17-33.26.el6_10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/microcode_ctl-debuginfo@1.17-33.26.el6_10?arch=x86_64\u0026epoch=2" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "microcode_ctl-2:1.17-33.26.el6_10.src", "product": { "name": "microcode_ctl-2:1.17-33.26.el6_10.src", "product_id": "microcode_ctl-2:1.17-33.26.el6_10.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/microcode_ctl@1.17-33.26.el6_10?arch=src\u0026epoch=2" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "microcode_ctl-2:1.17-33.26.el6_10.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:microcode_ctl-2:1.17-33.26.el6_10.i686" }, "product_reference": "microcode_ctl-2:1.17-33.26.el6_10.i686", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "microcode_ctl-2:1.17-33.26.el6_10.src as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:microcode_ctl-2:1.17-33.26.el6_10.src" }, "product_reference": "microcode_ctl-2:1.17-33.26.el6_10.src", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "microcode_ctl-2:1.17-33.26.el6_10.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:microcode_ctl-2:1.17-33.26.el6_10.x86_64" }, "product_reference": "microcode_ctl-2:1.17-33.26.el6_10.x86_64", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "microcode_ctl-debuginfo-2:1.17-33.26.el6_10.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:microcode_ctl-debuginfo-2:1.17-33.26.el6_10.i686" }, "product_reference": "microcode_ctl-debuginfo-2:1.17-33.26.el6_10.i686", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "microcode_ctl-debuginfo-2:1.17-33.26.el6_10.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:microcode_ctl-debuginfo-2:1.17-33.26.el6_10.x86_64" }, "product_reference": "microcode_ctl-debuginfo-2:1.17-33.26.el6_10.x86_64", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "microcode_ctl-2:1.17-33.26.el6_10.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:microcode_ctl-2:1.17-33.26.el6_10.i686" }, "product_reference": "microcode_ctl-2:1.17-33.26.el6_10.i686", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "microcode_ctl-2:1.17-33.26.el6_10.src as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:microcode_ctl-2:1.17-33.26.el6_10.src" }, "product_reference": "microcode_ctl-2:1.17-33.26.el6_10.src", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "microcode_ctl-2:1.17-33.26.el6_10.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:microcode_ctl-2:1.17-33.26.el6_10.x86_64" }, "product_reference": "microcode_ctl-2:1.17-33.26.el6_10.x86_64", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "microcode_ctl-debuginfo-2:1.17-33.26.el6_10.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:microcode_ctl-debuginfo-2:1.17-33.26.el6_10.i686" }, "product_reference": "microcode_ctl-debuginfo-2:1.17-33.26.el6_10.i686", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "microcode_ctl-debuginfo-2:1.17-33.26.el6_10.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:microcode_ctl-debuginfo-2:1.17-33.26.el6_10.x86_64" }, "product_reference": "microcode_ctl-debuginfo-2:1.17-33.26.el6_10.x86_64", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "microcode_ctl-2:1.17-33.26.el6_10.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:microcode_ctl-2:1.17-33.26.el6_10.i686" }, "product_reference": "microcode_ctl-2:1.17-33.26.el6_10.i686", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "microcode_ctl-2:1.17-33.26.el6_10.src as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:microcode_ctl-2:1.17-33.26.el6_10.src" }, "product_reference": "microcode_ctl-2:1.17-33.26.el6_10.src", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "microcode_ctl-2:1.17-33.26.el6_10.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:microcode_ctl-2:1.17-33.26.el6_10.x86_64" }, "product_reference": "microcode_ctl-2:1.17-33.26.el6_10.x86_64", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "microcode_ctl-debuginfo-2:1.17-33.26.el6_10.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:microcode_ctl-debuginfo-2:1.17-33.26.el6_10.i686" }, "product_reference": "microcode_ctl-debuginfo-2:1.17-33.26.el6_10.i686", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "microcode_ctl-debuginfo-2:1.17-33.26.el6_10.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:microcode_ctl-debuginfo-2:1.17-33.26.el6_10.x86_64" }, "product_reference": "microcode_ctl-debuginfo-2:1.17-33.26.el6_10.x86_64", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "microcode_ctl-2:1.17-33.26.el6_10.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:microcode_ctl-2:1.17-33.26.el6_10.i686" }, "product_reference": "microcode_ctl-2:1.17-33.26.el6_10.i686", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "microcode_ctl-2:1.17-33.26.el6_10.src as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:microcode_ctl-2:1.17-33.26.el6_10.src" }, "product_reference": "microcode_ctl-2:1.17-33.26.el6_10.src", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "microcode_ctl-2:1.17-33.26.el6_10.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:microcode_ctl-2:1.17-33.26.el6_10.x86_64" }, "product_reference": "microcode_ctl-2:1.17-33.26.el6_10.x86_64", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "microcode_ctl-debuginfo-2:1.17-33.26.el6_10.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:microcode_ctl-debuginfo-2:1.17-33.26.el6_10.i686" }, "product_reference": "microcode_ctl-debuginfo-2:1.17-33.26.el6_10.i686", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "microcode_ctl-debuginfo-2:1.17-33.26.el6_10.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:microcode_ctl-debuginfo-2:1.17-33.26.el6_10.x86_64" }, "product_reference": "microcode_ctl-debuginfo-2:1.17-33.26.el6_10.x86_64", "relates_to_product_reference": "6Workstation-6.10.z" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Intel" ] } ], "cve": "CVE-2020-0543", "discovery_date": "2020-04-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1827165" } ], "notes": [ { "category": "description", "text": "A new domain bypass transient execution attack known as Special Register Buffer Data Sampling (SRBDS) has been found. This flaw allows data values from special internal registers to be leaked by an attacker able to execute code on any core of the CPU. An unprivileged, local attacker can use this flaw to infer values returned by affected instructions known to be commonly used during cryptographic operations that rely on uniqueness, secrecy, or both.", "title": "Vulnerability description" }, { "category": "summary", "text": "hw: Special Register Buffer Data Sampling (SRBDS)", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/solutions/5142691", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-6.10.z:microcode_ctl-2:1.17-33.26.el6_10.i686", "6Client-6.10.z:microcode_ctl-2:1.17-33.26.el6_10.src", "6Client-6.10.z:microcode_ctl-2:1.17-33.26.el6_10.x86_64", "6Client-6.10.z:microcode_ctl-debuginfo-2:1.17-33.26.el6_10.i686", "6Client-6.10.z:microcode_ctl-debuginfo-2:1.17-33.26.el6_10.x86_64", "6ComputeNode-6.10.z:microcode_ctl-2:1.17-33.26.el6_10.i686", "6ComputeNode-6.10.z:microcode_ctl-2:1.17-33.26.el6_10.src", "6ComputeNode-6.10.z:microcode_ctl-2:1.17-33.26.el6_10.x86_64", "6ComputeNode-6.10.z:microcode_ctl-debuginfo-2:1.17-33.26.el6_10.i686", "6ComputeNode-6.10.z:microcode_ctl-debuginfo-2:1.17-33.26.el6_10.x86_64", "6Server-6.10.z:microcode_ctl-2:1.17-33.26.el6_10.i686", "6Server-6.10.z:microcode_ctl-2:1.17-33.26.el6_10.src", "6Server-6.10.z:microcode_ctl-2:1.17-33.26.el6_10.x86_64", "6Server-6.10.z:microcode_ctl-debuginfo-2:1.17-33.26.el6_10.i686", "6Server-6.10.z:microcode_ctl-debuginfo-2:1.17-33.26.el6_10.x86_64", "6Workstation-6.10.z:microcode_ctl-2:1.17-33.26.el6_10.i686", "6Workstation-6.10.z:microcode_ctl-2:1.17-33.26.el6_10.src", "6Workstation-6.10.z:microcode_ctl-2:1.17-33.26.el6_10.x86_64", "6Workstation-6.10.z:microcode_ctl-debuginfo-2:1.17-33.26.el6_10.i686", "6Workstation-6.10.z:microcode_ctl-debuginfo-2:1.17-33.26.el6_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-0543" }, { "category": "external", "summary": "RHBZ#1827165", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1827165" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-0543", "url": "https://www.cve.org/CVERecord?id=CVE-2020-0543" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-0543", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-0543" }, { "category": "external", "summary": "https://access.redhat.com/solutions/5142691", "url": "https://access.redhat.com/solutions/5142691" }, { "category": "external", "summary": "https://access.redhat.com/solutions/5142751", "url": "https://access.redhat.com/solutions/5142751" }, { "category": "external", "summary": "https://blogs.intel.com/technology/2020/06/ipas-security-advisories-for-june-2020/#gs.6uyhri", "url": "https://blogs.intel.com/technology/2020/06/ipas-security-advisories-for-june-2020/#gs.6uyhri" }, { "category": "external", "summary": "https://software.intel.com/security-software-guidance/insights/deep-dive-special-register-buffer-data-sampling", "url": "https://software.intel.com/security-software-guidance/insights/deep-dive-special-register-buffer-data-sampling" }, { "category": "external", "summary": "https://xenbits.xen.org/xsa/advisory-320.html", "url": "https://xenbits.xen.org/xsa/advisory-320.html" } ], "release_date": "2020-06-09T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-06-09T19:30:27+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Client-6.10.z:microcode_ctl-2:1.17-33.26.el6_10.i686", "6Client-6.10.z:microcode_ctl-2:1.17-33.26.el6_10.src", "6Client-6.10.z:microcode_ctl-2:1.17-33.26.el6_10.x86_64", "6Client-6.10.z:microcode_ctl-debuginfo-2:1.17-33.26.el6_10.i686", "6Client-6.10.z:microcode_ctl-debuginfo-2:1.17-33.26.el6_10.x86_64", "6ComputeNode-6.10.z:microcode_ctl-2:1.17-33.26.el6_10.i686", "6ComputeNode-6.10.z:microcode_ctl-2:1.17-33.26.el6_10.src", "6ComputeNode-6.10.z:microcode_ctl-2:1.17-33.26.el6_10.x86_64", "6ComputeNode-6.10.z:microcode_ctl-debuginfo-2:1.17-33.26.el6_10.i686", "6ComputeNode-6.10.z:microcode_ctl-debuginfo-2:1.17-33.26.el6_10.x86_64", "6Server-6.10.z:microcode_ctl-2:1.17-33.26.el6_10.i686", "6Server-6.10.z:microcode_ctl-2:1.17-33.26.el6_10.src", "6Server-6.10.z:microcode_ctl-2:1.17-33.26.el6_10.x86_64", "6Server-6.10.z:microcode_ctl-debuginfo-2:1.17-33.26.el6_10.i686", "6Server-6.10.z:microcode_ctl-debuginfo-2:1.17-33.26.el6_10.x86_64", "6Workstation-6.10.z:microcode_ctl-2:1.17-33.26.el6_10.i686", "6Workstation-6.10.z:microcode_ctl-2:1.17-33.26.el6_10.src", "6Workstation-6.10.z:microcode_ctl-2:1.17-33.26.el6_10.x86_64", "6Workstation-6.10.z:microcode_ctl-debuginfo-2:1.17-33.26.el6_10.i686", "6Workstation-6.10.z:microcode_ctl-debuginfo-2:1.17-33.26.el6_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2433" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "6Client-6.10.z:microcode_ctl-2:1.17-33.26.el6_10.i686", "6Client-6.10.z:microcode_ctl-2:1.17-33.26.el6_10.src", "6Client-6.10.z:microcode_ctl-2:1.17-33.26.el6_10.x86_64", "6Client-6.10.z:microcode_ctl-debuginfo-2:1.17-33.26.el6_10.i686", "6Client-6.10.z:microcode_ctl-debuginfo-2:1.17-33.26.el6_10.x86_64", "6ComputeNode-6.10.z:microcode_ctl-2:1.17-33.26.el6_10.i686", "6ComputeNode-6.10.z:microcode_ctl-2:1.17-33.26.el6_10.src", "6ComputeNode-6.10.z:microcode_ctl-2:1.17-33.26.el6_10.x86_64", "6ComputeNode-6.10.z:microcode_ctl-debuginfo-2:1.17-33.26.el6_10.i686", "6ComputeNode-6.10.z:microcode_ctl-debuginfo-2:1.17-33.26.el6_10.x86_64", "6Server-6.10.z:microcode_ctl-2:1.17-33.26.el6_10.i686", "6Server-6.10.z:microcode_ctl-2:1.17-33.26.el6_10.src", "6Server-6.10.z:microcode_ctl-2:1.17-33.26.el6_10.x86_64", "6Server-6.10.z:microcode_ctl-debuginfo-2:1.17-33.26.el6_10.i686", "6Server-6.10.z:microcode_ctl-debuginfo-2:1.17-33.26.el6_10.x86_64", "6Workstation-6.10.z:microcode_ctl-2:1.17-33.26.el6_10.i686", "6Workstation-6.10.z:microcode_ctl-2:1.17-33.26.el6_10.src", "6Workstation-6.10.z:microcode_ctl-2:1.17-33.26.el6_10.x86_64", "6Workstation-6.10.z:microcode_ctl-debuginfo-2:1.17-33.26.el6_10.i686", "6Workstation-6.10.z:microcode_ctl-debuginfo-2:1.17-33.26.el6_10.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "6Client-6.10.z:microcode_ctl-2:1.17-33.26.el6_10.i686", "6Client-6.10.z:microcode_ctl-2:1.17-33.26.el6_10.src", "6Client-6.10.z:microcode_ctl-2:1.17-33.26.el6_10.x86_64", "6Client-6.10.z:microcode_ctl-debuginfo-2:1.17-33.26.el6_10.i686", "6Client-6.10.z:microcode_ctl-debuginfo-2:1.17-33.26.el6_10.x86_64", "6ComputeNode-6.10.z:microcode_ctl-2:1.17-33.26.el6_10.i686", "6ComputeNode-6.10.z:microcode_ctl-2:1.17-33.26.el6_10.src", "6ComputeNode-6.10.z:microcode_ctl-2:1.17-33.26.el6_10.x86_64", "6ComputeNode-6.10.z:microcode_ctl-debuginfo-2:1.17-33.26.el6_10.i686", "6ComputeNode-6.10.z:microcode_ctl-debuginfo-2:1.17-33.26.el6_10.x86_64", "6Server-6.10.z:microcode_ctl-2:1.17-33.26.el6_10.i686", "6Server-6.10.z:microcode_ctl-2:1.17-33.26.el6_10.src", "6Server-6.10.z:microcode_ctl-2:1.17-33.26.el6_10.x86_64", "6Server-6.10.z:microcode_ctl-debuginfo-2:1.17-33.26.el6_10.i686", "6Server-6.10.z:microcode_ctl-debuginfo-2:1.17-33.26.el6_10.x86_64", "6Workstation-6.10.z:microcode_ctl-2:1.17-33.26.el6_10.i686", "6Workstation-6.10.z:microcode_ctl-2:1.17-33.26.el6_10.src", "6Workstation-6.10.z:microcode_ctl-2:1.17-33.26.el6_10.x86_64", "6Workstation-6.10.z:microcode_ctl-debuginfo-2:1.17-33.26.el6_10.i686", "6Workstation-6.10.z:microcode_ctl-debuginfo-2:1.17-33.26.el6_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "hw: Special Register Buffer Data Sampling (SRBDS)" }, { "cve": "CVE-2020-0548", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2020-01-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1788786" } ], "notes": [ { "category": "description", "text": "A flaw was found in Intel processors where a local attacker is able to gain information about registers used for vector calculations by observing register states from other processes running on the system. This results in a race condition where store buffers, which were not cleared, could be read by another process or a CPU sibling. The highest threat from this vulnerability is data confidentiality where an attacker could read arbitrary data as it passes through the processor.", "title": "Vulnerability description" }, { "category": "summary", "text": "hw: Vector Register Data Sampling", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-6.10.z:microcode_ctl-2:1.17-33.26.el6_10.i686", "6Client-6.10.z:microcode_ctl-2:1.17-33.26.el6_10.src", "6Client-6.10.z:microcode_ctl-2:1.17-33.26.el6_10.x86_64", "6Client-6.10.z:microcode_ctl-debuginfo-2:1.17-33.26.el6_10.i686", "6Client-6.10.z:microcode_ctl-debuginfo-2:1.17-33.26.el6_10.x86_64", "6ComputeNode-6.10.z:microcode_ctl-2:1.17-33.26.el6_10.i686", "6ComputeNode-6.10.z:microcode_ctl-2:1.17-33.26.el6_10.src", "6ComputeNode-6.10.z:microcode_ctl-2:1.17-33.26.el6_10.x86_64", "6ComputeNode-6.10.z:microcode_ctl-debuginfo-2:1.17-33.26.el6_10.i686", "6ComputeNode-6.10.z:microcode_ctl-debuginfo-2:1.17-33.26.el6_10.x86_64", "6Server-6.10.z:microcode_ctl-2:1.17-33.26.el6_10.i686", "6Server-6.10.z:microcode_ctl-2:1.17-33.26.el6_10.src", "6Server-6.10.z:microcode_ctl-2:1.17-33.26.el6_10.x86_64", "6Server-6.10.z:microcode_ctl-debuginfo-2:1.17-33.26.el6_10.i686", "6Server-6.10.z:microcode_ctl-debuginfo-2:1.17-33.26.el6_10.x86_64", "6Workstation-6.10.z:microcode_ctl-2:1.17-33.26.el6_10.i686", "6Workstation-6.10.z:microcode_ctl-2:1.17-33.26.el6_10.src", "6Workstation-6.10.z:microcode_ctl-2:1.17-33.26.el6_10.x86_64", "6Workstation-6.10.z:microcode_ctl-debuginfo-2:1.17-33.26.el6_10.i686", "6Workstation-6.10.z:microcode_ctl-debuginfo-2:1.17-33.26.el6_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-0548" }, { "category": "external", "summary": "RHBZ#1788786", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1788786" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-0548", "url": "https://www.cve.org/CVERecord?id=CVE-2020-0548" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-0548", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-0548" }, { "category": "external", "summary": "https://access.redhat.com/solutions/l1d-cache-eviction-and-vector-register-sampling", "url": "https://access.redhat.com/solutions/l1d-cache-eviction-and-vector-register-sampling" }, { "category": "external", "summary": "https://blogs.intel.com/technology/2020/01/ipas-intel-sa-00329/", "url": "https://blogs.intel.com/technology/2020/01/ipas-intel-sa-00329/" }, { "category": "external", "summary": "https://cacheoutattack.com/CacheOut.pdf", "url": "https://cacheoutattack.com/CacheOut.pdf" }, { "category": "external", "summary": "https://software.intel.com/security-software-guidance/software-guidance/l1d-eviction-sampling", "url": "https://software.intel.com/security-software-guidance/software-guidance/l1d-eviction-sampling" } ], "release_date": "2020-01-27T13:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-06-09T19:30:27+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Client-6.10.z:microcode_ctl-2:1.17-33.26.el6_10.i686", "6Client-6.10.z:microcode_ctl-2:1.17-33.26.el6_10.src", "6Client-6.10.z:microcode_ctl-2:1.17-33.26.el6_10.x86_64", "6Client-6.10.z:microcode_ctl-debuginfo-2:1.17-33.26.el6_10.i686", "6Client-6.10.z:microcode_ctl-debuginfo-2:1.17-33.26.el6_10.x86_64", "6ComputeNode-6.10.z:microcode_ctl-2:1.17-33.26.el6_10.i686", "6ComputeNode-6.10.z:microcode_ctl-2:1.17-33.26.el6_10.src", "6ComputeNode-6.10.z:microcode_ctl-2:1.17-33.26.el6_10.x86_64", "6ComputeNode-6.10.z:microcode_ctl-debuginfo-2:1.17-33.26.el6_10.i686", "6ComputeNode-6.10.z:microcode_ctl-debuginfo-2:1.17-33.26.el6_10.x86_64", "6Server-6.10.z:microcode_ctl-2:1.17-33.26.el6_10.i686", "6Server-6.10.z:microcode_ctl-2:1.17-33.26.el6_10.src", "6Server-6.10.z:microcode_ctl-2:1.17-33.26.el6_10.x86_64", "6Server-6.10.z:microcode_ctl-debuginfo-2:1.17-33.26.el6_10.i686", "6Server-6.10.z:microcode_ctl-debuginfo-2:1.17-33.26.el6_10.x86_64", "6Workstation-6.10.z:microcode_ctl-2:1.17-33.26.el6_10.i686", "6Workstation-6.10.z:microcode_ctl-2:1.17-33.26.el6_10.src", "6Workstation-6.10.z:microcode_ctl-2:1.17-33.26.el6_10.x86_64", "6Workstation-6.10.z:microcode_ctl-debuginfo-2:1.17-33.26.el6_10.i686", "6Workstation-6.10.z:microcode_ctl-debuginfo-2:1.17-33.26.el6_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2433" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 2.8, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.0" }, "products": [ "6Client-6.10.z:microcode_ctl-2:1.17-33.26.el6_10.i686", "6Client-6.10.z:microcode_ctl-2:1.17-33.26.el6_10.src", "6Client-6.10.z:microcode_ctl-2:1.17-33.26.el6_10.x86_64", "6Client-6.10.z:microcode_ctl-debuginfo-2:1.17-33.26.el6_10.i686", "6Client-6.10.z:microcode_ctl-debuginfo-2:1.17-33.26.el6_10.x86_64", "6ComputeNode-6.10.z:microcode_ctl-2:1.17-33.26.el6_10.i686", "6ComputeNode-6.10.z:microcode_ctl-2:1.17-33.26.el6_10.src", "6ComputeNode-6.10.z:microcode_ctl-2:1.17-33.26.el6_10.x86_64", "6ComputeNode-6.10.z:microcode_ctl-debuginfo-2:1.17-33.26.el6_10.i686", "6ComputeNode-6.10.z:microcode_ctl-debuginfo-2:1.17-33.26.el6_10.x86_64", "6Server-6.10.z:microcode_ctl-2:1.17-33.26.el6_10.i686", "6Server-6.10.z:microcode_ctl-2:1.17-33.26.el6_10.src", "6Server-6.10.z:microcode_ctl-2:1.17-33.26.el6_10.x86_64", "6Server-6.10.z:microcode_ctl-debuginfo-2:1.17-33.26.el6_10.i686", "6Server-6.10.z:microcode_ctl-debuginfo-2:1.17-33.26.el6_10.x86_64", "6Workstation-6.10.z:microcode_ctl-2:1.17-33.26.el6_10.i686", "6Workstation-6.10.z:microcode_ctl-2:1.17-33.26.el6_10.src", "6Workstation-6.10.z:microcode_ctl-2:1.17-33.26.el6_10.x86_64", "6Workstation-6.10.z:microcode_ctl-debuginfo-2:1.17-33.26.el6_10.i686", "6Workstation-6.10.z:microcode_ctl-debuginfo-2:1.17-33.26.el6_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "hw: Vector Register Data Sampling" }, { "cve": "CVE-2020-0549", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2020-01-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1788788" } ], "notes": [ { "category": "description", "text": "A microarchitectural timing flaw was found on some Intel processors. A corner case exists where data in-flight during the eviction process can end up in the \u201cfill buffers\u201d and not properly cleared by the MDS mitigations. The fill buffer contents (which were expected to be blank) can be inferred using MDS or TAA style attack methods to allow a local attacker to infer fill buffer values.", "title": "Vulnerability description" }, { "category": "summary", "text": "hw: L1D Cache Eviction Sampling", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-6.10.z:microcode_ctl-2:1.17-33.26.el6_10.i686", "6Client-6.10.z:microcode_ctl-2:1.17-33.26.el6_10.src", "6Client-6.10.z:microcode_ctl-2:1.17-33.26.el6_10.x86_64", "6Client-6.10.z:microcode_ctl-debuginfo-2:1.17-33.26.el6_10.i686", "6Client-6.10.z:microcode_ctl-debuginfo-2:1.17-33.26.el6_10.x86_64", "6ComputeNode-6.10.z:microcode_ctl-2:1.17-33.26.el6_10.i686", "6ComputeNode-6.10.z:microcode_ctl-2:1.17-33.26.el6_10.src", "6ComputeNode-6.10.z:microcode_ctl-2:1.17-33.26.el6_10.x86_64", "6ComputeNode-6.10.z:microcode_ctl-debuginfo-2:1.17-33.26.el6_10.i686", "6ComputeNode-6.10.z:microcode_ctl-debuginfo-2:1.17-33.26.el6_10.x86_64", "6Server-6.10.z:microcode_ctl-2:1.17-33.26.el6_10.i686", "6Server-6.10.z:microcode_ctl-2:1.17-33.26.el6_10.src", "6Server-6.10.z:microcode_ctl-2:1.17-33.26.el6_10.x86_64", "6Server-6.10.z:microcode_ctl-debuginfo-2:1.17-33.26.el6_10.i686", "6Server-6.10.z:microcode_ctl-debuginfo-2:1.17-33.26.el6_10.x86_64", "6Workstation-6.10.z:microcode_ctl-2:1.17-33.26.el6_10.i686", "6Workstation-6.10.z:microcode_ctl-2:1.17-33.26.el6_10.src", "6Workstation-6.10.z:microcode_ctl-2:1.17-33.26.el6_10.x86_64", "6Workstation-6.10.z:microcode_ctl-debuginfo-2:1.17-33.26.el6_10.i686", "6Workstation-6.10.z:microcode_ctl-debuginfo-2:1.17-33.26.el6_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-0549" }, { "category": "external", "summary": "RHBZ#1788788", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1788788" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-0549", "url": "https://www.cve.org/CVERecord?id=CVE-2020-0549" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-0549", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-0549" }, { "category": "external", "summary": "https://access.redhat.com/solutions/l1d-cache-eviction-and-vector-register-sampling", "url": "https://access.redhat.com/solutions/l1d-cache-eviction-and-vector-register-sampling" }, { "category": "external", "summary": "https://blogs.intel.com/technology/2020/01/ipas-intel-sa-00329/", "url": "https://blogs.intel.com/technology/2020/01/ipas-intel-sa-00329/" }, { "category": "external", "summary": "https://cacheoutattack.com/CacheOut.pdf", "url": "https://cacheoutattack.com/CacheOut.pdf" }, { "category": "external", "summary": "https://software.intel.com/security-software-guidance/software-guidance/l1d-eviction-sampling", "url": "https://software.intel.com/security-software-guidance/software-guidance/l1d-eviction-sampling" } ], "release_date": "2020-01-27T13:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-06-09T19:30:27+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Client-6.10.z:microcode_ctl-2:1.17-33.26.el6_10.i686", "6Client-6.10.z:microcode_ctl-2:1.17-33.26.el6_10.src", "6Client-6.10.z:microcode_ctl-2:1.17-33.26.el6_10.x86_64", "6Client-6.10.z:microcode_ctl-debuginfo-2:1.17-33.26.el6_10.i686", "6Client-6.10.z:microcode_ctl-debuginfo-2:1.17-33.26.el6_10.x86_64", "6ComputeNode-6.10.z:microcode_ctl-2:1.17-33.26.el6_10.i686", "6ComputeNode-6.10.z:microcode_ctl-2:1.17-33.26.el6_10.src", "6ComputeNode-6.10.z:microcode_ctl-2:1.17-33.26.el6_10.x86_64", "6ComputeNode-6.10.z:microcode_ctl-debuginfo-2:1.17-33.26.el6_10.i686", "6ComputeNode-6.10.z:microcode_ctl-debuginfo-2:1.17-33.26.el6_10.x86_64", "6Server-6.10.z:microcode_ctl-2:1.17-33.26.el6_10.i686", "6Server-6.10.z:microcode_ctl-2:1.17-33.26.el6_10.src", "6Server-6.10.z:microcode_ctl-2:1.17-33.26.el6_10.x86_64", "6Server-6.10.z:microcode_ctl-debuginfo-2:1.17-33.26.el6_10.i686", "6Server-6.10.z:microcode_ctl-debuginfo-2:1.17-33.26.el6_10.x86_64", "6Workstation-6.10.z:microcode_ctl-2:1.17-33.26.el6_10.i686", "6Workstation-6.10.z:microcode_ctl-2:1.17-33.26.el6_10.src", "6Workstation-6.10.z:microcode_ctl-2:1.17-33.26.el6_10.x86_64", "6Workstation-6.10.z:microcode_ctl-debuginfo-2:1.17-33.26.el6_10.i686", "6Workstation-6.10.z:microcode_ctl-debuginfo-2:1.17-33.26.el6_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2433" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "6Client-6.10.z:microcode_ctl-2:1.17-33.26.el6_10.i686", "6Client-6.10.z:microcode_ctl-2:1.17-33.26.el6_10.src", "6Client-6.10.z:microcode_ctl-2:1.17-33.26.el6_10.x86_64", "6Client-6.10.z:microcode_ctl-debuginfo-2:1.17-33.26.el6_10.i686", "6Client-6.10.z:microcode_ctl-debuginfo-2:1.17-33.26.el6_10.x86_64", "6ComputeNode-6.10.z:microcode_ctl-2:1.17-33.26.el6_10.i686", "6ComputeNode-6.10.z:microcode_ctl-2:1.17-33.26.el6_10.src", "6ComputeNode-6.10.z:microcode_ctl-2:1.17-33.26.el6_10.x86_64", "6ComputeNode-6.10.z:microcode_ctl-debuginfo-2:1.17-33.26.el6_10.i686", "6ComputeNode-6.10.z:microcode_ctl-debuginfo-2:1.17-33.26.el6_10.x86_64", "6Server-6.10.z:microcode_ctl-2:1.17-33.26.el6_10.i686", "6Server-6.10.z:microcode_ctl-2:1.17-33.26.el6_10.src", "6Server-6.10.z:microcode_ctl-2:1.17-33.26.el6_10.x86_64", "6Server-6.10.z:microcode_ctl-debuginfo-2:1.17-33.26.el6_10.i686", "6Server-6.10.z:microcode_ctl-debuginfo-2:1.17-33.26.el6_10.x86_64", "6Workstation-6.10.z:microcode_ctl-2:1.17-33.26.el6_10.i686", "6Workstation-6.10.z:microcode_ctl-2:1.17-33.26.el6_10.src", "6Workstation-6.10.z:microcode_ctl-2:1.17-33.26.el6_10.x86_64", "6Workstation-6.10.z:microcode_ctl-debuginfo-2:1.17-33.26.el6_10.i686", "6Workstation-6.10.z:microcode_ctl-debuginfo-2:1.17-33.26.el6_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "hw: L1D Cache Eviction Sampling" } ] }
rhsa-2021:3029
Vulnerability from csaf_redhat
Published
2021-08-10 16:13
Modified
2025-08-02 09:53
Summary
Red Hat Security Advisory: microcode_ctl security, bug fix and enhancement update
Notes
Topic
An update for microcode_ctl is now available for Red Hat Enterprise Linux 7.7 Extended Update Support.
Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.
Details
The microcode_ctl packages provide microcode updates for Intel.
Security Fix(es):
* hw: Special Register Buffer Data Sampling (SRBDS) (CVE-2020-0543)
* hw: Vector Register Data Sampling (CVE-2020-0548)
* hw: L1D Cache Eviction Sampling (CVE-2020-0549)
* hw: vt-d related privilege escalation (CVE-2020-24489)
* hw: improper isolation of shared resources in some Intel Processors (CVE-2020-24511)
* hw: observable timing discrepancy in some Intel Processors (CVE-2020-24512)
* hw: Information disclosure issue in Intel SGX via RAPL interface (CVE-2020-8695)
* hw: Vector Register Leakage-Active (CVE-2020-8696)
* hw: Fast forward store predictor (CVE-2020-8698)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for microcode_ctl is now available for Red Hat Enterprise Linux 7.7 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact\nof Important. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available for each vulnerability\nfrom the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The microcode_ctl packages provide microcode updates for Intel.\n\nSecurity Fix(es):\n\n* hw: Special Register Buffer Data Sampling (SRBDS) (CVE-2020-0543)\n\n* hw: Vector Register Data Sampling (CVE-2020-0548)\n\n* hw: L1D Cache Eviction Sampling (CVE-2020-0549)\n\n* hw: vt-d related privilege escalation (CVE-2020-24489)\n\n* hw: improper isolation of shared resources in some Intel Processors (CVE-2020-24511)\n\n* hw: observable timing discrepancy in some Intel Processors (CVE-2020-24512)\n\n* hw: Information disclosure issue in Intel SGX via RAPL interface (CVE-2020-8695)\n\n* hw: Vector Register Leakage-Active (CVE-2020-8696)\n\n* hw: Fast forward store predictor (CVE-2020-8698)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2021:3029", "url": "https://access.redhat.com/errata/RHSA-2021:3029" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1788786", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1788786" }, { "category": "external", "summary": "1788788", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1788788" }, { "category": "external", "summary": "1827165", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1827165" }, { "category": "external", "summary": "1828583", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1828583" }, { "category": "external", "summary": "1890355", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890355" }, { "category": "external", "summary": "1890356", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890356" }, { "category": "external", "summary": "1962650", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1962650" }, { "category": "external", "summary": "1962702", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1962702" }, { "category": "external", "summary": "1962722", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1962722" }, { "category": "external", "summary": "1972332", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1972332" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3029.json" } ], "title": "Red Hat Security Advisory: microcode_ctl security, bug fix and enhancement update", "tracking": { "current_release_date": "2025-08-02T09:53:21+00:00", "generator": { "date": "2025-08-02T09:53:21+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2021:3029", "initial_release_date": "2021-08-10T16:13:33+00:00", "revision_history": [ { "date": "2021-08-10T16:13:33+00:00", "number": "1", "summary": "Initial version" }, { "date": "2021-08-10T16:13:33+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-02T09:53:21+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)", "product": { "name": "Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)", "product_id": "7ComputeNode-7.7.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:7.7::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server EUS (v. 7.7)", "product": { "name": "Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-7.7.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:7.7::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "microcode_ctl-2:2.1-53.18.el7_7.src", "product": { "name": "microcode_ctl-2:2.1-53.18.el7_7.src", "product_id": "microcode_ctl-2:2.1-53.18.el7_7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/microcode_ctl@2.1-53.18.el7_7?arch=src\u0026epoch=2" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "microcode_ctl-2:2.1-53.18.el7_7.x86_64", "product": { "name": "microcode_ctl-2:2.1-53.18.el7_7.x86_64", "product_id": "microcode_ctl-2:2.1-53.18.el7_7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/microcode_ctl@2.1-53.18.el7_7?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "microcode_ctl-debuginfo-2:2.1-53.18.el7_7.x86_64", "product": { "name": "microcode_ctl-debuginfo-2:2.1-53.18.el7_7.x86_64", "product_id": "microcode_ctl-debuginfo-2:2.1-53.18.el7_7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/microcode_ctl-debuginfo@2.1-53.18.el7_7?arch=x86_64\u0026epoch=2" } } } ], "category": "architecture", "name": "x86_64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "microcode_ctl-2:2.1-53.18.el7_7.src as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)", "product_id": "7ComputeNode-7.7.EUS:microcode_ctl-2:2.1-53.18.el7_7.src" }, "product_reference": "microcode_ctl-2:2.1-53.18.el7_7.src", "relates_to_product_reference": "7ComputeNode-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "microcode_ctl-2:2.1-53.18.el7_7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)", "product_id": "7ComputeNode-7.7.EUS:microcode_ctl-2:2.1-53.18.el7_7.x86_64" }, "product_reference": "microcode_ctl-2:2.1-53.18.el7_7.x86_64", "relates_to_product_reference": "7ComputeNode-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "microcode_ctl-debuginfo-2:2.1-53.18.el7_7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)", "product_id": "7ComputeNode-7.7.EUS:microcode_ctl-debuginfo-2:2.1-53.18.el7_7.x86_64" }, "product_reference": "microcode_ctl-debuginfo-2:2.1-53.18.el7_7.x86_64", "relates_to_product_reference": "7ComputeNode-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "microcode_ctl-2:2.1-53.18.el7_7.src as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-7.7.EUS:microcode_ctl-2:2.1-53.18.el7_7.src" }, "product_reference": "microcode_ctl-2:2.1-53.18.el7_7.src", "relates_to_product_reference": "7Server-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "microcode_ctl-2:2.1-53.18.el7_7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-7.7.EUS:microcode_ctl-2:2.1-53.18.el7_7.x86_64" }, "product_reference": "microcode_ctl-2:2.1-53.18.el7_7.x86_64", "relates_to_product_reference": "7Server-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "microcode_ctl-debuginfo-2:2.1-53.18.el7_7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-7.7.EUS:microcode_ctl-debuginfo-2:2.1-53.18.el7_7.x86_64" }, "product_reference": "microcode_ctl-debuginfo-2:2.1-53.18.el7_7.x86_64", "relates_to_product_reference": "7Server-7.7.EUS" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Intel" ] } ], "cve": "CVE-2020-0543", "discovery_date": "2020-04-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1827165" } ], "notes": [ { "category": "description", "text": "A new domain bypass transient execution attack known as Special Register Buffer Data Sampling (SRBDS) has been found. This flaw allows data values from special internal registers to be leaked by an attacker able to execute code on any core of the CPU. An unprivileged, local attacker can use this flaw to infer values returned by affected instructions known to be commonly used during cryptographic operations that rely on uniqueness, secrecy, or both.", "title": "Vulnerability description" }, { "category": "summary", "text": "hw: Special Register Buffer Data Sampling (SRBDS)", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/solutions/5142691", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7ComputeNode-7.7.EUS:microcode_ctl-2:2.1-53.18.el7_7.src", "7ComputeNode-7.7.EUS:microcode_ctl-2:2.1-53.18.el7_7.x86_64", "7ComputeNode-7.7.EUS:microcode_ctl-debuginfo-2:2.1-53.18.el7_7.x86_64", "7Server-7.7.EUS:microcode_ctl-2:2.1-53.18.el7_7.src", "7Server-7.7.EUS:microcode_ctl-2:2.1-53.18.el7_7.x86_64", "7Server-7.7.EUS:microcode_ctl-debuginfo-2:2.1-53.18.el7_7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-0543" }, { "category": "external", "summary": "RHBZ#1827165", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1827165" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-0543", "url": "https://www.cve.org/CVERecord?id=CVE-2020-0543" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-0543", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-0543" }, { "category": "external", "summary": "https://access.redhat.com/solutions/5142691", "url": "https://access.redhat.com/solutions/5142691" }, { "category": "external", "summary": "https://access.redhat.com/solutions/5142751", "url": "https://access.redhat.com/solutions/5142751" }, { "category": "external", "summary": "https://blogs.intel.com/technology/2020/06/ipas-security-advisories-for-june-2020/#gs.6uyhri", "url": "https://blogs.intel.com/technology/2020/06/ipas-security-advisories-for-june-2020/#gs.6uyhri" }, { "category": "external", "summary": "https://software.intel.com/security-software-guidance/insights/deep-dive-special-register-buffer-data-sampling", "url": "https://software.intel.com/security-software-guidance/insights/deep-dive-special-register-buffer-data-sampling" }, { "category": "external", "summary": "https://xenbits.xen.org/xsa/advisory-320.html", "url": "https://xenbits.xen.org/xsa/advisory-320.html" } ], "release_date": "2020-06-09T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-08-10T16:13:33+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7ComputeNode-7.7.EUS:microcode_ctl-2:2.1-53.18.el7_7.src", "7ComputeNode-7.7.EUS:microcode_ctl-2:2.1-53.18.el7_7.x86_64", "7ComputeNode-7.7.EUS:microcode_ctl-debuginfo-2:2.1-53.18.el7_7.x86_64", "7Server-7.7.EUS:microcode_ctl-2:2.1-53.18.el7_7.src", "7Server-7.7.EUS:microcode_ctl-2:2.1-53.18.el7_7.x86_64", "7Server-7.7.EUS:microcode_ctl-debuginfo-2:2.1-53.18.el7_7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3029" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "7ComputeNode-7.7.EUS:microcode_ctl-2:2.1-53.18.el7_7.src", "7ComputeNode-7.7.EUS:microcode_ctl-2:2.1-53.18.el7_7.x86_64", "7ComputeNode-7.7.EUS:microcode_ctl-debuginfo-2:2.1-53.18.el7_7.x86_64", "7Server-7.7.EUS:microcode_ctl-2:2.1-53.18.el7_7.src", "7Server-7.7.EUS:microcode_ctl-2:2.1-53.18.el7_7.x86_64", "7Server-7.7.EUS:microcode_ctl-debuginfo-2:2.1-53.18.el7_7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "7ComputeNode-7.7.EUS:microcode_ctl-2:2.1-53.18.el7_7.src", "7ComputeNode-7.7.EUS:microcode_ctl-2:2.1-53.18.el7_7.x86_64", "7ComputeNode-7.7.EUS:microcode_ctl-debuginfo-2:2.1-53.18.el7_7.x86_64", "7Server-7.7.EUS:microcode_ctl-2:2.1-53.18.el7_7.src", "7Server-7.7.EUS:microcode_ctl-2:2.1-53.18.el7_7.x86_64", "7Server-7.7.EUS:microcode_ctl-debuginfo-2:2.1-53.18.el7_7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "hw: Special Register Buffer Data Sampling (SRBDS)" }, { "cve": "CVE-2020-0548", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2020-01-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1788786" } ], "notes": [ { "category": "description", "text": "A flaw was found in Intel processors where a local attacker is able to gain information about registers used for vector calculations by observing register states from other processes running on the system. This results in a race condition where store buffers, which were not cleared, could be read by another process or a CPU sibling. The highest threat from this vulnerability is data confidentiality where an attacker could read arbitrary data as it passes through the processor.", "title": "Vulnerability description" }, { "category": "summary", "text": "hw: Vector Register Data Sampling", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7ComputeNode-7.7.EUS:microcode_ctl-2:2.1-53.18.el7_7.src", "7ComputeNode-7.7.EUS:microcode_ctl-2:2.1-53.18.el7_7.x86_64", "7ComputeNode-7.7.EUS:microcode_ctl-debuginfo-2:2.1-53.18.el7_7.x86_64", "7Server-7.7.EUS:microcode_ctl-2:2.1-53.18.el7_7.src", "7Server-7.7.EUS:microcode_ctl-2:2.1-53.18.el7_7.x86_64", "7Server-7.7.EUS:microcode_ctl-debuginfo-2:2.1-53.18.el7_7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-0548" }, { "category": "external", "summary": "RHBZ#1788786", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1788786" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-0548", "url": "https://www.cve.org/CVERecord?id=CVE-2020-0548" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-0548", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-0548" }, { "category": "external", "summary": "https://access.redhat.com/solutions/l1d-cache-eviction-and-vector-register-sampling", "url": "https://access.redhat.com/solutions/l1d-cache-eviction-and-vector-register-sampling" }, { "category": "external", "summary": "https://blogs.intel.com/technology/2020/01/ipas-intel-sa-00329/", "url": "https://blogs.intel.com/technology/2020/01/ipas-intel-sa-00329/" }, { "category": "external", "summary": "https://cacheoutattack.com/CacheOut.pdf", "url": "https://cacheoutattack.com/CacheOut.pdf" }, { "category": "external", "summary": "https://software.intel.com/security-software-guidance/software-guidance/l1d-eviction-sampling", "url": "https://software.intel.com/security-software-guidance/software-guidance/l1d-eviction-sampling" } ], "release_date": "2020-01-27T13:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-08-10T16:13:33+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7ComputeNode-7.7.EUS:microcode_ctl-2:2.1-53.18.el7_7.src", "7ComputeNode-7.7.EUS:microcode_ctl-2:2.1-53.18.el7_7.x86_64", "7ComputeNode-7.7.EUS:microcode_ctl-debuginfo-2:2.1-53.18.el7_7.x86_64", "7Server-7.7.EUS:microcode_ctl-2:2.1-53.18.el7_7.src", "7Server-7.7.EUS:microcode_ctl-2:2.1-53.18.el7_7.x86_64", "7Server-7.7.EUS:microcode_ctl-debuginfo-2:2.1-53.18.el7_7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3029" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 2.8, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.0" }, "products": [ "7ComputeNode-7.7.EUS:microcode_ctl-2:2.1-53.18.el7_7.src", "7ComputeNode-7.7.EUS:microcode_ctl-2:2.1-53.18.el7_7.x86_64", "7ComputeNode-7.7.EUS:microcode_ctl-debuginfo-2:2.1-53.18.el7_7.x86_64", "7Server-7.7.EUS:microcode_ctl-2:2.1-53.18.el7_7.src", "7Server-7.7.EUS:microcode_ctl-2:2.1-53.18.el7_7.x86_64", "7Server-7.7.EUS:microcode_ctl-debuginfo-2:2.1-53.18.el7_7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "hw: Vector Register Data Sampling" }, { "cve": "CVE-2020-0549", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2020-01-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1788788" } ], "notes": [ { "category": "description", "text": "A microarchitectural timing flaw was found on some Intel processors. A corner case exists where data in-flight during the eviction process can end up in the \u201cfill buffers\u201d and not properly cleared by the MDS mitigations. The fill buffer contents (which were expected to be blank) can be inferred using MDS or TAA style attack methods to allow a local attacker to infer fill buffer values.", "title": "Vulnerability description" }, { "category": "summary", "text": "hw: L1D Cache Eviction Sampling", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7ComputeNode-7.7.EUS:microcode_ctl-2:2.1-53.18.el7_7.src", "7ComputeNode-7.7.EUS:microcode_ctl-2:2.1-53.18.el7_7.x86_64", "7ComputeNode-7.7.EUS:microcode_ctl-debuginfo-2:2.1-53.18.el7_7.x86_64", "7Server-7.7.EUS:microcode_ctl-2:2.1-53.18.el7_7.src", "7Server-7.7.EUS:microcode_ctl-2:2.1-53.18.el7_7.x86_64", "7Server-7.7.EUS:microcode_ctl-debuginfo-2:2.1-53.18.el7_7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-0549" }, { "category": "external", "summary": "RHBZ#1788788", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1788788" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-0549", "url": "https://www.cve.org/CVERecord?id=CVE-2020-0549" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-0549", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-0549" }, { "category": "external", "summary": "https://access.redhat.com/solutions/l1d-cache-eviction-and-vector-register-sampling", "url": "https://access.redhat.com/solutions/l1d-cache-eviction-and-vector-register-sampling" }, { "category": "external", "summary": "https://blogs.intel.com/technology/2020/01/ipas-intel-sa-00329/", "url": "https://blogs.intel.com/technology/2020/01/ipas-intel-sa-00329/" }, { "category": "external", "summary": "https://cacheoutattack.com/CacheOut.pdf", "url": "https://cacheoutattack.com/CacheOut.pdf" }, { "category": "external", "summary": "https://software.intel.com/security-software-guidance/software-guidance/l1d-eviction-sampling", "url": "https://software.intel.com/security-software-guidance/software-guidance/l1d-eviction-sampling" } ], "release_date": "2020-01-27T13:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-08-10T16:13:33+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7ComputeNode-7.7.EUS:microcode_ctl-2:2.1-53.18.el7_7.src", "7ComputeNode-7.7.EUS:microcode_ctl-2:2.1-53.18.el7_7.x86_64", "7ComputeNode-7.7.EUS:microcode_ctl-debuginfo-2:2.1-53.18.el7_7.x86_64", "7Server-7.7.EUS:microcode_ctl-2:2.1-53.18.el7_7.src", "7Server-7.7.EUS:microcode_ctl-2:2.1-53.18.el7_7.x86_64", "7Server-7.7.EUS:microcode_ctl-debuginfo-2:2.1-53.18.el7_7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3029" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "7ComputeNode-7.7.EUS:microcode_ctl-2:2.1-53.18.el7_7.src", "7ComputeNode-7.7.EUS:microcode_ctl-2:2.1-53.18.el7_7.x86_64", "7ComputeNode-7.7.EUS:microcode_ctl-debuginfo-2:2.1-53.18.el7_7.x86_64", "7Server-7.7.EUS:microcode_ctl-2:2.1-53.18.el7_7.src", "7Server-7.7.EUS:microcode_ctl-2:2.1-53.18.el7_7.x86_64", "7Server-7.7.EUS:microcode_ctl-debuginfo-2:2.1-53.18.el7_7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "hw: L1D Cache Eviction Sampling" }, { "acknowledgments": [ { "names": [ "Intel" ] } ], "cve": "CVE-2020-8695", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2020-04-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1828583" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in Intel\u0027s implementation of RAPL (Running Average Power Limit). An attacker with a local account could query the power management functionality to intelligently infer SGX enclave computation values by measuring power usage in the RAPL subsystem.", "title": "Vulnerability description" }, { "category": "summary", "text": "hw: Information disclosure issue in Intel SGX via RAPL interface", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7ComputeNode-7.7.EUS:microcode_ctl-2:2.1-53.18.el7_7.src", "7ComputeNode-7.7.EUS:microcode_ctl-2:2.1-53.18.el7_7.x86_64", "7ComputeNode-7.7.EUS:microcode_ctl-debuginfo-2:2.1-53.18.el7_7.x86_64", "7Server-7.7.EUS:microcode_ctl-2:2.1-53.18.el7_7.src", "7Server-7.7.EUS:microcode_ctl-2:2.1-53.18.el7_7.x86_64", "7Server-7.7.EUS:microcode_ctl-debuginfo-2:2.1-53.18.el7_7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-8695" }, { "category": "external", "summary": "RHBZ#1828583", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1828583" }, { "category": "external", "summary": "RHSB-5569051", "url": "https://access.redhat.com/articles/5569051" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-8695", "url": "https://www.cve.org/CVERecord?id=CVE-2020-8695" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-8695", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8695" }, { "category": "external", "summary": "https://en.wikipedia.org/wiki/Power_analysis", "url": "https://en.wikipedia.org/wiki/Power_analysis" }, { "category": "external", "summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00389.html", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00389.html" } ], "release_date": "2020-11-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-08-10T16:13:33+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7ComputeNode-7.7.EUS:microcode_ctl-2:2.1-53.18.el7_7.src", "7ComputeNode-7.7.EUS:microcode_ctl-2:2.1-53.18.el7_7.x86_64", "7ComputeNode-7.7.EUS:microcode_ctl-debuginfo-2:2.1-53.18.el7_7.x86_64", "7Server-7.7.EUS:microcode_ctl-2:2.1-53.18.el7_7.src", "7Server-7.7.EUS:microcode_ctl-2:2.1-53.18.el7_7.x86_64", "7Server-7.7.EUS:microcode_ctl-debuginfo-2:2.1-53.18.el7_7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3029" }, { "category": "workaround", "details": "Until a firmware update and reboot can be applied, the attack vector can be reduced by limiting read access to the sysfs attributes that export this functionality to userspace. \n\nThe command:\n~~~\nsudo chmod 400 /sys/class/powercap/intel_rapl/*/energy_uj\n~~~\nWill do this for the current boot, it will need to be scripted to run at each boot to remain persistent across reboots.", "product_ids": [ "7ComputeNode-7.7.EUS:microcode_ctl-2:2.1-53.18.el7_7.src", "7ComputeNode-7.7.EUS:microcode_ctl-2:2.1-53.18.el7_7.x86_64", "7ComputeNode-7.7.EUS:microcode_ctl-debuginfo-2:2.1-53.18.el7_7.x86_64", "7Server-7.7.EUS:microcode_ctl-2:2.1-53.18.el7_7.src", "7Server-7.7.EUS:microcode_ctl-2:2.1-53.18.el7_7.x86_64", "7Server-7.7.EUS:microcode_ctl-debuginfo-2:2.1-53.18.el7_7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "7ComputeNode-7.7.EUS:microcode_ctl-2:2.1-53.18.el7_7.src", "7ComputeNode-7.7.EUS:microcode_ctl-2:2.1-53.18.el7_7.x86_64", "7ComputeNode-7.7.EUS:microcode_ctl-debuginfo-2:2.1-53.18.el7_7.x86_64", "7Server-7.7.EUS:microcode_ctl-2:2.1-53.18.el7_7.src", "7Server-7.7.EUS:microcode_ctl-2:2.1-53.18.el7_7.x86_64", "7Server-7.7.EUS:microcode_ctl-debuginfo-2:2.1-53.18.el7_7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "hw: Information disclosure issue in Intel SGX via RAPL interface" }, { "acknowledgments": [ { "names": [ "Intel" ] } ], "cve": "CVE-2020-8696", "cwe": { "id": "CWE-212", "name": "Improper Removal of Sensitive Information Before Storage or Transfer" }, "discovery_date": "2020-10-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1890355" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Intel Advanced Vector Extensions (AVX) implementation, where a local authenticated attacker with the ability to execute AVX instructions can gather the AVX register state from previous AVX executions. This vulnerability allows information disclosure of the AVX register state.", "title": "Vulnerability description" }, { "category": "summary", "text": "hw: Vector Register Leakage-Active", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7ComputeNode-7.7.EUS:microcode_ctl-2:2.1-53.18.el7_7.src", "7ComputeNode-7.7.EUS:microcode_ctl-2:2.1-53.18.el7_7.x86_64", "7ComputeNode-7.7.EUS:microcode_ctl-debuginfo-2:2.1-53.18.el7_7.x86_64", "7Server-7.7.EUS:microcode_ctl-2:2.1-53.18.el7_7.src", "7Server-7.7.EUS:microcode_ctl-2:2.1-53.18.el7_7.x86_64", "7Server-7.7.EUS:microcode_ctl-debuginfo-2:2.1-53.18.el7_7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-8696" }, { "category": "external", "summary": "RHBZ#1890355", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890355" }, { "category": "external", "summary": "RHSB-5569051", "url": "https://access.redhat.com/articles/5569051" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-8696", "url": "https://www.cve.org/CVERecord?id=CVE-2020-8696" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-8696", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8696" }, { "category": "external", "summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00381.html", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00381.html" } ], "release_date": "2020-11-10T13:55:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-08-10T16:13:33+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7ComputeNode-7.7.EUS:microcode_ctl-2:2.1-53.18.el7_7.src", "7ComputeNode-7.7.EUS:microcode_ctl-2:2.1-53.18.el7_7.x86_64", "7ComputeNode-7.7.EUS:microcode_ctl-debuginfo-2:2.1-53.18.el7_7.x86_64", "7Server-7.7.EUS:microcode_ctl-2:2.1-53.18.el7_7.src", "7Server-7.7.EUS:microcode_ctl-2:2.1-53.18.el7_7.x86_64", "7Server-7.7.EUS:microcode_ctl-debuginfo-2:2.1-53.18.el7_7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3029" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 2.8, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.1" }, "products": [ "7ComputeNode-7.7.EUS:microcode_ctl-2:2.1-53.18.el7_7.src", "7ComputeNode-7.7.EUS:microcode_ctl-2:2.1-53.18.el7_7.x86_64", "7ComputeNode-7.7.EUS:microcode_ctl-debuginfo-2:2.1-53.18.el7_7.x86_64", "7Server-7.7.EUS:microcode_ctl-2:2.1-53.18.el7_7.src", "7Server-7.7.EUS:microcode_ctl-2:2.1-53.18.el7_7.x86_64", "7Server-7.7.EUS:microcode_ctl-debuginfo-2:2.1-53.18.el7_7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "hw: Vector Register Leakage-Active" }, { "acknowledgments": [ { "names": [ "Intel" ] } ], "cve": "CVE-2020-8698", "cwe": { "id": "CWE-212", "name": "Improper Removal of Sensitive Information Before Storage or Transfer" }, "discovery_date": "2020-10-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1890356" } ], "notes": [ { "category": "description", "text": "A flaw was found in the CPU microarchitecture where a local attacker is able to abuse a timing issue which may allow them to infer internal architectural state from previous executions on the CPU.", "title": "Vulnerability description" }, { "category": "summary", "text": "hw: Fast forward store predictor", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7ComputeNode-7.7.EUS:microcode_ctl-2:2.1-53.18.el7_7.src", "7ComputeNode-7.7.EUS:microcode_ctl-2:2.1-53.18.el7_7.x86_64", "7ComputeNode-7.7.EUS:microcode_ctl-debuginfo-2:2.1-53.18.el7_7.x86_64", "7Server-7.7.EUS:microcode_ctl-2:2.1-53.18.el7_7.src", "7Server-7.7.EUS:microcode_ctl-2:2.1-53.18.el7_7.x86_64", "7Server-7.7.EUS:microcode_ctl-debuginfo-2:2.1-53.18.el7_7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-8698" }, { "category": "external", "summary": "RHBZ#1890356", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890356" }, { "category": "external", "summary": "RHSB-5569051", "url": "https://access.redhat.com/articles/5569051" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-8698", "url": "https://www.cve.org/CVERecord?id=CVE-2020-8698" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-8698", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8698" }, { "category": "external", "summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00381.html", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00381.html" } ], "release_date": "2020-11-10T13:55:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-08-10T16:13:33+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7ComputeNode-7.7.EUS:microcode_ctl-2:2.1-53.18.el7_7.src", "7ComputeNode-7.7.EUS:microcode_ctl-2:2.1-53.18.el7_7.x86_64", "7ComputeNode-7.7.EUS:microcode_ctl-debuginfo-2:2.1-53.18.el7_7.x86_64", "7Server-7.7.EUS:microcode_ctl-2:2.1-53.18.el7_7.src", "7Server-7.7.EUS:microcode_ctl-2:2.1-53.18.el7_7.x86_64", "7Server-7.7.EUS:microcode_ctl-debuginfo-2:2.1-53.18.el7_7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3029" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "7ComputeNode-7.7.EUS:microcode_ctl-2:2.1-53.18.el7_7.src", "7ComputeNode-7.7.EUS:microcode_ctl-2:2.1-53.18.el7_7.x86_64", "7ComputeNode-7.7.EUS:microcode_ctl-debuginfo-2:2.1-53.18.el7_7.x86_64", "7Server-7.7.EUS:microcode_ctl-2:2.1-53.18.el7_7.src", "7Server-7.7.EUS:microcode_ctl-2:2.1-53.18.el7_7.x86_64", "7Server-7.7.EUS:microcode_ctl-debuginfo-2:2.1-53.18.el7_7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "hw: Fast forward store predictor" }, { "acknowledgments": [ { "names": [ "Intel" ] } ], "cve": "CVE-2020-24489", "cwe": { "id": "CWE-459", "name": "Incomplete Cleanup" }, "discovery_date": "2021-05-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1962650" } ], "notes": [ { "category": "description", "text": "A flaw was found in Intel\u00ae VT-d products. Entries from the context cache on some types of context cache invalidations may not be properly invalidated which may allow an authenticated user to potentially enable escalation of privilege via local access. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "hw: vt-d related privilege escalation", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7ComputeNode-7.7.EUS:microcode_ctl-2:2.1-53.18.el7_7.src", "7ComputeNode-7.7.EUS:microcode_ctl-2:2.1-53.18.el7_7.x86_64", "7ComputeNode-7.7.EUS:microcode_ctl-debuginfo-2:2.1-53.18.el7_7.x86_64", "7Server-7.7.EUS:microcode_ctl-2:2.1-53.18.el7_7.src", "7Server-7.7.EUS:microcode_ctl-2:2.1-53.18.el7_7.x86_64", "7Server-7.7.EUS:microcode_ctl-debuginfo-2:2.1-53.18.el7_7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-24489" }, { "category": "external", "summary": "RHBZ#1962650", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1962650" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-24489", "url": "https://www.cve.org/CVERecord?id=CVE-2020-24489" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-24489", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-24489" } ], "release_date": "2021-06-08T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-08-10T16:13:33+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7ComputeNode-7.7.EUS:microcode_ctl-2:2.1-53.18.el7_7.src", "7ComputeNode-7.7.EUS:microcode_ctl-2:2.1-53.18.el7_7.x86_64", "7ComputeNode-7.7.EUS:microcode_ctl-debuginfo-2:2.1-53.18.el7_7.x86_64", "7Server-7.7.EUS:microcode_ctl-2:2.1-53.18.el7_7.src", "7Server-7.7.EUS:microcode_ctl-2:2.1-53.18.el7_7.x86_64", "7Server-7.7.EUS:microcode_ctl-debuginfo-2:2.1-53.18.el7_7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3029" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7ComputeNode-7.7.EUS:microcode_ctl-2:2.1-53.18.el7_7.src", "7ComputeNode-7.7.EUS:microcode_ctl-2:2.1-53.18.el7_7.x86_64", "7ComputeNode-7.7.EUS:microcode_ctl-debuginfo-2:2.1-53.18.el7_7.x86_64", "7Server-7.7.EUS:microcode_ctl-2:2.1-53.18.el7_7.src", "7Server-7.7.EUS:microcode_ctl-2:2.1-53.18.el7_7.x86_64", "7Server-7.7.EUS:microcode_ctl-debuginfo-2:2.1-53.18.el7_7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "hw: vt-d related privilege escalation" }, { "acknowledgments": [ { "names": [ "Intel" ] } ], "cve": "CVE-2020-24511", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2021-05-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1962702" } ], "notes": [ { "category": "description", "text": "Microcode misconfiguration in some Intel processors may cause EIBRS mitigation (CVE-2017-5715) to be incomplete. As a consequence, this issue may allow an authenticated user to potentially enable information disclosure via local access.", "title": "Vulnerability description" }, { "category": "summary", "text": "hw: improper isolation of shared resources in some Intel Processors", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7ComputeNode-7.7.EUS:microcode_ctl-2:2.1-53.18.el7_7.src", "7ComputeNode-7.7.EUS:microcode_ctl-2:2.1-53.18.el7_7.x86_64", "7ComputeNode-7.7.EUS:microcode_ctl-debuginfo-2:2.1-53.18.el7_7.x86_64", "7Server-7.7.EUS:microcode_ctl-2:2.1-53.18.el7_7.src", "7Server-7.7.EUS:microcode_ctl-2:2.1-53.18.el7_7.x86_64", "7Server-7.7.EUS:microcode_ctl-debuginfo-2:2.1-53.18.el7_7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-24511" }, { "category": "external", "summary": "RHBZ#1962702", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1962702" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-24511", "url": "https://www.cve.org/CVERecord?id=CVE-2020-24511" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-24511", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-24511" } ], "release_date": "2021-06-08T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-08-10T16:13:33+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7ComputeNode-7.7.EUS:microcode_ctl-2:2.1-53.18.el7_7.src", "7ComputeNode-7.7.EUS:microcode_ctl-2:2.1-53.18.el7_7.x86_64", "7ComputeNode-7.7.EUS:microcode_ctl-debuginfo-2:2.1-53.18.el7_7.x86_64", "7Server-7.7.EUS:microcode_ctl-2:2.1-53.18.el7_7.src", "7Server-7.7.EUS:microcode_ctl-2:2.1-53.18.el7_7.x86_64", "7Server-7.7.EUS:microcode_ctl-debuginfo-2:2.1-53.18.el7_7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3029" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "7ComputeNode-7.7.EUS:microcode_ctl-2:2.1-53.18.el7_7.src", "7ComputeNode-7.7.EUS:microcode_ctl-2:2.1-53.18.el7_7.x86_64", "7ComputeNode-7.7.EUS:microcode_ctl-debuginfo-2:2.1-53.18.el7_7.x86_64", "7Server-7.7.EUS:microcode_ctl-2:2.1-53.18.el7_7.src", "7Server-7.7.EUS:microcode_ctl-2:2.1-53.18.el7_7.x86_64", "7Server-7.7.EUS:microcode_ctl-debuginfo-2:2.1-53.18.el7_7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "hw: improper isolation of shared resources in some Intel Processors" }, { "acknowledgments": [ { "names": [ "Intel" ] } ], "cve": "CVE-2020-24512", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2021-05-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1962722" } ], "notes": [ { "category": "description", "text": "Observable timing discrepancy in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.", "title": "Vulnerability description" }, { "category": "summary", "text": "hw: observable timing discrepancy in some Intel Processors", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7ComputeNode-7.7.EUS:microcode_ctl-2:2.1-53.18.el7_7.src", "7ComputeNode-7.7.EUS:microcode_ctl-2:2.1-53.18.el7_7.x86_64", "7ComputeNode-7.7.EUS:microcode_ctl-debuginfo-2:2.1-53.18.el7_7.x86_64", "7Server-7.7.EUS:microcode_ctl-2:2.1-53.18.el7_7.src", "7Server-7.7.EUS:microcode_ctl-2:2.1-53.18.el7_7.x86_64", "7Server-7.7.EUS:microcode_ctl-debuginfo-2:2.1-53.18.el7_7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-24512" }, { "category": "external", "summary": "RHBZ#1962722", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1962722" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-24512", "url": "https://www.cve.org/CVERecord?id=CVE-2020-24512" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-24512", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-24512" } ], "release_date": "2021-06-08T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-08-10T16:13:33+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7ComputeNode-7.7.EUS:microcode_ctl-2:2.1-53.18.el7_7.src", "7ComputeNode-7.7.EUS:microcode_ctl-2:2.1-53.18.el7_7.x86_64", "7ComputeNode-7.7.EUS:microcode_ctl-debuginfo-2:2.1-53.18.el7_7.x86_64", "7Server-7.7.EUS:microcode_ctl-2:2.1-53.18.el7_7.src", "7Server-7.7.EUS:microcode_ctl-2:2.1-53.18.el7_7.x86_64", "7Server-7.7.EUS:microcode_ctl-debuginfo-2:2.1-53.18.el7_7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3029" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 2.8, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.1" }, "products": [ "7ComputeNode-7.7.EUS:microcode_ctl-2:2.1-53.18.el7_7.src", "7ComputeNode-7.7.EUS:microcode_ctl-2:2.1-53.18.el7_7.x86_64", "7ComputeNode-7.7.EUS:microcode_ctl-debuginfo-2:2.1-53.18.el7_7.x86_64", "7Server-7.7.EUS:microcode_ctl-2:2.1-53.18.el7_7.src", "7Server-7.7.EUS:microcode_ctl-2:2.1-53.18.el7_7.x86_64", "7Server-7.7.EUS:microcode_ctl-debuginfo-2:2.1-53.18.el7_7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "hw: observable timing discrepancy in some Intel Processors" } ] }
rhsa-2021:3027
Vulnerability from csaf_redhat
Published
2021-08-09 09:56
Modified
2025-08-02 09:52
Summary
Red Hat Security Advisory: microcode_ctl security, bug fix and enhancement update
Notes
Topic
An update for microcode_ctl is now available for Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.
Details
The microcode_ctl packages provide microcode updates for Intel.
Security Fix(es):
* hw: Special Register Buffer Data Sampling (SRBDS) (CVE-2020-0543)
* hw: Vector Register Data Sampling (CVE-2020-0548)
* hw: L1D Cache Eviction Sampling (CVE-2020-0549)
* hw: vt-d related privilege escalation (CVE-2020-24489)
* hw: improper isolation of shared resources in some Intel Processors
(CVE-2020-24511)
* hw: observable timing discrepancy in some Intel Processors
(CVE-2020-24512)
* hw: Information disclosure issue in Intel SGX via RAPL interface
(CVE-2020-8695)
* hw: Vector Register Leakage-Active (CVE-2020-8696)
* hw: Fast forward store predictor (CVE-2020-8698)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for microcode_ctl is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact\nof Important. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available for each vulnerability\nfrom the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The microcode_ctl packages provide microcode updates for Intel.\n\nSecurity Fix(es):\n\n* hw: Special Register Buffer Data Sampling (SRBDS) (CVE-2020-0543)\n\n* hw: Vector Register Data Sampling (CVE-2020-0548)\n\n* hw: L1D Cache Eviction Sampling (CVE-2020-0549)\n\n* hw: vt-d related privilege escalation (CVE-2020-24489)\n\n* hw: improper isolation of shared resources in some Intel Processors\n(CVE-2020-24511)\n\n* hw: observable timing discrepancy in some Intel Processors\n(CVE-2020-24512)\n\n* hw: Information disclosure issue in Intel SGX via RAPL interface\n(CVE-2020-8695)\n\n* hw: Vector Register Leakage-Active (CVE-2020-8696)\n\n* hw: Fast forward store predictor (CVE-2020-8698)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2021:3027", "url": "https://access.redhat.com/errata/RHSA-2021:3027" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1788786", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1788786" }, { "category": "external", "summary": "1788788", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1788788" }, { "category": "external", "summary": "1827165", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1827165" }, { "category": "external", "summary": "1828583", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1828583" }, { "category": "external", "summary": "1890355", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890355" }, { "category": "external", "summary": "1890356", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890356" }, { "category": "external", "summary": "1962650", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1962650" }, { "category": "external", "summary": "1962702", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1962702" }, { "category": "external", "summary": "1962722", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1962722" }, { "category": "external", "summary": "1972325", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1972325" }, { "category": "external", "summary": "1972328", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1972328" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3027.json" } ], "title": "Red Hat Security Advisory: microcode_ctl security, bug fix and enhancement update", "tracking": { "current_release_date": "2025-08-02T09:52:56+00:00", "generator": { "date": "2025-08-02T09:52:56+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2021:3027", "initial_release_date": "2021-08-09T09:56:52+00:00", "revision_history": [ { "date": "2021-08-09T09:56:52+00:00", "number": "1", "summary": "Initial version" }, { "date": "2021-08-09T09:56:52+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-02T09:52:56+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux BaseOS (v. 8)", "product": { "name": "Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.Z.MAIN.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:8::baseos" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "microcode_ctl-4:20210216-1.20210608.1.el8_4.src", "product": { "name": "microcode_ctl-4:20210216-1.20210608.1.el8_4.src", "product_id": "microcode_ctl-4:20210216-1.20210608.1.el8_4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/microcode_ctl@20210216-1.20210608.1.el8_4?arch=src\u0026epoch=4" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "microcode_ctl-4:20210216-1.20210608.1.el8_4.x86_64", "product": { "name": "microcode_ctl-4:20210216-1.20210608.1.el8_4.x86_64", "product_id": "microcode_ctl-4:20210216-1.20210608.1.el8_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/microcode_ctl@20210216-1.20210608.1.el8_4?arch=x86_64\u0026epoch=4" } } } ], "category": "architecture", "name": "x86_64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "microcode_ctl-4:20210216-1.20210608.1.el8_4.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:microcode_ctl-4:20210216-1.20210608.1.el8_4.src" }, "product_reference": "microcode_ctl-4:20210216-1.20210608.1.el8_4.src", "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "microcode_ctl-4:20210216-1.20210608.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.Z.MAIN.EUS:microcode_ctl-4:20210216-1.20210608.1.el8_4.x86_64" }, "product_reference": "microcode_ctl-4:20210216-1.20210608.1.el8_4.x86_64", "relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Intel" ] } ], "cve": "CVE-2020-0543", "discovery_date": "2020-04-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1827165" } ], "notes": [ { "category": "description", "text": "A new domain bypass transient execution attack known as Special Register Buffer Data Sampling (SRBDS) has been found. This flaw allows data values from special internal registers to be leaked by an attacker able to execute code on any core of the CPU. An unprivileged, local attacker can use this flaw to infer values returned by affected instructions known to be commonly used during cryptographic operations that rely on uniqueness, secrecy, or both.", "title": "Vulnerability description" }, { "category": "summary", "text": "hw: Special Register Buffer Data Sampling (SRBDS)", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/solutions/5142691", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.4.0.Z.MAIN.EUS:microcode_ctl-4:20210216-1.20210608.1.el8_4.src", "BaseOS-8.4.0.Z.MAIN.EUS:microcode_ctl-4:20210216-1.20210608.1.el8_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-0543" }, { "category": "external", "summary": "RHBZ#1827165", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1827165" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-0543", "url": "https://www.cve.org/CVERecord?id=CVE-2020-0543" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-0543", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-0543" }, { "category": "external", "summary": "https://access.redhat.com/solutions/5142691", "url": "https://access.redhat.com/solutions/5142691" }, { "category": "external", "summary": "https://access.redhat.com/solutions/5142751", "url": "https://access.redhat.com/solutions/5142751" }, { "category": "external", "summary": "https://blogs.intel.com/technology/2020/06/ipas-security-advisories-for-june-2020/#gs.6uyhri", "url": "https://blogs.intel.com/technology/2020/06/ipas-security-advisories-for-june-2020/#gs.6uyhri" }, { "category": "external", "summary": "https://software.intel.com/security-software-guidance/insights/deep-dive-special-register-buffer-data-sampling", "url": "https://software.intel.com/security-software-guidance/insights/deep-dive-special-register-buffer-data-sampling" }, { "category": "external", "summary": "https://xenbits.xen.org/xsa/advisory-320.html", "url": "https://xenbits.xen.org/xsa/advisory-320.html" } ], "release_date": "2020-06-09T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-08-09T09:56:52+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "BaseOS-8.4.0.Z.MAIN.EUS:microcode_ctl-4:20210216-1.20210608.1.el8_4.src", "BaseOS-8.4.0.Z.MAIN.EUS:microcode_ctl-4:20210216-1.20210608.1.el8_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3027" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "BaseOS-8.4.0.Z.MAIN.EUS:microcode_ctl-4:20210216-1.20210608.1.el8_4.src", "BaseOS-8.4.0.Z.MAIN.EUS:microcode_ctl-4:20210216-1.20210608.1.el8_4.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "BaseOS-8.4.0.Z.MAIN.EUS:microcode_ctl-4:20210216-1.20210608.1.el8_4.src", "BaseOS-8.4.0.Z.MAIN.EUS:microcode_ctl-4:20210216-1.20210608.1.el8_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "hw: Special Register Buffer Data Sampling (SRBDS)" }, { "cve": "CVE-2020-0548", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2020-01-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1788786" } ], "notes": [ { "category": "description", "text": "A flaw was found in Intel processors where a local attacker is able to gain information about registers used for vector calculations by observing register states from other processes running on the system. This results in a race condition where store buffers, which were not cleared, could be read by another process or a CPU sibling. The highest threat from this vulnerability is data confidentiality where an attacker could read arbitrary data as it passes through the processor.", "title": "Vulnerability description" }, { "category": "summary", "text": "hw: Vector Register Data Sampling", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.4.0.Z.MAIN.EUS:microcode_ctl-4:20210216-1.20210608.1.el8_4.src", "BaseOS-8.4.0.Z.MAIN.EUS:microcode_ctl-4:20210216-1.20210608.1.el8_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-0548" }, { "category": "external", "summary": "RHBZ#1788786", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1788786" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-0548", "url": "https://www.cve.org/CVERecord?id=CVE-2020-0548" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-0548", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-0548" }, { "category": "external", "summary": "https://access.redhat.com/solutions/l1d-cache-eviction-and-vector-register-sampling", "url": "https://access.redhat.com/solutions/l1d-cache-eviction-and-vector-register-sampling" }, { "category": "external", "summary": "https://blogs.intel.com/technology/2020/01/ipas-intel-sa-00329/", "url": "https://blogs.intel.com/technology/2020/01/ipas-intel-sa-00329/" }, { "category": "external", "summary": "https://cacheoutattack.com/CacheOut.pdf", "url": "https://cacheoutattack.com/CacheOut.pdf" }, { "category": "external", "summary": "https://software.intel.com/security-software-guidance/software-guidance/l1d-eviction-sampling", "url": "https://software.intel.com/security-software-guidance/software-guidance/l1d-eviction-sampling" } ], "release_date": "2020-01-27T13:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-08-09T09:56:52+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "BaseOS-8.4.0.Z.MAIN.EUS:microcode_ctl-4:20210216-1.20210608.1.el8_4.src", "BaseOS-8.4.0.Z.MAIN.EUS:microcode_ctl-4:20210216-1.20210608.1.el8_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3027" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 2.8, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.0" }, "products": [ "BaseOS-8.4.0.Z.MAIN.EUS:microcode_ctl-4:20210216-1.20210608.1.el8_4.src", "BaseOS-8.4.0.Z.MAIN.EUS:microcode_ctl-4:20210216-1.20210608.1.el8_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "hw: Vector Register Data Sampling" }, { "cve": "CVE-2020-0549", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2020-01-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1788788" } ], "notes": [ { "category": "description", "text": "A microarchitectural timing flaw was found on some Intel processors. A corner case exists where data in-flight during the eviction process can end up in the \u201cfill buffers\u201d and not properly cleared by the MDS mitigations. The fill buffer contents (which were expected to be blank) can be inferred using MDS or TAA style attack methods to allow a local attacker to infer fill buffer values.", "title": "Vulnerability description" }, { "category": "summary", "text": "hw: L1D Cache Eviction Sampling", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.4.0.Z.MAIN.EUS:microcode_ctl-4:20210216-1.20210608.1.el8_4.src", "BaseOS-8.4.0.Z.MAIN.EUS:microcode_ctl-4:20210216-1.20210608.1.el8_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-0549" }, { "category": "external", "summary": "RHBZ#1788788", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1788788" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-0549", "url": "https://www.cve.org/CVERecord?id=CVE-2020-0549" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-0549", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-0549" }, { "category": "external", "summary": "https://access.redhat.com/solutions/l1d-cache-eviction-and-vector-register-sampling", "url": "https://access.redhat.com/solutions/l1d-cache-eviction-and-vector-register-sampling" }, { "category": "external", "summary": "https://blogs.intel.com/technology/2020/01/ipas-intel-sa-00329/", "url": "https://blogs.intel.com/technology/2020/01/ipas-intel-sa-00329/" }, { "category": "external", "summary": "https://cacheoutattack.com/CacheOut.pdf", "url": "https://cacheoutattack.com/CacheOut.pdf" }, { "category": "external", "summary": "https://software.intel.com/security-software-guidance/software-guidance/l1d-eviction-sampling", "url": "https://software.intel.com/security-software-guidance/software-guidance/l1d-eviction-sampling" } ], "release_date": "2020-01-27T13:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-08-09T09:56:52+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "BaseOS-8.4.0.Z.MAIN.EUS:microcode_ctl-4:20210216-1.20210608.1.el8_4.src", "BaseOS-8.4.0.Z.MAIN.EUS:microcode_ctl-4:20210216-1.20210608.1.el8_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3027" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "BaseOS-8.4.0.Z.MAIN.EUS:microcode_ctl-4:20210216-1.20210608.1.el8_4.src", "BaseOS-8.4.0.Z.MAIN.EUS:microcode_ctl-4:20210216-1.20210608.1.el8_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "hw: L1D Cache Eviction Sampling" }, { "acknowledgments": [ { "names": [ "Intel" ] } ], "cve": "CVE-2020-8695", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2020-04-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1828583" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in Intel\u0027s implementation of RAPL (Running Average Power Limit). An attacker with a local account could query the power management functionality to intelligently infer SGX enclave computation values by measuring power usage in the RAPL subsystem.", "title": "Vulnerability description" }, { "category": "summary", "text": "hw: Information disclosure issue in Intel SGX via RAPL interface", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.4.0.Z.MAIN.EUS:microcode_ctl-4:20210216-1.20210608.1.el8_4.src", "BaseOS-8.4.0.Z.MAIN.EUS:microcode_ctl-4:20210216-1.20210608.1.el8_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-8695" }, { "category": "external", "summary": "RHBZ#1828583", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1828583" }, { "category": "external", "summary": "RHSB-5569051", "url": "https://access.redhat.com/articles/5569051" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-8695", "url": "https://www.cve.org/CVERecord?id=CVE-2020-8695" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-8695", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8695" }, { "category": "external", "summary": "https://en.wikipedia.org/wiki/Power_analysis", "url": "https://en.wikipedia.org/wiki/Power_analysis" }, { "category": "external", "summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00389.html", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00389.html" } ], "release_date": "2020-11-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-08-09T09:56:52+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "BaseOS-8.4.0.Z.MAIN.EUS:microcode_ctl-4:20210216-1.20210608.1.el8_4.src", "BaseOS-8.4.0.Z.MAIN.EUS:microcode_ctl-4:20210216-1.20210608.1.el8_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3027" }, { "category": "workaround", "details": "Until a firmware update and reboot can be applied, the attack vector can be reduced by limiting read access to the sysfs attributes that export this functionality to userspace. \n\nThe command:\n~~~\nsudo chmod 400 /sys/class/powercap/intel_rapl/*/energy_uj\n~~~\nWill do this for the current boot, it will need to be scripted to run at each boot to remain persistent across reboots.", "product_ids": [ "BaseOS-8.4.0.Z.MAIN.EUS:microcode_ctl-4:20210216-1.20210608.1.el8_4.src", "BaseOS-8.4.0.Z.MAIN.EUS:microcode_ctl-4:20210216-1.20210608.1.el8_4.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "BaseOS-8.4.0.Z.MAIN.EUS:microcode_ctl-4:20210216-1.20210608.1.el8_4.src", "BaseOS-8.4.0.Z.MAIN.EUS:microcode_ctl-4:20210216-1.20210608.1.el8_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "hw: Information disclosure issue in Intel SGX via RAPL interface" }, { "acknowledgments": [ { "names": [ "Intel" ] } ], "cve": "CVE-2020-8696", "cwe": { "id": "CWE-212", "name": "Improper Removal of Sensitive Information Before Storage or Transfer" }, "discovery_date": "2020-10-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1890355" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Intel Advanced Vector Extensions (AVX) implementation, where a local authenticated attacker with the ability to execute AVX instructions can gather the AVX register state from previous AVX executions. This vulnerability allows information disclosure of the AVX register state.", "title": "Vulnerability description" }, { "category": "summary", "text": "hw: Vector Register Leakage-Active", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.4.0.Z.MAIN.EUS:microcode_ctl-4:20210216-1.20210608.1.el8_4.src", "BaseOS-8.4.0.Z.MAIN.EUS:microcode_ctl-4:20210216-1.20210608.1.el8_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-8696" }, { "category": "external", "summary": "RHBZ#1890355", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890355" }, { "category": "external", "summary": "RHSB-5569051", "url": "https://access.redhat.com/articles/5569051" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-8696", "url": "https://www.cve.org/CVERecord?id=CVE-2020-8696" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-8696", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8696" }, { "category": "external", "summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00381.html", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00381.html" } ], "release_date": "2020-11-10T13:55:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-08-09T09:56:52+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "BaseOS-8.4.0.Z.MAIN.EUS:microcode_ctl-4:20210216-1.20210608.1.el8_4.src", "BaseOS-8.4.0.Z.MAIN.EUS:microcode_ctl-4:20210216-1.20210608.1.el8_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3027" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 2.8, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.1" }, "products": [ "BaseOS-8.4.0.Z.MAIN.EUS:microcode_ctl-4:20210216-1.20210608.1.el8_4.src", "BaseOS-8.4.0.Z.MAIN.EUS:microcode_ctl-4:20210216-1.20210608.1.el8_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "hw: Vector Register Leakage-Active" }, { "acknowledgments": [ { "names": [ "Intel" ] } ], "cve": "CVE-2020-8698", "cwe": { "id": "CWE-212", "name": "Improper Removal of Sensitive Information Before Storage or Transfer" }, "discovery_date": "2020-10-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1890356" } ], "notes": [ { "category": "description", "text": "A flaw was found in the CPU microarchitecture where a local attacker is able to abuse a timing issue which may allow them to infer internal architectural state from previous executions on the CPU.", "title": "Vulnerability description" }, { "category": "summary", "text": "hw: Fast forward store predictor", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.4.0.Z.MAIN.EUS:microcode_ctl-4:20210216-1.20210608.1.el8_4.src", "BaseOS-8.4.0.Z.MAIN.EUS:microcode_ctl-4:20210216-1.20210608.1.el8_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-8698" }, { "category": "external", "summary": "RHBZ#1890356", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890356" }, { "category": "external", "summary": "RHSB-5569051", "url": "https://access.redhat.com/articles/5569051" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-8698", "url": "https://www.cve.org/CVERecord?id=CVE-2020-8698" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-8698", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8698" }, { "category": "external", "summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00381.html", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00381.html" } ], "release_date": "2020-11-10T13:55:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-08-09T09:56:52+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "BaseOS-8.4.0.Z.MAIN.EUS:microcode_ctl-4:20210216-1.20210608.1.el8_4.src", "BaseOS-8.4.0.Z.MAIN.EUS:microcode_ctl-4:20210216-1.20210608.1.el8_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3027" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "BaseOS-8.4.0.Z.MAIN.EUS:microcode_ctl-4:20210216-1.20210608.1.el8_4.src", "BaseOS-8.4.0.Z.MAIN.EUS:microcode_ctl-4:20210216-1.20210608.1.el8_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "hw: Fast forward store predictor" }, { "acknowledgments": [ { "names": [ "Intel" ] } ], "cve": "CVE-2020-24489", "cwe": { "id": "CWE-459", "name": "Incomplete Cleanup" }, "discovery_date": "2021-05-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1962650" } ], "notes": [ { "category": "description", "text": "A flaw was found in Intel\u00ae VT-d products. Entries from the context cache on some types of context cache invalidations may not be properly invalidated which may allow an authenticated user to potentially enable escalation of privilege via local access. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "hw: vt-d related privilege escalation", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.4.0.Z.MAIN.EUS:microcode_ctl-4:20210216-1.20210608.1.el8_4.src", "BaseOS-8.4.0.Z.MAIN.EUS:microcode_ctl-4:20210216-1.20210608.1.el8_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-24489" }, { "category": "external", "summary": "RHBZ#1962650", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1962650" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-24489", "url": "https://www.cve.org/CVERecord?id=CVE-2020-24489" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-24489", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-24489" } ], "release_date": "2021-06-08T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-08-09T09:56:52+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "BaseOS-8.4.0.Z.MAIN.EUS:microcode_ctl-4:20210216-1.20210608.1.el8_4.src", "BaseOS-8.4.0.Z.MAIN.EUS:microcode_ctl-4:20210216-1.20210608.1.el8_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3027" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-8.4.0.Z.MAIN.EUS:microcode_ctl-4:20210216-1.20210608.1.el8_4.src", "BaseOS-8.4.0.Z.MAIN.EUS:microcode_ctl-4:20210216-1.20210608.1.el8_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "hw: vt-d related privilege escalation" }, { "acknowledgments": [ { "names": [ "Intel" ] } ], "cve": "CVE-2020-24511", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2021-05-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1962702" } ], "notes": [ { "category": "description", "text": "Microcode misconfiguration in some Intel processors may cause EIBRS mitigation (CVE-2017-5715) to be incomplete. As a consequence, this issue may allow an authenticated user to potentially enable information disclosure via local access.", "title": "Vulnerability description" }, { "category": "summary", "text": "hw: improper isolation of shared resources in some Intel Processors", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.4.0.Z.MAIN.EUS:microcode_ctl-4:20210216-1.20210608.1.el8_4.src", "BaseOS-8.4.0.Z.MAIN.EUS:microcode_ctl-4:20210216-1.20210608.1.el8_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-24511" }, { "category": "external", "summary": "RHBZ#1962702", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1962702" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-24511", "url": "https://www.cve.org/CVERecord?id=CVE-2020-24511" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-24511", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-24511" } ], "release_date": "2021-06-08T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-08-09T09:56:52+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "BaseOS-8.4.0.Z.MAIN.EUS:microcode_ctl-4:20210216-1.20210608.1.el8_4.src", "BaseOS-8.4.0.Z.MAIN.EUS:microcode_ctl-4:20210216-1.20210608.1.el8_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3027" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "BaseOS-8.4.0.Z.MAIN.EUS:microcode_ctl-4:20210216-1.20210608.1.el8_4.src", "BaseOS-8.4.0.Z.MAIN.EUS:microcode_ctl-4:20210216-1.20210608.1.el8_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "hw: improper isolation of shared resources in some Intel Processors" }, { "acknowledgments": [ { "names": [ "Intel" ] } ], "cve": "CVE-2020-24512", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2021-05-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1962722" } ], "notes": [ { "category": "description", "text": "Observable timing discrepancy in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.", "title": "Vulnerability description" }, { "category": "summary", "text": "hw: observable timing discrepancy in some Intel Processors", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.4.0.Z.MAIN.EUS:microcode_ctl-4:20210216-1.20210608.1.el8_4.src", "BaseOS-8.4.0.Z.MAIN.EUS:microcode_ctl-4:20210216-1.20210608.1.el8_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-24512" }, { "category": "external", "summary": "RHBZ#1962722", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1962722" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-24512", "url": "https://www.cve.org/CVERecord?id=CVE-2020-24512" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-24512", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-24512" } ], "release_date": "2021-06-08T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-08-09T09:56:52+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "BaseOS-8.4.0.Z.MAIN.EUS:microcode_ctl-4:20210216-1.20210608.1.el8_4.src", "BaseOS-8.4.0.Z.MAIN.EUS:microcode_ctl-4:20210216-1.20210608.1.el8_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3027" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 2.8, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.1" }, "products": [ "BaseOS-8.4.0.Z.MAIN.EUS:microcode_ctl-4:20210216-1.20210608.1.el8_4.src", "BaseOS-8.4.0.Z.MAIN.EUS:microcode_ctl-4:20210216-1.20210608.1.el8_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "hw: observable timing discrepancy in some Intel Processors" } ] }
rhsa-2021:3364
Vulnerability from csaf_redhat
Published
2021-08-31 09:26
Modified
2025-08-02 09:53
Summary
Red Hat Security Advisory: microcode_ctl security, bug fix and enhancement update
Notes
Topic
An update for microcode_ctl is now available for Red Hat Enterprise Linux 8.2 Extended User Support.
Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.
Details
The microcode_ctl packages provide microcode updates for Intel.
Security Fix(es):
* hw: Vector Register Data Sampling (CVE-2020-0548)
* hw: L1D Cache Eviction Sampling (CVE-2020-0549)
* hw: Special Register Buffer Data Sampling (SRBDS) (CVE-2020-0543)
* hw: Information disclosure issue in Intel SGX via RAPL interface
(CVE-2020-8695)
* hw: Vector Register Leakage-Active (CVE-2020-8696)
* hw: Fast forward store predictor (CVE-2020-8698)
* hw: vt-d related privilege escalation (CVE-2020-24489)
* hw: improper isolation of shared resources in some Intel Processors
(CVE-2020-24511)
* hw: observable timing discrepancy in some Intel Processors
(CVE-2020-24512)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for microcode_ctl is now available for Red Hat Enterprise Linux 8.2 Extended User Support.\n\nRed Hat Product Security has rated this update as having a security impact\nof Moderate. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available for each vulnerability from\nthe CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The microcode_ctl packages provide microcode updates for Intel.\n\nSecurity Fix(es):\n\n* hw: Vector Register Data Sampling (CVE-2020-0548)\n\n* hw: L1D Cache Eviction Sampling (CVE-2020-0549)\n\n* hw: Special Register Buffer Data Sampling (SRBDS) (CVE-2020-0543)\n\n* hw: Information disclosure issue in Intel SGX via RAPL interface\n(CVE-2020-8695)\n\n* hw: Vector Register Leakage-Active (CVE-2020-8696)\n\n* hw: Fast forward store predictor (CVE-2020-8698)\n\n* hw: vt-d related privilege escalation (CVE-2020-24489)\n\n* hw: improper isolation of shared resources in some Intel Processors\n(CVE-2020-24511)\n\n* hw: observable timing discrepancy in some Intel Processors\n(CVE-2020-24512)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE\npage(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2021:3364", "url": "https://access.redhat.com/errata/RHSA-2021:3364" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1788786", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1788786" }, { "category": "external", "summary": "1788788", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1788788" }, { "category": "external", "summary": "1827165", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1827165" }, { "category": "external", "summary": "1828583", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1828583" }, { "category": "external", "summary": "1890355", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890355" }, { "category": "external", "summary": "1890356", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890356" }, { "category": "external", "summary": "1962650", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1962650" }, { "category": "external", "summary": "1962702", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1962702" }, { "category": "external", "summary": "1962722", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1962722" }, { "category": "external", "summary": "1972326", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1972326" }, { "category": "external", "summary": "1972329", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1972329" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3364.json" } ], "title": "Red Hat Security Advisory: microcode_ctl security, bug fix and enhancement update", "tracking": { "current_release_date": "2025-08-02T09:53:04+00:00", "generator": { "date": "2025-08-02T09:53:04+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2021:3364", "initial_release_date": "2021-08-31T09:26:30+00:00", "revision_history": [ { "date": "2021-08-31T09:26:30+00:00", "number": "1", "summary": "Initial version" }, { "date": "2021-08-31T09:26:30+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-02T09:53:04+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product": { "name": "Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:8.2::baseos" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "microcode_ctl-4:20191115-4.20210608.1.el8_2.src", "product": { "name": "microcode_ctl-4:20191115-4.20210608.1.el8_2.src", "product_id": "microcode_ctl-4:20191115-4.20210608.1.el8_2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/microcode_ctl@20191115-4.20210608.1.el8_2?arch=src\u0026epoch=4" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "microcode_ctl-4:20191115-4.20210608.1.el8_2.x86_64", "product": { "name": "microcode_ctl-4:20191115-4.20210608.1.el8_2.x86_64", "product_id": "microcode_ctl-4:20191115-4.20210608.1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/microcode_ctl@20191115-4.20210608.1.el8_2?arch=x86_64\u0026epoch=4" } } } ], "category": "architecture", "name": "x86_64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "microcode_ctl-4:20191115-4.20210608.1.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:microcode_ctl-4:20191115-4.20210608.1.el8_2.src" }, "product_reference": "microcode_ctl-4:20191115-4.20210608.1.el8_2.src", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "microcode_ctl-4:20191115-4.20210608.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:microcode_ctl-4:20191115-4.20210608.1.el8_2.x86_64" }, "product_reference": "microcode_ctl-4:20191115-4.20210608.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Intel" ] } ], "cve": "CVE-2020-0543", "discovery_date": "2020-04-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1827165" } ], "notes": [ { "category": "description", "text": "A new domain bypass transient execution attack known as Special Register Buffer Data Sampling (SRBDS) has been found. This flaw allows data values from special internal registers to be leaked by an attacker able to execute code on any core of the CPU. An unprivileged, local attacker can use this flaw to infer values returned by affected instructions known to be commonly used during cryptographic operations that rely on uniqueness, secrecy, or both.", "title": "Vulnerability description" }, { "category": "summary", "text": "hw: Special Register Buffer Data Sampling (SRBDS)", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/solutions/5142691", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.2.0.Z.EUS:microcode_ctl-4:20191115-4.20210608.1.el8_2.src", "BaseOS-8.2.0.Z.EUS:microcode_ctl-4:20191115-4.20210608.1.el8_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-0543" }, { "category": "external", "summary": "RHBZ#1827165", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1827165" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-0543", "url": "https://www.cve.org/CVERecord?id=CVE-2020-0543" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-0543", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-0543" }, { "category": "external", "summary": "https://access.redhat.com/solutions/5142691", "url": "https://access.redhat.com/solutions/5142691" }, { "category": "external", "summary": "https://access.redhat.com/solutions/5142751", "url": "https://access.redhat.com/solutions/5142751" }, { "category": "external", "summary": "https://blogs.intel.com/technology/2020/06/ipas-security-advisories-for-june-2020/#gs.6uyhri", "url": "https://blogs.intel.com/technology/2020/06/ipas-security-advisories-for-june-2020/#gs.6uyhri" }, { "category": "external", "summary": "https://software.intel.com/security-software-guidance/insights/deep-dive-special-register-buffer-data-sampling", "url": "https://software.intel.com/security-software-guidance/insights/deep-dive-special-register-buffer-data-sampling" }, { "category": "external", "summary": "https://xenbits.xen.org/xsa/advisory-320.html", "url": "https://xenbits.xen.org/xsa/advisory-320.html" } ], "release_date": "2020-06-09T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-08-31T09:26:30+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "BaseOS-8.2.0.Z.EUS:microcode_ctl-4:20191115-4.20210608.1.el8_2.src", "BaseOS-8.2.0.Z.EUS:microcode_ctl-4:20191115-4.20210608.1.el8_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3364" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "BaseOS-8.2.0.Z.EUS:microcode_ctl-4:20191115-4.20210608.1.el8_2.src", "BaseOS-8.2.0.Z.EUS:microcode_ctl-4:20191115-4.20210608.1.el8_2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "BaseOS-8.2.0.Z.EUS:microcode_ctl-4:20191115-4.20210608.1.el8_2.src", "BaseOS-8.2.0.Z.EUS:microcode_ctl-4:20191115-4.20210608.1.el8_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "hw: Special Register Buffer Data Sampling (SRBDS)" }, { "cve": "CVE-2020-0548", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2020-01-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1788786" } ], "notes": [ { "category": "description", "text": "A flaw was found in Intel processors where a local attacker is able to gain information about registers used for vector calculations by observing register states from other processes running on the system. This results in a race condition where store buffers, which were not cleared, could be read by another process or a CPU sibling. The highest threat from this vulnerability is data confidentiality where an attacker could read arbitrary data as it passes through the processor.", "title": "Vulnerability description" }, { "category": "summary", "text": "hw: Vector Register Data Sampling", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.2.0.Z.EUS:microcode_ctl-4:20191115-4.20210608.1.el8_2.src", "BaseOS-8.2.0.Z.EUS:microcode_ctl-4:20191115-4.20210608.1.el8_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-0548" }, { "category": "external", "summary": "RHBZ#1788786", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1788786" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-0548", "url": "https://www.cve.org/CVERecord?id=CVE-2020-0548" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-0548", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-0548" }, { "category": "external", "summary": "https://access.redhat.com/solutions/l1d-cache-eviction-and-vector-register-sampling", "url": "https://access.redhat.com/solutions/l1d-cache-eviction-and-vector-register-sampling" }, { "category": "external", "summary": "https://blogs.intel.com/technology/2020/01/ipas-intel-sa-00329/", "url": "https://blogs.intel.com/technology/2020/01/ipas-intel-sa-00329/" }, { "category": "external", "summary": "https://cacheoutattack.com/CacheOut.pdf", "url": "https://cacheoutattack.com/CacheOut.pdf" }, { "category": "external", "summary": "https://software.intel.com/security-software-guidance/software-guidance/l1d-eviction-sampling", "url": "https://software.intel.com/security-software-guidance/software-guidance/l1d-eviction-sampling" } ], "release_date": "2020-01-27T13:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-08-31T09:26:30+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "BaseOS-8.2.0.Z.EUS:microcode_ctl-4:20191115-4.20210608.1.el8_2.src", "BaseOS-8.2.0.Z.EUS:microcode_ctl-4:20191115-4.20210608.1.el8_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 2.8, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.0" }, "products": [ "BaseOS-8.2.0.Z.EUS:microcode_ctl-4:20191115-4.20210608.1.el8_2.src", "BaseOS-8.2.0.Z.EUS:microcode_ctl-4:20191115-4.20210608.1.el8_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "hw: Vector Register Data Sampling" }, { "cve": "CVE-2020-0549", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2020-01-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1788788" } ], "notes": [ { "category": "description", "text": "A microarchitectural timing flaw was found on some Intel processors. A corner case exists where data in-flight during the eviction process can end up in the \u201cfill buffers\u201d and not properly cleared by the MDS mitigations. The fill buffer contents (which were expected to be blank) can be inferred using MDS or TAA style attack methods to allow a local attacker to infer fill buffer values.", "title": "Vulnerability description" }, { "category": "summary", "text": "hw: L1D Cache Eviction Sampling", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.2.0.Z.EUS:microcode_ctl-4:20191115-4.20210608.1.el8_2.src", "BaseOS-8.2.0.Z.EUS:microcode_ctl-4:20191115-4.20210608.1.el8_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-0549" }, { "category": "external", "summary": "RHBZ#1788788", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1788788" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-0549", "url": "https://www.cve.org/CVERecord?id=CVE-2020-0549" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-0549", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-0549" }, { "category": "external", "summary": "https://access.redhat.com/solutions/l1d-cache-eviction-and-vector-register-sampling", "url": "https://access.redhat.com/solutions/l1d-cache-eviction-and-vector-register-sampling" }, { "category": "external", "summary": "https://blogs.intel.com/technology/2020/01/ipas-intel-sa-00329/", "url": "https://blogs.intel.com/technology/2020/01/ipas-intel-sa-00329/" }, { "category": "external", "summary": "https://cacheoutattack.com/CacheOut.pdf", "url": "https://cacheoutattack.com/CacheOut.pdf" }, { "category": "external", "summary": "https://software.intel.com/security-software-guidance/software-guidance/l1d-eviction-sampling", "url": "https://software.intel.com/security-software-guidance/software-guidance/l1d-eviction-sampling" } ], "release_date": "2020-01-27T13:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-08-31T09:26:30+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "BaseOS-8.2.0.Z.EUS:microcode_ctl-4:20191115-4.20210608.1.el8_2.src", "BaseOS-8.2.0.Z.EUS:microcode_ctl-4:20191115-4.20210608.1.el8_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "BaseOS-8.2.0.Z.EUS:microcode_ctl-4:20191115-4.20210608.1.el8_2.src", "BaseOS-8.2.0.Z.EUS:microcode_ctl-4:20191115-4.20210608.1.el8_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "hw: L1D Cache Eviction Sampling" }, { "acknowledgments": [ { "names": [ "Intel" ] } ], "cve": "CVE-2020-8695", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2020-04-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1828583" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in Intel\u0027s implementation of RAPL (Running Average Power Limit). An attacker with a local account could query the power management functionality to intelligently infer SGX enclave computation values by measuring power usage in the RAPL subsystem.", "title": "Vulnerability description" }, { "category": "summary", "text": "hw: Information disclosure issue in Intel SGX via RAPL interface", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.2.0.Z.EUS:microcode_ctl-4:20191115-4.20210608.1.el8_2.src", "BaseOS-8.2.0.Z.EUS:microcode_ctl-4:20191115-4.20210608.1.el8_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-8695" }, { "category": "external", "summary": "RHBZ#1828583", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1828583" }, { "category": "external", "summary": "RHSB-5569051", "url": "https://access.redhat.com/articles/5569051" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-8695", "url": "https://www.cve.org/CVERecord?id=CVE-2020-8695" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-8695", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8695" }, { "category": "external", "summary": "https://en.wikipedia.org/wiki/Power_analysis", "url": "https://en.wikipedia.org/wiki/Power_analysis" }, { "category": "external", "summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00389.html", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00389.html" } ], "release_date": "2020-11-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-08-31T09:26:30+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "BaseOS-8.2.0.Z.EUS:microcode_ctl-4:20191115-4.20210608.1.el8_2.src", "BaseOS-8.2.0.Z.EUS:microcode_ctl-4:20191115-4.20210608.1.el8_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3364" }, { "category": "workaround", "details": "Until a firmware update and reboot can be applied, the attack vector can be reduced by limiting read access to the sysfs attributes that export this functionality to userspace. \n\nThe command:\n~~~\nsudo chmod 400 /sys/class/powercap/intel_rapl/*/energy_uj\n~~~\nWill do this for the current boot, it will need to be scripted to run at each boot to remain persistent across reboots.", "product_ids": [ "BaseOS-8.2.0.Z.EUS:microcode_ctl-4:20191115-4.20210608.1.el8_2.src", "BaseOS-8.2.0.Z.EUS:microcode_ctl-4:20191115-4.20210608.1.el8_2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "BaseOS-8.2.0.Z.EUS:microcode_ctl-4:20191115-4.20210608.1.el8_2.src", "BaseOS-8.2.0.Z.EUS:microcode_ctl-4:20191115-4.20210608.1.el8_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "hw: Information disclosure issue in Intel SGX via RAPL interface" }, { "acknowledgments": [ { "names": [ "Intel" ] } ], "cve": "CVE-2020-8696", "cwe": { "id": "CWE-212", "name": "Improper Removal of Sensitive Information Before Storage or Transfer" }, "discovery_date": "2020-10-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1890355" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Intel Advanced Vector Extensions (AVX) implementation, where a local authenticated attacker with the ability to execute AVX instructions can gather the AVX register state from previous AVX executions. This vulnerability allows information disclosure of the AVX register state.", "title": "Vulnerability description" }, { "category": "summary", "text": "hw: Vector Register Leakage-Active", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.2.0.Z.EUS:microcode_ctl-4:20191115-4.20210608.1.el8_2.src", "BaseOS-8.2.0.Z.EUS:microcode_ctl-4:20191115-4.20210608.1.el8_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-8696" }, { "category": "external", "summary": "RHBZ#1890355", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890355" }, { "category": "external", "summary": "RHSB-5569051", "url": "https://access.redhat.com/articles/5569051" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-8696", "url": "https://www.cve.org/CVERecord?id=CVE-2020-8696" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-8696", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8696" }, { "category": "external", "summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00381.html", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00381.html" } ], "release_date": "2020-11-10T13:55:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-08-31T09:26:30+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "BaseOS-8.2.0.Z.EUS:microcode_ctl-4:20191115-4.20210608.1.el8_2.src", "BaseOS-8.2.0.Z.EUS:microcode_ctl-4:20191115-4.20210608.1.el8_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 2.8, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.1" }, "products": [ "BaseOS-8.2.0.Z.EUS:microcode_ctl-4:20191115-4.20210608.1.el8_2.src", "BaseOS-8.2.0.Z.EUS:microcode_ctl-4:20191115-4.20210608.1.el8_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "hw: Vector Register Leakage-Active" }, { "acknowledgments": [ { "names": [ "Intel" ] } ], "cve": "CVE-2020-8698", "cwe": { "id": "CWE-212", "name": "Improper Removal of Sensitive Information Before Storage or Transfer" }, "discovery_date": "2020-10-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1890356" } ], "notes": [ { "category": "description", "text": "A flaw was found in the CPU microarchitecture where a local attacker is able to abuse a timing issue which may allow them to infer internal architectural state from previous executions on the CPU.", "title": "Vulnerability description" }, { "category": "summary", "text": "hw: Fast forward store predictor", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.2.0.Z.EUS:microcode_ctl-4:20191115-4.20210608.1.el8_2.src", "BaseOS-8.2.0.Z.EUS:microcode_ctl-4:20191115-4.20210608.1.el8_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-8698" }, { "category": "external", "summary": "RHBZ#1890356", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890356" }, { "category": "external", "summary": "RHSB-5569051", "url": "https://access.redhat.com/articles/5569051" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-8698", "url": "https://www.cve.org/CVERecord?id=CVE-2020-8698" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-8698", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8698" }, { "category": "external", "summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00381.html", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00381.html" } ], "release_date": "2020-11-10T13:55:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-08-31T09:26:30+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "BaseOS-8.2.0.Z.EUS:microcode_ctl-4:20191115-4.20210608.1.el8_2.src", "BaseOS-8.2.0.Z.EUS:microcode_ctl-4:20191115-4.20210608.1.el8_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "BaseOS-8.2.0.Z.EUS:microcode_ctl-4:20191115-4.20210608.1.el8_2.src", "BaseOS-8.2.0.Z.EUS:microcode_ctl-4:20191115-4.20210608.1.el8_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "hw: Fast forward store predictor" }, { "acknowledgments": [ { "names": [ "Intel" ] } ], "cve": "CVE-2020-24489", "cwe": { "id": "CWE-459", "name": "Incomplete Cleanup" }, "discovery_date": "2021-05-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1962650" } ], "notes": [ { "category": "description", "text": "A flaw was found in Intel\u00ae VT-d products. Entries from the context cache on some types of context cache invalidations may not be properly invalidated which may allow an authenticated user to potentially enable escalation of privilege via local access. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "hw: vt-d related privilege escalation", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.2.0.Z.EUS:microcode_ctl-4:20191115-4.20210608.1.el8_2.src", "BaseOS-8.2.0.Z.EUS:microcode_ctl-4:20191115-4.20210608.1.el8_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-24489" }, { "category": "external", "summary": "RHBZ#1962650", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1962650" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-24489", "url": "https://www.cve.org/CVERecord?id=CVE-2020-24489" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-24489", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-24489" } ], "release_date": "2021-06-08T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-08-31T09:26:30+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "BaseOS-8.2.0.Z.EUS:microcode_ctl-4:20191115-4.20210608.1.el8_2.src", "BaseOS-8.2.0.Z.EUS:microcode_ctl-4:20191115-4.20210608.1.el8_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-8.2.0.Z.EUS:microcode_ctl-4:20191115-4.20210608.1.el8_2.src", "BaseOS-8.2.0.Z.EUS:microcode_ctl-4:20191115-4.20210608.1.el8_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "hw: vt-d related privilege escalation" }, { "acknowledgments": [ { "names": [ "Intel" ] } ], "cve": "CVE-2020-24511", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2021-05-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1962702" } ], "notes": [ { "category": "description", "text": "Microcode misconfiguration in some Intel processors may cause EIBRS mitigation (CVE-2017-5715) to be incomplete. As a consequence, this issue may allow an authenticated user to potentially enable information disclosure via local access.", "title": "Vulnerability description" }, { "category": "summary", "text": "hw: improper isolation of shared resources in some Intel Processors", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.2.0.Z.EUS:microcode_ctl-4:20191115-4.20210608.1.el8_2.src", "BaseOS-8.2.0.Z.EUS:microcode_ctl-4:20191115-4.20210608.1.el8_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-24511" }, { "category": "external", "summary": "RHBZ#1962702", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1962702" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-24511", "url": "https://www.cve.org/CVERecord?id=CVE-2020-24511" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-24511", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-24511" } ], "release_date": "2021-06-08T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-08-31T09:26:30+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "BaseOS-8.2.0.Z.EUS:microcode_ctl-4:20191115-4.20210608.1.el8_2.src", "BaseOS-8.2.0.Z.EUS:microcode_ctl-4:20191115-4.20210608.1.el8_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "BaseOS-8.2.0.Z.EUS:microcode_ctl-4:20191115-4.20210608.1.el8_2.src", "BaseOS-8.2.0.Z.EUS:microcode_ctl-4:20191115-4.20210608.1.el8_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "hw: improper isolation of shared resources in some Intel Processors" }, { "acknowledgments": [ { "names": [ "Intel" ] } ], "cve": "CVE-2020-24512", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2021-05-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1962722" } ], "notes": [ { "category": "description", "text": "Observable timing discrepancy in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.", "title": "Vulnerability description" }, { "category": "summary", "text": "hw: observable timing discrepancy in some Intel Processors", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.2.0.Z.EUS:microcode_ctl-4:20191115-4.20210608.1.el8_2.src", "BaseOS-8.2.0.Z.EUS:microcode_ctl-4:20191115-4.20210608.1.el8_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-24512" }, { "category": "external", "summary": "RHBZ#1962722", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1962722" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-24512", "url": "https://www.cve.org/CVERecord?id=CVE-2020-24512" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-24512", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-24512" } ], "release_date": "2021-06-08T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-08-31T09:26:30+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "BaseOS-8.2.0.Z.EUS:microcode_ctl-4:20191115-4.20210608.1.el8_2.src", "BaseOS-8.2.0.Z.EUS:microcode_ctl-4:20191115-4.20210608.1.el8_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 2.8, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.1" }, "products": [ "BaseOS-8.2.0.Z.EUS:microcode_ctl-4:20191115-4.20210608.1.el8_2.src", "BaseOS-8.2.0.Z.EUS:microcode_ctl-4:20191115-4.20210608.1.el8_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "hw: observable timing discrepancy in some Intel Processors" } ] }
rhsa-2021:3323
Vulnerability from csaf_redhat
Published
2021-08-31 07:59
Modified
2025-08-02 09:53
Summary
Red Hat Security Advisory: microcode_ctl security, bug fix and enhancement update
Notes
Topic
An update for microcode_ctl is now available for Red Hat Enterprise Linux 7.2 Advanced Update Support.
Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.
Details
The microcode_ctl packages provide microcode updates for Intel.
Security Fix(es):
* hw: Vector Register Data Sampling (CVE-2020-0548)
* hw: L1D Cache Eviction Sampling (CVE-2020-0549)
* hw: Special Register Buffer Data Sampling (SRBDS) (CVE-2020-0543)
* hw: Information disclosure issue in Intel SGX via RAPL interface (CVE-2020-8695)
* hw: Vector Register Leakage-Active (CVE-2020-8696)
* hw: Fast forward store predictor (CVE-2020-8698)
* hw: vt-d related privilege escalation (CVE-2020-24489)
* hw: improper isolation of shared resources in some Intel Processors (CVE-2020-24511)
* hw: observable timing discrepancy in some Intel Processors (CVE-2020-24512)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for microcode_ctl is now available for Red Hat Enterprise Linux 7.2 Advanced Update Support.\n\nRed Hat Product Security has rated this update as having a security impact\nof Moderate. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available for each vulnerability from\nthe CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The microcode_ctl packages provide microcode updates for Intel.\n\nSecurity Fix(es):\n\n* hw: Vector Register Data Sampling (CVE-2020-0548)\n\n* hw: L1D Cache Eviction Sampling (CVE-2020-0549)\n\n* hw: Special Register Buffer Data Sampling (SRBDS) (CVE-2020-0543)\n\n* hw: Information disclosure issue in Intel SGX via RAPL interface (CVE-2020-8695)\n\n* hw: Vector Register Leakage-Active (CVE-2020-8696)\n\n* hw: Fast forward store predictor (CVE-2020-8698)\n\n* hw: vt-d related privilege escalation (CVE-2020-24489)\n\n* hw: improper isolation of shared resources in some Intel Processors (CVE-2020-24511)\n\n* hw: observable timing discrepancy in some Intel Processors (CVE-2020-24512)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE\npage(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2021:3323", "url": "https://access.redhat.com/errata/RHSA-2021:3323" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1788786", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1788786" }, { "category": "external", "summary": "1788788", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1788788" }, { "category": "external", "summary": "1827165", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1827165" }, { "category": "external", "summary": "1828583", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1828583" }, { "category": "external", "summary": "1890355", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890355" }, { "category": "external", "summary": "1890356", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890356" }, { "category": "external", "summary": "1962650", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1962650" }, { "category": "external", "summary": "1962702", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1962702" }, { "category": "external", "summary": "1962722", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1962722" }, { "category": "external", "summary": "1972336", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1972336" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3323.json" } ], "title": "Red Hat Security Advisory: microcode_ctl security, bug fix and enhancement update", "tracking": { "current_release_date": "2025-08-02T09:53:19+00:00", "generator": { "date": "2025-08-02T09:53:19+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2021:3323", "initial_release_date": "2021-08-31T07:59:36+00:00", "revision_history": [ { "date": "2021-08-31T07:59:36+00:00", "number": "1", "summary": "Initial version" }, { "date": "2021-08-31T07:59:36+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-02T09:53:19+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Server AUS (v. 7.2)", "product": { "name": "Red Hat Enterprise Linux Server AUS (v. 7.2)", "product_id": "7Server-7.2.AUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_aus:7.2::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "microcode_ctl-2:2.1-12.39.el7_2.src", "product": { "name": "microcode_ctl-2:2.1-12.39.el7_2.src", "product_id": "microcode_ctl-2:2.1-12.39.el7_2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/microcode_ctl@2.1-12.39.el7_2?arch=src\u0026epoch=2" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "microcode_ctl-2:2.1-12.39.el7_2.x86_64", "product": { "name": "microcode_ctl-2:2.1-12.39.el7_2.x86_64", "product_id": "microcode_ctl-2:2.1-12.39.el7_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/microcode_ctl@2.1-12.39.el7_2?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "microcode_ctl-debuginfo-2:2.1-12.39.el7_2.x86_64", "product": { "name": "microcode_ctl-debuginfo-2:2.1-12.39.el7_2.x86_64", "product_id": "microcode_ctl-debuginfo-2:2.1-12.39.el7_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/microcode_ctl-debuginfo@2.1-12.39.el7_2?arch=x86_64\u0026epoch=2" } } } ], "category": "architecture", "name": "x86_64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "microcode_ctl-2:2.1-12.39.el7_2.src as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)", "product_id": "7Server-7.2.AUS:microcode_ctl-2:2.1-12.39.el7_2.src" }, "product_reference": "microcode_ctl-2:2.1-12.39.el7_2.src", "relates_to_product_reference": "7Server-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "microcode_ctl-2:2.1-12.39.el7_2.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)", "product_id": "7Server-7.2.AUS:microcode_ctl-2:2.1-12.39.el7_2.x86_64" }, "product_reference": "microcode_ctl-2:2.1-12.39.el7_2.x86_64", "relates_to_product_reference": "7Server-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "microcode_ctl-debuginfo-2:2.1-12.39.el7_2.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)", "product_id": "7Server-7.2.AUS:microcode_ctl-debuginfo-2:2.1-12.39.el7_2.x86_64" }, "product_reference": "microcode_ctl-debuginfo-2:2.1-12.39.el7_2.x86_64", "relates_to_product_reference": "7Server-7.2.AUS" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Intel" ] } ], "cve": "CVE-2020-0543", "discovery_date": "2020-04-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1827165" } ], "notes": [ { "category": "description", "text": "A new domain bypass transient execution attack known as Special Register Buffer Data Sampling (SRBDS) has been found. This flaw allows data values from special internal registers to be leaked by an attacker able to execute code on any core of the CPU. An unprivileged, local attacker can use this flaw to infer values returned by affected instructions known to be commonly used during cryptographic operations that rely on uniqueness, secrecy, or both.", "title": "Vulnerability description" }, { "category": "summary", "text": "hw: Special Register Buffer Data Sampling (SRBDS)", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/solutions/5142691", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-7.2.AUS:microcode_ctl-2:2.1-12.39.el7_2.src", "7Server-7.2.AUS:microcode_ctl-2:2.1-12.39.el7_2.x86_64", "7Server-7.2.AUS:microcode_ctl-debuginfo-2:2.1-12.39.el7_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-0543" }, { "category": "external", "summary": "RHBZ#1827165", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1827165" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-0543", "url": "https://www.cve.org/CVERecord?id=CVE-2020-0543" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-0543", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-0543" }, { "category": "external", "summary": "https://access.redhat.com/solutions/5142691", "url": "https://access.redhat.com/solutions/5142691" }, { "category": "external", "summary": "https://access.redhat.com/solutions/5142751", "url": "https://access.redhat.com/solutions/5142751" }, { "category": "external", "summary": "https://blogs.intel.com/technology/2020/06/ipas-security-advisories-for-june-2020/#gs.6uyhri", "url": "https://blogs.intel.com/technology/2020/06/ipas-security-advisories-for-june-2020/#gs.6uyhri" }, { "category": "external", "summary": "https://software.intel.com/security-software-guidance/insights/deep-dive-special-register-buffer-data-sampling", "url": "https://software.intel.com/security-software-guidance/insights/deep-dive-special-register-buffer-data-sampling" }, { "category": "external", "summary": "https://xenbits.xen.org/xsa/advisory-320.html", "url": "https://xenbits.xen.org/xsa/advisory-320.html" } ], "release_date": "2020-06-09T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-08-31T07:59:36+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-7.2.AUS:microcode_ctl-2:2.1-12.39.el7_2.src", "7Server-7.2.AUS:microcode_ctl-2:2.1-12.39.el7_2.x86_64", "7Server-7.2.AUS:microcode_ctl-debuginfo-2:2.1-12.39.el7_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3323" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "7Server-7.2.AUS:microcode_ctl-2:2.1-12.39.el7_2.src", "7Server-7.2.AUS:microcode_ctl-2:2.1-12.39.el7_2.x86_64", "7Server-7.2.AUS:microcode_ctl-debuginfo-2:2.1-12.39.el7_2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "7Server-7.2.AUS:microcode_ctl-2:2.1-12.39.el7_2.src", "7Server-7.2.AUS:microcode_ctl-2:2.1-12.39.el7_2.x86_64", "7Server-7.2.AUS:microcode_ctl-debuginfo-2:2.1-12.39.el7_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "hw: Special Register Buffer Data Sampling (SRBDS)" }, { "cve": "CVE-2020-0548", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2020-01-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1788786" } ], "notes": [ { "category": "description", "text": "A flaw was found in Intel processors where a local attacker is able to gain information about registers used for vector calculations by observing register states from other processes running on the system. This results in a race condition where store buffers, which were not cleared, could be read by another process or a CPU sibling. The highest threat from this vulnerability is data confidentiality where an attacker could read arbitrary data as it passes through the processor.", "title": "Vulnerability description" }, { "category": "summary", "text": "hw: Vector Register Data Sampling", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-7.2.AUS:microcode_ctl-2:2.1-12.39.el7_2.src", "7Server-7.2.AUS:microcode_ctl-2:2.1-12.39.el7_2.x86_64", "7Server-7.2.AUS:microcode_ctl-debuginfo-2:2.1-12.39.el7_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-0548" }, { "category": "external", "summary": "RHBZ#1788786", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1788786" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-0548", "url": "https://www.cve.org/CVERecord?id=CVE-2020-0548" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-0548", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-0548" }, { "category": "external", "summary": "https://access.redhat.com/solutions/l1d-cache-eviction-and-vector-register-sampling", "url": "https://access.redhat.com/solutions/l1d-cache-eviction-and-vector-register-sampling" }, { "category": "external", "summary": "https://blogs.intel.com/technology/2020/01/ipas-intel-sa-00329/", "url": "https://blogs.intel.com/technology/2020/01/ipas-intel-sa-00329/" }, { "category": "external", "summary": "https://cacheoutattack.com/CacheOut.pdf", "url": "https://cacheoutattack.com/CacheOut.pdf" }, { "category": "external", "summary": "https://software.intel.com/security-software-guidance/software-guidance/l1d-eviction-sampling", "url": "https://software.intel.com/security-software-guidance/software-guidance/l1d-eviction-sampling" } ], "release_date": "2020-01-27T13:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-08-31T07:59:36+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-7.2.AUS:microcode_ctl-2:2.1-12.39.el7_2.src", "7Server-7.2.AUS:microcode_ctl-2:2.1-12.39.el7_2.x86_64", "7Server-7.2.AUS:microcode_ctl-debuginfo-2:2.1-12.39.el7_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3323" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 2.8, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.0" }, "products": [ "7Server-7.2.AUS:microcode_ctl-2:2.1-12.39.el7_2.src", "7Server-7.2.AUS:microcode_ctl-2:2.1-12.39.el7_2.x86_64", "7Server-7.2.AUS:microcode_ctl-debuginfo-2:2.1-12.39.el7_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "hw: Vector Register Data Sampling" }, { "cve": "CVE-2020-0549", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2020-01-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1788788" } ], "notes": [ { "category": "description", "text": "A microarchitectural timing flaw was found on some Intel processors. A corner case exists where data in-flight during the eviction process can end up in the \u201cfill buffers\u201d and not properly cleared by the MDS mitigations. The fill buffer contents (which were expected to be blank) can be inferred using MDS or TAA style attack methods to allow a local attacker to infer fill buffer values.", "title": "Vulnerability description" }, { "category": "summary", "text": "hw: L1D Cache Eviction Sampling", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-7.2.AUS:microcode_ctl-2:2.1-12.39.el7_2.src", "7Server-7.2.AUS:microcode_ctl-2:2.1-12.39.el7_2.x86_64", "7Server-7.2.AUS:microcode_ctl-debuginfo-2:2.1-12.39.el7_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-0549" }, { "category": "external", "summary": "RHBZ#1788788", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1788788" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-0549", "url": "https://www.cve.org/CVERecord?id=CVE-2020-0549" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-0549", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-0549" }, { "category": "external", "summary": "https://access.redhat.com/solutions/l1d-cache-eviction-and-vector-register-sampling", "url": "https://access.redhat.com/solutions/l1d-cache-eviction-and-vector-register-sampling" }, { "category": "external", "summary": "https://blogs.intel.com/technology/2020/01/ipas-intel-sa-00329/", "url": "https://blogs.intel.com/technology/2020/01/ipas-intel-sa-00329/" }, { "category": "external", "summary": "https://cacheoutattack.com/CacheOut.pdf", "url": "https://cacheoutattack.com/CacheOut.pdf" }, { "category": "external", "summary": "https://software.intel.com/security-software-guidance/software-guidance/l1d-eviction-sampling", "url": "https://software.intel.com/security-software-guidance/software-guidance/l1d-eviction-sampling" } ], "release_date": "2020-01-27T13:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-08-31T07:59:36+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-7.2.AUS:microcode_ctl-2:2.1-12.39.el7_2.src", "7Server-7.2.AUS:microcode_ctl-2:2.1-12.39.el7_2.x86_64", "7Server-7.2.AUS:microcode_ctl-debuginfo-2:2.1-12.39.el7_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3323" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "7Server-7.2.AUS:microcode_ctl-2:2.1-12.39.el7_2.src", "7Server-7.2.AUS:microcode_ctl-2:2.1-12.39.el7_2.x86_64", "7Server-7.2.AUS:microcode_ctl-debuginfo-2:2.1-12.39.el7_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "hw: L1D Cache Eviction Sampling" }, { "acknowledgments": [ { "names": [ "Intel" ] } ], "cve": "CVE-2020-8695", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2020-04-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1828583" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in Intel\u0027s implementation of RAPL (Running Average Power Limit). An attacker with a local account could query the power management functionality to intelligently infer SGX enclave computation values by measuring power usage in the RAPL subsystem.", "title": "Vulnerability description" }, { "category": "summary", "text": "hw: Information disclosure issue in Intel SGX via RAPL interface", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-7.2.AUS:microcode_ctl-2:2.1-12.39.el7_2.src", "7Server-7.2.AUS:microcode_ctl-2:2.1-12.39.el7_2.x86_64", "7Server-7.2.AUS:microcode_ctl-debuginfo-2:2.1-12.39.el7_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-8695" }, { "category": "external", "summary": "RHBZ#1828583", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1828583" }, { "category": "external", "summary": "RHSB-5569051", "url": "https://access.redhat.com/articles/5569051" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-8695", "url": "https://www.cve.org/CVERecord?id=CVE-2020-8695" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-8695", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8695" }, { "category": "external", "summary": "https://en.wikipedia.org/wiki/Power_analysis", "url": "https://en.wikipedia.org/wiki/Power_analysis" }, { "category": "external", "summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00389.html", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00389.html" } ], "release_date": "2020-11-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-08-31T07:59:36+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-7.2.AUS:microcode_ctl-2:2.1-12.39.el7_2.src", "7Server-7.2.AUS:microcode_ctl-2:2.1-12.39.el7_2.x86_64", "7Server-7.2.AUS:microcode_ctl-debuginfo-2:2.1-12.39.el7_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3323" }, { "category": "workaround", "details": "Until a firmware update and reboot can be applied, the attack vector can be reduced by limiting read access to the sysfs attributes that export this functionality to userspace. \n\nThe command:\n~~~\nsudo chmod 400 /sys/class/powercap/intel_rapl/*/energy_uj\n~~~\nWill do this for the current boot, it will need to be scripted to run at each boot to remain persistent across reboots.", "product_ids": [ "7Server-7.2.AUS:microcode_ctl-2:2.1-12.39.el7_2.src", "7Server-7.2.AUS:microcode_ctl-2:2.1-12.39.el7_2.x86_64", "7Server-7.2.AUS:microcode_ctl-debuginfo-2:2.1-12.39.el7_2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "7Server-7.2.AUS:microcode_ctl-2:2.1-12.39.el7_2.src", "7Server-7.2.AUS:microcode_ctl-2:2.1-12.39.el7_2.x86_64", "7Server-7.2.AUS:microcode_ctl-debuginfo-2:2.1-12.39.el7_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "hw: Information disclosure issue in Intel SGX via RAPL interface" }, { "acknowledgments": [ { "names": [ "Intel" ] } ], "cve": "CVE-2020-8696", "cwe": { "id": "CWE-212", "name": "Improper Removal of Sensitive Information Before Storage or Transfer" }, "discovery_date": "2020-10-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1890355" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Intel Advanced Vector Extensions (AVX) implementation, where a local authenticated attacker with the ability to execute AVX instructions can gather the AVX register state from previous AVX executions. This vulnerability allows information disclosure of the AVX register state.", "title": "Vulnerability description" }, { "category": "summary", "text": "hw: Vector Register Leakage-Active", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-7.2.AUS:microcode_ctl-2:2.1-12.39.el7_2.src", "7Server-7.2.AUS:microcode_ctl-2:2.1-12.39.el7_2.x86_64", "7Server-7.2.AUS:microcode_ctl-debuginfo-2:2.1-12.39.el7_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-8696" }, { "category": "external", "summary": "RHBZ#1890355", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890355" }, { "category": "external", "summary": "RHSB-5569051", "url": "https://access.redhat.com/articles/5569051" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-8696", "url": "https://www.cve.org/CVERecord?id=CVE-2020-8696" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-8696", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8696" }, { "category": "external", "summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00381.html", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00381.html" } ], "release_date": "2020-11-10T13:55:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-08-31T07:59:36+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-7.2.AUS:microcode_ctl-2:2.1-12.39.el7_2.src", "7Server-7.2.AUS:microcode_ctl-2:2.1-12.39.el7_2.x86_64", "7Server-7.2.AUS:microcode_ctl-debuginfo-2:2.1-12.39.el7_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3323" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 2.8, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.1" }, "products": [ "7Server-7.2.AUS:microcode_ctl-2:2.1-12.39.el7_2.src", "7Server-7.2.AUS:microcode_ctl-2:2.1-12.39.el7_2.x86_64", "7Server-7.2.AUS:microcode_ctl-debuginfo-2:2.1-12.39.el7_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "hw: Vector Register Leakage-Active" }, { "acknowledgments": [ { "names": [ "Intel" ] } ], "cve": "CVE-2020-8698", "cwe": { "id": "CWE-212", "name": "Improper Removal of Sensitive Information Before Storage or Transfer" }, "discovery_date": "2020-10-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1890356" } ], "notes": [ { "category": "description", "text": "A flaw was found in the CPU microarchitecture where a local attacker is able to abuse a timing issue which may allow them to infer internal architectural state from previous executions on the CPU.", "title": "Vulnerability description" }, { "category": "summary", "text": "hw: Fast forward store predictor", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-7.2.AUS:microcode_ctl-2:2.1-12.39.el7_2.src", "7Server-7.2.AUS:microcode_ctl-2:2.1-12.39.el7_2.x86_64", "7Server-7.2.AUS:microcode_ctl-debuginfo-2:2.1-12.39.el7_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-8698" }, { "category": "external", "summary": "RHBZ#1890356", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890356" }, { "category": "external", "summary": "RHSB-5569051", "url": "https://access.redhat.com/articles/5569051" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-8698", "url": "https://www.cve.org/CVERecord?id=CVE-2020-8698" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-8698", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8698" }, { "category": "external", "summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00381.html", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00381.html" } ], "release_date": "2020-11-10T13:55:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-08-31T07:59:36+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-7.2.AUS:microcode_ctl-2:2.1-12.39.el7_2.src", "7Server-7.2.AUS:microcode_ctl-2:2.1-12.39.el7_2.x86_64", "7Server-7.2.AUS:microcode_ctl-debuginfo-2:2.1-12.39.el7_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3323" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "7Server-7.2.AUS:microcode_ctl-2:2.1-12.39.el7_2.src", "7Server-7.2.AUS:microcode_ctl-2:2.1-12.39.el7_2.x86_64", "7Server-7.2.AUS:microcode_ctl-debuginfo-2:2.1-12.39.el7_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "hw: Fast forward store predictor" }, { "acknowledgments": [ { "names": [ "Intel" ] } ], "cve": "CVE-2020-24489", "cwe": { "id": "CWE-459", "name": "Incomplete Cleanup" }, "discovery_date": "2021-05-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1962650" } ], "notes": [ { "category": "description", "text": "A flaw was found in Intel\u00ae VT-d products. Entries from the context cache on some types of context cache invalidations may not be properly invalidated which may allow an authenticated user to potentially enable escalation of privilege via local access. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "hw: vt-d related privilege escalation", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-7.2.AUS:microcode_ctl-2:2.1-12.39.el7_2.src", "7Server-7.2.AUS:microcode_ctl-2:2.1-12.39.el7_2.x86_64", "7Server-7.2.AUS:microcode_ctl-debuginfo-2:2.1-12.39.el7_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-24489" }, { "category": "external", "summary": "RHBZ#1962650", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1962650" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-24489", "url": "https://www.cve.org/CVERecord?id=CVE-2020-24489" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-24489", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-24489" } ], "release_date": "2021-06-08T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-08-31T07:59:36+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-7.2.AUS:microcode_ctl-2:2.1-12.39.el7_2.src", "7Server-7.2.AUS:microcode_ctl-2:2.1-12.39.el7_2.x86_64", "7Server-7.2.AUS:microcode_ctl-debuginfo-2:2.1-12.39.el7_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3323" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-7.2.AUS:microcode_ctl-2:2.1-12.39.el7_2.src", "7Server-7.2.AUS:microcode_ctl-2:2.1-12.39.el7_2.x86_64", "7Server-7.2.AUS:microcode_ctl-debuginfo-2:2.1-12.39.el7_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "hw: vt-d related privilege escalation" }, { "acknowledgments": [ { "names": [ "Intel" ] } ], "cve": "CVE-2020-24511", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2021-05-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1962702" } ], "notes": [ { "category": "description", "text": "Microcode misconfiguration in some Intel processors may cause EIBRS mitigation (CVE-2017-5715) to be incomplete. As a consequence, this issue may allow an authenticated user to potentially enable information disclosure via local access.", "title": "Vulnerability description" }, { "category": "summary", "text": "hw: improper isolation of shared resources in some Intel Processors", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-7.2.AUS:microcode_ctl-2:2.1-12.39.el7_2.src", "7Server-7.2.AUS:microcode_ctl-2:2.1-12.39.el7_2.x86_64", "7Server-7.2.AUS:microcode_ctl-debuginfo-2:2.1-12.39.el7_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-24511" }, { "category": "external", "summary": "RHBZ#1962702", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1962702" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-24511", "url": "https://www.cve.org/CVERecord?id=CVE-2020-24511" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-24511", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-24511" } ], "release_date": "2021-06-08T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-08-31T07:59:36+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-7.2.AUS:microcode_ctl-2:2.1-12.39.el7_2.src", "7Server-7.2.AUS:microcode_ctl-2:2.1-12.39.el7_2.x86_64", "7Server-7.2.AUS:microcode_ctl-debuginfo-2:2.1-12.39.el7_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3323" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "7Server-7.2.AUS:microcode_ctl-2:2.1-12.39.el7_2.src", "7Server-7.2.AUS:microcode_ctl-2:2.1-12.39.el7_2.x86_64", "7Server-7.2.AUS:microcode_ctl-debuginfo-2:2.1-12.39.el7_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "hw: improper isolation of shared resources in some Intel Processors" }, { "acknowledgments": [ { "names": [ "Intel" ] } ], "cve": "CVE-2020-24512", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2021-05-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1962722" } ], "notes": [ { "category": "description", "text": "Observable timing discrepancy in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.", "title": "Vulnerability description" }, { "category": "summary", "text": "hw: observable timing discrepancy in some Intel Processors", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-7.2.AUS:microcode_ctl-2:2.1-12.39.el7_2.src", "7Server-7.2.AUS:microcode_ctl-2:2.1-12.39.el7_2.x86_64", "7Server-7.2.AUS:microcode_ctl-debuginfo-2:2.1-12.39.el7_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-24512" }, { "category": "external", "summary": "RHBZ#1962722", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1962722" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-24512", "url": "https://www.cve.org/CVERecord?id=CVE-2020-24512" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-24512", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-24512" } ], "release_date": "2021-06-08T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-08-31T07:59:36+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-7.2.AUS:microcode_ctl-2:2.1-12.39.el7_2.src", "7Server-7.2.AUS:microcode_ctl-2:2.1-12.39.el7_2.x86_64", "7Server-7.2.AUS:microcode_ctl-debuginfo-2:2.1-12.39.el7_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3323" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 2.8, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.1" }, "products": [ "7Server-7.2.AUS:microcode_ctl-2:2.1-12.39.el7_2.src", "7Server-7.2.AUS:microcode_ctl-2:2.1-12.39.el7_2.x86_64", "7Server-7.2.AUS:microcode_ctl-debuginfo-2:2.1-12.39.el7_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "hw: observable timing discrepancy in some Intel Processors" } ] }
rhsa-2020:2677
Vulnerability from csaf_redhat
Published
2020-06-23 13:08
Modified
2025-02-28 01:28
Summary
Red Hat Security Advisory: microcode_ctl security, bug fix and enhancement update
Notes
Topic
An update for microcode_ctl is now available for Red Hat enterprise Linux 8.1 Extended Update Support.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Security Fix(es):
* hw: Special Register Buffer Data Sampling (SRBDS) (CVE-2020-0543)
* hw: L1D Cache Eviction Sampling (CVE-2020-0549)
* hw: Vector Register Data Sampling (CVE-2020-0548)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE page(s)
listed in the References section.
Bug Fix(es):
* Update Intel CPU microcode to microcode-20200609 release:
- Update of 06-2d-06/0x6d (SNB-E/EN/EP C1/M0) microcode from revision 0x61f
up to 0x621;
- Update of 06-2d-07/0x6d (SNB-E/EN/EP C2/M1) microcode from revision 0x718
up to 0x71a;
- Update of 06-3c-03/0x32 (HSW C0) microcode from revision 0x27 up to 0x28;
- Update of 06-3d-04/0xc0 (BDW-U/Y E0/F0) microcode from revision 0x2e
up to 0x2f;
- Update of 06-45-01/0x72 (HSW-U C0/D0) microcode from revision 0x25
up to 0x26;
- Update of 06-46-01/0x32 (HSW-H C0) microcode from revision 0x1b up to 0x1c;
- Update of 06-47-01/0x22 (BDW-H/Xeon E3 E0/G0) microcode from revision 0x21
up to 0x22;
- Update of 06-4e-03/0xc0 (SKL-U/Y D0) microcode from revision 0xd6
up to 0xdc;
- Update of 06-55-03/0x97 (SKX-SP B1) microcode from revision 0x1000151
up to 0x1000157;
- Update of 06-55-04/0xb7 (SKX-SP H0/M0/U0, SKX-D M1) microcode
(in intel-06-55-04/intel-ucode/06-55-04) from revision 0x2000065
up to 0x2006906;
- Update of 06-55-06/0xbf (CLX-SP B0) microcode from revision 0x400002c
up to 0x4002f01;
- Update of 06-55-07/0xbf (CLX-SP B1) microcode from revision 0x500002c
up to 0x5002f01;
- Update of 06-5e-03/0x36 (SKL-H/S R0/N0) microcode from revision 0xd6
up to 0xdc;
- Update of 06-7e-05/0x80 (ICL-U/Y D1) microcode from revision 0x46
up to 0x78;
- Update of 06-8e-09/0x10 (AML-Y22 H0) microcode from revision 0xca
up to 0xd6;
- Update of 06-8e-09/0xc0 (KBL-U/Y H0) microcode from revision 0xca
up to 0xd6;
- Update of 06-8e-0a/0xc0 (CFL-U43e D0) microcode from revision 0xca
up to 0xd6;
- Update of 06-8e-0b/0xd0 (WHL-U W0) microcode from revision 0xca
up to 0xd6;
- Update of 06-8e-0c/0x94 (AML-Y42 V0, CML-Y42 V0, WHL-U V0) microcode
from revision 0xca up to 0xd6;
- Update of 06-9e-09/0x2a (KBL-G/H/S/X/Xeon E3 B0) microcode from revision
0xca up to 0xd6;
- Update of 06-9e-0a/0x22 (CFL-H/S/Xeon E3 U0) microcode from revision 0xca
up to 0xd6;
- Update of 06-9e-0b/0x02 (CFL-S B0) microcode from revision 0xca up to 0xd6;
- Update of 06-9e-0c/0x22 (CFL-H/S P0) microcode from revision 0xca
up to 0xd6;
- Update of 06-9e-0d/0x22 (CFL-H R0) microcode from revision 0xca up to 0xd6.
* Do not update 06-4e-03 (SKL-U/Y) and 06-5e-03 (SKL-H/S/Xeon E3 v5) to revision
0xdc, use 0xd6 by default.
* Enable 06-2d-07 (SNB-E/EN/EP) caveat by default.
* Enable 06-55-04 (SKL-SP/X/W) caveat by default.
* Avoid find being SIGPIPE'd on early "grep -q" exit in the dracut script.
* Re-generate initramfs not only for the currently running kernel,
but for several recently installed kernels as well.
* Change the URL to point to the GitHub repository since the microcode download.
section at Intel Download Center does not exist anymore.
* Avoid temporary file creation, used for here-documents in check_caveats.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for microcode_ctl is now available for Red Hat enterprise Linux 8.1 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Security Fix(es):\n\n* hw: Special Register Buffer Data Sampling (SRBDS) (CVE-2020-0543)\n\n* hw: L1D Cache Eviction Sampling (CVE-2020-0549)\n\n* hw: Vector Register Data Sampling (CVE-2020-0548)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE page(s)\nlisted in the References section.\n\nBug Fix(es):\n\n* Update Intel CPU microcode to microcode-20200609 release:\n - Update of 06-2d-06/0x6d (SNB-E/EN/EP C1/M0) microcode from revision 0x61f\n up to 0x621;\n - Update of 06-2d-07/0x6d (SNB-E/EN/EP C2/M1) microcode from revision 0x718\n up to 0x71a;\n - Update of 06-3c-03/0x32 (HSW C0) microcode from revision 0x27 up to 0x28;\n - Update of 06-3d-04/0xc0 (BDW-U/Y E0/F0) microcode from revision 0x2e\n up to 0x2f;\n - Update of 06-45-01/0x72 (HSW-U C0/D0) microcode from revision 0x25\n up to 0x26;\n - Update of 06-46-01/0x32 (HSW-H C0) microcode from revision 0x1b up to 0x1c;\n - Update of 06-47-01/0x22 (BDW-H/Xeon E3 E0/G0) microcode from revision 0x21\n up to 0x22;\n - Update of 06-4e-03/0xc0 (SKL-U/Y D0) microcode from revision 0xd6\n up to 0xdc;\n - Update of 06-55-03/0x97 (SKX-SP B1) microcode from revision 0x1000151\n up to 0x1000157;\n - Update of 06-55-04/0xb7 (SKX-SP H0/M0/U0, SKX-D M1) microcode\n (in intel-06-55-04/intel-ucode/06-55-04) from revision 0x2000065\n up to 0x2006906;\n - Update of 06-55-06/0xbf (CLX-SP B0) microcode from revision 0x400002c\n up to 0x4002f01;\n - Update of 06-55-07/0xbf (CLX-SP B1) microcode from revision 0x500002c\n up to 0x5002f01;\n - Update of 06-5e-03/0x36 (SKL-H/S R0/N0) microcode from revision 0xd6\n up to 0xdc;\n - Update of 06-7e-05/0x80 (ICL-U/Y D1) microcode from revision 0x46\n up to 0x78;\n - Update of 06-8e-09/0x10 (AML-Y22 H0) microcode from revision 0xca\n up to 0xd6;\n - Update of 06-8e-09/0xc0 (KBL-U/Y H0) microcode from revision 0xca\n up to 0xd6;\n - Update of 06-8e-0a/0xc0 (CFL-U43e D0) microcode from revision 0xca\n up to 0xd6;\n - Update of 06-8e-0b/0xd0 (WHL-U W0) microcode from revision 0xca\n up to 0xd6;\n - Update of 06-8e-0c/0x94 (AML-Y42 V0, CML-Y42 V0, WHL-U V0) microcode\n from revision 0xca up to 0xd6;\n - Update of 06-9e-09/0x2a (KBL-G/H/S/X/Xeon E3 B0) microcode from revision\n 0xca up to 0xd6;\n - Update of 06-9e-0a/0x22 (CFL-H/S/Xeon E3 U0) microcode from revision 0xca\n up to 0xd6;\n - Update of 06-9e-0b/0x02 (CFL-S B0) microcode from revision 0xca up to 0xd6;\n - Update of 06-9e-0c/0x22 (CFL-H/S P0) microcode from revision 0xca\n up to 0xd6;\n - Update of 06-9e-0d/0x22 (CFL-H R0) microcode from revision 0xca up to 0xd6.\n* Do not update 06-4e-03 (SKL-U/Y) and 06-5e-03 (SKL-H/S/Xeon E3 v5) to revision\n 0xdc, use 0xd6 by default.\n* Enable 06-2d-07 (SNB-E/EN/EP) caveat by default.\n* Enable 06-55-04 (SKL-SP/X/W) caveat by default.\n* Avoid find being SIGPIPE\u0027d on early \"grep -q\" exit in the dracut script.\n* Re-generate initramfs not only for the currently running kernel,\n but for several recently installed kernels as well.\n* Change the URL to point to the GitHub repository since the microcode download.\n section at Intel Download Center does not exist anymore.\n* Avoid temporary file creation, used for here-documents in check_caveats.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2020:2677", "url": "https://access.redhat.com/errata/RHSA-2020:2677" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "https://access.redhat.com/solutions/5142691", "url": "https://access.redhat.com/solutions/5142691" }, { "category": "external", "summary": "https://access.redhat.com/solutions/l1d-cache-eviction-and-vector-register-sampling", "url": "https://access.redhat.com/solutions/l1d-cache-eviction-and-vector-register-sampling" }, { "category": "external", "summary": "1788786", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1788786" }, { "category": "external", "summary": "1788788", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1788788" }, { "category": "external", "summary": "1827165", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1827165" }, { "category": "external", "summary": "1848439", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1848439" }, { "category": "external", "summary": "1848502", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1848502" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_2677.json" } ], "title": "Red Hat Security Advisory: microcode_ctl security, bug fix and enhancement update", "tracking": { "current_release_date": "2025-02-28T01:28:08+00:00", "generator": { "date": "2025-02-28T01:28:08+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.3.1" } }, "id": "RHSA-2020:2677", "initial_release_date": "2020-06-23T13:08:38+00:00", "revision_history": [ { "date": "2020-06-23T13:08:38+00:00", "number": "1", "summary": "Initial version" }, { "date": "2020-06-23T13:08:38+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-02-28T01:28:08+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product": { "name": "Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:8.1::baseos" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "microcode_ctl-4:20190618-1.20200609.1.el8_1.x86_64", "product": { "name": "microcode_ctl-4:20190618-1.20200609.1.el8_1.x86_64", "product_id": "microcode_ctl-4:20190618-1.20200609.1.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/microcode_ctl@20190618-1.20200609.1.el8_1?arch=x86_64\u0026epoch=4" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "microcode_ctl-4:20190618-1.20200609.1.el8_1.src", "product": { "name": "microcode_ctl-4:20190618-1.20200609.1.el8_1.src", "product_id": "microcode_ctl-4:20190618-1.20200609.1.el8_1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/microcode_ctl@20190618-1.20200609.1.el8_1?arch=src\u0026epoch=4" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "microcode_ctl-4:20190618-1.20200609.1.el8_1.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:microcode_ctl-4:20190618-1.20200609.1.el8_1.src" }, "product_reference": "microcode_ctl-4:20190618-1.20200609.1.el8_1.src", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "microcode_ctl-4:20190618-1.20200609.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:microcode_ctl-4:20190618-1.20200609.1.el8_1.x86_64" }, "product_reference": "microcode_ctl-4:20190618-1.20200609.1.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Intel" ] } ], "cve": "CVE-2020-0543", "discovery_date": "2020-04-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1827165" } ], "notes": [ { "category": "description", "text": "A new domain bypass transient execution attack known as Special Register Buffer Data Sampling (SRBDS) has been found. This flaw allows data values from special internal registers to be leaked by an attacker able to execute code on any core of the CPU. An unprivileged, local attacker can use this flaw to infer values returned by affected instructions known to be commonly used during cryptographic operations that rely on uniqueness, secrecy, or both.", "title": "Vulnerability description" }, { "category": "summary", "text": "hw: Special Register Buffer Data Sampling (SRBDS)", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/solutions/5142691", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.1.0.Z.EUS:microcode_ctl-4:20190618-1.20200609.1.el8_1.src", "BaseOS-8.1.0.Z.EUS:microcode_ctl-4:20190618-1.20200609.1.el8_1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-0543" }, { "category": "external", "summary": "RHBZ#1827165", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1827165" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-0543", "url": "https://www.cve.org/CVERecord?id=CVE-2020-0543" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-0543", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-0543" }, { "category": "external", "summary": "https://access.redhat.com/solutions/5142691", "url": "https://access.redhat.com/solutions/5142691" }, { "category": "external", "summary": "https://access.redhat.com/solutions/5142751", "url": "https://access.redhat.com/solutions/5142751" }, { "category": "external", "summary": "https://blogs.intel.com/technology/2020/06/ipas-security-advisories-for-june-2020/#gs.6uyhri", "url": "https://blogs.intel.com/technology/2020/06/ipas-security-advisories-for-june-2020/#gs.6uyhri" }, { "category": "external", "summary": "https://software.intel.com/security-software-guidance/insights/deep-dive-special-register-buffer-data-sampling", "url": "https://software.intel.com/security-software-guidance/insights/deep-dive-special-register-buffer-data-sampling" }, { "category": "external", "summary": "https://xenbits.xen.org/xsa/advisory-320.html", "url": "https://xenbits.xen.org/xsa/advisory-320.html" } ], "release_date": "2020-06-09T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-06-23T13:08:38+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "BaseOS-8.1.0.Z.EUS:microcode_ctl-4:20190618-1.20200609.1.el8_1.src", "BaseOS-8.1.0.Z.EUS:microcode_ctl-4:20190618-1.20200609.1.el8_1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2677" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "BaseOS-8.1.0.Z.EUS:microcode_ctl-4:20190618-1.20200609.1.el8_1.src", "BaseOS-8.1.0.Z.EUS:microcode_ctl-4:20190618-1.20200609.1.el8_1.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "BaseOS-8.1.0.Z.EUS:microcode_ctl-4:20190618-1.20200609.1.el8_1.src", "BaseOS-8.1.0.Z.EUS:microcode_ctl-4:20190618-1.20200609.1.el8_1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "hw: Special Register Buffer Data Sampling (SRBDS)" }, { "cve": "CVE-2020-0548", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2020-01-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1788786" } ], "notes": [ { "category": "description", "text": "A flaw was found in Intel processors where a local attacker is able to gain information about registers used for vector calculations by observing register states from other processes running on the system. This results in a race condition where store buffers, which were not cleared, could be read by another process or a CPU sibling. The highest threat from this vulnerability is data confidentiality where an attacker could read arbitrary data as it passes through the processor.", "title": "Vulnerability description" }, { "category": "summary", "text": "hw: Vector Register Data Sampling", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.1.0.Z.EUS:microcode_ctl-4:20190618-1.20200609.1.el8_1.src", "BaseOS-8.1.0.Z.EUS:microcode_ctl-4:20190618-1.20200609.1.el8_1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-0548" }, { "category": "external", "summary": "RHBZ#1788786", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1788786" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-0548", "url": "https://www.cve.org/CVERecord?id=CVE-2020-0548" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-0548", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-0548" }, { "category": "external", "summary": "https://access.redhat.com/solutions/l1d-cache-eviction-and-vector-register-sampling", "url": "https://access.redhat.com/solutions/l1d-cache-eviction-and-vector-register-sampling" }, { "category": "external", "summary": "https://blogs.intel.com/technology/2020/01/ipas-intel-sa-00329/", "url": "https://blogs.intel.com/technology/2020/01/ipas-intel-sa-00329/" }, { "category": "external", "summary": "https://cacheoutattack.com/CacheOut.pdf", "url": "https://cacheoutattack.com/CacheOut.pdf" }, { "category": "external", "summary": "https://software.intel.com/security-software-guidance/software-guidance/l1d-eviction-sampling", "url": "https://software.intel.com/security-software-guidance/software-guidance/l1d-eviction-sampling" } ], "release_date": "2020-01-27T13:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-06-23T13:08:38+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "BaseOS-8.1.0.Z.EUS:microcode_ctl-4:20190618-1.20200609.1.el8_1.src", "BaseOS-8.1.0.Z.EUS:microcode_ctl-4:20190618-1.20200609.1.el8_1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2677" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 2.8, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.0" }, "products": [ "BaseOS-8.1.0.Z.EUS:microcode_ctl-4:20190618-1.20200609.1.el8_1.src", "BaseOS-8.1.0.Z.EUS:microcode_ctl-4:20190618-1.20200609.1.el8_1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "hw: Vector Register Data Sampling" }, { "cve": "CVE-2020-0549", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2020-01-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1788788" } ], "notes": [ { "category": "description", "text": "A microarchitectural timing flaw was found on some Intel processors. A corner case exists where data in-flight during the eviction process can end up in the \u201cfill buffers\u201d and not properly cleared by the MDS mitigations. The fill buffer contents (which were expected to be blank) can be inferred using MDS or TAA style attack methods to allow a local attacker to infer fill buffer values.", "title": "Vulnerability description" }, { "category": "summary", "text": "hw: L1D Cache Eviction Sampling", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.1.0.Z.EUS:microcode_ctl-4:20190618-1.20200609.1.el8_1.src", "BaseOS-8.1.0.Z.EUS:microcode_ctl-4:20190618-1.20200609.1.el8_1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-0549" }, { "category": "external", "summary": "RHBZ#1788788", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1788788" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-0549", "url": "https://www.cve.org/CVERecord?id=CVE-2020-0549" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-0549", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-0549" }, { "category": "external", "summary": "https://access.redhat.com/solutions/l1d-cache-eviction-and-vector-register-sampling", "url": "https://access.redhat.com/solutions/l1d-cache-eviction-and-vector-register-sampling" }, { "category": "external", "summary": "https://blogs.intel.com/technology/2020/01/ipas-intel-sa-00329/", "url": "https://blogs.intel.com/technology/2020/01/ipas-intel-sa-00329/" }, { "category": "external", "summary": "https://cacheoutattack.com/CacheOut.pdf", "url": "https://cacheoutattack.com/CacheOut.pdf" }, { "category": "external", "summary": "https://software.intel.com/security-software-guidance/software-guidance/l1d-eviction-sampling", "url": "https://software.intel.com/security-software-guidance/software-guidance/l1d-eviction-sampling" } ], "release_date": "2020-01-27T13:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-06-23T13:08:38+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "BaseOS-8.1.0.Z.EUS:microcode_ctl-4:20190618-1.20200609.1.el8_1.src", "BaseOS-8.1.0.Z.EUS:microcode_ctl-4:20190618-1.20200609.1.el8_1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2677" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "BaseOS-8.1.0.Z.EUS:microcode_ctl-4:20190618-1.20200609.1.el8_1.src", "BaseOS-8.1.0.Z.EUS:microcode_ctl-4:20190618-1.20200609.1.el8_1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "hw: L1D Cache Eviction Sampling" } ] }
rhsa-2020:2707
Vulnerability from csaf_redhat
Published
2020-06-23 15:36
Modified
2025-02-28 01:27
Summary
Red Hat Security Advisory: microcode_ctl security, bug fix and enhancement update
Notes
Topic
Updated microcode_ctl packages that fix several security bugs and add various
enhancements are now available.
Red Hat Product Security has rated this update as having a security impact of
Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a
detailed severity rating, is available for each vulnerability from the CVE
link(s) in the References section.
Details
Security Fix(es):
* hw: Special Register Buffer Data Sampling (SRBDS) (CVE-2020-0543)
* hw: L1D Cache Eviction Sampling (CVE-2020-0549)
* hw: Vector Register Data Sampling (CVE-2020-0548)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE page(s)
listed in the References section.
Bug Fix(es):
* Update Intel CPU microcode to microcode-20200609 release:
- Update of 06-2d-06/0x6d (SNB-E/EN/EP C1/M0) microcode from revision 0x61f
up to 0x621;
- Update of 06-2d-07/0x6d (SNB-E/EN/EP C2/M1) microcode from revision 0x718
up to 0x71a;
- Update of 06-3c-03/0x32 (HSW C0) microcode from revision 0x27 up to 0x28;
- Update of 06-3d-04/0xc0 (BDW-U/Y E0/F0) microcode from revision 0x2e
up to 0x2f;
- Update of 06-45-01/0x72 (HSW-U C0/D0) microcode from revision 0x25
up to 0x26;
- Update of 06-46-01/0x32 (HSW-H C0) microcode from revision 0x1b up to 0x1c;
- Update of 06-47-01/0x22 (BDW-H/Xeon E3 E0/G0) microcode from revision 0x21
up to 0x22;
- Update of 06-4e-03/0xc0 (SKL-U/Y D0) microcode from revision 0xd6
up to 0xdc;
- Update of 06-55-03/0x97 (SKX-SP B1) microcode from revision 0x1000151
up to 0x1000157;
- Update of 06-55-04/0xb7 (SKX-SP H0/M0/U0, SKX-D M1) microcode
(in intel-06-55-04/intel-ucode/06-55-04) from revision 0x2000065
up to 0x2006906;
- Update of 06-55-06/0xbf (CLX-SP B0) microcode from revision 0x400002c
up to 0x4002f01;
- Update of 06-55-07/0xbf (CLX-SP B1) microcode from revision 0x500002c
up to 0x5002f01;
- Update of 06-5e-03/0x36 (SKL-H/S R0/N0) microcode from revision 0xd6
up to 0xdc;
- Update of 06-7e-05/0x80 (ICL-U/Y D1) microcode from revision 0x46
up to 0x78;
- Update of 06-8e-09/0x10 (AML-Y22 H0) microcode from revision 0xca
up to 0xd6;
- Update of 06-8e-09/0xc0 (KBL-U/Y H0) microcode from revision 0xca
up to 0xd6;
- Update of 06-8e-0a/0xc0 (CFL-U43e D0) microcode from revision 0xca
up to 0xd6;
- Update of 06-8e-0b/0xd0 (WHL-U W0) microcode from revision 0xca
up to 0xd6;
- Update of 06-8e-0c/0x94 (AML-Y42 V0, CML-Y42 V0, WHL-U V0) microcode
from revision 0xca up to 0xd6;
- Update of 06-9e-09/0x2a (KBL-G/H/S/X/Xeon E3 B0) microcode from revision
0xca up to 0xd6;
- Update of 06-9e-0a/0x22 (CFL-H/S/Xeon E3 U0) microcode from revision 0xca
up to 0xd6;
- Update of 06-9e-0b/0x02 (CFL-S B0) microcode from revision 0xca up to 0xd6;
- Update of 06-9e-0c/0x22 (CFL-H/S P0) microcode from revision 0xca
up to 0xd6;
- Update of 06-9e-0d/0x22 (CFL-H R0) microcode from revision 0xca up to 0xd6.
* Do not update 06-4e-03 (SKL-U/Y) and 06-5e-03 (SKL-H/S/Xeon E3 v5) to revision
0xdc, use 0xd6 by default.
* Enable 06-2d-07 (SNB-E/EN/EP) caveat by default.
* Enable 06-55-04 (SKL-SP/X/W) caveat by default.
* Avoid find being SIGPIPE'd on early "grep -q" exit in the dracut script.
* Re-generate initramfs not only for the currently running kernel,
but for several recently installed kernels as well.
* Change the URL in the intel-microcode2ucode.8 to point to the GitHub
repository since the microcode download section at Intel Download Center
does not exist anymore.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated microcode_ctl packages that fix several security bugs and add various\nenhancements are now available.\n\nRed Hat Product Security has rated this update as having a security impact of\nModerate. A Common Vulnerability Scoring System (CVSS) base score, which gives a\ndetailed severity rating, is available for each vulnerability from the CVE\nlink(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Security Fix(es):\n\n* hw: Special Register Buffer Data Sampling (SRBDS) (CVE-2020-0543)\n\n* hw: L1D Cache Eviction Sampling (CVE-2020-0549)\n\n* hw: Vector Register Data Sampling (CVE-2020-0548)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE page(s)\nlisted in the References section.\n\nBug Fix(es):\n\n* Update Intel CPU microcode to microcode-20200609 release:\n - Update of 06-2d-06/0x6d (SNB-E/EN/EP C1/M0) microcode from revision 0x61f\n up to 0x621;\n - Update of 06-2d-07/0x6d (SNB-E/EN/EP C2/M1) microcode from revision 0x718\n up to 0x71a;\n - Update of 06-3c-03/0x32 (HSW C0) microcode from revision 0x27 up to 0x28;\n - Update of 06-3d-04/0xc0 (BDW-U/Y E0/F0) microcode from revision 0x2e\n up to 0x2f;\n - Update of 06-45-01/0x72 (HSW-U C0/D0) microcode from revision 0x25\n up to 0x26;\n - Update of 06-46-01/0x32 (HSW-H C0) microcode from revision 0x1b up to 0x1c;\n - Update of 06-47-01/0x22 (BDW-H/Xeon E3 E0/G0) microcode from revision 0x21\n up to 0x22;\n - Update of 06-4e-03/0xc0 (SKL-U/Y D0) microcode from revision 0xd6\n up to 0xdc;\n - Update of 06-55-03/0x97 (SKX-SP B1) microcode from revision 0x1000151\n up to 0x1000157;\n - Update of 06-55-04/0xb7 (SKX-SP H0/M0/U0, SKX-D M1) microcode\n (in intel-06-55-04/intel-ucode/06-55-04) from revision 0x2000065\n up to 0x2006906;\n - Update of 06-55-06/0xbf (CLX-SP B0) microcode from revision 0x400002c\n up to 0x4002f01;\n - Update of 06-55-07/0xbf (CLX-SP B1) microcode from revision 0x500002c\n up to 0x5002f01;\n - Update of 06-5e-03/0x36 (SKL-H/S R0/N0) microcode from revision 0xd6\n up to 0xdc;\n - Update of 06-7e-05/0x80 (ICL-U/Y D1) microcode from revision 0x46\n up to 0x78;\n - Update of 06-8e-09/0x10 (AML-Y22 H0) microcode from revision 0xca\n up to 0xd6;\n - Update of 06-8e-09/0xc0 (KBL-U/Y H0) microcode from revision 0xca\n up to 0xd6;\n - Update of 06-8e-0a/0xc0 (CFL-U43e D0) microcode from revision 0xca\n up to 0xd6;\n - Update of 06-8e-0b/0xd0 (WHL-U W0) microcode from revision 0xca\n up to 0xd6;\n - Update of 06-8e-0c/0x94 (AML-Y42 V0, CML-Y42 V0, WHL-U V0) microcode\n from revision 0xca up to 0xd6;\n - Update of 06-9e-09/0x2a (KBL-G/H/S/X/Xeon E3 B0) microcode from revision\n 0xca up to 0xd6;\n - Update of 06-9e-0a/0x22 (CFL-H/S/Xeon E3 U0) microcode from revision 0xca\n up to 0xd6;\n - Update of 06-9e-0b/0x02 (CFL-S B0) microcode from revision 0xca up to 0xd6;\n - Update of 06-9e-0c/0x22 (CFL-H/S P0) microcode from revision 0xca\n up to 0xd6;\n - Update of 06-9e-0d/0x22 (CFL-H R0) microcode from revision 0xca up to 0xd6.\n* Do not update 06-4e-03 (SKL-U/Y) and 06-5e-03 (SKL-H/S/Xeon E3 v5) to revision\n 0xdc, use 0xd6 by default.\n* Enable 06-2d-07 (SNB-E/EN/EP) caveat by default.\n* Enable 06-55-04 (SKL-SP/X/W) caveat by default.\n* Avoid find being SIGPIPE\u0027d on early \"grep -q\" exit in the dracut script.\n* Re-generate initramfs not only for the currently running kernel,\n but for several recently installed kernels as well.\n* Change the URL in the intel-microcode2ucode.8 to point to the GitHub\n repository since the microcode download section at Intel Download Center\n does not exist anymore.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2020:2707", "url": "https://access.redhat.com/errata/RHSA-2020:2707" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "https://access.redhat.com/solutions/5142691", "url": "https://access.redhat.com/solutions/5142691" }, { "category": "external", "summary": "https://access.redhat.com/solutions/l1d-cache-eviction-and-vector-register-sampling", "url": "https://access.redhat.com/solutions/l1d-cache-eviction-and-vector-register-sampling" }, { "category": "external", "summary": "1788786", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1788786" }, { "category": "external", "summary": "1788788", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1788788" }, { "category": "external", "summary": "1827165", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1827165" }, { "category": "external", "summary": "1840536", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1840536" }, { "category": "external", "summary": "1848989", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1848989" }, { "category": "external", "summary": "1848998", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1848998" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_2707.json" } ], "title": "Red Hat Security Advisory: microcode_ctl security, bug fix and enhancement update", "tracking": { "current_release_date": "2025-02-28T01:27:44+00:00", "generator": { "date": "2025-02-28T01:27:44+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.3.1" } }, "id": "RHSA-2020:2707", "initial_release_date": "2020-06-23T15:36:12+00:00", "revision_history": [ { "date": "2020-06-23T15:36:12+00:00", "number": "1", "summary": "Initial version" }, { "date": "2020-06-23T15:36:12+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-02-28T01:27:44+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Server AUS (v. 6.5)", "product": { "name": "Red Hat Enterprise Linux Server AUS (v. 6.5)", "product_id": "6Server-6.5.AUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_aus:6.5::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "microcode_ctl-2:1.17-17.31.el6_5.x86_64", "product": { "name": "microcode_ctl-2:1.17-17.31.el6_5.x86_64", "product_id": "microcode_ctl-2:1.17-17.31.el6_5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/microcode_ctl@1.17-17.31.el6_5?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "microcode_ctl-debuginfo-2:1.17-17.31.el6_5.x86_64", "product": { "name": "microcode_ctl-debuginfo-2:1.17-17.31.el6_5.x86_64", "product_id": "microcode_ctl-debuginfo-2:1.17-17.31.el6_5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/microcode_ctl-debuginfo@1.17-17.31.el6_5?arch=x86_64\u0026epoch=2" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "microcode_ctl-2:1.17-17.31.el6_5.src", "product": { "name": "microcode_ctl-2:1.17-17.31.el6_5.src", "product_id": "microcode_ctl-2:1.17-17.31.el6_5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/microcode_ctl@1.17-17.31.el6_5?arch=src\u0026epoch=2" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "microcode_ctl-2:1.17-17.31.el6_5.src as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)", "product_id": "6Server-6.5.AUS:microcode_ctl-2:1.17-17.31.el6_5.src" }, "product_reference": "microcode_ctl-2:1.17-17.31.el6_5.src", "relates_to_product_reference": "6Server-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "microcode_ctl-2:1.17-17.31.el6_5.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)", "product_id": "6Server-6.5.AUS:microcode_ctl-2:1.17-17.31.el6_5.x86_64" }, "product_reference": "microcode_ctl-2:1.17-17.31.el6_5.x86_64", "relates_to_product_reference": "6Server-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "microcode_ctl-debuginfo-2:1.17-17.31.el6_5.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)", "product_id": "6Server-6.5.AUS:microcode_ctl-debuginfo-2:1.17-17.31.el6_5.x86_64" }, "product_reference": "microcode_ctl-debuginfo-2:1.17-17.31.el6_5.x86_64", "relates_to_product_reference": "6Server-6.5.AUS" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Intel" ] } ], "cve": "CVE-2020-0543", "discovery_date": "2020-04-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1827165" } ], "notes": [ { "category": "description", "text": "A new domain bypass transient execution attack known as Special Register Buffer Data Sampling (SRBDS) has been found. This flaw allows data values from special internal registers to be leaked by an attacker able to execute code on any core of the CPU. An unprivileged, local attacker can use this flaw to infer values returned by affected instructions known to be commonly used during cryptographic operations that rely on uniqueness, secrecy, or both.", "title": "Vulnerability description" }, { "category": "summary", "text": "hw: Special Register Buffer Data Sampling (SRBDS)", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/solutions/5142691", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-6.5.AUS:microcode_ctl-2:1.17-17.31.el6_5.src", "6Server-6.5.AUS:microcode_ctl-2:1.17-17.31.el6_5.x86_64", "6Server-6.5.AUS:microcode_ctl-debuginfo-2:1.17-17.31.el6_5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-0543" }, { "category": "external", "summary": "RHBZ#1827165", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1827165" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-0543", "url": "https://www.cve.org/CVERecord?id=CVE-2020-0543" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-0543", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-0543" }, { "category": "external", "summary": "https://access.redhat.com/solutions/5142691", "url": "https://access.redhat.com/solutions/5142691" }, { "category": "external", "summary": "https://access.redhat.com/solutions/5142751", "url": "https://access.redhat.com/solutions/5142751" }, { "category": "external", "summary": "https://blogs.intel.com/technology/2020/06/ipas-security-advisories-for-june-2020/#gs.6uyhri", "url": "https://blogs.intel.com/technology/2020/06/ipas-security-advisories-for-june-2020/#gs.6uyhri" }, { "category": "external", "summary": "https://software.intel.com/security-software-guidance/insights/deep-dive-special-register-buffer-data-sampling", "url": "https://software.intel.com/security-software-guidance/insights/deep-dive-special-register-buffer-data-sampling" }, { "category": "external", "summary": "https://xenbits.xen.org/xsa/advisory-320.html", "url": "https://xenbits.xen.org/xsa/advisory-320.html" } ], "release_date": "2020-06-09T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-06-23T15:36:12+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-6.5.AUS:microcode_ctl-2:1.17-17.31.el6_5.src", "6Server-6.5.AUS:microcode_ctl-2:1.17-17.31.el6_5.x86_64", "6Server-6.5.AUS:microcode_ctl-debuginfo-2:1.17-17.31.el6_5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2707" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "6Server-6.5.AUS:microcode_ctl-2:1.17-17.31.el6_5.src", "6Server-6.5.AUS:microcode_ctl-2:1.17-17.31.el6_5.x86_64", "6Server-6.5.AUS:microcode_ctl-debuginfo-2:1.17-17.31.el6_5.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "6Server-6.5.AUS:microcode_ctl-2:1.17-17.31.el6_5.src", "6Server-6.5.AUS:microcode_ctl-2:1.17-17.31.el6_5.x86_64", "6Server-6.5.AUS:microcode_ctl-debuginfo-2:1.17-17.31.el6_5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "hw: Special Register Buffer Data Sampling (SRBDS)" }, { "cve": "CVE-2020-0548", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2020-01-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1788786" } ], "notes": [ { "category": "description", "text": "A flaw was found in Intel processors where a local attacker is able to gain information about registers used for vector calculations by observing register states from other processes running on the system. This results in a race condition where store buffers, which were not cleared, could be read by another process or a CPU sibling. The highest threat from this vulnerability is data confidentiality where an attacker could read arbitrary data as it passes through the processor.", "title": "Vulnerability description" }, { "category": "summary", "text": "hw: Vector Register Data Sampling", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-6.5.AUS:microcode_ctl-2:1.17-17.31.el6_5.src", "6Server-6.5.AUS:microcode_ctl-2:1.17-17.31.el6_5.x86_64", "6Server-6.5.AUS:microcode_ctl-debuginfo-2:1.17-17.31.el6_5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-0548" }, { "category": "external", "summary": "RHBZ#1788786", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1788786" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-0548", "url": "https://www.cve.org/CVERecord?id=CVE-2020-0548" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-0548", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-0548" }, { "category": "external", "summary": "https://access.redhat.com/solutions/l1d-cache-eviction-and-vector-register-sampling", "url": "https://access.redhat.com/solutions/l1d-cache-eviction-and-vector-register-sampling" }, { "category": "external", "summary": "https://blogs.intel.com/technology/2020/01/ipas-intel-sa-00329/", "url": "https://blogs.intel.com/technology/2020/01/ipas-intel-sa-00329/" }, { "category": "external", "summary": "https://cacheoutattack.com/CacheOut.pdf", "url": "https://cacheoutattack.com/CacheOut.pdf" }, { "category": "external", "summary": "https://software.intel.com/security-software-guidance/software-guidance/l1d-eviction-sampling", "url": "https://software.intel.com/security-software-guidance/software-guidance/l1d-eviction-sampling" } ], "release_date": "2020-01-27T13:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-06-23T15:36:12+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-6.5.AUS:microcode_ctl-2:1.17-17.31.el6_5.src", "6Server-6.5.AUS:microcode_ctl-2:1.17-17.31.el6_5.x86_64", "6Server-6.5.AUS:microcode_ctl-debuginfo-2:1.17-17.31.el6_5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2707" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 2.8, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.0" }, "products": [ "6Server-6.5.AUS:microcode_ctl-2:1.17-17.31.el6_5.src", "6Server-6.5.AUS:microcode_ctl-2:1.17-17.31.el6_5.x86_64", "6Server-6.5.AUS:microcode_ctl-debuginfo-2:1.17-17.31.el6_5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "hw: Vector Register Data Sampling" }, { "cve": "CVE-2020-0549", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2020-01-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1788788" } ], "notes": [ { "category": "description", "text": "A microarchitectural timing flaw was found on some Intel processors. A corner case exists where data in-flight during the eviction process can end up in the \u201cfill buffers\u201d and not properly cleared by the MDS mitigations. The fill buffer contents (which were expected to be blank) can be inferred using MDS or TAA style attack methods to allow a local attacker to infer fill buffer values.", "title": "Vulnerability description" }, { "category": "summary", "text": "hw: L1D Cache Eviction Sampling", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-6.5.AUS:microcode_ctl-2:1.17-17.31.el6_5.src", "6Server-6.5.AUS:microcode_ctl-2:1.17-17.31.el6_5.x86_64", "6Server-6.5.AUS:microcode_ctl-debuginfo-2:1.17-17.31.el6_5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-0549" }, { "category": "external", "summary": "RHBZ#1788788", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1788788" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-0549", "url": "https://www.cve.org/CVERecord?id=CVE-2020-0549" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-0549", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-0549" }, { "category": "external", "summary": "https://access.redhat.com/solutions/l1d-cache-eviction-and-vector-register-sampling", "url": "https://access.redhat.com/solutions/l1d-cache-eviction-and-vector-register-sampling" }, { "category": "external", "summary": "https://blogs.intel.com/technology/2020/01/ipas-intel-sa-00329/", "url": "https://blogs.intel.com/technology/2020/01/ipas-intel-sa-00329/" }, { "category": "external", "summary": "https://cacheoutattack.com/CacheOut.pdf", "url": "https://cacheoutattack.com/CacheOut.pdf" }, { "category": "external", "summary": "https://software.intel.com/security-software-guidance/software-guidance/l1d-eviction-sampling", "url": "https://software.intel.com/security-software-guidance/software-guidance/l1d-eviction-sampling" } ], "release_date": "2020-01-27T13:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-06-23T15:36:12+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-6.5.AUS:microcode_ctl-2:1.17-17.31.el6_5.src", "6Server-6.5.AUS:microcode_ctl-2:1.17-17.31.el6_5.x86_64", "6Server-6.5.AUS:microcode_ctl-debuginfo-2:1.17-17.31.el6_5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2707" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "6Server-6.5.AUS:microcode_ctl-2:1.17-17.31.el6_5.src", "6Server-6.5.AUS:microcode_ctl-2:1.17-17.31.el6_5.x86_64", "6Server-6.5.AUS:microcode_ctl-debuginfo-2:1.17-17.31.el6_5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "hw: L1D Cache Eviction Sampling" } ] }
rhsa-2020:2431
Vulnerability from csaf_redhat
Published
2020-06-09 18:15
Modified
2025-02-28 01:27
Summary
Red Hat Security Advisory: microcode_ctl security, bug fix and enhancement update
Notes
Topic
Updated microcode_ctl packages that fix several security bugs and add various enhancements are now available.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Security Fix(es):
* hw: Special Register Buffer Data Sampling (SRBDS) (CVE-2020-0543)
* hw: L1D Cache Eviction Sampling (CVE-2020-0549)
* hw: Vector Register Data Sampling (CVE-2020-0548)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es) and Enhancement(s):
* Update Intel CPU microcode to microcode-20200602 release, addresses:
- Update of 06-2d-06/0x6d (SNB-E/EN/EP C1/M0) microcode from revision 0x61f
up to 0x621;
- Update of 06-2d-07/0x6d (SNB-E/EN/EP C2/M1) microcode from revision 0x718
up to 0x71a;
- Update of 06-3c-03/0x32 (HSW C0) microcode from revision 0x27 up to 0x28;
- Update of 06-3d-04/0xc0 (BDW-U/Y E0/F0) microcode from revision 0x2e
up to 0x2f;
- Update of 06-45-01/0x72 (HSW-U C0/D0) microcode from revision 0x25
up to 0x26;
- Update of 06-46-01/0x32 (HSW-H C0) microcode from revision 0x1b up to 0x1c;
- Update of 06-47-01/0x22 (BDW-H/Xeon E3 E0/G0) microcode from revision 0x21
up to 0x22;
- Update of 06-4e-03/0xc0 (SKL-U/Y D0) microcode from revision 0xd6
up to 0xdc;
- Update of 06-55-03/0x97 (SKX-SP B1) microcode from revision 0x1000151
up to 0x1000157;
- Update of 06-55-04/0xb7 (SKX-SP H0/M0/U0, SKX-D M1) microcode
(in intel-06-55-04/intel-ucode/06-55-04) from revision 0x2000065
up to 0x2006906;
- Update of 06-55-06/0xbf (CLX-SP B0) microcode from revision 0x400002c
up to 0x4002f01;
- Update of 06-55-07/0xbf (CLX-SP B1) microcode from revision 0x500002c
up to 0x5002f01;
- Update of 06-5e-03/0x36 (SKL-H/S R0/N0) microcode from revision 0xd6
up to 0xdc;
- Update of 06-7e-05/0x80 (ICL-U/Y D1) microcode from revision 0x46
up to 0x78;
- Update of 06-8e-09/0x10 (AML-Y22 H0) microcode from revision 0xca
up to 0xd6;
- Update of 06-8e-09/0xc0 (KBL-U/Y H0) microcode from revision 0xca
up to 0xd6;
- Update of 06-8e-0a/0xc0 (CFL-U43e D0) microcode from revision 0xca
up to 0xd6;
- Update of 06-8e-0b/0xd0 (WHL-U W0) microcode from revision 0xca
up to 0xd6;
- Update of 06-8e-0c/0x94 (AML-Y42 V0, CML-Y42 V0, WHL-U V0) microcode
from revision 0xca up to 0xd6;
- Update of 06-9e-09/0x2a (KBL-G/H/S/X/Xeon E3 B0) microcode from revision
0xca up to 0xd6;
- Update of 06-9e-0a/0x22 (CFL-H/S/Xeon E3 U0) microcode from revision 0xca
up to 0xd6;
- Update of 06-9e-0b/0x02 (CFL-S B0) microcode from revision 0xca up to 0xd6;
- Update of 06-9e-0c/0x22 (CFL-H/S P0) microcode from revision 0xca
up to 0xd6;
- Update of 06-9e-0d/0x22 (CFL-H R0) microcode from revision 0xca up to 0xd6.
- Change the URL to point to the GitHub repository since the microcode download section at Intel Download Center does not exist anymore.
* Narrow down SKL-SP/W/X blacklist to exclude Server/FPGA/Fabric segment
models.
* Re-generate initramfs not only for the currently running kernel,
but for several recently installed kernels as well.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated microcode_ctl packages that fix several security bugs and add various enhancements are now available.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Security Fix(es):\n\n* hw: Special Register Buffer Data Sampling (SRBDS) (CVE-2020-0543)\n\n* hw: L1D Cache Eviction Sampling (CVE-2020-0549)\n\n* hw: Vector Register Data Sampling (CVE-2020-0548)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es) and Enhancement(s):\n\n* Update Intel CPU microcode to microcode-20200602 release, addresses:\n - Update of 06-2d-06/0x6d (SNB-E/EN/EP C1/M0) microcode from revision 0x61f\n up to 0x621;\n - Update of 06-2d-07/0x6d (SNB-E/EN/EP C2/M1) microcode from revision 0x718\n up to 0x71a;\n - Update of 06-3c-03/0x32 (HSW C0) microcode from revision 0x27 up to 0x28;\n - Update of 06-3d-04/0xc0 (BDW-U/Y E0/F0) microcode from revision 0x2e\n up to 0x2f;\n - Update of 06-45-01/0x72 (HSW-U C0/D0) microcode from revision 0x25\n up to 0x26;\n - Update of 06-46-01/0x32 (HSW-H C0) microcode from revision 0x1b up to 0x1c;\n - Update of 06-47-01/0x22 (BDW-H/Xeon E3 E0/G0) microcode from revision 0x21\n up to 0x22;\n - Update of 06-4e-03/0xc0 (SKL-U/Y D0) microcode from revision 0xd6\n up to 0xdc;\n - Update of 06-55-03/0x97 (SKX-SP B1) microcode from revision 0x1000151\n up to 0x1000157;\n - Update of 06-55-04/0xb7 (SKX-SP H0/M0/U0, SKX-D M1) microcode\n (in intel-06-55-04/intel-ucode/06-55-04) from revision 0x2000065\n up to 0x2006906;\n - Update of 06-55-06/0xbf (CLX-SP B0) microcode from revision 0x400002c\n up to 0x4002f01;\n - Update of 06-55-07/0xbf (CLX-SP B1) microcode from revision 0x500002c\n up to 0x5002f01;\n - Update of 06-5e-03/0x36 (SKL-H/S R0/N0) microcode from revision 0xd6\n up to 0xdc;\n - Update of 06-7e-05/0x80 (ICL-U/Y D1) microcode from revision 0x46\n up to 0x78;\n - Update of 06-8e-09/0x10 (AML-Y22 H0) microcode from revision 0xca\n up to 0xd6;\n - Update of 06-8e-09/0xc0 (KBL-U/Y H0) microcode from revision 0xca\n up to 0xd6;\n - Update of 06-8e-0a/0xc0 (CFL-U43e D0) microcode from revision 0xca\n up to 0xd6;\n - Update of 06-8e-0b/0xd0 (WHL-U W0) microcode from revision 0xca\n up to 0xd6;\n - Update of 06-8e-0c/0x94 (AML-Y42 V0, CML-Y42 V0, WHL-U V0) microcode\n from revision 0xca up to 0xd6;\n - Update of 06-9e-09/0x2a (KBL-G/H/S/X/Xeon E3 B0) microcode from revision\n 0xca up to 0xd6;\n - Update of 06-9e-0a/0x22 (CFL-H/S/Xeon E3 U0) microcode from revision 0xca\n up to 0xd6;\n - Update of 06-9e-0b/0x02 (CFL-S B0) microcode from revision 0xca up to 0xd6;\n - Update of 06-9e-0c/0x22 (CFL-H/S P0) microcode from revision 0xca\n up to 0xd6;\n - Update of 06-9e-0d/0x22 (CFL-H R0) microcode from revision 0xca up to 0xd6.\n - Change the URL to point to the GitHub repository since the microcode download section at Intel Download Center does not exist anymore.\n\n* Narrow down SKL-SP/W/X blacklist to exclude Server/FPGA/Fabric segment\n models.\n\n* Re-generate initramfs not only for the currently running kernel,\n but for several recently installed kernels as well.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2020:2431", "url": "https://access.redhat.com/errata/RHSA-2020:2431" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "https://access.redhat.com/solutions/5142751", "url": "https://access.redhat.com/solutions/5142751" }, { "category": "external", "summary": "https://access.redhat.com/solutions/5142691", "url": "https://access.redhat.com/solutions/5142691" }, { "category": "external", "summary": "1788786", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1788786" }, { "category": "external", "summary": "1788788", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1788788" }, { "category": "external", "summary": "1827165", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1827165" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_2431.json" } ], "title": "Red Hat Security Advisory: microcode_ctl security, bug fix and enhancement update", "tracking": { "current_release_date": "2025-02-28T01:27:54+00:00", "generator": { "date": "2025-02-28T01:27:54+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.3.1" } }, "id": "RHSA-2020:2431", "initial_release_date": "2020-06-09T18:15:00+00:00", "revision_history": [ { "date": "2020-06-09T18:15:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2020-06-09T18:15:00+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-02-28T01:27:54+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux BaseOS (v. 8)", "product": { "name": "Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:8::baseos" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "microcode_ctl-4:20191115-4.20200602.2.el8_2.x86_64", "product": { "name": "microcode_ctl-4:20191115-4.20200602.2.el8_2.x86_64", "product_id": "microcode_ctl-4:20191115-4.20200602.2.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/microcode_ctl@20191115-4.20200602.2.el8_2?arch=x86_64\u0026epoch=4" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "microcode_ctl-4:20191115-4.20200602.2.el8_2.src", "product": { "name": "microcode_ctl-4:20191115-4.20200602.2.el8_2.src", "product_id": "microcode_ctl-4:20191115-4.20200602.2.el8_2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/microcode_ctl@20191115-4.20200602.2.el8_2?arch=src\u0026epoch=4" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "microcode_ctl-4:20191115-4.20200602.2.el8_2.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:microcode_ctl-4:20191115-4.20200602.2.el8_2.src" }, "product_reference": "microcode_ctl-4:20191115-4.20200602.2.el8_2.src", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "microcode_ctl-4:20191115-4.20200602.2.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:microcode_ctl-4:20191115-4.20200602.2.el8_2.x86_64" }, "product_reference": "microcode_ctl-4:20191115-4.20200602.2.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Intel" ] } ], "cve": "CVE-2020-0543", "discovery_date": "2020-04-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1827165" } ], "notes": [ { "category": "description", "text": "A new domain bypass transient execution attack known as Special Register Buffer Data Sampling (SRBDS) has been found. This flaw allows data values from special internal registers to be leaked by an attacker able to execute code on any core of the CPU. An unprivileged, local attacker can use this flaw to infer values returned by affected instructions known to be commonly used during cryptographic operations that rely on uniqueness, secrecy, or both.", "title": "Vulnerability description" }, { "category": "summary", "text": "hw: Special Register Buffer Data Sampling (SRBDS)", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/solutions/5142691", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.2.0.Z.MAIN.EUS:microcode_ctl-4:20191115-4.20200602.2.el8_2.src", "BaseOS-8.2.0.Z.MAIN.EUS:microcode_ctl-4:20191115-4.20200602.2.el8_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-0543" }, { "category": "external", "summary": "RHBZ#1827165", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1827165" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-0543", "url": "https://www.cve.org/CVERecord?id=CVE-2020-0543" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-0543", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-0543" }, { "category": "external", "summary": "https://access.redhat.com/solutions/5142691", "url": "https://access.redhat.com/solutions/5142691" }, { "category": "external", "summary": "https://access.redhat.com/solutions/5142751", "url": "https://access.redhat.com/solutions/5142751" }, { "category": "external", "summary": "https://blogs.intel.com/technology/2020/06/ipas-security-advisories-for-june-2020/#gs.6uyhri", "url": "https://blogs.intel.com/technology/2020/06/ipas-security-advisories-for-june-2020/#gs.6uyhri" }, { "category": "external", "summary": "https://software.intel.com/security-software-guidance/insights/deep-dive-special-register-buffer-data-sampling", "url": "https://software.intel.com/security-software-guidance/insights/deep-dive-special-register-buffer-data-sampling" }, { "category": "external", "summary": "https://xenbits.xen.org/xsa/advisory-320.html", "url": "https://xenbits.xen.org/xsa/advisory-320.html" } ], "release_date": "2020-06-09T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-06-09T18:15:00+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "BaseOS-8.2.0.Z.MAIN.EUS:microcode_ctl-4:20191115-4.20200602.2.el8_2.src", "BaseOS-8.2.0.Z.MAIN.EUS:microcode_ctl-4:20191115-4.20200602.2.el8_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2431" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "BaseOS-8.2.0.Z.MAIN.EUS:microcode_ctl-4:20191115-4.20200602.2.el8_2.src", "BaseOS-8.2.0.Z.MAIN.EUS:microcode_ctl-4:20191115-4.20200602.2.el8_2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "BaseOS-8.2.0.Z.MAIN.EUS:microcode_ctl-4:20191115-4.20200602.2.el8_2.src", "BaseOS-8.2.0.Z.MAIN.EUS:microcode_ctl-4:20191115-4.20200602.2.el8_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "hw: Special Register Buffer Data Sampling (SRBDS)" }, { "cve": "CVE-2020-0548", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2020-01-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1788786" } ], "notes": [ { "category": "description", "text": "A flaw was found in Intel processors where a local attacker is able to gain information about registers used for vector calculations by observing register states from other processes running on the system. This results in a race condition where store buffers, which were not cleared, could be read by another process or a CPU sibling. The highest threat from this vulnerability is data confidentiality where an attacker could read arbitrary data as it passes through the processor.", "title": "Vulnerability description" }, { "category": "summary", "text": "hw: Vector Register Data Sampling", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.2.0.Z.MAIN.EUS:microcode_ctl-4:20191115-4.20200602.2.el8_2.src", "BaseOS-8.2.0.Z.MAIN.EUS:microcode_ctl-4:20191115-4.20200602.2.el8_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-0548" }, { "category": "external", "summary": "RHBZ#1788786", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1788786" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-0548", "url": "https://www.cve.org/CVERecord?id=CVE-2020-0548" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-0548", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-0548" }, { "category": "external", "summary": "https://access.redhat.com/solutions/l1d-cache-eviction-and-vector-register-sampling", "url": "https://access.redhat.com/solutions/l1d-cache-eviction-and-vector-register-sampling" }, { "category": "external", "summary": "https://blogs.intel.com/technology/2020/01/ipas-intel-sa-00329/", "url": "https://blogs.intel.com/technology/2020/01/ipas-intel-sa-00329/" }, { "category": "external", "summary": "https://cacheoutattack.com/CacheOut.pdf", "url": "https://cacheoutattack.com/CacheOut.pdf" }, { "category": "external", "summary": "https://software.intel.com/security-software-guidance/software-guidance/l1d-eviction-sampling", "url": "https://software.intel.com/security-software-guidance/software-guidance/l1d-eviction-sampling" } ], "release_date": "2020-01-27T13:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-06-09T18:15:00+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "BaseOS-8.2.0.Z.MAIN.EUS:microcode_ctl-4:20191115-4.20200602.2.el8_2.src", "BaseOS-8.2.0.Z.MAIN.EUS:microcode_ctl-4:20191115-4.20200602.2.el8_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2431" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 2.8, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.0" }, "products": [ "BaseOS-8.2.0.Z.MAIN.EUS:microcode_ctl-4:20191115-4.20200602.2.el8_2.src", "BaseOS-8.2.0.Z.MAIN.EUS:microcode_ctl-4:20191115-4.20200602.2.el8_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "hw: Vector Register Data Sampling" }, { "cve": "CVE-2020-0549", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2020-01-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1788788" } ], "notes": [ { "category": "description", "text": "A microarchitectural timing flaw was found on some Intel processors. A corner case exists where data in-flight during the eviction process can end up in the \u201cfill buffers\u201d and not properly cleared by the MDS mitigations. The fill buffer contents (which were expected to be blank) can be inferred using MDS or TAA style attack methods to allow a local attacker to infer fill buffer values.", "title": "Vulnerability description" }, { "category": "summary", "text": "hw: L1D Cache Eviction Sampling", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.2.0.Z.MAIN.EUS:microcode_ctl-4:20191115-4.20200602.2.el8_2.src", "BaseOS-8.2.0.Z.MAIN.EUS:microcode_ctl-4:20191115-4.20200602.2.el8_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-0549" }, { "category": "external", "summary": "RHBZ#1788788", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1788788" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-0549", "url": "https://www.cve.org/CVERecord?id=CVE-2020-0549" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-0549", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-0549" }, { "category": "external", "summary": "https://access.redhat.com/solutions/l1d-cache-eviction-and-vector-register-sampling", "url": "https://access.redhat.com/solutions/l1d-cache-eviction-and-vector-register-sampling" }, { "category": "external", "summary": "https://blogs.intel.com/technology/2020/01/ipas-intel-sa-00329/", "url": "https://blogs.intel.com/technology/2020/01/ipas-intel-sa-00329/" }, { "category": "external", "summary": "https://cacheoutattack.com/CacheOut.pdf", "url": "https://cacheoutattack.com/CacheOut.pdf" }, { "category": "external", "summary": "https://software.intel.com/security-software-guidance/software-guidance/l1d-eviction-sampling", "url": "https://software.intel.com/security-software-guidance/software-guidance/l1d-eviction-sampling" } ], "release_date": "2020-01-27T13:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-06-09T18:15:00+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "BaseOS-8.2.0.Z.MAIN.EUS:microcode_ctl-4:20191115-4.20200602.2.el8_2.src", "BaseOS-8.2.0.Z.MAIN.EUS:microcode_ctl-4:20191115-4.20200602.2.el8_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2431" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "BaseOS-8.2.0.Z.MAIN.EUS:microcode_ctl-4:20191115-4.20200602.2.el8_2.src", "BaseOS-8.2.0.Z.MAIN.EUS:microcode_ctl-4:20191115-4.20200602.2.el8_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "hw: L1D Cache Eviction Sampling" } ] }
rhsa-2020:2757
Vulnerability from csaf_redhat
Published
2020-06-29 07:48
Modified
2025-02-28 01:27
Summary
Red Hat Security Advisory: microcode_ctl security, bug fix and enhancement update
Notes
Topic
An update for microcode_ctl is now available for Red Hat Enterprise Linux 8.0 Update Services for SAP Solutions.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Security Fix(es):
* hw: Special Register Buffer Data Sampling (SRBDS) (CVE-2020-0543)
* hw: L1D Cache Eviction Sampling (CVE-2020-0549)
* hw: Vector Register Data Sampling (CVE-2020-0548)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE page(s)
listed in the References section.
Bug Fixes:
* Update Intel CPU microcode to microcode-20200609 release:
- Addition of 06-4d-08/0x01 (AVN B0/C0) microcode at revision 0x12d;
- Addition of 06-55-06/0xbf (CLX-SP B0) microcode at revision 0x4002f01;
- Addition of 06-7a-08/0x01 (GLK R0) microcode at revision 0x16;
- Update of 06-2d-06/0x6d (SNB-E/EN/EP C1/M0) microcode from revision 0x61f
up to 0x621;
- Update of 06-2d-07/0x6d (SNB-E/EN/EP C2/M1) microcode
(in intel-06-2d-07/intel-ucode/06-2d-07) from revision 0x718 up to 0x71a;
- Update of 06-3c-03/0x32 (HSW C0) microcode from revision 0x27 up to 0x28;
- Update of 06-3d-04/0xc0 (BDW-U/Y E0/F0) microcode from revision 0x2e
up to 0x2f;
- Update of 06-45-01/0x72 (HSW-U C0/D0) microcode from revision 0x25
up to 0x26;
- Update of 06-46-01/0x32 (HSW-H C0) microcode from revision 0x1b up to 0x1c;
- Update of 06-47-01/0x22 (BDW-H/Xeon E3 E0/G0) microcode from revision 0x21
up to 0x22;
- Update of 06-4e-03/0xc0 (SKL-U/Y D0) microcode from revision 0xd4
up to 0xdc;
- Update of 06-55-03/0x97 (SKX-SP B1) microcode from revision 0x1000150
up to 0x1000157;
- Update of 06-55-04/0xb7 (SKX-SP H0/M0/U0, SKX-D M1) microcode
(in intel-06-55-04/intel-ucode/06-55-04) from revision 0x2000064
up to 0x2006906;
- Update of 06-55-07/0xbf (CLX-SP B1) microcode from revision 0x500002b
up to 0x5002f01;
- Update of 06-5e-03/0x36 (SKL-H/S R0/N0) microcode from revision 0xd4
up to 0xdc;
- Update of 06-7a-01/0x01 (GLK B0) microcode from revision 0x2e up to 0x32;
- Update of 06-7e-05/0x80 (ICL-U/Y D1) microcode from revision 0x46
up to 0x78;
- Update of 06-8e-09/0x10 (AML-Y22 H0) microcode from revision 0xc6
up to 0xd6;
- Update of 06-8e-09/0xc0 (KBL-U/Y H0) microcode from revision 0xc6
up to 0xd6;
- Update of 06-8e-0a/0xc0 (CFL-U43e D0) microcode from revision 0xc6
up to 0xd6;
- Update of 06-8e-0b/0xd0 (WHL-U W0) microcode from revision 0xc6
up to 0xd6;
- Update of 06-8e-0c/0x94 (AML-Y42 V0, CML-Y42 V0, WHL-U V0) microcode
from revision 0xc6 up to 0xd6;
- Update of 06-9e-09/0x2a (KBL-G/H/S/X/Xeon E3 B0) microcode from revision
0xc6 up to 0xd6;
- Update of 06-9e-0a/0x22 (CFL-H/S/Xeon E3 U0) microcode from revision 0xc6
up to 0xd6;
- Update of 06-9e-0b/0x02 (CFL-S B0) microcode from revision 0xc6 up to 0xd6;
- Update of 06-9e-0c/0x22 (CFL-H/S P0) microcode from revision 0xae
up to 0xd6;
- Update of 06-9e-0d/0x22 (CFL-H R0) microcode from revision 0xc6 up to 0xd6.
- Update of 06-a6-00/0x80 (CML-U 6+2 A0) from revision 0xc6 up to 0xca.
* Do not update 06-4e-03 (SKL-U/Y) and 06-5e-03 (SKL-H/S/Xeon E3 v5) to revision
0xdc, use 0xd6 by default.
* Enable 06-2d-07 (SNB-E/EN/EP) caveat by default.
* Add 06-55-04 (SKL-X/W) caveat, enable it by default.
* Update stale posttrans dependency, add triggers for proper handling
of the debug kernel flavour along with kernel-rt.
* Avoid find being SIGPIPE'd on early "grep -q" exit in the dracut script.
* Re-generate initramfs not only for the currently running kernel,
but for several recently installed kernels as well.
* Change the URL to point to the GitHub repository since the microcode download
section at Intel Download Center does not exist anymore.
* Avoid temporary file creation, used for here-documents in check_caveats.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for microcode_ctl is now available for Red Hat Enterprise Linux 8.0 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Security Fix(es):\n\n* hw: Special Register Buffer Data Sampling (SRBDS) (CVE-2020-0543)\n\n* hw: L1D Cache Eviction Sampling (CVE-2020-0549)\n\n* hw: Vector Register Data Sampling (CVE-2020-0548)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE page(s)\nlisted in the References section.\n\nBug Fixes:\n\n* Update Intel CPU microcode to microcode-20200609 release:\n - Addition of 06-4d-08/0x01 (AVN B0/C0) microcode at revision 0x12d;\n - Addition of 06-55-06/0xbf (CLX-SP B0) microcode at revision 0x4002f01;\n - Addition of 06-7a-08/0x01 (GLK R0) microcode at revision 0x16;\n - Update of 06-2d-06/0x6d (SNB-E/EN/EP C1/M0) microcode from revision 0x61f\n up to 0x621;\n - Update of 06-2d-07/0x6d (SNB-E/EN/EP C2/M1) microcode\n (in intel-06-2d-07/intel-ucode/06-2d-07) from revision 0x718 up to 0x71a;\n - Update of 06-3c-03/0x32 (HSW C0) microcode from revision 0x27 up to 0x28;\n - Update of 06-3d-04/0xc0 (BDW-U/Y E0/F0) microcode from revision 0x2e\n up to 0x2f;\n - Update of 06-45-01/0x72 (HSW-U C0/D0) microcode from revision 0x25\n up to 0x26;\n - Update of 06-46-01/0x32 (HSW-H C0) microcode from revision 0x1b up to 0x1c;\n - Update of 06-47-01/0x22 (BDW-H/Xeon E3 E0/G0) microcode from revision 0x21\n up to 0x22;\n - Update of 06-4e-03/0xc0 (SKL-U/Y D0) microcode from revision 0xd4\n up to 0xdc;\n - Update of 06-55-03/0x97 (SKX-SP B1) microcode from revision 0x1000150\n up to 0x1000157;\n - Update of 06-55-04/0xb7 (SKX-SP H0/M0/U0, SKX-D M1) microcode\n (in intel-06-55-04/intel-ucode/06-55-04) from revision 0x2000064\n up to 0x2006906;\n - Update of 06-55-07/0xbf (CLX-SP B1) microcode from revision 0x500002b\n up to 0x5002f01;\n - Update of 06-5e-03/0x36 (SKL-H/S R0/N0) microcode from revision 0xd4\n up to 0xdc;\n - Update of 06-7a-01/0x01 (GLK B0) microcode from revision 0x2e up to 0x32;\n - Update of 06-7e-05/0x80 (ICL-U/Y D1) microcode from revision 0x46\n up to 0x78;\n - Update of 06-8e-09/0x10 (AML-Y22 H0) microcode from revision 0xc6\n up to 0xd6;\n - Update of 06-8e-09/0xc0 (KBL-U/Y H0) microcode from revision 0xc6\n up to 0xd6;\n - Update of 06-8e-0a/0xc0 (CFL-U43e D0) microcode from revision 0xc6\n up to 0xd6;\n - Update of 06-8e-0b/0xd0 (WHL-U W0) microcode from revision 0xc6\n up to 0xd6;\n - Update of 06-8e-0c/0x94 (AML-Y42 V0, CML-Y42 V0, WHL-U V0) microcode\n from revision 0xc6 up to 0xd6;\n - Update of 06-9e-09/0x2a (KBL-G/H/S/X/Xeon E3 B0) microcode from revision\n 0xc6 up to 0xd6;\n - Update of 06-9e-0a/0x22 (CFL-H/S/Xeon E3 U0) microcode from revision 0xc6\n up to 0xd6;\n - Update of 06-9e-0b/0x02 (CFL-S B0) microcode from revision 0xc6 up to 0xd6;\n - Update of 06-9e-0c/0x22 (CFL-H/S P0) microcode from revision 0xae\n up to 0xd6;\n - Update of 06-9e-0d/0x22 (CFL-H R0) microcode from revision 0xc6 up to 0xd6.\n - Update of 06-a6-00/0x80 (CML-U 6+2 A0) from revision 0xc6 up to 0xca.\n* Do not update 06-4e-03 (SKL-U/Y) and 06-5e-03 (SKL-H/S/Xeon E3 v5) to revision\n 0xdc, use 0xd6 by default.\n* Enable 06-2d-07 (SNB-E/EN/EP) caveat by default.\n* Add 06-55-04 (SKL-X/W) caveat, enable it by default.\n* Update stale posttrans dependency, add triggers for proper handling\n of the debug kernel flavour along with kernel-rt.\n* Avoid find being SIGPIPE\u0027d on early \"grep -q\" exit in the dracut script.\n* Re-generate initramfs not only for the currently running kernel,\n but for several recently installed kernels as well.\n* Change the URL to point to the GitHub repository since the microcode download\n section at Intel Download Center does not exist anymore.\n* Avoid temporary file creation, used for here-documents in check_caveats.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2020:2757", "url": "https://access.redhat.com/errata/RHSA-2020:2757" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "https://access.redhat.com/solutions/5142691", "url": "https://access.redhat.com/solutions/5142691" }, { "category": "external", "summary": "https://access.redhat.com/solutions/l1d-cache-eviction-and-vector-register-sampling", "url": "https://access.redhat.com/solutions/l1d-cache-eviction-and-vector-register-sampling" }, { "category": "external", "summary": "1788786", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1788786" }, { "category": "external", "summary": "1788788", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1788788" }, { "category": "external", "summary": "1827165", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1827165" }, { "category": "external", "summary": "1848438", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1848438" }, { "category": "external", "summary": "1848501", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1848501" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_2757.json" } ], "title": "Red Hat Security Advisory: microcode_ctl security, bug fix and enhancement update", "tracking": { "current_release_date": "2025-02-28T01:27:15+00:00", "generator": { "date": "2025-02-28T01:27:15+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.3.1" } }, "id": "RHSA-2020:2757", "initial_release_date": "2020-06-29T07:48:21+00:00", "revision_history": [ { "date": "2020-06-29T07:48:21+00:00", "number": "1", "summary": "Initial version" }, { "date": "2020-06-29T07:48:21+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-02-28T01:27:15+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux BaseOS E4S (v. 8.0)", "product": { "name": "Red Hat Enterprise Linux BaseOS E4S (v. 8.0)", "product_id": "BaseOS-8.0.0.Z.E4S", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_e4s:8.0::baseos" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "microcode_ctl-4:20180807a-2.20200609.1.el8_0.x86_64", "product": { "name": "microcode_ctl-4:20180807a-2.20200609.1.el8_0.x86_64", "product_id": "microcode_ctl-4:20180807a-2.20200609.1.el8_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/microcode_ctl@20180807a-2.20200609.1.el8_0?arch=x86_64\u0026epoch=4" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "microcode_ctl-4:20180807a-2.20200609.1.el8_0.src", "product": { "name": "microcode_ctl-4:20180807a-2.20200609.1.el8_0.src", "product_id": "microcode_ctl-4:20180807a-2.20200609.1.el8_0.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/microcode_ctl@20180807a-2.20200609.1.el8_0?arch=src\u0026epoch=4" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "microcode_ctl-4:20180807a-2.20200609.1.el8_0.src as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)", "product_id": "BaseOS-8.0.0.Z.E4S:microcode_ctl-4:20180807a-2.20200609.1.el8_0.src" }, "product_reference": "microcode_ctl-4:20180807a-2.20200609.1.el8_0.src", "relates_to_product_reference": "BaseOS-8.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "microcode_ctl-4:20180807a-2.20200609.1.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)", "product_id": "BaseOS-8.0.0.Z.E4S:microcode_ctl-4:20180807a-2.20200609.1.el8_0.x86_64" }, "product_reference": "microcode_ctl-4:20180807a-2.20200609.1.el8_0.x86_64", "relates_to_product_reference": "BaseOS-8.0.0.Z.E4S" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Intel" ] } ], "cve": "CVE-2020-0543", "discovery_date": "2020-04-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1827165" } ], "notes": [ { "category": "description", "text": "A new domain bypass transient execution attack known as Special Register Buffer Data Sampling (SRBDS) has been found. This flaw allows data values from special internal registers to be leaked by an attacker able to execute code on any core of the CPU. An unprivileged, local attacker can use this flaw to infer values returned by affected instructions known to be commonly used during cryptographic operations that rely on uniqueness, secrecy, or both.", "title": "Vulnerability description" }, { "category": "summary", "text": "hw: Special Register Buffer Data Sampling (SRBDS)", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/solutions/5142691", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.0.0.Z.E4S:microcode_ctl-4:20180807a-2.20200609.1.el8_0.src", "BaseOS-8.0.0.Z.E4S:microcode_ctl-4:20180807a-2.20200609.1.el8_0.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-0543" }, { "category": "external", "summary": "RHBZ#1827165", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1827165" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-0543", "url": "https://www.cve.org/CVERecord?id=CVE-2020-0543" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-0543", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-0543" }, { "category": "external", "summary": "https://access.redhat.com/solutions/5142691", "url": "https://access.redhat.com/solutions/5142691" }, { "category": "external", "summary": "https://access.redhat.com/solutions/5142751", "url": "https://access.redhat.com/solutions/5142751" }, { "category": "external", "summary": "https://blogs.intel.com/technology/2020/06/ipas-security-advisories-for-june-2020/#gs.6uyhri", "url": "https://blogs.intel.com/technology/2020/06/ipas-security-advisories-for-june-2020/#gs.6uyhri" }, { "category": "external", "summary": "https://software.intel.com/security-software-guidance/insights/deep-dive-special-register-buffer-data-sampling", "url": "https://software.intel.com/security-software-guidance/insights/deep-dive-special-register-buffer-data-sampling" }, { "category": "external", "summary": "https://xenbits.xen.org/xsa/advisory-320.html", "url": "https://xenbits.xen.org/xsa/advisory-320.html" } ], "release_date": "2020-06-09T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-06-29T07:48:21+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "BaseOS-8.0.0.Z.E4S:microcode_ctl-4:20180807a-2.20200609.1.el8_0.src", "BaseOS-8.0.0.Z.E4S:microcode_ctl-4:20180807a-2.20200609.1.el8_0.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2757" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "BaseOS-8.0.0.Z.E4S:microcode_ctl-4:20180807a-2.20200609.1.el8_0.src", "BaseOS-8.0.0.Z.E4S:microcode_ctl-4:20180807a-2.20200609.1.el8_0.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "BaseOS-8.0.0.Z.E4S:microcode_ctl-4:20180807a-2.20200609.1.el8_0.src", "BaseOS-8.0.0.Z.E4S:microcode_ctl-4:20180807a-2.20200609.1.el8_0.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "hw: Special Register Buffer Data Sampling (SRBDS)" }, { "cve": "CVE-2020-0548", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2020-01-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1788786" } ], "notes": [ { "category": "description", "text": "A flaw was found in Intel processors where a local attacker is able to gain information about registers used for vector calculations by observing register states from other processes running on the system. This results in a race condition where store buffers, which were not cleared, could be read by another process or a CPU sibling. The highest threat from this vulnerability is data confidentiality where an attacker could read arbitrary data as it passes through the processor.", "title": "Vulnerability description" }, { "category": "summary", "text": "hw: Vector Register Data Sampling", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.0.0.Z.E4S:microcode_ctl-4:20180807a-2.20200609.1.el8_0.src", "BaseOS-8.0.0.Z.E4S:microcode_ctl-4:20180807a-2.20200609.1.el8_0.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-0548" }, { "category": "external", "summary": "RHBZ#1788786", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1788786" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-0548", "url": "https://www.cve.org/CVERecord?id=CVE-2020-0548" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-0548", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-0548" }, { "category": "external", "summary": "https://access.redhat.com/solutions/l1d-cache-eviction-and-vector-register-sampling", "url": "https://access.redhat.com/solutions/l1d-cache-eviction-and-vector-register-sampling" }, { "category": "external", "summary": "https://blogs.intel.com/technology/2020/01/ipas-intel-sa-00329/", "url": "https://blogs.intel.com/technology/2020/01/ipas-intel-sa-00329/" }, { "category": "external", "summary": "https://cacheoutattack.com/CacheOut.pdf", "url": "https://cacheoutattack.com/CacheOut.pdf" }, { "category": "external", "summary": "https://software.intel.com/security-software-guidance/software-guidance/l1d-eviction-sampling", "url": "https://software.intel.com/security-software-guidance/software-guidance/l1d-eviction-sampling" } ], "release_date": "2020-01-27T13:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-06-29T07:48:21+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "BaseOS-8.0.0.Z.E4S:microcode_ctl-4:20180807a-2.20200609.1.el8_0.src", "BaseOS-8.0.0.Z.E4S:microcode_ctl-4:20180807a-2.20200609.1.el8_0.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2757" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 2.8, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.0" }, "products": [ "BaseOS-8.0.0.Z.E4S:microcode_ctl-4:20180807a-2.20200609.1.el8_0.src", "BaseOS-8.0.0.Z.E4S:microcode_ctl-4:20180807a-2.20200609.1.el8_0.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "hw: Vector Register Data Sampling" }, { "cve": "CVE-2020-0549", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2020-01-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1788788" } ], "notes": [ { "category": "description", "text": "A microarchitectural timing flaw was found on some Intel processors. A corner case exists where data in-flight during the eviction process can end up in the \u201cfill buffers\u201d and not properly cleared by the MDS mitigations. The fill buffer contents (which were expected to be blank) can be inferred using MDS or TAA style attack methods to allow a local attacker to infer fill buffer values.", "title": "Vulnerability description" }, { "category": "summary", "text": "hw: L1D Cache Eviction Sampling", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.0.0.Z.E4S:microcode_ctl-4:20180807a-2.20200609.1.el8_0.src", "BaseOS-8.0.0.Z.E4S:microcode_ctl-4:20180807a-2.20200609.1.el8_0.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-0549" }, { "category": "external", "summary": "RHBZ#1788788", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1788788" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-0549", "url": "https://www.cve.org/CVERecord?id=CVE-2020-0549" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-0549", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-0549" }, { "category": "external", "summary": "https://access.redhat.com/solutions/l1d-cache-eviction-and-vector-register-sampling", "url": "https://access.redhat.com/solutions/l1d-cache-eviction-and-vector-register-sampling" }, { "category": "external", "summary": "https://blogs.intel.com/technology/2020/01/ipas-intel-sa-00329/", "url": "https://blogs.intel.com/technology/2020/01/ipas-intel-sa-00329/" }, { "category": "external", "summary": "https://cacheoutattack.com/CacheOut.pdf", "url": "https://cacheoutattack.com/CacheOut.pdf" }, { "category": "external", "summary": "https://software.intel.com/security-software-guidance/software-guidance/l1d-eviction-sampling", "url": "https://software.intel.com/security-software-guidance/software-guidance/l1d-eviction-sampling" } ], "release_date": "2020-01-27T13:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-06-29T07:48:21+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "BaseOS-8.0.0.Z.E4S:microcode_ctl-4:20180807a-2.20200609.1.el8_0.src", "BaseOS-8.0.0.Z.E4S:microcode_ctl-4:20180807a-2.20200609.1.el8_0.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2757" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "BaseOS-8.0.0.Z.E4S:microcode_ctl-4:20180807a-2.20200609.1.el8_0.src", "BaseOS-8.0.0.Z.E4S:microcode_ctl-4:20180807a-2.20200609.1.el8_0.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "hw: L1D Cache Eviction Sampling" } ] }
rhsa-2020:2771
Vulnerability from csaf_redhat
Published
2020-06-30 12:12
Modified
2025-02-28 01:27
Summary
Red Hat Security Advisory: microcode_ctl security, bug fix and enhancement update
Notes
Topic
An update for microcode_ctl is now available for Red Hat Enterprise Linux 7.4 Advances Update Support.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Security Fix(es):
* hw: Special Register Buffer Data Sampling (SRBDS) (CVE-2020-0543)
* hw: L1D Cache Eviction Sampling (CVE-2020-0549)
* hw: Vector Register Data Sampling (CVE-2020-0548)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE page(s)
listed in the References section.
Bug Fix(es):
* Update Intel CPU microcode to microcode-20200609 release:
- Update of 06-2d-06/0x6d (SNB-E/EN/EP C1/M0) microcode from revision 0x61f
up to 0x621;
- Update of 06-2d-07/0x6d (SNB-E/EN/EP C2/M1) microcode from revision 0x718
up to 0x71a;
- Update of 06-3c-03/0x32 (HSW C0) microcode from revision 0x27 up to 0x28;
- Update of 06-3d-04/0xc0 (BDW-U/Y E0/F0) microcode from revision 0x2e
up to 0x2f;
- Update of 06-45-01/0x72 (HSW-U C0/D0) microcode from revision 0x25
up to 0x26;
- Update of 06-46-01/0x32 (HSW-H C0) microcode from revision 0x1b up to 0x1c;
- Update of 06-47-01/0x22 (BDW-H/Xeon E3 E0/G0) microcode from revision 0x21
up to 0x22;
- Update of 06-4e-03/0xc0 (SKL-U/Y D0) microcode from revision 0xd6
up to 0xdc;
- Update of 06-55-03/0x97 (SKX-SP B1) microcode from revision 0x1000151
up to 0x1000157;
- Update of 06-55-04/0xb7 (SKX-SP H0/M0/U0, SKX-D M1) microcode
(in intel-06-55-04/intel-ucode/06-55-04) from revision 0x2000065
up to 0x2006906;
- Update of 06-55-06/0xbf (CLX-SP B0) microcode from revision 0x400002c
up to 0x4002f01;
- Update of 06-55-07/0xbf (CLX-SP B1) microcode from revision 0x500002c
up to 0x5002f01;
- Update of 06-5e-03/0x36 (SKL-H/S R0/N0) microcode from revision 0xd6
up to 0xdc;
- Update of 06-7e-05/0x80 (ICL-U/Y D1) microcode from revision 0x46
up to 0x78;
- Update of 06-8e-09/0x10 (AML-Y22 H0) microcode from revision 0xca
up to 0xd6;
- Update of 06-8e-09/0xc0 (KBL-U/Y H0) microcode from revision 0xca
up to 0xd6;
- Update of 06-8e-0a/0xc0 (CFL-U43e D0) microcode from revision 0xca
up to 0xd6;
- Update of 06-8e-0b/0xd0 (WHL-U W0) microcode from revision 0xca
up to 0xd6;
- Update of 06-8e-0c/0x94 (AML-Y42 V0, CML-Y42 V0, WHL-U V0) microcode
from revision 0xca up to 0xd6;
- Update of 06-9e-09/0x2a (KBL-G/H/S/X/Xeon E3 B0) microcode from revision
0xca up to 0xd6;
- Update of 06-9e-0a/0x22 (CFL-H/S/Xeon E3 U0) microcode from revision 0xca
up to 0xd6;
- Update of 06-9e-0b/0x02 (CFL-S B0) microcode from revision 0xca up to 0xd6;
- Update of 06-9e-0c/0x22 (CFL-H/S P0) microcode from revision 0xca
up to 0xd6;
- Update of 06-9e-0d/0x22 (CFL-H R0) microcode from revision 0xca up to 0xd6.
* Do not update 06-4e-03 (SKL-U/Y) and 06-5e-03 (SKL-H/S/Xeon E3 v5) to revision
0xdc, use 0xd6 by default.
* Enable 06-2d-07 (SNB-E/EN/EP) caveat by default.
* Enable 06-55-04 (SKL-SP/X/W) caveat by default.
* Avoid find being SIGPIPE'd on early "grep -q" exit in the dracut script.
* Re-generate initramfs not only for the currently running kernel,
but for several recently installed kernels as well.
* Change the URL in the intel-microcode2ucode.8 to point to the GitHub
repository since the microcode download section at Intel Download Center
does not exist anymore.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for microcode_ctl is now available for Red Hat Enterprise Linux 7.4 Advances Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Security Fix(es):\n\n* hw: Special Register Buffer Data Sampling (SRBDS) (CVE-2020-0543)\n\n* hw: L1D Cache Eviction Sampling (CVE-2020-0549)\n\n* hw: Vector Register Data Sampling (CVE-2020-0548)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE page(s)\nlisted in the References section.\n\nBug Fix(es):\n\n* Update Intel CPU microcode to microcode-20200609 release:\n - Update of 06-2d-06/0x6d (SNB-E/EN/EP C1/M0) microcode from revision 0x61f\n up to 0x621;\n - Update of 06-2d-07/0x6d (SNB-E/EN/EP C2/M1) microcode from revision 0x718\n up to 0x71a;\n - Update of 06-3c-03/0x32 (HSW C0) microcode from revision 0x27 up to 0x28;\n - Update of 06-3d-04/0xc0 (BDW-U/Y E0/F0) microcode from revision 0x2e\n up to 0x2f;\n - Update of 06-45-01/0x72 (HSW-U C0/D0) microcode from revision 0x25\n up to 0x26;\n - Update of 06-46-01/0x32 (HSW-H C0) microcode from revision 0x1b up to 0x1c;\n - Update of 06-47-01/0x22 (BDW-H/Xeon E3 E0/G0) microcode from revision 0x21\n up to 0x22;\n - Update of 06-4e-03/0xc0 (SKL-U/Y D0) microcode from revision 0xd6\n up to 0xdc;\n - Update of 06-55-03/0x97 (SKX-SP B1) microcode from revision 0x1000151\n up to 0x1000157;\n - Update of 06-55-04/0xb7 (SKX-SP H0/M0/U0, SKX-D M1) microcode\n (in intel-06-55-04/intel-ucode/06-55-04) from revision 0x2000065\n up to 0x2006906;\n - Update of 06-55-06/0xbf (CLX-SP B0) microcode from revision 0x400002c\n up to 0x4002f01;\n - Update of 06-55-07/0xbf (CLX-SP B1) microcode from revision 0x500002c\n up to 0x5002f01;\n - Update of 06-5e-03/0x36 (SKL-H/S R0/N0) microcode from revision 0xd6\n up to 0xdc;\n - Update of 06-7e-05/0x80 (ICL-U/Y D1) microcode from revision 0x46\n up to 0x78;\n - Update of 06-8e-09/0x10 (AML-Y22 H0) microcode from revision 0xca\n up to 0xd6;\n - Update of 06-8e-09/0xc0 (KBL-U/Y H0) microcode from revision 0xca\n up to 0xd6;\n - Update of 06-8e-0a/0xc0 (CFL-U43e D0) microcode from revision 0xca\n up to 0xd6;\n - Update of 06-8e-0b/0xd0 (WHL-U W0) microcode from revision 0xca\n up to 0xd6;\n - Update of 06-8e-0c/0x94 (AML-Y42 V0, CML-Y42 V0, WHL-U V0) microcode\n from revision 0xca up to 0xd6;\n - Update of 06-9e-09/0x2a (KBL-G/H/S/X/Xeon E3 B0) microcode from revision\n 0xca up to 0xd6;\n - Update of 06-9e-0a/0x22 (CFL-H/S/Xeon E3 U0) microcode from revision 0xca\n up to 0xd6;\n - Update of 06-9e-0b/0x02 (CFL-S B0) microcode from revision 0xca up to 0xd6;\n - Update of 06-9e-0c/0x22 (CFL-H/S P0) microcode from revision 0xca\n up to 0xd6;\n - Update of 06-9e-0d/0x22 (CFL-H R0) microcode from revision 0xca up to 0xd6.\n* Do not update 06-4e-03 (SKL-U/Y) and 06-5e-03 (SKL-H/S/Xeon E3 v5) to revision\n 0xdc, use 0xd6 by default.\n* Enable 06-2d-07 (SNB-E/EN/EP) caveat by default.\n* Enable 06-55-04 (SKL-SP/X/W) caveat by default.\n* Avoid find being SIGPIPE\u0027d on early \"grep -q\" exit in the dracut script.\n* Re-generate initramfs not only for the currently running kernel,\n but for several recently installed kernels as well.\n* Change the URL in the intel-microcode2ucode.8 to point to the GitHub\n repository since the microcode download section at Intel Download Center\n does not exist anymore.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2020:2771", "url": "https://access.redhat.com/errata/RHSA-2020:2771" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "https://access.redhat.com/solutions/5142691", "url": "https://access.redhat.com/solutions/5142691" }, { "category": "external", "summary": "https://access.redhat.com/solutions/l1d-cache-eviction-and-vector-register-sampling", "url": "https://access.redhat.com/solutions/l1d-cache-eviction-and-vector-register-sampling" }, { "category": "external", "summary": "1788786", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1788786" }, { "category": "external", "summary": "1788788", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1788788" }, { "category": "external", "summary": "1827165", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1827165" }, { "category": "external", "summary": "1849061", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1849061" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_2771.json" } ], "title": "Red Hat Security Advisory: microcode_ctl security, bug fix and enhancement update", "tracking": { "current_release_date": "2025-02-28T01:27:29+00:00", "generator": { "date": "2025-02-28T01:27:29+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.3.1" } }, "id": "RHSA-2020:2771", "initial_release_date": "2020-06-30T12:12:47+00:00", "revision_history": [ { "date": "2020-06-30T12:12:47+00:00", "number": "1", "summary": "Initial version" }, { "date": "2020-06-30T12:12:47+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-02-28T01:27:29+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Server AUS (v. 7.4)", "product": { "name": "Red Hat Enterprise Linux Server AUS (v. 7.4)", "product_id": "7Server-7.4.AUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_aus:7.4::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server E4S (v. 7.4)", "product": { "name": "Red Hat Enterprise Linux Server E4S (v. 7.4)", "product_id": "7Server-7.4.E4S", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_e4s:7.4::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server TUS (v. 7.4)", "product": { "name": "Red Hat Enterprise Linux Server TUS (v. 7.4)", "product_id": "7Server-7.4.TUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_tus:7.4::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "microcode_ctl-2:2.1-22.32.el7_4.x86_64", "product": { "name": "microcode_ctl-2:2.1-22.32.el7_4.x86_64", "product_id": "microcode_ctl-2:2.1-22.32.el7_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/microcode_ctl@2.1-22.32.el7_4?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "microcode_ctl-debuginfo-2:2.1-22.32.el7_4.x86_64", "product": { "name": "microcode_ctl-debuginfo-2:2.1-22.32.el7_4.x86_64", "product_id": "microcode_ctl-debuginfo-2:2.1-22.32.el7_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/microcode_ctl-debuginfo@2.1-22.32.el7_4?arch=x86_64\u0026epoch=2" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "microcode_ctl-2:2.1-22.32.el7_4.src", "product": { "name": "microcode_ctl-2:2.1-22.32.el7_4.src", "product_id": "microcode_ctl-2:2.1-22.32.el7_4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/microcode_ctl@2.1-22.32.el7_4?arch=src\u0026epoch=2" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "microcode_ctl-2:2.1-22.32.el7_4.src as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)", "product_id": "7Server-7.4.AUS:microcode_ctl-2:2.1-22.32.el7_4.src" }, "product_reference": "microcode_ctl-2:2.1-22.32.el7_4.src", "relates_to_product_reference": "7Server-7.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "microcode_ctl-2:2.1-22.32.el7_4.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)", "product_id": "7Server-7.4.AUS:microcode_ctl-2:2.1-22.32.el7_4.x86_64" }, "product_reference": "microcode_ctl-2:2.1-22.32.el7_4.x86_64", "relates_to_product_reference": "7Server-7.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "microcode_ctl-debuginfo-2:2.1-22.32.el7_4.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)", "product_id": "7Server-7.4.AUS:microcode_ctl-debuginfo-2:2.1-22.32.el7_4.x86_64" }, "product_reference": "microcode_ctl-debuginfo-2:2.1-22.32.el7_4.x86_64", "relates_to_product_reference": "7Server-7.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "microcode_ctl-2:2.1-22.32.el7_4.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)", "product_id": "7Server-7.4.E4S:microcode_ctl-2:2.1-22.32.el7_4.src" }, "product_reference": "microcode_ctl-2:2.1-22.32.el7_4.src", "relates_to_product_reference": "7Server-7.4.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "microcode_ctl-2:2.1-22.32.el7_4.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)", "product_id": "7Server-7.4.E4S:microcode_ctl-2:2.1-22.32.el7_4.x86_64" }, "product_reference": "microcode_ctl-2:2.1-22.32.el7_4.x86_64", "relates_to_product_reference": "7Server-7.4.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "microcode_ctl-debuginfo-2:2.1-22.32.el7_4.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)", "product_id": "7Server-7.4.E4S:microcode_ctl-debuginfo-2:2.1-22.32.el7_4.x86_64" }, "product_reference": "microcode_ctl-debuginfo-2:2.1-22.32.el7_4.x86_64", "relates_to_product_reference": "7Server-7.4.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "microcode_ctl-2:2.1-22.32.el7_4.src as a component of Red Hat Enterprise Linux Server TUS (v. 7.4)", "product_id": "7Server-7.4.TUS:microcode_ctl-2:2.1-22.32.el7_4.src" }, "product_reference": "microcode_ctl-2:2.1-22.32.el7_4.src", "relates_to_product_reference": "7Server-7.4.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "microcode_ctl-2:2.1-22.32.el7_4.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.4)", "product_id": "7Server-7.4.TUS:microcode_ctl-2:2.1-22.32.el7_4.x86_64" }, "product_reference": "microcode_ctl-2:2.1-22.32.el7_4.x86_64", "relates_to_product_reference": "7Server-7.4.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "microcode_ctl-debuginfo-2:2.1-22.32.el7_4.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.4)", "product_id": "7Server-7.4.TUS:microcode_ctl-debuginfo-2:2.1-22.32.el7_4.x86_64" }, "product_reference": "microcode_ctl-debuginfo-2:2.1-22.32.el7_4.x86_64", "relates_to_product_reference": "7Server-7.4.TUS" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Intel" ] } ], "cve": "CVE-2020-0543", "discovery_date": "2020-04-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1827165" } ], "notes": [ { "category": "description", "text": "A new domain bypass transient execution attack known as Special Register Buffer Data Sampling (SRBDS) has been found. This flaw allows data values from special internal registers to be leaked by an attacker able to execute code on any core of the CPU. An unprivileged, local attacker can use this flaw to infer values returned by affected instructions known to be commonly used during cryptographic operations that rely on uniqueness, secrecy, or both.", "title": "Vulnerability description" }, { "category": "summary", "text": "hw: Special Register Buffer Data Sampling (SRBDS)", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/solutions/5142691", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-7.4.AUS:microcode_ctl-2:2.1-22.32.el7_4.src", "7Server-7.4.AUS:microcode_ctl-2:2.1-22.32.el7_4.x86_64", "7Server-7.4.AUS:microcode_ctl-debuginfo-2:2.1-22.32.el7_4.x86_64", "7Server-7.4.E4S:microcode_ctl-2:2.1-22.32.el7_4.src", "7Server-7.4.E4S:microcode_ctl-2:2.1-22.32.el7_4.x86_64", "7Server-7.4.E4S:microcode_ctl-debuginfo-2:2.1-22.32.el7_4.x86_64", "7Server-7.4.TUS:microcode_ctl-2:2.1-22.32.el7_4.src", "7Server-7.4.TUS:microcode_ctl-2:2.1-22.32.el7_4.x86_64", "7Server-7.4.TUS:microcode_ctl-debuginfo-2:2.1-22.32.el7_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-0543" }, { "category": "external", "summary": "RHBZ#1827165", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1827165" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-0543", "url": "https://www.cve.org/CVERecord?id=CVE-2020-0543" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-0543", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-0543" }, { "category": "external", "summary": "https://access.redhat.com/solutions/5142691", "url": "https://access.redhat.com/solutions/5142691" }, { "category": "external", "summary": "https://access.redhat.com/solutions/5142751", "url": "https://access.redhat.com/solutions/5142751" }, { "category": "external", "summary": "https://blogs.intel.com/technology/2020/06/ipas-security-advisories-for-june-2020/#gs.6uyhri", "url": "https://blogs.intel.com/technology/2020/06/ipas-security-advisories-for-june-2020/#gs.6uyhri" }, { "category": "external", "summary": "https://software.intel.com/security-software-guidance/insights/deep-dive-special-register-buffer-data-sampling", "url": "https://software.intel.com/security-software-guidance/insights/deep-dive-special-register-buffer-data-sampling" }, { "category": "external", "summary": "https://xenbits.xen.org/xsa/advisory-320.html", "url": "https://xenbits.xen.org/xsa/advisory-320.html" } ], "release_date": "2020-06-09T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-06-30T12:12:47+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-7.4.AUS:microcode_ctl-2:2.1-22.32.el7_4.src", "7Server-7.4.AUS:microcode_ctl-2:2.1-22.32.el7_4.x86_64", "7Server-7.4.AUS:microcode_ctl-debuginfo-2:2.1-22.32.el7_4.x86_64", "7Server-7.4.E4S:microcode_ctl-2:2.1-22.32.el7_4.src", "7Server-7.4.E4S:microcode_ctl-2:2.1-22.32.el7_4.x86_64", "7Server-7.4.E4S:microcode_ctl-debuginfo-2:2.1-22.32.el7_4.x86_64", "7Server-7.4.TUS:microcode_ctl-2:2.1-22.32.el7_4.src", "7Server-7.4.TUS:microcode_ctl-2:2.1-22.32.el7_4.x86_64", "7Server-7.4.TUS:microcode_ctl-debuginfo-2:2.1-22.32.el7_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2771" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "7Server-7.4.AUS:microcode_ctl-2:2.1-22.32.el7_4.src", "7Server-7.4.AUS:microcode_ctl-2:2.1-22.32.el7_4.x86_64", "7Server-7.4.AUS:microcode_ctl-debuginfo-2:2.1-22.32.el7_4.x86_64", "7Server-7.4.E4S:microcode_ctl-2:2.1-22.32.el7_4.src", "7Server-7.4.E4S:microcode_ctl-2:2.1-22.32.el7_4.x86_64", "7Server-7.4.E4S:microcode_ctl-debuginfo-2:2.1-22.32.el7_4.x86_64", "7Server-7.4.TUS:microcode_ctl-2:2.1-22.32.el7_4.src", "7Server-7.4.TUS:microcode_ctl-2:2.1-22.32.el7_4.x86_64", "7Server-7.4.TUS:microcode_ctl-debuginfo-2:2.1-22.32.el7_4.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "7Server-7.4.AUS:microcode_ctl-2:2.1-22.32.el7_4.src", "7Server-7.4.AUS:microcode_ctl-2:2.1-22.32.el7_4.x86_64", "7Server-7.4.AUS:microcode_ctl-debuginfo-2:2.1-22.32.el7_4.x86_64", "7Server-7.4.E4S:microcode_ctl-2:2.1-22.32.el7_4.src", "7Server-7.4.E4S:microcode_ctl-2:2.1-22.32.el7_4.x86_64", "7Server-7.4.E4S:microcode_ctl-debuginfo-2:2.1-22.32.el7_4.x86_64", "7Server-7.4.TUS:microcode_ctl-2:2.1-22.32.el7_4.src", "7Server-7.4.TUS:microcode_ctl-2:2.1-22.32.el7_4.x86_64", "7Server-7.4.TUS:microcode_ctl-debuginfo-2:2.1-22.32.el7_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "hw: Special Register Buffer Data Sampling (SRBDS)" }, { "cve": "CVE-2020-0548", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2020-01-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1788786" } ], "notes": [ { "category": "description", "text": "A flaw was found in Intel processors where a local attacker is able to gain information about registers used for vector calculations by observing register states from other processes running on the system. This results in a race condition where store buffers, which were not cleared, could be read by another process or a CPU sibling. The highest threat from this vulnerability is data confidentiality where an attacker could read arbitrary data as it passes through the processor.", "title": "Vulnerability description" }, { "category": "summary", "text": "hw: Vector Register Data Sampling", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-7.4.AUS:microcode_ctl-2:2.1-22.32.el7_4.src", "7Server-7.4.AUS:microcode_ctl-2:2.1-22.32.el7_4.x86_64", "7Server-7.4.AUS:microcode_ctl-debuginfo-2:2.1-22.32.el7_4.x86_64", "7Server-7.4.E4S:microcode_ctl-2:2.1-22.32.el7_4.src", "7Server-7.4.E4S:microcode_ctl-2:2.1-22.32.el7_4.x86_64", "7Server-7.4.E4S:microcode_ctl-debuginfo-2:2.1-22.32.el7_4.x86_64", "7Server-7.4.TUS:microcode_ctl-2:2.1-22.32.el7_4.src", "7Server-7.4.TUS:microcode_ctl-2:2.1-22.32.el7_4.x86_64", "7Server-7.4.TUS:microcode_ctl-debuginfo-2:2.1-22.32.el7_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-0548" }, { "category": "external", "summary": "RHBZ#1788786", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1788786" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-0548", "url": "https://www.cve.org/CVERecord?id=CVE-2020-0548" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-0548", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-0548" }, { "category": "external", "summary": "https://access.redhat.com/solutions/l1d-cache-eviction-and-vector-register-sampling", "url": "https://access.redhat.com/solutions/l1d-cache-eviction-and-vector-register-sampling" }, { "category": "external", "summary": "https://blogs.intel.com/technology/2020/01/ipas-intel-sa-00329/", "url": "https://blogs.intel.com/technology/2020/01/ipas-intel-sa-00329/" }, { "category": "external", "summary": "https://cacheoutattack.com/CacheOut.pdf", "url": "https://cacheoutattack.com/CacheOut.pdf" }, { "category": "external", "summary": "https://software.intel.com/security-software-guidance/software-guidance/l1d-eviction-sampling", "url": "https://software.intel.com/security-software-guidance/software-guidance/l1d-eviction-sampling" } ], "release_date": "2020-01-27T13:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-06-30T12:12:47+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-7.4.AUS:microcode_ctl-2:2.1-22.32.el7_4.src", "7Server-7.4.AUS:microcode_ctl-2:2.1-22.32.el7_4.x86_64", "7Server-7.4.AUS:microcode_ctl-debuginfo-2:2.1-22.32.el7_4.x86_64", "7Server-7.4.E4S:microcode_ctl-2:2.1-22.32.el7_4.src", "7Server-7.4.E4S:microcode_ctl-2:2.1-22.32.el7_4.x86_64", "7Server-7.4.E4S:microcode_ctl-debuginfo-2:2.1-22.32.el7_4.x86_64", "7Server-7.4.TUS:microcode_ctl-2:2.1-22.32.el7_4.src", "7Server-7.4.TUS:microcode_ctl-2:2.1-22.32.el7_4.x86_64", "7Server-7.4.TUS:microcode_ctl-debuginfo-2:2.1-22.32.el7_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2771" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 2.8, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.0" }, "products": [ "7Server-7.4.AUS:microcode_ctl-2:2.1-22.32.el7_4.src", "7Server-7.4.AUS:microcode_ctl-2:2.1-22.32.el7_4.x86_64", "7Server-7.4.AUS:microcode_ctl-debuginfo-2:2.1-22.32.el7_4.x86_64", "7Server-7.4.E4S:microcode_ctl-2:2.1-22.32.el7_4.src", "7Server-7.4.E4S:microcode_ctl-2:2.1-22.32.el7_4.x86_64", "7Server-7.4.E4S:microcode_ctl-debuginfo-2:2.1-22.32.el7_4.x86_64", "7Server-7.4.TUS:microcode_ctl-2:2.1-22.32.el7_4.src", "7Server-7.4.TUS:microcode_ctl-2:2.1-22.32.el7_4.x86_64", "7Server-7.4.TUS:microcode_ctl-debuginfo-2:2.1-22.32.el7_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "hw: Vector Register Data Sampling" }, { "cve": "CVE-2020-0549", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2020-01-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1788788" } ], "notes": [ { "category": "description", "text": "A microarchitectural timing flaw was found on some Intel processors. A corner case exists where data in-flight during the eviction process can end up in the \u201cfill buffers\u201d and not properly cleared by the MDS mitigations. The fill buffer contents (which were expected to be blank) can be inferred using MDS or TAA style attack methods to allow a local attacker to infer fill buffer values.", "title": "Vulnerability description" }, { "category": "summary", "text": "hw: L1D Cache Eviction Sampling", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-7.4.AUS:microcode_ctl-2:2.1-22.32.el7_4.src", "7Server-7.4.AUS:microcode_ctl-2:2.1-22.32.el7_4.x86_64", "7Server-7.4.AUS:microcode_ctl-debuginfo-2:2.1-22.32.el7_4.x86_64", "7Server-7.4.E4S:microcode_ctl-2:2.1-22.32.el7_4.src", "7Server-7.4.E4S:microcode_ctl-2:2.1-22.32.el7_4.x86_64", "7Server-7.4.E4S:microcode_ctl-debuginfo-2:2.1-22.32.el7_4.x86_64", "7Server-7.4.TUS:microcode_ctl-2:2.1-22.32.el7_4.src", "7Server-7.4.TUS:microcode_ctl-2:2.1-22.32.el7_4.x86_64", "7Server-7.4.TUS:microcode_ctl-debuginfo-2:2.1-22.32.el7_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-0549" }, { "category": "external", "summary": "RHBZ#1788788", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1788788" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-0549", "url": "https://www.cve.org/CVERecord?id=CVE-2020-0549" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-0549", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-0549" }, { "category": "external", "summary": "https://access.redhat.com/solutions/l1d-cache-eviction-and-vector-register-sampling", "url": "https://access.redhat.com/solutions/l1d-cache-eviction-and-vector-register-sampling" }, { "category": "external", "summary": "https://blogs.intel.com/technology/2020/01/ipas-intel-sa-00329/", "url": "https://blogs.intel.com/technology/2020/01/ipas-intel-sa-00329/" }, { "category": "external", "summary": "https://cacheoutattack.com/CacheOut.pdf", "url": "https://cacheoutattack.com/CacheOut.pdf" }, { "category": "external", "summary": "https://software.intel.com/security-software-guidance/software-guidance/l1d-eviction-sampling", "url": "https://software.intel.com/security-software-guidance/software-guidance/l1d-eviction-sampling" } ], "release_date": "2020-01-27T13:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-06-30T12:12:47+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-7.4.AUS:microcode_ctl-2:2.1-22.32.el7_4.src", "7Server-7.4.AUS:microcode_ctl-2:2.1-22.32.el7_4.x86_64", "7Server-7.4.AUS:microcode_ctl-debuginfo-2:2.1-22.32.el7_4.x86_64", "7Server-7.4.E4S:microcode_ctl-2:2.1-22.32.el7_4.src", "7Server-7.4.E4S:microcode_ctl-2:2.1-22.32.el7_4.x86_64", "7Server-7.4.E4S:microcode_ctl-debuginfo-2:2.1-22.32.el7_4.x86_64", "7Server-7.4.TUS:microcode_ctl-2:2.1-22.32.el7_4.src", "7Server-7.4.TUS:microcode_ctl-2:2.1-22.32.el7_4.x86_64", "7Server-7.4.TUS:microcode_ctl-debuginfo-2:2.1-22.32.el7_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2771" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "7Server-7.4.AUS:microcode_ctl-2:2.1-22.32.el7_4.src", "7Server-7.4.AUS:microcode_ctl-2:2.1-22.32.el7_4.x86_64", "7Server-7.4.AUS:microcode_ctl-debuginfo-2:2.1-22.32.el7_4.x86_64", "7Server-7.4.E4S:microcode_ctl-2:2.1-22.32.el7_4.src", "7Server-7.4.E4S:microcode_ctl-2:2.1-22.32.el7_4.x86_64", "7Server-7.4.E4S:microcode_ctl-debuginfo-2:2.1-22.32.el7_4.x86_64", "7Server-7.4.TUS:microcode_ctl-2:2.1-22.32.el7_4.src", "7Server-7.4.TUS:microcode_ctl-2:2.1-22.32.el7_4.x86_64", "7Server-7.4.TUS:microcode_ctl-debuginfo-2:2.1-22.32.el7_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "hw: L1D Cache Eviction Sampling" } ] }
rhsa-2021:3255
Vulnerability from csaf_redhat
Published
2021-08-24 10:01
Modified
2025-08-02 09:52
Summary
Red Hat Security Advisory: microcode_ctl security, bug fix and enhancement update
Notes
Topic
An update for microcode_ctl is now available for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.
Details
The microcode_ctl packages provide microcode updates for Intel.
Security Fix(es):
* hw: Special Register Buffer Data Sampling (SRBDS) (CVE-2020-0543)
* hw: Vector Register Data Sampling (CVE-2020-0548)
* hw: L1D Cache Eviction Sampling (CVE-2020-0549)
* hw: vt-d related privilege escalation (CVE-2020-24489)
* hw: improper isolation of shared resources in some Intel Processors (CVE-2020-24511)
* hw: observable timing discrepancy in some Intel Processors (CVE-2020-24512)
* hw: Information disclosure issue in Intel SGX via RAPL interface (CVE-2020-8695)
* hw: Vector Register Leakage-Active (CVE-2020-8696)
* hw: Fast forward store predictor (CVE-2020-8698)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for microcode_ctl is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact\nof Important. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available for each vulnerability\nfrom the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The microcode_ctl packages provide microcode updates for Intel.\n\nSecurity Fix(es):\n\n* hw: Special Register Buffer Data Sampling (SRBDS) (CVE-2020-0543)\n\n* hw: Vector Register Data Sampling (CVE-2020-0548)\n\n* hw: L1D Cache Eviction Sampling (CVE-2020-0549)\n\n* hw: vt-d related privilege escalation (CVE-2020-24489)\n\n* hw: improper isolation of shared resources in some Intel Processors (CVE-2020-24511)\n\n* hw: observable timing discrepancy in some Intel Processors (CVE-2020-24512)\n\n* hw: Information disclosure issue in Intel SGX via RAPL interface (CVE-2020-8695)\n\n* hw: Vector Register Leakage-Active (CVE-2020-8696)\n\n* hw: Fast forward store predictor (CVE-2020-8698)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2021:3255", "url": "https://access.redhat.com/errata/RHSA-2021:3255" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1788786", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1788786" }, { "category": "external", "summary": "1788788", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1788788" }, { "category": "external", "summary": "1827165", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1827165" }, { "category": "external", "summary": "1828583", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1828583" }, { "category": "external", "summary": "1890355", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890355" }, { "category": "external", "summary": "1890356", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890356" }, { "category": "external", "summary": "1962650", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1962650" }, { "category": "external", "summary": "1962702", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1962702" }, { "category": "external", "summary": "1962722", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1962722" }, { "category": "external", "summary": "1972334", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1972334" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3255.json" } ], "title": "Red Hat Security Advisory: microcode_ctl security, bug fix and enhancement update", "tracking": { "current_release_date": "2025-08-02T09:52:50+00:00", "generator": { "date": "2025-08-02T09:52:50+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2021:3255", "initial_release_date": "2021-08-24T10:01:08+00:00", "revision_history": [ { "date": "2021-08-24T10:01:08+00:00", "number": "1", "summary": "Initial version" }, { "date": "2021-08-24T12:01:49+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-02T09:52:50+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Server AUS (v. 7.4)", "product": { "name": "Red Hat Enterprise Linux Server AUS (v. 7.4)", "product_id": "7Server-7.4.AUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_aus:7.4::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server E4S (v. 7.4)", "product": { "name": "Red Hat Enterprise Linux Server E4S (v. 7.4)", "product_id": "7Server-7.4.E4S", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_e4s:7.4::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server TUS (v. 7.4)", "product": { "name": "Red Hat Enterprise Linux Server TUS (v. 7.4)", "product_id": "7Server-7.4.TUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_tus:7.4::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "microcode_ctl-2:2.1-22.41.el7_4.src", "product": { "name": "microcode_ctl-2:2.1-22.41.el7_4.src", "product_id": "microcode_ctl-2:2.1-22.41.el7_4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/microcode_ctl@2.1-22.41.el7_4?arch=src\u0026epoch=2" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "microcode_ctl-2:2.1-22.41.el7_4.x86_64", "product": { "name": "microcode_ctl-2:2.1-22.41.el7_4.x86_64", "product_id": "microcode_ctl-2:2.1-22.41.el7_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/microcode_ctl@2.1-22.41.el7_4?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "microcode_ctl-debuginfo-2:2.1-22.41.el7_4.x86_64", "product": { "name": "microcode_ctl-debuginfo-2:2.1-22.41.el7_4.x86_64", "product_id": "microcode_ctl-debuginfo-2:2.1-22.41.el7_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/microcode_ctl-debuginfo@2.1-22.41.el7_4?arch=x86_64\u0026epoch=2" } } } ], "category": "architecture", "name": "x86_64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "microcode_ctl-2:2.1-22.41.el7_4.src as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)", "product_id": "7Server-7.4.AUS:microcode_ctl-2:2.1-22.41.el7_4.src" }, "product_reference": "microcode_ctl-2:2.1-22.41.el7_4.src", "relates_to_product_reference": "7Server-7.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "microcode_ctl-2:2.1-22.41.el7_4.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)", "product_id": "7Server-7.4.AUS:microcode_ctl-2:2.1-22.41.el7_4.x86_64" }, "product_reference": "microcode_ctl-2:2.1-22.41.el7_4.x86_64", "relates_to_product_reference": "7Server-7.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "microcode_ctl-debuginfo-2:2.1-22.41.el7_4.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)", "product_id": "7Server-7.4.AUS:microcode_ctl-debuginfo-2:2.1-22.41.el7_4.x86_64" }, "product_reference": "microcode_ctl-debuginfo-2:2.1-22.41.el7_4.x86_64", "relates_to_product_reference": "7Server-7.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "microcode_ctl-2:2.1-22.41.el7_4.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)", "product_id": "7Server-7.4.E4S:microcode_ctl-2:2.1-22.41.el7_4.src" }, "product_reference": "microcode_ctl-2:2.1-22.41.el7_4.src", "relates_to_product_reference": "7Server-7.4.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "microcode_ctl-2:2.1-22.41.el7_4.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)", "product_id": "7Server-7.4.E4S:microcode_ctl-2:2.1-22.41.el7_4.x86_64" }, "product_reference": "microcode_ctl-2:2.1-22.41.el7_4.x86_64", "relates_to_product_reference": "7Server-7.4.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "microcode_ctl-debuginfo-2:2.1-22.41.el7_4.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)", "product_id": "7Server-7.4.E4S:microcode_ctl-debuginfo-2:2.1-22.41.el7_4.x86_64" }, "product_reference": "microcode_ctl-debuginfo-2:2.1-22.41.el7_4.x86_64", "relates_to_product_reference": "7Server-7.4.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "microcode_ctl-2:2.1-22.41.el7_4.src as a component of Red Hat Enterprise Linux Server TUS (v. 7.4)", "product_id": "7Server-7.4.TUS:microcode_ctl-2:2.1-22.41.el7_4.src" }, "product_reference": "microcode_ctl-2:2.1-22.41.el7_4.src", "relates_to_product_reference": "7Server-7.4.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "microcode_ctl-2:2.1-22.41.el7_4.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.4)", "product_id": "7Server-7.4.TUS:microcode_ctl-2:2.1-22.41.el7_4.x86_64" }, "product_reference": "microcode_ctl-2:2.1-22.41.el7_4.x86_64", "relates_to_product_reference": "7Server-7.4.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "microcode_ctl-debuginfo-2:2.1-22.41.el7_4.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.4)", "product_id": "7Server-7.4.TUS:microcode_ctl-debuginfo-2:2.1-22.41.el7_4.x86_64" }, "product_reference": "microcode_ctl-debuginfo-2:2.1-22.41.el7_4.x86_64", "relates_to_product_reference": "7Server-7.4.TUS" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Intel" ] } ], "cve": "CVE-2020-0543", "discovery_date": "2020-04-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1827165" } ], "notes": [ { "category": "description", "text": "A new domain bypass transient execution attack known as Special Register Buffer Data Sampling (SRBDS) has been found. This flaw allows data values from special internal registers to be leaked by an attacker able to execute code on any core of the CPU. An unprivileged, local attacker can use this flaw to infer values returned by affected instructions known to be commonly used during cryptographic operations that rely on uniqueness, secrecy, or both.", "title": "Vulnerability description" }, { "category": "summary", "text": "hw: Special Register Buffer Data Sampling (SRBDS)", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/solutions/5142691", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-7.4.AUS:microcode_ctl-2:2.1-22.41.el7_4.src", "7Server-7.4.AUS:microcode_ctl-2:2.1-22.41.el7_4.x86_64", "7Server-7.4.AUS:microcode_ctl-debuginfo-2:2.1-22.41.el7_4.x86_64", "7Server-7.4.E4S:microcode_ctl-2:2.1-22.41.el7_4.src", "7Server-7.4.E4S:microcode_ctl-2:2.1-22.41.el7_4.x86_64", "7Server-7.4.E4S:microcode_ctl-debuginfo-2:2.1-22.41.el7_4.x86_64", "7Server-7.4.TUS:microcode_ctl-2:2.1-22.41.el7_4.src", "7Server-7.4.TUS:microcode_ctl-2:2.1-22.41.el7_4.x86_64", "7Server-7.4.TUS:microcode_ctl-debuginfo-2:2.1-22.41.el7_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-0543" }, { "category": "external", "summary": "RHBZ#1827165", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1827165" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-0543", "url": "https://www.cve.org/CVERecord?id=CVE-2020-0543" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-0543", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-0543" }, { "category": "external", "summary": "https://access.redhat.com/solutions/5142691", "url": "https://access.redhat.com/solutions/5142691" }, { "category": "external", "summary": "https://access.redhat.com/solutions/5142751", "url": "https://access.redhat.com/solutions/5142751" }, { "category": "external", "summary": "https://blogs.intel.com/technology/2020/06/ipas-security-advisories-for-june-2020/#gs.6uyhri", "url": "https://blogs.intel.com/technology/2020/06/ipas-security-advisories-for-june-2020/#gs.6uyhri" }, { "category": "external", "summary": "https://software.intel.com/security-software-guidance/insights/deep-dive-special-register-buffer-data-sampling", "url": "https://software.intel.com/security-software-guidance/insights/deep-dive-special-register-buffer-data-sampling" }, { "category": "external", "summary": "https://xenbits.xen.org/xsa/advisory-320.html", "url": "https://xenbits.xen.org/xsa/advisory-320.html" } ], "release_date": "2020-06-09T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-08-24T10:01:08+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-7.4.AUS:microcode_ctl-2:2.1-22.41.el7_4.src", "7Server-7.4.AUS:microcode_ctl-2:2.1-22.41.el7_4.x86_64", "7Server-7.4.AUS:microcode_ctl-debuginfo-2:2.1-22.41.el7_4.x86_64", "7Server-7.4.E4S:microcode_ctl-2:2.1-22.41.el7_4.src", "7Server-7.4.E4S:microcode_ctl-2:2.1-22.41.el7_4.x86_64", "7Server-7.4.E4S:microcode_ctl-debuginfo-2:2.1-22.41.el7_4.x86_64", "7Server-7.4.TUS:microcode_ctl-2:2.1-22.41.el7_4.src", "7Server-7.4.TUS:microcode_ctl-2:2.1-22.41.el7_4.x86_64", "7Server-7.4.TUS:microcode_ctl-debuginfo-2:2.1-22.41.el7_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3255" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "7Server-7.4.AUS:microcode_ctl-2:2.1-22.41.el7_4.src", "7Server-7.4.AUS:microcode_ctl-2:2.1-22.41.el7_4.x86_64", "7Server-7.4.AUS:microcode_ctl-debuginfo-2:2.1-22.41.el7_4.x86_64", "7Server-7.4.E4S:microcode_ctl-2:2.1-22.41.el7_4.src", "7Server-7.4.E4S:microcode_ctl-2:2.1-22.41.el7_4.x86_64", "7Server-7.4.E4S:microcode_ctl-debuginfo-2:2.1-22.41.el7_4.x86_64", "7Server-7.4.TUS:microcode_ctl-2:2.1-22.41.el7_4.src", "7Server-7.4.TUS:microcode_ctl-2:2.1-22.41.el7_4.x86_64", "7Server-7.4.TUS:microcode_ctl-debuginfo-2:2.1-22.41.el7_4.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "7Server-7.4.AUS:microcode_ctl-2:2.1-22.41.el7_4.src", "7Server-7.4.AUS:microcode_ctl-2:2.1-22.41.el7_4.x86_64", "7Server-7.4.AUS:microcode_ctl-debuginfo-2:2.1-22.41.el7_4.x86_64", "7Server-7.4.E4S:microcode_ctl-2:2.1-22.41.el7_4.src", "7Server-7.4.E4S:microcode_ctl-2:2.1-22.41.el7_4.x86_64", "7Server-7.4.E4S:microcode_ctl-debuginfo-2:2.1-22.41.el7_4.x86_64", "7Server-7.4.TUS:microcode_ctl-2:2.1-22.41.el7_4.src", "7Server-7.4.TUS:microcode_ctl-2:2.1-22.41.el7_4.x86_64", "7Server-7.4.TUS:microcode_ctl-debuginfo-2:2.1-22.41.el7_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "hw: Special Register Buffer Data Sampling (SRBDS)" }, { "cve": "CVE-2020-0548", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2020-01-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1788786" } ], "notes": [ { "category": "description", "text": "A flaw was found in Intel processors where a local attacker is able to gain information about registers used for vector calculations by observing register states from other processes running on the system. This results in a race condition where store buffers, which were not cleared, could be read by another process or a CPU sibling. The highest threat from this vulnerability is data confidentiality where an attacker could read arbitrary data as it passes through the processor.", "title": "Vulnerability description" }, { "category": "summary", "text": "hw: Vector Register Data Sampling", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-7.4.AUS:microcode_ctl-2:2.1-22.41.el7_4.src", "7Server-7.4.AUS:microcode_ctl-2:2.1-22.41.el7_4.x86_64", "7Server-7.4.AUS:microcode_ctl-debuginfo-2:2.1-22.41.el7_4.x86_64", "7Server-7.4.E4S:microcode_ctl-2:2.1-22.41.el7_4.src", "7Server-7.4.E4S:microcode_ctl-2:2.1-22.41.el7_4.x86_64", "7Server-7.4.E4S:microcode_ctl-debuginfo-2:2.1-22.41.el7_4.x86_64", "7Server-7.4.TUS:microcode_ctl-2:2.1-22.41.el7_4.src", "7Server-7.4.TUS:microcode_ctl-2:2.1-22.41.el7_4.x86_64", "7Server-7.4.TUS:microcode_ctl-debuginfo-2:2.1-22.41.el7_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-0548" }, { "category": "external", "summary": "RHBZ#1788786", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1788786" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-0548", "url": "https://www.cve.org/CVERecord?id=CVE-2020-0548" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-0548", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-0548" }, { "category": "external", "summary": "https://access.redhat.com/solutions/l1d-cache-eviction-and-vector-register-sampling", "url": "https://access.redhat.com/solutions/l1d-cache-eviction-and-vector-register-sampling" }, { "category": "external", "summary": "https://blogs.intel.com/technology/2020/01/ipas-intel-sa-00329/", "url": "https://blogs.intel.com/technology/2020/01/ipas-intel-sa-00329/" }, { "category": "external", "summary": "https://cacheoutattack.com/CacheOut.pdf", "url": "https://cacheoutattack.com/CacheOut.pdf" }, { "category": "external", "summary": "https://software.intel.com/security-software-guidance/software-guidance/l1d-eviction-sampling", "url": "https://software.intel.com/security-software-guidance/software-guidance/l1d-eviction-sampling" } ], "release_date": "2020-01-27T13:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-08-24T10:01:08+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-7.4.AUS:microcode_ctl-2:2.1-22.41.el7_4.src", "7Server-7.4.AUS:microcode_ctl-2:2.1-22.41.el7_4.x86_64", "7Server-7.4.AUS:microcode_ctl-debuginfo-2:2.1-22.41.el7_4.x86_64", "7Server-7.4.E4S:microcode_ctl-2:2.1-22.41.el7_4.src", "7Server-7.4.E4S:microcode_ctl-2:2.1-22.41.el7_4.x86_64", "7Server-7.4.E4S:microcode_ctl-debuginfo-2:2.1-22.41.el7_4.x86_64", "7Server-7.4.TUS:microcode_ctl-2:2.1-22.41.el7_4.src", "7Server-7.4.TUS:microcode_ctl-2:2.1-22.41.el7_4.x86_64", "7Server-7.4.TUS:microcode_ctl-debuginfo-2:2.1-22.41.el7_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3255" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 2.8, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.0" }, "products": [ "7Server-7.4.AUS:microcode_ctl-2:2.1-22.41.el7_4.src", "7Server-7.4.AUS:microcode_ctl-2:2.1-22.41.el7_4.x86_64", "7Server-7.4.AUS:microcode_ctl-debuginfo-2:2.1-22.41.el7_4.x86_64", "7Server-7.4.E4S:microcode_ctl-2:2.1-22.41.el7_4.src", "7Server-7.4.E4S:microcode_ctl-2:2.1-22.41.el7_4.x86_64", "7Server-7.4.E4S:microcode_ctl-debuginfo-2:2.1-22.41.el7_4.x86_64", "7Server-7.4.TUS:microcode_ctl-2:2.1-22.41.el7_4.src", "7Server-7.4.TUS:microcode_ctl-2:2.1-22.41.el7_4.x86_64", "7Server-7.4.TUS:microcode_ctl-debuginfo-2:2.1-22.41.el7_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "hw: Vector Register Data Sampling" }, { "cve": "CVE-2020-0549", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2020-01-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1788788" } ], "notes": [ { "category": "description", "text": "A microarchitectural timing flaw was found on some Intel processors. A corner case exists where data in-flight during the eviction process can end up in the \u201cfill buffers\u201d and not properly cleared by the MDS mitigations. The fill buffer contents (which were expected to be blank) can be inferred using MDS or TAA style attack methods to allow a local attacker to infer fill buffer values.", "title": "Vulnerability description" }, { "category": "summary", "text": "hw: L1D Cache Eviction Sampling", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-7.4.AUS:microcode_ctl-2:2.1-22.41.el7_4.src", "7Server-7.4.AUS:microcode_ctl-2:2.1-22.41.el7_4.x86_64", "7Server-7.4.AUS:microcode_ctl-debuginfo-2:2.1-22.41.el7_4.x86_64", "7Server-7.4.E4S:microcode_ctl-2:2.1-22.41.el7_4.src", "7Server-7.4.E4S:microcode_ctl-2:2.1-22.41.el7_4.x86_64", "7Server-7.4.E4S:microcode_ctl-debuginfo-2:2.1-22.41.el7_4.x86_64", "7Server-7.4.TUS:microcode_ctl-2:2.1-22.41.el7_4.src", "7Server-7.4.TUS:microcode_ctl-2:2.1-22.41.el7_4.x86_64", "7Server-7.4.TUS:microcode_ctl-debuginfo-2:2.1-22.41.el7_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-0549" }, { "category": "external", "summary": "RHBZ#1788788", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1788788" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-0549", "url": "https://www.cve.org/CVERecord?id=CVE-2020-0549" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-0549", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-0549" }, { "category": "external", "summary": "https://access.redhat.com/solutions/l1d-cache-eviction-and-vector-register-sampling", "url": "https://access.redhat.com/solutions/l1d-cache-eviction-and-vector-register-sampling" }, { "category": "external", "summary": "https://blogs.intel.com/technology/2020/01/ipas-intel-sa-00329/", "url": "https://blogs.intel.com/technology/2020/01/ipas-intel-sa-00329/" }, { "category": "external", "summary": "https://cacheoutattack.com/CacheOut.pdf", "url": "https://cacheoutattack.com/CacheOut.pdf" }, { "category": "external", "summary": "https://software.intel.com/security-software-guidance/software-guidance/l1d-eviction-sampling", "url": "https://software.intel.com/security-software-guidance/software-guidance/l1d-eviction-sampling" } ], "release_date": "2020-01-27T13:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-08-24T10:01:08+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-7.4.AUS:microcode_ctl-2:2.1-22.41.el7_4.src", "7Server-7.4.AUS:microcode_ctl-2:2.1-22.41.el7_4.x86_64", "7Server-7.4.AUS:microcode_ctl-debuginfo-2:2.1-22.41.el7_4.x86_64", "7Server-7.4.E4S:microcode_ctl-2:2.1-22.41.el7_4.src", "7Server-7.4.E4S:microcode_ctl-2:2.1-22.41.el7_4.x86_64", "7Server-7.4.E4S:microcode_ctl-debuginfo-2:2.1-22.41.el7_4.x86_64", "7Server-7.4.TUS:microcode_ctl-2:2.1-22.41.el7_4.src", "7Server-7.4.TUS:microcode_ctl-2:2.1-22.41.el7_4.x86_64", "7Server-7.4.TUS:microcode_ctl-debuginfo-2:2.1-22.41.el7_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3255" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "7Server-7.4.AUS:microcode_ctl-2:2.1-22.41.el7_4.src", "7Server-7.4.AUS:microcode_ctl-2:2.1-22.41.el7_4.x86_64", "7Server-7.4.AUS:microcode_ctl-debuginfo-2:2.1-22.41.el7_4.x86_64", "7Server-7.4.E4S:microcode_ctl-2:2.1-22.41.el7_4.src", "7Server-7.4.E4S:microcode_ctl-2:2.1-22.41.el7_4.x86_64", "7Server-7.4.E4S:microcode_ctl-debuginfo-2:2.1-22.41.el7_4.x86_64", "7Server-7.4.TUS:microcode_ctl-2:2.1-22.41.el7_4.src", "7Server-7.4.TUS:microcode_ctl-2:2.1-22.41.el7_4.x86_64", "7Server-7.4.TUS:microcode_ctl-debuginfo-2:2.1-22.41.el7_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "hw: L1D Cache Eviction Sampling" }, { "acknowledgments": [ { "names": [ "Intel" ] } ], "cve": "CVE-2020-8695", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2020-04-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1828583" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in Intel\u0027s implementation of RAPL (Running Average Power Limit). An attacker with a local account could query the power management functionality to intelligently infer SGX enclave computation values by measuring power usage in the RAPL subsystem.", "title": "Vulnerability description" }, { "category": "summary", "text": "hw: Information disclosure issue in Intel SGX via RAPL interface", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-7.4.AUS:microcode_ctl-2:2.1-22.41.el7_4.src", "7Server-7.4.AUS:microcode_ctl-2:2.1-22.41.el7_4.x86_64", "7Server-7.4.AUS:microcode_ctl-debuginfo-2:2.1-22.41.el7_4.x86_64", "7Server-7.4.E4S:microcode_ctl-2:2.1-22.41.el7_4.src", "7Server-7.4.E4S:microcode_ctl-2:2.1-22.41.el7_4.x86_64", "7Server-7.4.E4S:microcode_ctl-debuginfo-2:2.1-22.41.el7_4.x86_64", "7Server-7.4.TUS:microcode_ctl-2:2.1-22.41.el7_4.src", "7Server-7.4.TUS:microcode_ctl-2:2.1-22.41.el7_4.x86_64", "7Server-7.4.TUS:microcode_ctl-debuginfo-2:2.1-22.41.el7_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-8695" }, { "category": "external", "summary": "RHBZ#1828583", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1828583" }, { "category": "external", "summary": "RHSB-5569051", "url": "https://access.redhat.com/articles/5569051" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-8695", "url": "https://www.cve.org/CVERecord?id=CVE-2020-8695" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-8695", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8695" }, { "category": "external", "summary": "https://en.wikipedia.org/wiki/Power_analysis", "url": "https://en.wikipedia.org/wiki/Power_analysis" }, { "category": "external", "summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00389.html", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00389.html" } ], "release_date": "2020-11-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-08-24T10:01:08+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-7.4.AUS:microcode_ctl-2:2.1-22.41.el7_4.src", "7Server-7.4.AUS:microcode_ctl-2:2.1-22.41.el7_4.x86_64", "7Server-7.4.AUS:microcode_ctl-debuginfo-2:2.1-22.41.el7_4.x86_64", "7Server-7.4.E4S:microcode_ctl-2:2.1-22.41.el7_4.src", "7Server-7.4.E4S:microcode_ctl-2:2.1-22.41.el7_4.x86_64", "7Server-7.4.E4S:microcode_ctl-debuginfo-2:2.1-22.41.el7_4.x86_64", "7Server-7.4.TUS:microcode_ctl-2:2.1-22.41.el7_4.src", "7Server-7.4.TUS:microcode_ctl-2:2.1-22.41.el7_4.x86_64", "7Server-7.4.TUS:microcode_ctl-debuginfo-2:2.1-22.41.el7_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3255" }, { "category": "workaround", "details": "Until a firmware update and reboot can be applied, the attack vector can be reduced by limiting read access to the sysfs attributes that export this functionality to userspace. \n\nThe command:\n~~~\nsudo chmod 400 /sys/class/powercap/intel_rapl/*/energy_uj\n~~~\nWill do this for the current boot, it will need to be scripted to run at each boot to remain persistent across reboots.", "product_ids": [ "7Server-7.4.AUS:microcode_ctl-2:2.1-22.41.el7_4.src", "7Server-7.4.AUS:microcode_ctl-2:2.1-22.41.el7_4.x86_64", "7Server-7.4.AUS:microcode_ctl-debuginfo-2:2.1-22.41.el7_4.x86_64", "7Server-7.4.E4S:microcode_ctl-2:2.1-22.41.el7_4.src", "7Server-7.4.E4S:microcode_ctl-2:2.1-22.41.el7_4.x86_64", "7Server-7.4.E4S:microcode_ctl-debuginfo-2:2.1-22.41.el7_4.x86_64", "7Server-7.4.TUS:microcode_ctl-2:2.1-22.41.el7_4.src", "7Server-7.4.TUS:microcode_ctl-2:2.1-22.41.el7_4.x86_64", "7Server-7.4.TUS:microcode_ctl-debuginfo-2:2.1-22.41.el7_4.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "7Server-7.4.AUS:microcode_ctl-2:2.1-22.41.el7_4.src", "7Server-7.4.AUS:microcode_ctl-2:2.1-22.41.el7_4.x86_64", "7Server-7.4.AUS:microcode_ctl-debuginfo-2:2.1-22.41.el7_4.x86_64", "7Server-7.4.E4S:microcode_ctl-2:2.1-22.41.el7_4.src", "7Server-7.4.E4S:microcode_ctl-2:2.1-22.41.el7_4.x86_64", "7Server-7.4.E4S:microcode_ctl-debuginfo-2:2.1-22.41.el7_4.x86_64", "7Server-7.4.TUS:microcode_ctl-2:2.1-22.41.el7_4.src", "7Server-7.4.TUS:microcode_ctl-2:2.1-22.41.el7_4.x86_64", "7Server-7.4.TUS:microcode_ctl-debuginfo-2:2.1-22.41.el7_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "hw: Information disclosure issue in Intel SGX via RAPL interface" }, { "acknowledgments": [ { "names": [ "Intel" ] } ], "cve": "CVE-2020-8696", "cwe": { "id": "CWE-212", "name": "Improper Removal of Sensitive Information Before Storage or Transfer" }, "discovery_date": "2020-10-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1890355" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Intel Advanced Vector Extensions (AVX) implementation, where a local authenticated attacker with the ability to execute AVX instructions can gather the AVX register state from previous AVX executions. This vulnerability allows information disclosure of the AVX register state.", "title": "Vulnerability description" }, { "category": "summary", "text": "hw: Vector Register Leakage-Active", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-7.4.AUS:microcode_ctl-2:2.1-22.41.el7_4.src", "7Server-7.4.AUS:microcode_ctl-2:2.1-22.41.el7_4.x86_64", "7Server-7.4.AUS:microcode_ctl-debuginfo-2:2.1-22.41.el7_4.x86_64", "7Server-7.4.E4S:microcode_ctl-2:2.1-22.41.el7_4.src", "7Server-7.4.E4S:microcode_ctl-2:2.1-22.41.el7_4.x86_64", "7Server-7.4.E4S:microcode_ctl-debuginfo-2:2.1-22.41.el7_4.x86_64", "7Server-7.4.TUS:microcode_ctl-2:2.1-22.41.el7_4.src", "7Server-7.4.TUS:microcode_ctl-2:2.1-22.41.el7_4.x86_64", "7Server-7.4.TUS:microcode_ctl-debuginfo-2:2.1-22.41.el7_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-8696" }, { "category": "external", "summary": "RHBZ#1890355", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890355" }, { "category": "external", "summary": "RHSB-5569051", "url": "https://access.redhat.com/articles/5569051" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-8696", "url": "https://www.cve.org/CVERecord?id=CVE-2020-8696" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-8696", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8696" }, { "category": "external", "summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00381.html", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00381.html" } ], "release_date": "2020-11-10T13:55:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-08-24T10:01:08+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-7.4.AUS:microcode_ctl-2:2.1-22.41.el7_4.src", "7Server-7.4.AUS:microcode_ctl-2:2.1-22.41.el7_4.x86_64", "7Server-7.4.AUS:microcode_ctl-debuginfo-2:2.1-22.41.el7_4.x86_64", "7Server-7.4.E4S:microcode_ctl-2:2.1-22.41.el7_4.src", "7Server-7.4.E4S:microcode_ctl-2:2.1-22.41.el7_4.x86_64", "7Server-7.4.E4S:microcode_ctl-debuginfo-2:2.1-22.41.el7_4.x86_64", "7Server-7.4.TUS:microcode_ctl-2:2.1-22.41.el7_4.src", "7Server-7.4.TUS:microcode_ctl-2:2.1-22.41.el7_4.x86_64", "7Server-7.4.TUS:microcode_ctl-debuginfo-2:2.1-22.41.el7_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3255" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 2.8, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.1" }, "products": [ "7Server-7.4.AUS:microcode_ctl-2:2.1-22.41.el7_4.src", "7Server-7.4.AUS:microcode_ctl-2:2.1-22.41.el7_4.x86_64", "7Server-7.4.AUS:microcode_ctl-debuginfo-2:2.1-22.41.el7_4.x86_64", "7Server-7.4.E4S:microcode_ctl-2:2.1-22.41.el7_4.src", "7Server-7.4.E4S:microcode_ctl-2:2.1-22.41.el7_4.x86_64", "7Server-7.4.E4S:microcode_ctl-debuginfo-2:2.1-22.41.el7_4.x86_64", "7Server-7.4.TUS:microcode_ctl-2:2.1-22.41.el7_4.src", "7Server-7.4.TUS:microcode_ctl-2:2.1-22.41.el7_4.x86_64", "7Server-7.4.TUS:microcode_ctl-debuginfo-2:2.1-22.41.el7_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "hw: Vector Register Leakage-Active" }, { "acknowledgments": [ { "names": [ "Intel" ] } ], "cve": "CVE-2020-8698", "cwe": { "id": "CWE-212", "name": "Improper Removal of Sensitive Information Before Storage or Transfer" }, "discovery_date": "2020-10-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1890356" } ], "notes": [ { "category": "description", "text": "A flaw was found in the CPU microarchitecture where a local attacker is able to abuse a timing issue which may allow them to infer internal architectural state from previous executions on the CPU.", "title": "Vulnerability description" }, { "category": "summary", "text": "hw: Fast forward store predictor", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-7.4.AUS:microcode_ctl-2:2.1-22.41.el7_4.src", "7Server-7.4.AUS:microcode_ctl-2:2.1-22.41.el7_4.x86_64", "7Server-7.4.AUS:microcode_ctl-debuginfo-2:2.1-22.41.el7_4.x86_64", "7Server-7.4.E4S:microcode_ctl-2:2.1-22.41.el7_4.src", "7Server-7.4.E4S:microcode_ctl-2:2.1-22.41.el7_4.x86_64", "7Server-7.4.E4S:microcode_ctl-debuginfo-2:2.1-22.41.el7_4.x86_64", "7Server-7.4.TUS:microcode_ctl-2:2.1-22.41.el7_4.src", "7Server-7.4.TUS:microcode_ctl-2:2.1-22.41.el7_4.x86_64", "7Server-7.4.TUS:microcode_ctl-debuginfo-2:2.1-22.41.el7_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-8698" }, { "category": "external", "summary": "RHBZ#1890356", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890356" }, { "category": "external", "summary": "RHSB-5569051", "url": "https://access.redhat.com/articles/5569051" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-8698", "url": "https://www.cve.org/CVERecord?id=CVE-2020-8698" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-8698", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8698" }, { "category": "external", "summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00381.html", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00381.html" } ], "release_date": "2020-11-10T13:55:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-08-24T10:01:08+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-7.4.AUS:microcode_ctl-2:2.1-22.41.el7_4.src", "7Server-7.4.AUS:microcode_ctl-2:2.1-22.41.el7_4.x86_64", "7Server-7.4.AUS:microcode_ctl-debuginfo-2:2.1-22.41.el7_4.x86_64", "7Server-7.4.E4S:microcode_ctl-2:2.1-22.41.el7_4.src", "7Server-7.4.E4S:microcode_ctl-2:2.1-22.41.el7_4.x86_64", "7Server-7.4.E4S:microcode_ctl-debuginfo-2:2.1-22.41.el7_4.x86_64", "7Server-7.4.TUS:microcode_ctl-2:2.1-22.41.el7_4.src", "7Server-7.4.TUS:microcode_ctl-2:2.1-22.41.el7_4.x86_64", "7Server-7.4.TUS:microcode_ctl-debuginfo-2:2.1-22.41.el7_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3255" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "7Server-7.4.AUS:microcode_ctl-2:2.1-22.41.el7_4.src", "7Server-7.4.AUS:microcode_ctl-2:2.1-22.41.el7_4.x86_64", "7Server-7.4.AUS:microcode_ctl-debuginfo-2:2.1-22.41.el7_4.x86_64", "7Server-7.4.E4S:microcode_ctl-2:2.1-22.41.el7_4.src", "7Server-7.4.E4S:microcode_ctl-2:2.1-22.41.el7_4.x86_64", "7Server-7.4.E4S:microcode_ctl-debuginfo-2:2.1-22.41.el7_4.x86_64", "7Server-7.4.TUS:microcode_ctl-2:2.1-22.41.el7_4.src", "7Server-7.4.TUS:microcode_ctl-2:2.1-22.41.el7_4.x86_64", "7Server-7.4.TUS:microcode_ctl-debuginfo-2:2.1-22.41.el7_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "hw: Fast forward store predictor" }, { "acknowledgments": [ { "names": [ "Intel" ] } ], "cve": "CVE-2020-24489", "cwe": { "id": "CWE-459", "name": "Incomplete Cleanup" }, "discovery_date": "2021-05-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1962650" } ], "notes": [ { "category": "description", "text": "A flaw was found in Intel\u00ae VT-d products. Entries from the context cache on some types of context cache invalidations may not be properly invalidated which may allow an authenticated user to potentially enable escalation of privilege via local access. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "hw: vt-d related privilege escalation", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-7.4.AUS:microcode_ctl-2:2.1-22.41.el7_4.src", "7Server-7.4.AUS:microcode_ctl-2:2.1-22.41.el7_4.x86_64", "7Server-7.4.AUS:microcode_ctl-debuginfo-2:2.1-22.41.el7_4.x86_64", "7Server-7.4.E4S:microcode_ctl-2:2.1-22.41.el7_4.src", "7Server-7.4.E4S:microcode_ctl-2:2.1-22.41.el7_4.x86_64", "7Server-7.4.E4S:microcode_ctl-debuginfo-2:2.1-22.41.el7_4.x86_64", "7Server-7.4.TUS:microcode_ctl-2:2.1-22.41.el7_4.src", "7Server-7.4.TUS:microcode_ctl-2:2.1-22.41.el7_4.x86_64", "7Server-7.4.TUS:microcode_ctl-debuginfo-2:2.1-22.41.el7_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-24489" }, { "category": "external", "summary": "RHBZ#1962650", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1962650" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-24489", "url": "https://www.cve.org/CVERecord?id=CVE-2020-24489" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-24489", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-24489" } ], "release_date": "2021-06-08T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-08-24T10:01:08+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-7.4.AUS:microcode_ctl-2:2.1-22.41.el7_4.src", "7Server-7.4.AUS:microcode_ctl-2:2.1-22.41.el7_4.x86_64", "7Server-7.4.AUS:microcode_ctl-debuginfo-2:2.1-22.41.el7_4.x86_64", "7Server-7.4.E4S:microcode_ctl-2:2.1-22.41.el7_4.src", "7Server-7.4.E4S:microcode_ctl-2:2.1-22.41.el7_4.x86_64", "7Server-7.4.E4S:microcode_ctl-debuginfo-2:2.1-22.41.el7_4.x86_64", "7Server-7.4.TUS:microcode_ctl-2:2.1-22.41.el7_4.src", "7Server-7.4.TUS:microcode_ctl-2:2.1-22.41.el7_4.x86_64", "7Server-7.4.TUS:microcode_ctl-debuginfo-2:2.1-22.41.el7_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3255" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-7.4.AUS:microcode_ctl-2:2.1-22.41.el7_4.src", "7Server-7.4.AUS:microcode_ctl-2:2.1-22.41.el7_4.x86_64", "7Server-7.4.AUS:microcode_ctl-debuginfo-2:2.1-22.41.el7_4.x86_64", "7Server-7.4.E4S:microcode_ctl-2:2.1-22.41.el7_4.src", "7Server-7.4.E4S:microcode_ctl-2:2.1-22.41.el7_4.x86_64", "7Server-7.4.E4S:microcode_ctl-debuginfo-2:2.1-22.41.el7_4.x86_64", "7Server-7.4.TUS:microcode_ctl-2:2.1-22.41.el7_4.src", "7Server-7.4.TUS:microcode_ctl-2:2.1-22.41.el7_4.x86_64", "7Server-7.4.TUS:microcode_ctl-debuginfo-2:2.1-22.41.el7_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "hw: vt-d related privilege escalation" }, { "acknowledgments": [ { "names": [ "Intel" ] } ], "cve": "CVE-2020-24511", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2021-05-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1962702" } ], "notes": [ { "category": "description", "text": "Microcode misconfiguration in some Intel processors may cause EIBRS mitigation (CVE-2017-5715) to be incomplete. As a consequence, this issue may allow an authenticated user to potentially enable information disclosure via local access.", "title": "Vulnerability description" }, { "category": "summary", "text": "hw: improper isolation of shared resources in some Intel Processors", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-7.4.AUS:microcode_ctl-2:2.1-22.41.el7_4.src", "7Server-7.4.AUS:microcode_ctl-2:2.1-22.41.el7_4.x86_64", "7Server-7.4.AUS:microcode_ctl-debuginfo-2:2.1-22.41.el7_4.x86_64", "7Server-7.4.E4S:microcode_ctl-2:2.1-22.41.el7_4.src", "7Server-7.4.E4S:microcode_ctl-2:2.1-22.41.el7_4.x86_64", "7Server-7.4.E4S:microcode_ctl-debuginfo-2:2.1-22.41.el7_4.x86_64", "7Server-7.4.TUS:microcode_ctl-2:2.1-22.41.el7_4.src", "7Server-7.4.TUS:microcode_ctl-2:2.1-22.41.el7_4.x86_64", "7Server-7.4.TUS:microcode_ctl-debuginfo-2:2.1-22.41.el7_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-24511" }, { "category": "external", "summary": "RHBZ#1962702", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1962702" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-24511", "url": "https://www.cve.org/CVERecord?id=CVE-2020-24511" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-24511", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-24511" } ], "release_date": "2021-06-08T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-08-24T10:01:08+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-7.4.AUS:microcode_ctl-2:2.1-22.41.el7_4.src", "7Server-7.4.AUS:microcode_ctl-2:2.1-22.41.el7_4.x86_64", "7Server-7.4.AUS:microcode_ctl-debuginfo-2:2.1-22.41.el7_4.x86_64", "7Server-7.4.E4S:microcode_ctl-2:2.1-22.41.el7_4.src", "7Server-7.4.E4S:microcode_ctl-2:2.1-22.41.el7_4.x86_64", "7Server-7.4.E4S:microcode_ctl-debuginfo-2:2.1-22.41.el7_4.x86_64", "7Server-7.4.TUS:microcode_ctl-2:2.1-22.41.el7_4.src", "7Server-7.4.TUS:microcode_ctl-2:2.1-22.41.el7_4.x86_64", "7Server-7.4.TUS:microcode_ctl-debuginfo-2:2.1-22.41.el7_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3255" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "7Server-7.4.AUS:microcode_ctl-2:2.1-22.41.el7_4.src", "7Server-7.4.AUS:microcode_ctl-2:2.1-22.41.el7_4.x86_64", "7Server-7.4.AUS:microcode_ctl-debuginfo-2:2.1-22.41.el7_4.x86_64", "7Server-7.4.E4S:microcode_ctl-2:2.1-22.41.el7_4.src", "7Server-7.4.E4S:microcode_ctl-2:2.1-22.41.el7_4.x86_64", "7Server-7.4.E4S:microcode_ctl-debuginfo-2:2.1-22.41.el7_4.x86_64", "7Server-7.4.TUS:microcode_ctl-2:2.1-22.41.el7_4.src", "7Server-7.4.TUS:microcode_ctl-2:2.1-22.41.el7_4.x86_64", "7Server-7.4.TUS:microcode_ctl-debuginfo-2:2.1-22.41.el7_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "hw: improper isolation of shared resources in some Intel Processors" }, { "acknowledgments": [ { "names": [ "Intel" ] } ], "cve": "CVE-2020-24512", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2021-05-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1962722" } ], "notes": [ { "category": "description", "text": "Observable timing discrepancy in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.", "title": "Vulnerability description" }, { "category": "summary", "text": "hw: observable timing discrepancy in some Intel Processors", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-7.4.AUS:microcode_ctl-2:2.1-22.41.el7_4.src", "7Server-7.4.AUS:microcode_ctl-2:2.1-22.41.el7_4.x86_64", "7Server-7.4.AUS:microcode_ctl-debuginfo-2:2.1-22.41.el7_4.x86_64", "7Server-7.4.E4S:microcode_ctl-2:2.1-22.41.el7_4.src", "7Server-7.4.E4S:microcode_ctl-2:2.1-22.41.el7_4.x86_64", "7Server-7.4.E4S:microcode_ctl-debuginfo-2:2.1-22.41.el7_4.x86_64", "7Server-7.4.TUS:microcode_ctl-2:2.1-22.41.el7_4.src", "7Server-7.4.TUS:microcode_ctl-2:2.1-22.41.el7_4.x86_64", "7Server-7.4.TUS:microcode_ctl-debuginfo-2:2.1-22.41.el7_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-24512" }, { "category": "external", "summary": "RHBZ#1962722", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1962722" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-24512", "url": "https://www.cve.org/CVERecord?id=CVE-2020-24512" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-24512", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-24512" } ], "release_date": "2021-06-08T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-08-24T10:01:08+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-7.4.AUS:microcode_ctl-2:2.1-22.41.el7_4.src", "7Server-7.4.AUS:microcode_ctl-2:2.1-22.41.el7_4.x86_64", "7Server-7.4.AUS:microcode_ctl-debuginfo-2:2.1-22.41.el7_4.x86_64", "7Server-7.4.E4S:microcode_ctl-2:2.1-22.41.el7_4.src", "7Server-7.4.E4S:microcode_ctl-2:2.1-22.41.el7_4.x86_64", "7Server-7.4.E4S:microcode_ctl-debuginfo-2:2.1-22.41.el7_4.x86_64", "7Server-7.4.TUS:microcode_ctl-2:2.1-22.41.el7_4.src", "7Server-7.4.TUS:microcode_ctl-2:2.1-22.41.el7_4.x86_64", "7Server-7.4.TUS:microcode_ctl-debuginfo-2:2.1-22.41.el7_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3255" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 2.8, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.1" }, "products": [ "7Server-7.4.AUS:microcode_ctl-2:2.1-22.41.el7_4.src", "7Server-7.4.AUS:microcode_ctl-2:2.1-22.41.el7_4.x86_64", "7Server-7.4.AUS:microcode_ctl-debuginfo-2:2.1-22.41.el7_4.x86_64", "7Server-7.4.E4S:microcode_ctl-2:2.1-22.41.el7_4.src", "7Server-7.4.E4S:microcode_ctl-2:2.1-22.41.el7_4.x86_64", "7Server-7.4.E4S:microcode_ctl-debuginfo-2:2.1-22.41.el7_4.x86_64", "7Server-7.4.TUS:microcode_ctl-2:2.1-22.41.el7_4.src", "7Server-7.4.TUS:microcode_ctl-2:2.1-22.41.el7_4.x86_64", "7Server-7.4.TUS:microcode_ctl-debuginfo-2:2.1-22.41.el7_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "hw: observable timing discrepancy in some Intel Processors" } ] }
rhsa-2021:3176
Vulnerability from csaf_redhat
Published
2021-08-17 08:33
Modified
2025-08-02 09:53
Summary
Red Hat Security Advisory: microcode_ctl security, bug fix and enhancement update
Notes
Topic
An update for microcode_ctl is now available for Red Hat Enterprise Linux 8.1 Extended Update Support.
Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.
Details
The microcode_ctl packages provide microcode updates for Intel.
Security Fixes:
* hw: Vector Register Data Sampling (CVE-2020-0548)
* hw: L1D Cache Eviction Sampling (CVE-2020-0549)
* hw: Special Register Buffer Data Sampling (SRBDS) (CVE-2020-0543)
* hw: Information disclosure issue in Intel SGX via RAPL interface (CVE-2020-8695)
* hw: Vector Register Leakage-Active (CVE-2020-8696)
* hw: Fast forward store predictor (CVE-2020-8698)
* hw: vt-d related privilege escalation (CVE-2020-24489)
* hw: improper isolation of shared resources in some Intel Processors (CVE-2020-24511)
* hw: observable timing discrepancy in some Intel Processors (CVE-2020-24512)
Bug Fix(es):
* [rhel-8.1.0.z] Re-enable 06-5e-03 (SKL-H/S, CPUID 0x506e3) latest microcode updates (BZ#1972327)
* [rhel-8.1.0.z] Re-enable 06-8c-01 (TGL-UP3/UP4, CPUID 0x806c1) latest microcode updates (BZ#1972331)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for microcode_ctl is now available for Red Hat Enterprise Linux 8.1 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact\nof Important. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available for each vulnerability\nfrom the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The microcode_ctl packages provide microcode updates for Intel.\n\nSecurity Fixes:\n\n* hw: Vector Register Data Sampling (CVE-2020-0548)\n\n* hw: L1D Cache Eviction Sampling (CVE-2020-0549)\n\n* hw: Special Register Buffer Data Sampling (SRBDS) (CVE-2020-0543)\n\n* hw: Information disclosure issue in Intel SGX via RAPL interface (CVE-2020-8695)\n\n* hw: Vector Register Leakage-Active (CVE-2020-8696)\n\n* hw: Fast forward store predictor (CVE-2020-8698)\n\n* hw: vt-d related privilege escalation (CVE-2020-24489)\n\n* hw: improper isolation of shared resources in some Intel Processors (CVE-2020-24511)\n\n* hw: observable timing discrepancy in some Intel Processors (CVE-2020-24512)\n\nBug Fix(es):\n\n* [rhel-8.1.0.z] Re-enable 06-5e-03 (SKL-H/S, CPUID 0x506e3) latest microcode updates (BZ#1972327)\n\n* [rhel-8.1.0.z] Re-enable 06-8c-01 (TGL-UP3/UP4, CPUID 0x806c1) latest microcode updates (BZ#1972331)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2021:3176", "url": "https://access.redhat.com/errata/RHSA-2021:3176" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1788786", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1788786" }, { "category": "external", "summary": "1788788", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1788788" }, { "category": "external", "summary": "1827165", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1827165" }, { "category": "external", "summary": "1828583", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1828583" }, { "category": "external", "summary": "1890355", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890355" }, { "category": "external", "summary": "1890356", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890356" }, { "category": "external", "summary": "1962650", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1962650" }, { "category": "external", "summary": "1962702", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1962702" }, { "category": "external", "summary": "1962722", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1962722" }, { "category": "external", "summary": "1972327", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1972327" }, { "category": "external", "summary": "1972331", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1972331" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3176.json" } ], "title": "Red Hat Security Advisory: microcode_ctl security, bug fix and enhancement update", "tracking": { "current_release_date": "2025-08-02T09:53:36+00:00", "generator": { "date": "2025-08-02T09:53:36+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2021:3176", "initial_release_date": "2021-08-17T08:33:36+00:00", "revision_history": [ { "date": "2021-08-17T08:33:36+00:00", "number": "1", "summary": "Initial version" }, { "date": "2021-08-17T08:33:36+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-02T09:53:36+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product": { "name": "Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:8.1::baseos" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "microcode_ctl-4:20190618-1.20210608.1.el8_1.src", "product": { "name": "microcode_ctl-4:20190618-1.20210608.1.el8_1.src", "product_id": "microcode_ctl-4:20190618-1.20210608.1.el8_1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/microcode_ctl@20190618-1.20210608.1.el8_1?arch=src\u0026epoch=4" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "microcode_ctl-4:20190618-1.20210608.1.el8_1.x86_64", "product": { "name": "microcode_ctl-4:20190618-1.20210608.1.el8_1.x86_64", "product_id": "microcode_ctl-4:20190618-1.20210608.1.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/microcode_ctl@20190618-1.20210608.1.el8_1?arch=x86_64\u0026epoch=4" } } } ], "category": "architecture", "name": "x86_64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "microcode_ctl-4:20190618-1.20210608.1.el8_1.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:microcode_ctl-4:20190618-1.20210608.1.el8_1.src" }, "product_reference": "microcode_ctl-4:20190618-1.20210608.1.el8_1.src", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "microcode_ctl-4:20190618-1.20210608.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:microcode_ctl-4:20190618-1.20210608.1.el8_1.x86_64" }, "product_reference": "microcode_ctl-4:20190618-1.20210608.1.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Intel" ] } ], "cve": "CVE-2020-0543", "discovery_date": "2020-04-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1827165" } ], "notes": [ { "category": "description", "text": "A new domain bypass transient execution attack known as Special Register Buffer Data Sampling (SRBDS) has been found. This flaw allows data values from special internal registers to be leaked by an attacker able to execute code on any core of the CPU. An unprivileged, local attacker can use this flaw to infer values returned by affected instructions known to be commonly used during cryptographic operations that rely on uniqueness, secrecy, or both.", "title": "Vulnerability description" }, { "category": "summary", "text": "hw: Special Register Buffer Data Sampling (SRBDS)", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/solutions/5142691", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.1.0.Z.EUS:microcode_ctl-4:20190618-1.20210608.1.el8_1.src", "BaseOS-8.1.0.Z.EUS:microcode_ctl-4:20190618-1.20210608.1.el8_1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-0543" }, { "category": "external", "summary": "RHBZ#1827165", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1827165" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-0543", "url": "https://www.cve.org/CVERecord?id=CVE-2020-0543" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-0543", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-0543" }, { "category": "external", "summary": "https://access.redhat.com/solutions/5142691", "url": "https://access.redhat.com/solutions/5142691" }, { "category": "external", "summary": "https://access.redhat.com/solutions/5142751", "url": "https://access.redhat.com/solutions/5142751" }, { "category": "external", "summary": "https://blogs.intel.com/technology/2020/06/ipas-security-advisories-for-june-2020/#gs.6uyhri", "url": "https://blogs.intel.com/technology/2020/06/ipas-security-advisories-for-june-2020/#gs.6uyhri" }, { "category": "external", "summary": "https://software.intel.com/security-software-guidance/insights/deep-dive-special-register-buffer-data-sampling", "url": "https://software.intel.com/security-software-guidance/insights/deep-dive-special-register-buffer-data-sampling" }, { "category": "external", "summary": "https://xenbits.xen.org/xsa/advisory-320.html", "url": "https://xenbits.xen.org/xsa/advisory-320.html" } ], "release_date": "2020-06-09T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-08-17T08:33:36+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "BaseOS-8.1.0.Z.EUS:microcode_ctl-4:20190618-1.20210608.1.el8_1.src", "BaseOS-8.1.0.Z.EUS:microcode_ctl-4:20190618-1.20210608.1.el8_1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3176" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "BaseOS-8.1.0.Z.EUS:microcode_ctl-4:20190618-1.20210608.1.el8_1.src", "BaseOS-8.1.0.Z.EUS:microcode_ctl-4:20190618-1.20210608.1.el8_1.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "BaseOS-8.1.0.Z.EUS:microcode_ctl-4:20190618-1.20210608.1.el8_1.src", "BaseOS-8.1.0.Z.EUS:microcode_ctl-4:20190618-1.20210608.1.el8_1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "hw: Special Register Buffer Data Sampling (SRBDS)" }, { "cve": "CVE-2020-0548", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2020-01-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1788786" } ], "notes": [ { "category": "description", "text": "A flaw was found in Intel processors where a local attacker is able to gain information about registers used for vector calculations by observing register states from other processes running on the system. This results in a race condition where store buffers, which were not cleared, could be read by another process or a CPU sibling. The highest threat from this vulnerability is data confidentiality where an attacker could read arbitrary data as it passes through the processor.", "title": "Vulnerability description" }, { "category": "summary", "text": "hw: Vector Register Data Sampling", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.1.0.Z.EUS:microcode_ctl-4:20190618-1.20210608.1.el8_1.src", "BaseOS-8.1.0.Z.EUS:microcode_ctl-4:20190618-1.20210608.1.el8_1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-0548" }, { "category": "external", "summary": "RHBZ#1788786", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1788786" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-0548", "url": "https://www.cve.org/CVERecord?id=CVE-2020-0548" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-0548", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-0548" }, { "category": "external", "summary": "https://access.redhat.com/solutions/l1d-cache-eviction-and-vector-register-sampling", "url": "https://access.redhat.com/solutions/l1d-cache-eviction-and-vector-register-sampling" }, { "category": "external", "summary": "https://blogs.intel.com/technology/2020/01/ipas-intel-sa-00329/", "url": "https://blogs.intel.com/technology/2020/01/ipas-intel-sa-00329/" }, { "category": "external", "summary": "https://cacheoutattack.com/CacheOut.pdf", "url": "https://cacheoutattack.com/CacheOut.pdf" }, { "category": "external", "summary": "https://software.intel.com/security-software-guidance/software-guidance/l1d-eviction-sampling", "url": "https://software.intel.com/security-software-guidance/software-guidance/l1d-eviction-sampling" } ], "release_date": "2020-01-27T13:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-08-17T08:33:36+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "BaseOS-8.1.0.Z.EUS:microcode_ctl-4:20190618-1.20210608.1.el8_1.src", "BaseOS-8.1.0.Z.EUS:microcode_ctl-4:20190618-1.20210608.1.el8_1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3176" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 2.8, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.0" }, "products": [ "BaseOS-8.1.0.Z.EUS:microcode_ctl-4:20190618-1.20210608.1.el8_1.src", "BaseOS-8.1.0.Z.EUS:microcode_ctl-4:20190618-1.20210608.1.el8_1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "hw: Vector Register Data Sampling" }, { "cve": "CVE-2020-0549", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2020-01-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1788788" } ], "notes": [ { "category": "description", "text": "A microarchitectural timing flaw was found on some Intel processors. A corner case exists where data in-flight during the eviction process can end up in the \u201cfill buffers\u201d and not properly cleared by the MDS mitigations. The fill buffer contents (which were expected to be blank) can be inferred using MDS or TAA style attack methods to allow a local attacker to infer fill buffer values.", "title": "Vulnerability description" }, { "category": "summary", "text": "hw: L1D Cache Eviction Sampling", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.1.0.Z.EUS:microcode_ctl-4:20190618-1.20210608.1.el8_1.src", "BaseOS-8.1.0.Z.EUS:microcode_ctl-4:20190618-1.20210608.1.el8_1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-0549" }, { "category": "external", "summary": "RHBZ#1788788", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1788788" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-0549", "url": "https://www.cve.org/CVERecord?id=CVE-2020-0549" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-0549", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-0549" }, { "category": "external", "summary": "https://access.redhat.com/solutions/l1d-cache-eviction-and-vector-register-sampling", "url": "https://access.redhat.com/solutions/l1d-cache-eviction-and-vector-register-sampling" }, { "category": "external", "summary": "https://blogs.intel.com/technology/2020/01/ipas-intel-sa-00329/", "url": "https://blogs.intel.com/technology/2020/01/ipas-intel-sa-00329/" }, { "category": "external", "summary": "https://cacheoutattack.com/CacheOut.pdf", "url": "https://cacheoutattack.com/CacheOut.pdf" }, { "category": "external", "summary": "https://software.intel.com/security-software-guidance/software-guidance/l1d-eviction-sampling", "url": "https://software.intel.com/security-software-guidance/software-guidance/l1d-eviction-sampling" } ], "release_date": "2020-01-27T13:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-08-17T08:33:36+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "BaseOS-8.1.0.Z.EUS:microcode_ctl-4:20190618-1.20210608.1.el8_1.src", "BaseOS-8.1.0.Z.EUS:microcode_ctl-4:20190618-1.20210608.1.el8_1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3176" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "BaseOS-8.1.0.Z.EUS:microcode_ctl-4:20190618-1.20210608.1.el8_1.src", "BaseOS-8.1.0.Z.EUS:microcode_ctl-4:20190618-1.20210608.1.el8_1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "hw: L1D Cache Eviction Sampling" }, { "acknowledgments": [ { "names": [ "Intel" ] } ], "cve": "CVE-2020-8695", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2020-04-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1828583" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in Intel\u0027s implementation of RAPL (Running Average Power Limit). An attacker with a local account could query the power management functionality to intelligently infer SGX enclave computation values by measuring power usage in the RAPL subsystem.", "title": "Vulnerability description" }, { "category": "summary", "text": "hw: Information disclosure issue in Intel SGX via RAPL interface", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.1.0.Z.EUS:microcode_ctl-4:20190618-1.20210608.1.el8_1.src", "BaseOS-8.1.0.Z.EUS:microcode_ctl-4:20190618-1.20210608.1.el8_1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-8695" }, { "category": "external", "summary": "RHBZ#1828583", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1828583" }, { "category": "external", "summary": "RHSB-5569051", "url": "https://access.redhat.com/articles/5569051" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-8695", "url": "https://www.cve.org/CVERecord?id=CVE-2020-8695" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-8695", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8695" }, { "category": "external", "summary": "https://en.wikipedia.org/wiki/Power_analysis", "url": "https://en.wikipedia.org/wiki/Power_analysis" }, { "category": "external", "summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00389.html", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00389.html" } ], "release_date": "2020-11-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-08-17T08:33:36+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "BaseOS-8.1.0.Z.EUS:microcode_ctl-4:20190618-1.20210608.1.el8_1.src", "BaseOS-8.1.0.Z.EUS:microcode_ctl-4:20190618-1.20210608.1.el8_1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3176" }, { "category": "workaround", "details": "Until a firmware update and reboot can be applied, the attack vector can be reduced by limiting read access to the sysfs attributes that export this functionality to userspace. \n\nThe command:\n~~~\nsudo chmod 400 /sys/class/powercap/intel_rapl/*/energy_uj\n~~~\nWill do this for the current boot, it will need to be scripted to run at each boot to remain persistent across reboots.", "product_ids": [ "BaseOS-8.1.0.Z.EUS:microcode_ctl-4:20190618-1.20210608.1.el8_1.src", "BaseOS-8.1.0.Z.EUS:microcode_ctl-4:20190618-1.20210608.1.el8_1.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "BaseOS-8.1.0.Z.EUS:microcode_ctl-4:20190618-1.20210608.1.el8_1.src", "BaseOS-8.1.0.Z.EUS:microcode_ctl-4:20190618-1.20210608.1.el8_1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "hw: Information disclosure issue in Intel SGX via RAPL interface" }, { "acknowledgments": [ { "names": [ "Intel" ] } ], "cve": "CVE-2020-8696", "cwe": { "id": "CWE-212", "name": "Improper Removal of Sensitive Information Before Storage or Transfer" }, "discovery_date": "2020-10-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1890355" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Intel Advanced Vector Extensions (AVX) implementation, where a local authenticated attacker with the ability to execute AVX instructions can gather the AVX register state from previous AVX executions. This vulnerability allows information disclosure of the AVX register state.", "title": "Vulnerability description" }, { "category": "summary", "text": "hw: Vector Register Leakage-Active", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.1.0.Z.EUS:microcode_ctl-4:20190618-1.20210608.1.el8_1.src", "BaseOS-8.1.0.Z.EUS:microcode_ctl-4:20190618-1.20210608.1.el8_1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-8696" }, { "category": "external", "summary": "RHBZ#1890355", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890355" }, { "category": "external", "summary": "RHSB-5569051", "url": "https://access.redhat.com/articles/5569051" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-8696", "url": "https://www.cve.org/CVERecord?id=CVE-2020-8696" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-8696", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8696" }, { "category": "external", "summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00381.html", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00381.html" } ], "release_date": "2020-11-10T13:55:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-08-17T08:33:36+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "BaseOS-8.1.0.Z.EUS:microcode_ctl-4:20190618-1.20210608.1.el8_1.src", "BaseOS-8.1.0.Z.EUS:microcode_ctl-4:20190618-1.20210608.1.el8_1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3176" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 2.8, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.1" }, "products": [ "BaseOS-8.1.0.Z.EUS:microcode_ctl-4:20190618-1.20210608.1.el8_1.src", "BaseOS-8.1.0.Z.EUS:microcode_ctl-4:20190618-1.20210608.1.el8_1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "hw: Vector Register Leakage-Active" }, { "acknowledgments": [ { "names": [ "Intel" ] } ], "cve": "CVE-2020-8698", "cwe": { "id": "CWE-212", "name": "Improper Removal of Sensitive Information Before Storage or Transfer" }, "discovery_date": "2020-10-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1890356" } ], "notes": [ { "category": "description", "text": "A flaw was found in the CPU microarchitecture where a local attacker is able to abuse a timing issue which may allow them to infer internal architectural state from previous executions on the CPU.", "title": "Vulnerability description" }, { "category": "summary", "text": "hw: Fast forward store predictor", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.1.0.Z.EUS:microcode_ctl-4:20190618-1.20210608.1.el8_1.src", "BaseOS-8.1.0.Z.EUS:microcode_ctl-4:20190618-1.20210608.1.el8_1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-8698" }, { "category": "external", "summary": "RHBZ#1890356", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890356" }, { "category": "external", "summary": "RHSB-5569051", "url": "https://access.redhat.com/articles/5569051" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-8698", "url": "https://www.cve.org/CVERecord?id=CVE-2020-8698" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-8698", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8698" }, { "category": "external", "summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00381.html", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00381.html" } ], "release_date": "2020-11-10T13:55:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-08-17T08:33:36+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "BaseOS-8.1.0.Z.EUS:microcode_ctl-4:20190618-1.20210608.1.el8_1.src", "BaseOS-8.1.0.Z.EUS:microcode_ctl-4:20190618-1.20210608.1.el8_1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3176" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "BaseOS-8.1.0.Z.EUS:microcode_ctl-4:20190618-1.20210608.1.el8_1.src", "BaseOS-8.1.0.Z.EUS:microcode_ctl-4:20190618-1.20210608.1.el8_1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "hw: Fast forward store predictor" }, { "acknowledgments": [ { "names": [ "Intel" ] } ], "cve": "CVE-2020-24489", "cwe": { "id": "CWE-459", "name": "Incomplete Cleanup" }, "discovery_date": "2021-05-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1962650" } ], "notes": [ { "category": "description", "text": "A flaw was found in Intel\u00ae VT-d products. Entries from the context cache on some types of context cache invalidations may not be properly invalidated which may allow an authenticated user to potentially enable escalation of privilege via local access. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "hw: vt-d related privilege escalation", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.1.0.Z.EUS:microcode_ctl-4:20190618-1.20210608.1.el8_1.src", "BaseOS-8.1.0.Z.EUS:microcode_ctl-4:20190618-1.20210608.1.el8_1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-24489" }, { "category": "external", "summary": "RHBZ#1962650", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1962650" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-24489", "url": "https://www.cve.org/CVERecord?id=CVE-2020-24489" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-24489", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-24489" } ], "release_date": "2021-06-08T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-08-17T08:33:36+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "BaseOS-8.1.0.Z.EUS:microcode_ctl-4:20190618-1.20210608.1.el8_1.src", "BaseOS-8.1.0.Z.EUS:microcode_ctl-4:20190618-1.20210608.1.el8_1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3176" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-8.1.0.Z.EUS:microcode_ctl-4:20190618-1.20210608.1.el8_1.src", "BaseOS-8.1.0.Z.EUS:microcode_ctl-4:20190618-1.20210608.1.el8_1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "hw: vt-d related privilege escalation" }, { "acknowledgments": [ { "names": [ "Intel" ] } ], "cve": "CVE-2020-24511", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2021-05-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1962702" } ], "notes": [ { "category": "description", "text": "Microcode misconfiguration in some Intel processors may cause EIBRS mitigation (CVE-2017-5715) to be incomplete. As a consequence, this issue may allow an authenticated user to potentially enable information disclosure via local access.", "title": "Vulnerability description" }, { "category": "summary", "text": "hw: improper isolation of shared resources in some Intel Processors", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.1.0.Z.EUS:microcode_ctl-4:20190618-1.20210608.1.el8_1.src", "BaseOS-8.1.0.Z.EUS:microcode_ctl-4:20190618-1.20210608.1.el8_1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-24511" }, { "category": "external", "summary": "RHBZ#1962702", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1962702" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-24511", "url": "https://www.cve.org/CVERecord?id=CVE-2020-24511" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-24511", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-24511" } ], "release_date": "2021-06-08T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-08-17T08:33:36+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "BaseOS-8.1.0.Z.EUS:microcode_ctl-4:20190618-1.20210608.1.el8_1.src", "BaseOS-8.1.0.Z.EUS:microcode_ctl-4:20190618-1.20210608.1.el8_1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3176" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "BaseOS-8.1.0.Z.EUS:microcode_ctl-4:20190618-1.20210608.1.el8_1.src", "BaseOS-8.1.0.Z.EUS:microcode_ctl-4:20190618-1.20210608.1.el8_1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "hw: improper isolation of shared resources in some Intel Processors" }, { "acknowledgments": [ { "names": [ "Intel" ] } ], "cve": "CVE-2020-24512", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2021-05-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1962722" } ], "notes": [ { "category": "description", "text": "Observable timing discrepancy in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.", "title": "Vulnerability description" }, { "category": "summary", "text": "hw: observable timing discrepancy in some Intel Processors", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.1.0.Z.EUS:microcode_ctl-4:20190618-1.20210608.1.el8_1.src", "BaseOS-8.1.0.Z.EUS:microcode_ctl-4:20190618-1.20210608.1.el8_1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-24512" }, { "category": "external", "summary": "RHBZ#1962722", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1962722" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-24512", "url": "https://www.cve.org/CVERecord?id=CVE-2020-24512" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-24512", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-24512" } ], "release_date": "2021-06-08T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-08-17T08:33:36+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "BaseOS-8.1.0.Z.EUS:microcode_ctl-4:20190618-1.20210608.1.el8_1.src", "BaseOS-8.1.0.Z.EUS:microcode_ctl-4:20190618-1.20210608.1.el8_1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3176" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 2.8, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.1" }, "products": [ "BaseOS-8.1.0.Z.EUS:microcode_ctl-4:20190618-1.20210608.1.el8_1.src", "BaseOS-8.1.0.Z.EUS:microcode_ctl-4:20190618-1.20210608.1.el8_1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "hw: observable timing discrepancy in some Intel Processors" } ] }
rhsa-2020:2706
Vulnerability from csaf_redhat
Published
2020-06-23 15:37
Modified
2025-02-28 01:27
Summary
Red Hat Security Advisory: microcode_ctl security, bug fix and enhancement update
Notes
Topic
Updated microcode_ctl packages that fix several security bugs and add various
enhancements are now available.
Red Hat Product Security has rated this update as having a security impact of
Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a
detailed severity rating, is available for each vulnerability from the CVE
link(s) in the References section.
Details
Security Fix(es):
* hw: Special Register Buffer Data Sampling (SRBDS) (CVE-2020-0543)
* hw: L1D Cache Eviction Sampling (CVE-2020-0549)
* hw: Vector Register Data Sampling (CVE-2020-0548)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE page(s)
listed in the References section.
Bug Fix(es):
* Update Intel CPU microcode to microcode-20200609 release:
- Update of 06-2d-06/0x6d (SNB-E/EN/EP C1/M0) microcode from revision 0x61f
up to 0x621;
- Update of 06-2d-07/0x6d (SNB-E/EN/EP C2/M1) microcode from revision 0x718
up to 0x71a;
- Update of 06-3c-03/0x32 (HSW C0) microcode from revision 0x27 up to 0x28;
- Update of 06-3d-04/0xc0 (BDW-U/Y E0/F0) microcode from revision 0x2e
up to 0x2f;
- Update of 06-45-01/0x72 (HSW-U C0/D0) microcode from revision 0x25
up to 0x26;
- Update of 06-46-01/0x32 (HSW-H C0) microcode from revision 0x1b up to 0x1c;
- Update of 06-47-01/0x22 (BDW-H/Xeon E3 E0/G0) microcode from revision 0x21
up to 0x22;
- Update of 06-4e-03/0xc0 (SKL-U/Y D0) microcode from revision 0xd6
up to 0xdc;
- Update of 06-55-03/0x97 (SKX-SP B1) microcode from revision 0x1000151
up to 0x1000157;
- Update of 06-55-04/0xb7 (SKX-SP H0/M0/U0, SKX-D M1) microcode
(in intel-06-55-04/intel-ucode/06-55-04) from revision 0x2000065
up to 0x2006906;
- Update of 06-55-06/0xbf (CLX-SP B0) microcode from revision 0x400002c
up to 0x4002f01;
- Update of 06-55-07/0xbf (CLX-SP B1) microcode from revision 0x500002c
up to 0x5002f01;
- Update of 06-5e-03/0x36 (SKL-H/S R0/N0) microcode from revision 0xd6
up to 0xdc;
- Update of 06-7e-05/0x80 (ICL-U/Y D1) microcode from revision 0x46
up to 0x78;
- Update of 06-8e-09/0x10 (AML-Y22 H0) microcode from revision 0xca
up to 0xd6;
- Update of 06-8e-09/0xc0 (KBL-U/Y H0) microcode from revision 0xca
up to 0xd6;
- Update of 06-8e-0a/0xc0 (CFL-U43e D0) microcode from revision 0xca
up to 0xd6;
- Update of 06-8e-0b/0xd0 (WHL-U W0) microcode from revision 0xca
up to 0xd6;
- Update of 06-8e-0c/0x94 (AML-Y42 V0, CML-Y42 V0, WHL-U V0) microcode
from revision 0xca up to 0xd6;
- Update of 06-9e-09/0x2a (KBL-G/H/S/X/Xeon E3 B0) microcode from revision
0xca up to 0xd6;
- Update of 06-9e-0a/0x22 (CFL-H/S/Xeon E3 U0) microcode from revision 0xca
up to 0xd6;
- Update of 06-9e-0b/0x02 (CFL-S B0) microcode from revision 0xca up to 0xd6;
- Update of 06-9e-0c/0x22 (CFL-H/S P0) microcode from revision 0xca
up to 0xd6;
- Update of 06-9e-0d/0x22 (CFL-H R0) microcode from revision 0xca up to 0xd6.
* Do not update 06-4e-03 (SKL-U/Y) and 06-5e-03 (SKL-H/S/Xeon E3 v5) to revision
0xdc, use 0xd6 by default.
* Enable 06-2d-07 (SNB-E/EN/EP) caveat by default.
* Enable 06-55-04 (SKL-SP/X/W) caveat by default.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated microcode_ctl packages that fix several security bugs and add various\nenhancements are now available.\n\nRed Hat Product Security has rated this update as having a security impact of\nModerate. A Common Vulnerability Scoring System (CVSS) base score, which gives a\ndetailed severity rating, is available for each vulnerability from the CVE\nlink(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Security Fix(es):\n\n* hw: Special Register Buffer Data Sampling (SRBDS) (CVE-2020-0543)\n\n* hw: L1D Cache Eviction Sampling (CVE-2020-0549)\n\n* hw: Vector Register Data Sampling (CVE-2020-0548)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE page(s)\nlisted in the References section.\n\nBug Fix(es):\n\n* Update Intel CPU microcode to microcode-20200609 release:\n - Update of 06-2d-06/0x6d (SNB-E/EN/EP C1/M0) microcode from revision 0x61f\n up to 0x621;\n - Update of 06-2d-07/0x6d (SNB-E/EN/EP C2/M1) microcode from revision 0x718\n up to 0x71a;\n - Update of 06-3c-03/0x32 (HSW C0) microcode from revision 0x27 up to 0x28;\n - Update of 06-3d-04/0xc0 (BDW-U/Y E0/F0) microcode from revision 0x2e\n up to 0x2f;\n - Update of 06-45-01/0x72 (HSW-U C0/D0) microcode from revision 0x25\n up to 0x26;\n - Update of 06-46-01/0x32 (HSW-H C0) microcode from revision 0x1b up to 0x1c;\n - Update of 06-47-01/0x22 (BDW-H/Xeon E3 E0/G0) microcode from revision 0x21\n up to 0x22;\n - Update of 06-4e-03/0xc0 (SKL-U/Y D0) microcode from revision 0xd6\n up to 0xdc;\n - Update of 06-55-03/0x97 (SKX-SP B1) microcode from revision 0x1000151\n up to 0x1000157;\n - Update of 06-55-04/0xb7 (SKX-SP H0/M0/U0, SKX-D M1) microcode\n (in intel-06-55-04/intel-ucode/06-55-04) from revision 0x2000065\n up to 0x2006906;\n - Update of 06-55-06/0xbf (CLX-SP B0) microcode from revision 0x400002c\n up to 0x4002f01;\n - Update of 06-55-07/0xbf (CLX-SP B1) microcode from revision 0x500002c\n up to 0x5002f01;\n - Update of 06-5e-03/0x36 (SKL-H/S R0/N0) microcode from revision 0xd6\n up to 0xdc;\n - Update of 06-7e-05/0x80 (ICL-U/Y D1) microcode from revision 0x46\n up to 0x78;\n - Update of 06-8e-09/0x10 (AML-Y22 H0) microcode from revision 0xca\n up to 0xd6;\n - Update of 06-8e-09/0xc0 (KBL-U/Y H0) microcode from revision 0xca\n up to 0xd6;\n - Update of 06-8e-0a/0xc0 (CFL-U43e D0) microcode from revision 0xca\n up to 0xd6;\n - Update of 06-8e-0b/0xd0 (WHL-U W0) microcode from revision 0xca\n up to 0xd6;\n - Update of 06-8e-0c/0x94 (AML-Y42 V0, CML-Y42 V0, WHL-U V0) microcode\n from revision 0xca up to 0xd6;\n - Update of 06-9e-09/0x2a (KBL-G/H/S/X/Xeon E3 B0) microcode from revision\n 0xca up to 0xd6;\n - Update of 06-9e-0a/0x22 (CFL-H/S/Xeon E3 U0) microcode from revision 0xca\n up to 0xd6;\n - Update of 06-9e-0b/0x02 (CFL-S B0) microcode from revision 0xca up to 0xd6;\n - Update of 06-9e-0c/0x22 (CFL-H/S P0) microcode from revision 0xca\n up to 0xd6;\n - Update of 06-9e-0d/0x22 (CFL-H R0) microcode from revision 0xca up to 0xd6.\n* Do not update 06-4e-03 (SKL-U/Y) and 06-5e-03 (SKL-H/S/Xeon E3 v5) to revision\n 0xdc, use 0xd6 by default.\n* Enable 06-2d-07 (SNB-E/EN/EP) caveat by default.\n* Enable 06-55-04 (SKL-SP/X/W) caveat by default.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2020:2706", "url": "https://access.redhat.com/errata/RHSA-2020:2706" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "https://access.redhat.com/solutions/5142691", "url": "https://access.redhat.com/solutions/5142691" }, { "category": "external", "summary": "https://access.redhat.com/solutions/l1d-cache-eviction-and-vector-register-sampling", "url": "https://access.redhat.com/solutions/l1d-cache-eviction-and-vector-register-sampling" }, { "category": "external", "summary": "1788786", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1788786" }, { "category": "external", "summary": "1788788", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1788788" }, { "category": "external", "summary": "1827165", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1827165" }, { "category": "external", "summary": "1840537", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1840537" }, { "category": "external", "summary": "1848990", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1848990" }, { "category": "external", "summary": "1848999", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1848999" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_2706.json" } ], "title": "Red Hat Security Advisory: microcode_ctl security, bug fix and enhancement update", "tracking": { "current_release_date": "2025-02-28T01:27:37+00:00", "generator": { "date": "2025-02-28T01:27:37+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.3.1" } }, "id": "RHSA-2020:2706", "initial_release_date": "2020-06-23T15:37:13+00:00", "revision_history": [ { "date": "2020-06-23T15:37:13+00:00", "number": "1", "summary": "Initial version" }, { "date": "2020-06-23T15:37:13+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-02-28T01:27:37+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Server AUS (v. 6.6)", "product": { "name": "Red Hat Enterprise Linux Server AUS (v. 6.6)", "product_id": "6Server-6.6.AUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_aus:6.6::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "microcode_ctl-2:1.17-19.29.el6_6.x86_64", "product": { "name": "microcode_ctl-2:1.17-19.29.el6_6.x86_64", "product_id": "microcode_ctl-2:1.17-19.29.el6_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/microcode_ctl@1.17-19.29.el6_6?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "microcode_ctl-debuginfo-2:1.17-19.29.el6_6.x86_64", "product": { "name": "microcode_ctl-debuginfo-2:1.17-19.29.el6_6.x86_64", "product_id": "microcode_ctl-debuginfo-2:1.17-19.29.el6_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/microcode_ctl-debuginfo@1.17-19.29.el6_6?arch=x86_64\u0026epoch=2" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "microcode_ctl-2:1.17-19.29.el6_6.src", "product": { "name": "microcode_ctl-2:1.17-19.29.el6_6.src", "product_id": "microcode_ctl-2:1.17-19.29.el6_6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/microcode_ctl@1.17-19.29.el6_6?arch=src\u0026epoch=2" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "microcode_ctl-2:1.17-19.29.el6_6.src as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)", "product_id": "6Server-6.6.AUS:microcode_ctl-2:1.17-19.29.el6_6.src" }, "product_reference": "microcode_ctl-2:1.17-19.29.el6_6.src", "relates_to_product_reference": "6Server-6.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "microcode_ctl-2:1.17-19.29.el6_6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)", "product_id": "6Server-6.6.AUS:microcode_ctl-2:1.17-19.29.el6_6.x86_64" }, "product_reference": "microcode_ctl-2:1.17-19.29.el6_6.x86_64", "relates_to_product_reference": "6Server-6.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "microcode_ctl-debuginfo-2:1.17-19.29.el6_6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)", "product_id": "6Server-6.6.AUS:microcode_ctl-debuginfo-2:1.17-19.29.el6_6.x86_64" }, "product_reference": "microcode_ctl-debuginfo-2:1.17-19.29.el6_6.x86_64", "relates_to_product_reference": "6Server-6.6.AUS" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Intel" ] } ], "cve": "CVE-2020-0543", "discovery_date": "2020-04-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1827165" } ], "notes": [ { "category": "description", "text": "A new domain bypass transient execution attack known as Special Register Buffer Data Sampling (SRBDS) has been found. This flaw allows data values from special internal registers to be leaked by an attacker able to execute code on any core of the CPU. An unprivileged, local attacker can use this flaw to infer values returned by affected instructions known to be commonly used during cryptographic operations that rely on uniqueness, secrecy, or both.", "title": "Vulnerability description" }, { "category": "summary", "text": "hw: Special Register Buffer Data Sampling (SRBDS)", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/solutions/5142691", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-6.6.AUS:microcode_ctl-2:1.17-19.29.el6_6.src", "6Server-6.6.AUS:microcode_ctl-2:1.17-19.29.el6_6.x86_64", "6Server-6.6.AUS:microcode_ctl-debuginfo-2:1.17-19.29.el6_6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-0543" }, { "category": "external", "summary": "RHBZ#1827165", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1827165" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-0543", "url": "https://www.cve.org/CVERecord?id=CVE-2020-0543" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-0543", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-0543" }, { "category": "external", "summary": "https://access.redhat.com/solutions/5142691", "url": "https://access.redhat.com/solutions/5142691" }, { "category": "external", "summary": "https://access.redhat.com/solutions/5142751", "url": "https://access.redhat.com/solutions/5142751" }, { "category": "external", "summary": "https://blogs.intel.com/technology/2020/06/ipas-security-advisories-for-june-2020/#gs.6uyhri", "url": "https://blogs.intel.com/technology/2020/06/ipas-security-advisories-for-june-2020/#gs.6uyhri" }, { "category": "external", "summary": "https://software.intel.com/security-software-guidance/insights/deep-dive-special-register-buffer-data-sampling", "url": "https://software.intel.com/security-software-guidance/insights/deep-dive-special-register-buffer-data-sampling" }, { "category": "external", "summary": "https://xenbits.xen.org/xsa/advisory-320.html", "url": "https://xenbits.xen.org/xsa/advisory-320.html" } ], "release_date": "2020-06-09T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-06-23T15:37:13+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-6.6.AUS:microcode_ctl-2:1.17-19.29.el6_6.src", "6Server-6.6.AUS:microcode_ctl-2:1.17-19.29.el6_6.x86_64", "6Server-6.6.AUS:microcode_ctl-debuginfo-2:1.17-19.29.el6_6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2706" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "6Server-6.6.AUS:microcode_ctl-2:1.17-19.29.el6_6.src", "6Server-6.6.AUS:microcode_ctl-2:1.17-19.29.el6_6.x86_64", "6Server-6.6.AUS:microcode_ctl-debuginfo-2:1.17-19.29.el6_6.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "6Server-6.6.AUS:microcode_ctl-2:1.17-19.29.el6_6.src", "6Server-6.6.AUS:microcode_ctl-2:1.17-19.29.el6_6.x86_64", "6Server-6.6.AUS:microcode_ctl-debuginfo-2:1.17-19.29.el6_6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "hw: Special Register Buffer Data Sampling (SRBDS)" }, { "cve": "CVE-2020-0548", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2020-01-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1788786" } ], "notes": [ { "category": "description", "text": "A flaw was found in Intel processors where a local attacker is able to gain information about registers used for vector calculations by observing register states from other processes running on the system. This results in a race condition where store buffers, which were not cleared, could be read by another process or a CPU sibling. The highest threat from this vulnerability is data confidentiality where an attacker could read arbitrary data as it passes through the processor.", "title": "Vulnerability description" }, { "category": "summary", "text": "hw: Vector Register Data Sampling", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-6.6.AUS:microcode_ctl-2:1.17-19.29.el6_6.src", "6Server-6.6.AUS:microcode_ctl-2:1.17-19.29.el6_6.x86_64", "6Server-6.6.AUS:microcode_ctl-debuginfo-2:1.17-19.29.el6_6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-0548" }, { "category": "external", "summary": "RHBZ#1788786", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1788786" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-0548", "url": "https://www.cve.org/CVERecord?id=CVE-2020-0548" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-0548", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-0548" }, { "category": "external", "summary": "https://access.redhat.com/solutions/l1d-cache-eviction-and-vector-register-sampling", "url": "https://access.redhat.com/solutions/l1d-cache-eviction-and-vector-register-sampling" }, { "category": "external", "summary": "https://blogs.intel.com/technology/2020/01/ipas-intel-sa-00329/", "url": "https://blogs.intel.com/technology/2020/01/ipas-intel-sa-00329/" }, { "category": "external", "summary": "https://cacheoutattack.com/CacheOut.pdf", "url": "https://cacheoutattack.com/CacheOut.pdf" }, { "category": "external", "summary": "https://software.intel.com/security-software-guidance/software-guidance/l1d-eviction-sampling", "url": "https://software.intel.com/security-software-guidance/software-guidance/l1d-eviction-sampling" } ], "release_date": "2020-01-27T13:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-06-23T15:37:13+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-6.6.AUS:microcode_ctl-2:1.17-19.29.el6_6.src", "6Server-6.6.AUS:microcode_ctl-2:1.17-19.29.el6_6.x86_64", "6Server-6.6.AUS:microcode_ctl-debuginfo-2:1.17-19.29.el6_6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2706" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 2.8, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.0" }, "products": [ "6Server-6.6.AUS:microcode_ctl-2:1.17-19.29.el6_6.src", "6Server-6.6.AUS:microcode_ctl-2:1.17-19.29.el6_6.x86_64", "6Server-6.6.AUS:microcode_ctl-debuginfo-2:1.17-19.29.el6_6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "hw: Vector Register Data Sampling" }, { "cve": "CVE-2020-0549", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2020-01-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1788788" } ], "notes": [ { "category": "description", "text": "A microarchitectural timing flaw was found on some Intel processors. A corner case exists where data in-flight during the eviction process can end up in the \u201cfill buffers\u201d and not properly cleared by the MDS mitigations. The fill buffer contents (which were expected to be blank) can be inferred using MDS or TAA style attack methods to allow a local attacker to infer fill buffer values.", "title": "Vulnerability description" }, { "category": "summary", "text": "hw: L1D Cache Eviction Sampling", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-6.6.AUS:microcode_ctl-2:1.17-19.29.el6_6.src", "6Server-6.6.AUS:microcode_ctl-2:1.17-19.29.el6_6.x86_64", "6Server-6.6.AUS:microcode_ctl-debuginfo-2:1.17-19.29.el6_6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-0549" }, { "category": "external", "summary": "RHBZ#1788788", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1788788" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-0549", "url": "https://www.cve.org/CVERecord?id=CVE-2020-0549" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-0549", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-0549" }, { "category": "external", "summary": "https://access.redhat.com/solutions/l1d-cache-eviction-and-vector-register-sampling", "url": "https://access.redhat.com/solutions/l1d-cache-eviction-and-vector-register-sampling" }, { "category": "external", "summary": "https://blogs.intel.com/technology/2020/01/ipas-intel-sa-00329/", "url": "https://blogs.intel.com/technology/2020/01/ipas-intel-sa-00329/" }, { "category": "external", "summary": "https://cacheoutattack.com/CacheOut.pdf", "url": "https://cacheoutattack.com/CacheOut.pdf" }, { "category": "external", "summary": "https://software.intel.com/security-software-guidance/software-guidance/l1d-eviction-sampling", "url": "https://software.intel.com/security-software-guidance/software-guidance/l1d-eviction-sampling" } ], "release_date": "2020-01-27T13:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-06-23T15:37:13+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-6.6.AUS:microcode_ctl-2:1.17-19.29.el6_6.src", "6Server-6.6.AUS:microcode_ctl-2:1.17-19.29.el6_6.x86_64", "6Server-6.6.AUS:microcode_ctl-debuginfo-2:1.17-19.29.el6_6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2706" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "6Server-6.6.AUS:microcode_ctl-2:1.17-19.29.el6_6.src", "6Server-6.6.AUS:microcode_ctl-2:1.17-19.29.el6_6.x86_64", "6Server-6.6.AUS:microcode_ctl-debuginfo-2:1.17-19.29.el6_6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "hw: L1D Cache Eviction Sampling" } ] }
rhsa-2020:2758
Vulnerability from csaf_redhat
Published
2020-06-29 08:16
Modified
2025-02-28 01:27
Summary
Red Hat Security Advisory: microcode_ctl security, bug fix and enhancement update
Notes
Topic
An update for microcode_ctl is now available for Red at Enterprise Linux 7.7 Extended Update Support.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Security Fix(es):
* hw: Special Register Buffer Data Sampling (SRBDS) (CVE-2020-0543)
* hw: L1D Cache Eviction Sampling (CVE-2020-0549)
* hw: Vector Register Data Sampling (CVE-2020-0548)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE page(s)
listed in the References section.
Bug Fix(es):
* Update Intel CPU microcode to microcode-20200609 release:
- Update of 06-2d-06/0x6d (SNB-E/EN/EP C1/M0) microcode from revision 0x61f
up to 0x621;
- Update of 06-2d-07/0x6d (SNB-E/EN/EP C2/M1) microcode from revision 0x718
up to 0x71a;
- Update of 06-3c-03/0x32 (HSW C0) microcode from revision 0x27 up to 0x28;
- Update of 06-3d-04/0xc0 (BDW-U/Y E0/F0) microcode from revision 0x2e
up to 0x2f;
- Update of 06-45-01/0x72 (HSW-U C0/D0) microcode from revision 0x25
up to 0x26;
- Update of 06-46-01/0x32 (HSW-H C0) microcode from revision 0x1b up to 0x1c;
- Update of 06-47-01/0x22 (BDW-H/Xeon E3 E0/G0) microcode from revision 0x21
up to 0x22;
- Update of 06-4e-03/0xc0 (SKL-U/Y D0) microcode from revision 0xd6
up to 0xdc;
- Update of 06-55-03/0x97 (SKX-SP B1) microcode from revision 0x1000151
up to 0x1000157;
- Update of 06-55-04/0xb7 (SKX-SP H0/M0/U0, SKX-D M1) microcode
(in intel-06-55-04/intel-ucode/06-55-04) from revision 0x2000065
up to 0x2006906;
- Update of 06-55-06/0xbf (CLX-SP B0) microcode from revision 0x400002c
up to 0x4002f01;
- Update of 06-55-07/0xbf (CLX-SP B1) microcode from revision 0x500002c
up to 0x5002f01;
- Update of 06-5e-03/0x36 (SKL-H/S R0/N0) microcode from revision 0xd6
up to 0xdc;
- Update of 06-7e-05/0x80 (ICL-U/Y D1) microcode from revision 0x46
up to 0x78;
- Update of 06-8e-09/0x10 (AML-Y22 H0) microcode from revision 0xca
up to 0xd6;
- Update of 06-8e-09/0xc0 (KBL-U/Y H0) microcode from revision 0xca
up to 0xd6;
- Update of 06-8e-0a/0xc0 (CFL-U43e D0) microcode from revision 0xca
up to 0xd6;
- Update of 06-8e-0b/0xd0 (WHL-U W0) microcode from revision 0xca
up to 0xd6;
- Update of 06-8e-0c/0x94 (AML-Y42 V0, CML-Y42 V0, WHL-U V0) microcode
from revision 0xca up to 0xd6;
- Update of 06-9e-09/0x2a (KBL-G/H/S/X/Xeon E3 B0) microcode from revision
0xca up to 0xd6;
- Update of 06-9e-0a/0x22 (CFL-H/S/Xeon E3 U0) microcode from revision 0xca
up to 0xd6;
- Update of 06-9e-0b/0x02 (CFL-S B0) microcode from revision 0xca up to 0xd6;
- Update of 06-9e-0c/0x22 (CFL-H/S P0) microcode from revision 0xca
up to 0xd6;
- Update of 06-9e-0d/0x22 (CFL-H R0) microcode from revision 0xca up to 0xd6.
* Do not update 06-4e-03 (SKL-U/Y) and 06-5e-03 (SKL-H/S/Xeon E3 v5) to revision
0xdc, use 0xd6 by default.
* Enable 06-2d-07 (SNB-E/EN/EP) caveat by default.
* Enable 06-55-04 (SKL-SP/X/W) caveat by default.
* Avoid find being SIGPIPE'd on early "grep -q" exit in the dracut script.
* Re-generate initramfs not only for the currently running kernel,
but for several recently installed kernels as well.
* Change the URL in the intel-microcode2ucode.8 to point to the GitHub
repository since the microcode download section at Intel Download Center
does not exist anymore.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for microcode_ctl is now available for Red at Enterprise Linux 7.7 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Security Fix(es):\n\n* hw: Special Register Buffer Data Sampling (SRBDS) (CVE-2020-0543)\n\n* hw: L1D Cache Eviction Sampling (CVE-2020-0549)\n\n* hw: Vector Register Data Sampling (CVE-2020-0548)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE page(s)\nlisted in the References section.\n\nBug Fix(es):\n\n* Update Intel CPU microcode to microcode-20200609 release:\n - Update of 06-2d-06/0x6d (SNB-E/EN/EP C1/M0) microcode from revision 0x61f\n up to 0x621;\n - Update of 06-2d-07/0x6d (SNB-E/EN/EP C2/M1) microcode from revision 0x718\n up to 0x71a;\n - Update of 06-3c-03/0x32 (HSW C0) microcode from revision 0x27 up to 0x28;\n - Update of 06-3d-04/0xc0 (BDW-U/Y E0/F0) microcode from revision 0x2e\n up to 0x2f;\n - Update of 06-45-01/0x72 (HSW-U C0/D0) microcode from revision 0x25\n up to 0x26;\n - Update of 06-46-01/0x32 (HSW-H C0) microcode from revision 0x1b up to 0x1c;\n - Update of 06-47-01/0x22 (BDW-H/Xeon E3 E0/G0) microcode from revision 0x21\n up to 0x22;\n - Update of 06-4e-03/0xc0 (SKL-U/Y D0) microcode from revision 0xd6\n up to 0xdc;\n - Update of 06-55-03/0x97 (SKX-SP B1) microcode from revision 0x1000151\n up to 0x1000157;\n - Update of 06-55-04/0xb7 (SKX-SP H0/M0/U0, SKX-D M1) microcode\n (in intel-06-55-04/intel-ucode/06-55-04) from revision 0x2000065\n up to 0x2006906;\n - Update of 06-55-06/0xbf (CLX-SP B0) microcode from revision 0x400002c\n up to 0x4002f01;\n - Update of 06-55-07/0xbf (CLX-SP B1) microcode from revision 0x500002c\n up to 0x5002f01;\n - Update of 06-5e-03/0x36 (SKL-H/S R0/N0) microcode from revision 0xd6\n up to 0xdc;\n - Update of 06-7e-05/0x80 (ICL-U/Y D1) microcode from revision 0x46\n up to 0x78;\n - Update of 06-8e-09/0x10 (AML-Y22 H0) microcode from revision 0xca\n up to 0xd6;\n - Update of 06-8e-09/0xc0 (KBL-U/Y H0) microcode from revision 0xca\n up to 0xd6;\n - Update of 06-8e-0a/0xc0 (CFL-U43e D0) microcode from revision 0xca\n up to 0xd6;\n - Update of 06-8e-0b/0xd0 (WHL-U W0) microcode from revision 0xca\n up to 0xd6;\n - Update of 06-8e-0c/0x94 (AML-Y42 V0, CML-Y42 V0, WHL-U V0) microcode\n from revision 0xca up to 0xd6;\n - Update of 06-9e-09/0x2a (KBL-G/H/S/X/Xeon E3 B0) microcode from revision\n 0xca up to 0xd6;\n - Update of 06-9e-0a/0x22 (CFL-H/S/Xeon E3 U0) microcode from revision 0xca\n up to 0xd6;\n - Update of 06-9e-0b/0x02 (CFL-S B0) microcode from revision 0xca up to 0xd6;\n - Update of 06-9e-0c/0x22 (CFL-H/S P0) microcode from revision 0xca\n up to 0xd6;\n - Update of 06-9e-0d/0x22 (CFL-H R0) microcode from revision 0xca up to 0xd6.\n* Do not update 06-4e-03 (SKL-U/Y) and 06-5e-03 (SKL-H/S/Xeon E3 v5) to revision\n 0xdc, use 0xd6 by default.\n* Enable 06-2d-07 (SNB-E/EN/EP) caveat by default.\n* Enable 06-55-04 (SKL-SP/X/W) caveat by default.\n* Avoid find being SIGPIPE\u0027d on early \"grep -q\" exit in the dracut script.\n* Re-generate initramfs not only for the currently running kernel,\n but for several recently installed kernels as well.\n* Change the URL in the intel-microcode2ucode.8 to point to the GitHub\n repository since the microcode download section at Intel Download Center\n does not exist anymore.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2020:2758", "url": "https://access.redhat.com/errata/RHSA-2020:2758" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "https://access.redhat.com/solutions/5142691", "url": "https://access.redhat.com/solutions/5142691" }, { "category": "external", "summary": "https://access.redhat.com/solutions/l1d-cache-eviction-and-vector-register-sampling", "url": "https://access.redhat.com/solutions/l1d-cache-eviction-and-vector-register-sampling" }, { "category": "external", "summary": "1788786", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1788786" }, { "category": "external", "summary": "1788788", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1788788" }, { "category": "external", "summary": "1827165", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1827165" }, { "category": "external", "summary": "1849064", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1849064" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_2758.json" } ], "title": "Red Hat Security Advisory: microcode_ctl security, bug fix and enhancement update", "tracking": { "current_release_date": "2025-02-28T01:27:22+00:00", "generator": { "date": "2025-02-28T01:27:22+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.3.1" } }, "id": "RHSA-2020:2758", "initial_release_date": "2020-06-29T08:16:58+00:00", "revision_history": [ { "date": "2020-06-29T08:16:58+00:00", "number": "1", "summary": "Initial version" }, { "date": "2020-06-29T08:16:58+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-02-28T01:27:22+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)", "product": { "name": "Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)", "product_id": "7ComputeNode-7.7.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:7.7::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server EUS (v. 7.7)", "product": { "name": "Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-7.7.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:7.7::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "microcode_ctl-2:2.1-53.9.el7_7.x86_64", "product": { "name": "microcode_ctl-2:2.1-53.9.el7_7.x86_64", "product_id": "microcode_ctl-2:2.1-53.9.el7_7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/microcode_ctl@2.1-53.9.el7_7?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "microcode_ctl-debuginfo-2:2.1-53.9.el7_7.x86_64", "product": { "name": "microcode_ctl-debuginfo-2:2.1-53.9.el7_7.x86_64", "product_id": "microcode_ctl-debuginfo-2:2.1-53.9.el7_7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/microcode_ctl-debuginfo@2.1-53.9.el7_7?arch=x86_64\u0026epoch=2" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "microcode_ctl-2:2.1-53.9.el7_7.src", "product": { "name": "microcode_ctl-2:2.1-53.9.el7_7.src", "product_id": "microcode_ctl-2:2.1-53.9.el7_7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/microcode_ctl@2.1-53.9.el7_7?arch=src\u0026epoch=2" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "microcode_ctl-2:2.1-53.9.el7_7.src as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)", "product_id": "7ComputeNode-7.7.EUS:microcode_ctl-2:2.1-53.9.el7_7.src" }, "product_reference": "microcode_ctl-2:2.1-53.9.el7_7.src", "relates_to_product_reference": "7ComputeNode-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "microcode_ctl-2:2.1-53.9.el7_7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)", "product_id": "7ComputeNode-7.7.EUS:microcode_ctl-2:2.1-53.9.el7_7.x86_64" }, "product_reference": "microcode_ctl-2:2.1-53.9.el7_7.x86_64", "relates_to_product_reference": "7ComputeNode-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "microcode_ctl-debuginfo-2:2.1-53.9.el7_7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.7)", "product_id": "7ComputeNode-7.7.EUS:microcode_ctl-debuginfo-2:2.1-53.9.el7_7.x86_64" }, "product_reference": "microcode_ctl-debuginfo-2:2.1-53.9.el7_7.x86_64", "relates_to_product_reference": "7ComputeNode-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "microcode_ctl-2:2.1-53.9.el7_7.src as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-7.7.EUS:microcode_ctl-2:2.1-53.9.el7_7.src" }, "product_reference": "microcode_ctl-2:2.1-53.9.el7_7.src", "relates_to_product_reference": "7Server-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "microcode_ctl-2:2.1-53.9.el7_7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-7.7.EUS:microcode_ctl-2:2.1-53.9.el7_7.x86_64" }, "product_reference": "microcode_ctl-2:2.1-53.9.el7_7.x86_64", "relates_to_product_reference": "7Server-7.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "microcode_ctl-debuginfo-2:2.1-53.9.el7_7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-7.7.EUS:microcode_ctl-debuginfo-2:2.1-53.9.el7_7.x86_64" }, "product_reference": "microcode_ctl-debuginfo-2:2.1-53.9.el7_7.x86_64", "relates_to_product_reference": "7Server-7.7.EUS" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Intel" ] } ], "cve": "CVE-2020-0543", "discovery_date": "2020-04-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1827165" } ], "notes": [ { "category": "description", "text": "A new domain bypass transient execution attack known as Special Register Buffer Data Sampling (SRBDS) has been found. This flaw allows data values from special internal registers to be leaked by an attacker able to execute code on any core of the CPU. An unprivileged, local attacker can use this flaw to infer values returned by affected instructions known to be commonly used during cryptographic operations that rely on uniqueness, secrecy, or both.", "title": "Vulnerability description" }, { "category": "summary", "text": "hw: Special Register Buffer Data Sampling (SRBDS)", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/solutions/5142691", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7ComputeNode-7.7.EUS:microcode_ctl-2:2.1-53.9.el7_7.src", "7ComputeNode-7.7.EUS:microcode_ctl-2:2.1-53.9.el7_7.x86_64", "7ComputeNode-7.7.EUS:microcode_ctl-debuginfo-2:2.1-53.9.el7_7.x86_64", "7Server-7.7.EUS:microcode_ctl-2:2.1-53.9.el7_7.src", "7Server-7.7.EUS:microcode_ctl-2:2.1-53.9.el7_7.x86_64", "7Server-7.7.EUS:microcode_ctl-debuginfo-2:2.1-53.9.el7_7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-0543" }, { "category": "external", "summary": "RHBZ#1827165", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1827165" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-0543", "url": "https://www.cve.org/CVERecord?id=CVE-2020-0543" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-0543", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-0543" }, { "category": "external", "summary": "https://access.redhat.com/solutions/5142691", "url": "https://access.redhat.com/solutions/5142691" }, { "category": "external", "summary": "https://access.redhat.com/solutions/5142751", "url": "https://access.redhat.com/solutions/5142751" }, { "category": "external", "summary": "https://blogs.intel.com/technology/2020/06/ipas-security-advisories-for-june-2020/#gs.6uyhri", "url": "https://blogs.intel.com/technology/2020/06/ipas-security-advisories-for-june-2020/#gs.6uyhri" }, { "category": "external", "summary": "https://software.intel.com/security-software-guidance/insights/deep-dive-special-register-buffer-data-sampling", "url": "https://software.intel.com/security-software-guidance/insights/deep-dive-special-register-buffer-data-sampling" }, { "category": "external", "summary": "https://xenbits.xen.org/xsa/advisory-320.html", "url": "https://xenbits.xen.org/xsa/advisory-320.html" } ], "release_date": "2020-06-09T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-06-29T08:16:58+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7ComputeNode-7.7.EUS:microcode_ctl-2:2.1-53.9.el7_7.src", "7ComputeNode-7.7.EUS:microcode_ctl-2:2.1-53.9.el7_7.x86_64", "7ComputeNode-7.7.EUS:microcode_ctl-debuginfo-2:2.1-53.9.el7_7.x86_64", "7Server-7.7.EUS:microcode_ctl-2:2.1-53.9.el7_7.src", "7Server-7.7.EUS:microcode_ctl-2:2.1-53.9.el7_7.x86_64", "7Server-7.7.EUS:microcode_ctl-debuginfo-2:2.1-53.9.el7_7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2758" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "7ComputeNode-7.7.EUS:microcode_ctl-2:2.1-53.9.el7_7.src", "7ComputeNode-7.7.EUS:microcode_ctl-2:2.1-53.9.el7_7.x86_64", "7ComputeNode-7.7.EUS:microcode_ctl-debuginfo-2:2.1-53.9.el7_7.x86_64", "7Server-7.7.EUS:microcode_ctl-2:2.1-53.9.el7_7.src", "7Server-7.7.EUS:microcode_ctl-2:2.1-53.9.el7_7.x86_64", "7Server-7.7.EUS:microcode_ctl-debuginfo-2:2.1-53.9.el7_7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "7ComputeNode-7.7.EUS:microcode_ctl-2:2.1-53.9.el7_7.src", "7ComputeNode-7.7.EUS:microcode_ctl-2:2.1-53.9.el7_7.x86_64", "7ComputeNode-7.7.EUS:microcode_ctl-debuginfo-2:2.1-53.9.el7_7.x86_64", "7Server-7.7.EUS:microcode_ctl-2:2.1-53.9.el7_7.src", "7Server-7.7.EUS:microcode_ctl-2:2.1-53.9.el7_7.x86_64", "7Server-7.7.EUS:microcode_ctl-debuginfo-2:2.1-53.9.el7_7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "hw: Special Register Buffer Data Sampling (SRBDS)" }, { "cve": "CVE-2020-0548", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2020-01-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1788786" } ], "notes": [ { "category": "description", "text": "A flaw was found in Intel processors where a local attacker is able to gain information about registers used for vector calculations by observing register states from other processes running on the system. This results in a race condition where store buffers, which were not cleared, could be read by another process or a CPU sibling. The highest threat from this vulnerability is data confidentiality where an attacker could read arbitrary data as it passes through the processor.", "title": "Vulnerability description" }, { "category": "summary", "text": "hw: Vector Register Data Sampling", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7ComputeNode-7.7.EUS:microcode_ctl-2:2.1-53.9.el7_7.src", "7ComputeNode-7.7.EUS:microcode_ctl-2:2.1-53.9.el7_7.x86_64", "7ComputeNode-7.7.EUS:microcode_ctl-debuginfo-2:2.1-53.9.el7_7.x86_64", "7Server-7.7.EUS:microcode_ctl-2:2.1-53.9.el7_7.src", "7Server-7.7.EUS:microcode_ctl-2:2.1-53.9.el7_7.x86_64", "7Server-7.7.EUS:microcode_ctl-debuginfo-2:2.1-53.9.el7_7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-0548" }, { "category": "external", "summary": "RHBZ#1788786", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1788786" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-0548", "url": "https://www.cve.org/CVERecord?id=CVE-2020-0548" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-0548", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-0548" }, { "category": "external", "summary": "https://access.redhat.com/solutions/l1d-cache-eviction-and-vector-register-sampling", "url": "https://access.redhat.com/solutions/l1d-cache-eviction-and-vector-register-sampling" }, { "category": "external", "summary": "https://blogs.intel.com/technology/2020/01/ipas-intel-sa-00329/", "url": "https://blogs.intel.com/technology/2020/01/ipas-intel-sa-00329/" }, { "category": "external", "summary": "https://cacheoutattack.com/CacheOut.pdf", "url": "https://cacheoutattack.com/CacheOut.pdf" }, { "category": "external", "summary": "https://software.intel.com/security-software-guidance/software-guidance/l1d-eviction-sampling", "url": "https://software.intel.com/security-software-guidance/software-guidance/l1d-eviction-sampling" } ], "release_date": "2020-01-27T13:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-06-29T08:16:58+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7ComputeNode-7.7.EUS:microcode_ctl-2:2.1-53.9.el7_7.src", "7ComputeNode-7.7.EUS:microcode_ctl-2:2.1-53.9.el7_7.x86_64", "7ComputeNode-7.7.EUS:microcode_ctl-debuginfo-2:2.1-53.9.el7_7.x86_64", "7Server-7.7.EUS:microcode_ctl-2:2.1-53.9.el7_7.src", "7Server-7.7.EUS:microcode_ctl-2:2.1-53.9.el7_7.x86_64", "7Server-7.7.EUS:microcode_ctl-debuginfo-2:2.1-53.9.el7_7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2758" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 2.8, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.0" }, "products": [ "7ComputeNode-7.7.EUS:microcode_ctl-2:2.1-53.9.el7_7.src", "7ComputeNode-7.7.EUS:microcode_ctl-2:2.1-53.9.el7_7.x86_64", "7ComputeNode-7.7.EUS:microcode_ctl-debuginfo-2:2.1-53.9.el7_7.x86_64", "7Server-7.7.EUS:microcode_ctl-2:2.1-53.9.el7_7.src", "7Server-7.7.EUS:microcode_ctl-2:2.1-53.9.el7_7.x86_64", "7Server-7.7.EUS:microcode_ctl-debuginfo-2:2.1-53.9.el7_7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "hw: Vector Register Data Sampling" }, { "cve": "CVE-2020-0549", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2020-01-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1788788" } ], "notes": [ { "category": "description", "text": "A microarchitectural timing flaw was found on some Intel processors. A corner case exists where data in-flight during the eviction process can end up in the \u201cfill buffers\u201d and not properly cleared by the MDS mitigations. The fill buffer contents (which were expected to be blank) can be inferred using MDS or TAA style attack methods to allow a local attacker to infer fill buffer values.", "title": "Vulnerability description" }, { "category": "summary", "text": "hw: L1D Cache Eviction Sampling", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7ComputeNode-7.7.EUS:microcode_ctl-2:2.1-53.9.el7_7.src", "7ComputeNode-7.7.EUS:microcode_ctl-2:2.1-53.9.el7_7.x86_64", "7ComputeNode-7.7.EUS:microcode_ctl-debuginfo-2:2.1-53.9.el7_7.x86_64", "7Server-7.7.EUS:microcode_ctl-2:2.1-53.9.el7_7.src", "7Server-7.7.EUS:microcode_ctl-2:2.1-53.9.el7_7.x86_64", "7Server-7.7.EUS:microcode_ctl-debuginfo-2:2.1-53.9.el7_7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-0549" }, { "category": "external", "summary": "RHBZ#1788788", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1788788" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-0549", "url": "https://www.cve.org/CVERecord?id=CVE-2020-0549" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-0549", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-0549" }, { "category": "external", "summary": "https://access.redhat.com/solutions/l1d-cache-eviction-and-vector-register-sampling", "url": "https://access.redhat.com/solutions/l1d-cache-eviction-and-vector-register-sampling" }, { "category": "external", "summary": "https://blogs.intel.com/technology/2020/01/ipas-intel-sa-00329/", "url": "https://blogs.intel.com/technology/2020/01/ipas-intel-sa-00329/" }, { "category": "external", "summary": "https://cacheoutattack.com/CacheOut.pdf", "url": "https://cacheoutattack.com/CacheOut.pdf" }, { "category": "external", "summary": "https://software.intel.com/security-software-guidance/software-guidance/l1d-eviction-sampling", "url": "https://software.intel.com/security-software-guidance/software-guidance/l1d-eviction-sampling" } ], "release_date": "2020-01-27T13:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-06-29T08:16:58+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7ComputeNode-7.7.EUS:microcode_ctl-2:2.1-53.9.el7_7.src", "7ComputeNode-7.7.EUS:microcode_ctl-2:2.1-53.9.el7_7.x86_64", "7ComputeNode-7.7.EUS:microcode_ctl-debuginfo-2:2.1-53.9.el7_7.x86_64", "7Server-7.7.EUS:microcode_ctl-2:2.1-53.9.el7_7.src", "7Server-7.7.EUS:microcode_ctl-2:2.1-53.9.el7_7.x86_64", "7Server-7.7.EUS:microcode_ctl-debuginfo-2:2.1-53.9.el7_7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2758" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "7ComputeNode-7.7.EUS:microcode_ctl-2:2.1-53.9.el7_7.src", "7ComputeNode-7.7.EUS:microcode_ctl-2:2.1-53.9.el7_7.x86_64", "7ComputeNode-7.7.EUS:microcode_ctl-debuginfo-2:2.1-53.9.el7_7.x86_64", "7Server-7.7.EUS:microcode_ctl-2:2.1-53.9.el7_7.src", "7Server-7.7.EUS:microcode_ctl-2:2.1-53.9.el7_7.x86_64", "7Server-7.7.EUS:microcode_ctl-debuginfo-2:2.1-53.9.el7_7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "hw: L1D Cache Eviction Sampling" } ] }
rhsa-2020:2842
Vulnerability from csaf_redhat
Published
2020-07-07 10:31
Modified
2025-02-28 01:27
Summary
Red Hat Security Advisory: microcode_ctl security, bug fix and enhancement update
Notes
Topic
An update for microcode_ctl is now available for Red Hat Enterprise Linux 7.6 Extended Update Support.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Security Fix(es):
* hw: Special Register Buffer Data Sampling (SRBDS) (CVE-2020-0543)
* hw: L1D Cache Eviction Sampling (CVE-2020-0549)
* hw: Vector Register Data Sampling (CVE-2020-0548)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* Update Intel CPU microcode to microcode-20200609 release:
- Update of 06-2d-06/0x6d (SNB-E/EN/EP C1/M0) microcode from revision 0x61f
up to 0x621;
- Update of 06-2d-07/0x6d (SNB-E/EN/EP C2/M1) microcode from revision 0x718
up to 0x71a;
- Update of 06-3c-03/0x32 (HSW C0) microcode from revision 0x27 up to 0x28;
- Update of 06-3d-04/0xc0 (BDW-U/Y E0/F0) microcode from revision 0x2e
up to 0x2f;
- Update of 06-45-01/0x72 (HSW-U C0/D0) microcode from revision 0x25
up to 0x26;
- Update of 06-46-01/0x32 (HSW-H C0) microcode from revision 0x1b up to 0x1c;
- Update of 06-47-01/0x22 (BDW-H/Xeon E3 E0/G0) microcode from revision 0x21
up to 0x22;
- Update of 06-4e-03/0xc0 (SKL-U/Y D0) microcode from revision 0xd6
up to 0xdc;
- Update of 06-55-03/0x97 (SKX-SP B1) microcode from revision 0x1000151
up to 0x1000157;
- Update of 06-55-04/0xb7 (SKX-SP H0/M0/U0, SKX-D M1) microcode
(in intel-06-55-04/intel-ucode/06-55-04) from revision 0x2000065
up to 0x2006906;
- Update of 06-55-06/0xbf (CLX-SP B0) microcode from revision 0x400002c
up to 0x4002f01;
- Update of 06-55-07/0xbf (CLX-SP B1) microcode from revision 0x500002c
up to 0x5002f01;
- Update of 06-5e-03/0x36 (SKL-H/S R0/N0) microcode from revision 0xd6
up to 0xdc;
- Update of 06-7e-05/0x80 (ICL-U/Y D1) microcode from revision 0x46
up to 0x78;
- Update of 06-8e-09/0x10 (AML-Y22 H0) microcode from revision 0xca
up to 0xd6;
- Update of 06-8e-09/0xc0 (KBL-U/Y H0) microcode from revision 0xca
up to 0xd6;
- Update of 06-8e-0a/0xc0 (CFL-U43e D0) microcode from revision 0xca
up to 0xd6;
- Update of 06-8e-0b/0xd0 (WHL-U W0) microcode from revision 0xca
up to 0xd6;
- Update of 06-8e-0c/0x94 (AML-Y42 V0, CML-Y42 V0, WHL-U V0) microcode
from revision 0xca up to 0xd6;
- Update of 06-9e-09/0x2a (KBL-G/H/S/X/Xeon E3 B0) microcode from revision
0xca up to 0xd6;
- Update of 06-9e-0a/0x22 (CFL-H/S/Xeon E3 U0) microcode from revision 0xca
up to 0xd6;
- Update of 06-9e-0b/0x02 (CFL-S B0) microcode from revision 0xca up to 0xd6;
- Update of 06-9e-0c/0x22 (CFL-H/S P0) microcode from revision 0xca
up to 0xd6;
- Update of 06-9e-0d/0x22 (CFL-H R0) microcode from revision 0xca up to 0xd6.
* Do not update 06-4e-03 (SKL-U/Y) and 06-5e-03 (SKL-H/S/Xeon E3 v5) to revision
0xdc, use 0xd6 by default.
* Enable 06-2d-07 (SNB-E/EN/EP) caveat by default.
* Enable 06-55-04 (SKL-SP/X/W) caveat by default.
* Avoid find being SIGPIPE'd on early "grep -q" exit in the dracut script.
* Re-generate initramfs not only for the currently running kernel,
but for several recently installed kernels as well.
* Change the URL in the intel-microcode2ucode.8 to point to the GitHub
repository since the microcode download section at Intel Download Center
does not exist anymore.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for microcode_ctl is now available for Red Hat Enterprise Linux 7.6 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Security Fix(es):\n\n* hw: Special Register Buffer Data Sampling (SRBDS) (CVE-2020-0543)\n\n* hw: L1D Cache Eviction Sampling (CVE-2020-0549)\n\n* hw: Vector Register Data Sampling (CVE-2020-0548)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* Update Intel CPU microcode to microcode-20200609 release:\n - Update of 06-2d-06/0x6d (SNB-E/EN/EP C1/M0) microcode from revision 0x61f\n up to 0x621;\n - Update of 06-2d-07/0x6d (SNB-E/EN/EP C2/M1) microcode from revision 0x718\n up to 0x71a;\n - Update of 06-3c-03/0x32 (HSW C0) microcode from revision 0x27 up to 0x28;\n - Update of 06-3d-04/0xc0 (BDW-U/Y E0/F0) microcode from revision 0x2e\n up to 0x2f;\n - Update of 06-45-01/0x72 (HSW-U C0/D0) microcode from revision 0x25\n up to 0x26;\n - Update of 06-46-01/0x32 (HSW-H C0) microcode from revision 0x1b up to 0x1c;\n - Update of 06-47-01/0x22 (BDW-H/Xeon E3 E0/G0) microcode from revision 0x21\n up to 0x22;\n - Update of 06-4e-03/0xc0 (SKL-U/Y D0) microcode from revision 0xd6\n up to 0xdc;\n - Update of 06-55-03/0x97 (SKX-SP B1) microcode from revision 0x1000151\n up to 0x1000157;\n - Update of 06-55-04/0xb7 (SKX-SP H0/M0/U0, SKX-D M1) microcode\n (in intel-06-55-04/intel-ucode/06-55-04) from revision 0x2000065\n up to 0x2006906;\n - Update of 06-55-06/0xbf (CLX-SP B0) microcode from revision 0x400002c\n up to 0x4002f01;\n - Update of 06-55-07/0xbf (CLX-SP B1) microcode from revision 0x500002c\n up to 0x5002f01;\n - Update of 06-5e-03/0x36 (SKL-H/S R0/N0) microcode from revision 0xd6\n up to 0xdc;\n - Update of 06-7e-05/0x80 (ICL-U/Y D1) microcode from revision 0x46\n up to 0x78;\n - Update of 06-8e-09/0x10 (AML-Y22 H0) microcode from revision 0xca\n up to 0xd6;\n - Update of 06-8e-09/0xc0 (KBL-U/Y H0) microcode from revision 0xca\n up to 0xd6;\n - Update of 06-8e-0a/0xc0 (CFL-U43e D0) microcode from revision 0xca\n up to 0xd6;\n - Update of 06-8e-0b/0xd0 (WHL-U W0) microcode from revision 0xca\n up to 0xd6;\n - Update of 06-8e-0c/0x94 (AML-Y42 V0, CML-Y42 V0, WHL-U V0) microcode\n from revision 0xca up to 0xd6;\n - Update of 06-9e-09/0x2a (KBL-G/H/S/X/Xeon E3 B0) microcode from revision\n 0xca up to 0xd6;\n - Update of 06-9e-0a/0x22 (CFL-H/S/Xeon E3 U0) microcode from revision 0xca\n up to 0xd6;\n - Update of 06-9e-0b/0x02 (CFL-S B0) microcode from revision 0xca up to 0xd6;\n - Update of 06-9e-0c/0x22 (CFL-H/S P0) microcode from revision 0xca\n up to 0xd6;\n - Update of 06-9e-0d/0x22 (CFL-H R0) microcode from revision 0xca up to 0xd6.\n* Do not update 06-4e-03 (SKL-U/Y) and 06-5e-03 (SKL-H/S/Xeon E3 v5) to revision\n 0xdc, use 0xd6 by default.\n* Enable 06-2d-07 (SNB-E/EN/EP) caveat by default.\n* Enable 06-55-04 (SKL-SP/X/W) caveat by default.\n* Avoid find being SIGPIPE\u0027d on early \"grep -q\" exit in the dracut script.\n* Re-generate initramfs not only for the currently running kernel,\n but for several recently installed kernels as well.\n* Change the URL in the intel-microcode2ucode.8 to point to the GitHub\n repository since the microcode download section at Intel Download Center\n does not exist anymore.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2020:2842", "url": "https://access.redhat.com/errata/RHSA-2020:2842" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "1788786", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1788786" }, { "category": "external", "summary": "https://access.redhat.com/solutions/5142691", "url": "https://access.redhat.com/solutions/5142691" }, { "category": "external", "summary": "https://access.redhat.com/solutions/l1d-cache-eviction-and-vector-register-sampling", "url": "https://access.redhat.com/solutions/l1d-cache-eviction-and-vector-register-sampling" }, { "category": "external", "summary": "1788788", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1788788" }, { "category": "external", "summary": "1827165", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1827165" }, { "category": "external", "summary": "1849063", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1849063" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_2842.json" } ], "title": "Red Hat Security Advisory: microcode_ctl security, bug fix and enhancement update", "tracking": { "current_release_date": "2025-02-28T01:27:58+00:00", "generator": { "date": "2025-02-28T01:27:58+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.3.1" } }, "id": "RHSA-2020:2842", "initial_release_date": "2020-07-07T10:31:30+00:00", "revision_history": [ { "date": "2020-07-07T10:31:30+00:00", "number": "1", "summary": "Initial version" }, { "date": "2020-07-07T10:31:30+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-02-28T01:27:58+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)", "product": { "name": "Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)", "product_id": "7ComputeNode-7.6.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:7.6::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server EUS (v. 7.6)", "product": { "name": "Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-7.6.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:7.6::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "microcode_ctl-2:2.1-47.14.el7_6.x86_64", "product": { "name": "microcode_ctl-2:2.1-47.14.el7_6.x86_64", "product_id": "microcode_ctl-2:2.1-47.14.el7_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/microcode_ctl@2.1-47.14.el7_6?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "microcode_ctl-debuginfo-2:2.1-47.14.el7_6.x86_64", "product": { "name": "microcode_ctl-debuginfo-2:2.1-47.14.el7_6.x86_64", "product_id": "microcode_ctl-debuginfo-2:2.1-47.14.el7_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/microcode_ctl-debuginfo@2.1-47.14.el7_6?arch=x86_64\u0026epoch=2" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "microcode_ctl-2:2.1-47.14.el7_6.src", "product": { "name": "microcode_ctl-2:2.1-47.14.el7_6.src", "product_id": "microcode_ctl-2:2.1-47.14.el7_6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/microcode_ctl@2.1-47.14.el7_6?arch=src\u0026epoch=2" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "microcode_ctl-2:2.1-47.14.el7_6.src as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)", "product_id": "7ComputeNode-7.6.EUS:microcode_ctl-2:2.1-47.14.el7_6.src" }, "product_reference": "microcode_ctl-2:2.1-47.14.el7_6.src", "relates_to_product_reference": "7ComputeNode-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "microcode_ctl-2:2.1-47.14.el7_6.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)", "product_id": "7ComputeNode-7.6.EUS:microcode_ctl-2:2.1-47.14.el7_6.x86_64" }, "product_reference": "microcode_ctl-2:2.1-47.14.el7_6.x86_64", "relates_to_product_reference": "7ComputeNode-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "microcode_ctl-debuginfo-2:2.1-47.14.el7_6.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)", "product_id": "7ComputeNode-7.6.EUS:microcode_ctl-debuginfo-2:2.1-47.14.el7_6.x86_64" }, "product_reference": "microcode_ctl-debuginfo-2:2.1-47.14.el7_6.x86_64", "relates_to_product_reference": "7ComputeNode-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "microcode_ctl-2:2.1-47.14.el7_6.src as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-7.6.EUS:microcode_ctl-2:2.1-47.14.el7_6.src" }, "product_reference": "microcode_ctl-2:2.1-47.14.el7_6.src", "relates_to_product_reference": "7Server-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "microcode_ctl-2:2.1-47.14.el7_6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-7.6.EUS:microcode_ctl-2:2.1-47.14.el7_6.x86_64" }, "product_reference": "microcode_ctl-2:2.1-47.14.el7_6.x86_64", "relates_to_product_reference": "7Server-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "microcode_ctl-debuginfo-2:2.1-47.14.el7_6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-7.6.EUS:microcode_ctl-debuginfo-2:2.1-47.14.el7_6.x86_64" }, "product_reference": "microcode_ctl-debuginfo-2:2.1-47.14.el7_6.x86_64", "relates_to_product_reference": "7Server-7.6.EUS" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Intel" ] } ], "cve": "CVE-2020-0543", "discovery_date": "2020-04-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1827165" } ], "notes": [ { "category": "description", "text": "A new domain bypass transient execution attack known as Special Register Buffer Data Sampling (SRBDS) has been found. This flaw allows data values from special internal registers to be leaked by an attacker able to execute code on any core of the CPU. An unprivileged, local attacker can use this flaw to infer values returned by affected instructions known to be commonly used during cryptographic operations that rely on uniqueness, secrecy, or both.", "title": "Vulnerability description" }, { "category": "summary", "text": "hw: Special Register Buffer Data Sampling (SRBDS)", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/solutions/5142691", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7ComputeNode-7.6.EUS:microcode_ctl-2:2.1-47.14.el7_6.src", "7ComputeNode-7.6.EUS:microcode_ctl-2:2.1-47.14.el7_6.x86_64", "7ComputeNode-7.6.EUS:microcode_ctl-debuginfo-2:2.1-47.14.el7_6.x86_64", "7Server-7.6.EUS:microcode_ctl-2:2.1-47.14.el7_6.src", "7Server-7.6.EUS:microcode_ctl-2:2.1-47.14.el7_6.x86_64", "7Server-7.6.EUS:microcode_ctl-debuginfo-2:2.1-47.14.el7_6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-0543" }, { "category": "external", "summary": "RHBZ#1827165", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1827165" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-0543", "url": "https://www.cve.org/CVERecord?id=CVE-2020-0543" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-0543", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-0543" }, { "category": "external", "summary": "https://access.redhat.com/solutions/5142691", "url": "https://access.redhat.com/solutions/5142691" }, { "category": "external", "summary": "https://access.redhat.com/solutions/5142751", "url": "https://access.redhat.com/solutions/5142751" }, { "category": "external", "summary": "https://blogs.intel.com/technology/2020/06/ipas-security-advisories-for-june-2020/#gs.6uyhri", "url": "https://blogs.intel.com/technology/2020/06/ipas-security-advisories-for-june-2020/#gs.6uyhri" }, { "category": "external", "summary": "https://software.intel.com/security-software-guidance/insights/deep-dive-special-register-buffer-data-sampling", "url": "https://software.intel.com/security-software-guidance/insights/deep-dive-special-register-buffer-data-sampling" }, { "category": "external", "summary": "https://xenbits.xen.org/xsa/advisory-320.html", "url": "https://xenbits.xen.org/xsa/advisory-320.html" } ], "release_date": "2020-06-09T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-07T10:31:30+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7ComputeNode-7.6.EUS:microcode_ctl-2:2.1-47.14.el7_6.src", "7ComputeNode-7.6.EUS:microcode_ctl-2:2.1-47.14.el7_6.x86_64", "7ComputeNode-7.6.EUS:microcode_ctl-debuginfo-2:2.1-47.14.el7_6.x86_64", "7Server-7.6.EUS:microcode_ctl-2:2.1-47.14.el7_6.src", "7Server-7.6.EUS:microcode_ctl-2:2.1-47.14.el7_6.x86_64", "7Server-7.6.EUS:microcode_ctl-debuginfo-2:2.1-47.14.el7_6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2842" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "7ComputeNode-7.6.EUS:microcode_ctl-2:2.1-47.14.el7_6.src", "7ComputeNode-7.6.EUS:microcode_ctl-2:2.1-47.14.el7_6.x86_64", "7ComputeNode-7.6.EUS:microcode_ctl-debuginfo-2:2.1-47.14.el7_6.x86_64", "7Server-7.6.EUS:microcode_ctl-2:2.1-47.14.el7_6.src", "7Server-7.6.EUS:microcode_ctl-2:2.1-47.14.el7_6.x86_64", "7Server-7.6.EUS:microcode_ctl-debuginfo-2:2.1-47.14.el7_6.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "7ComputeNode-7.6.EUS:microcode_ctl-2:2.1-47.14.el7_6.src", "7ComputeNode-7.6.EUS:microcode_ctl-2:2.1-47.14.el7_6.x86_64", "7ComputeNode-7.6.EUS:microcode_ctl-debuginfo-2:2.1-47.14.el7_6.x86_64", "7Server-7.6.EUS:microcode_ctl-2:2.1-47.14.el7_6.src", "7Server-7.6.EUS:microcode_ctl-2:2.1-47.14.el7_6.x86_64", "7Server-7.6.EUS:microcode_ctl-debuginfo-2:2.1-47.14.el7_6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "hw: Special Register Buffer Data Sampling (SRBDS)" }, { "cve": "CVE-2020-0548", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2020-01-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1788786" } ], "notes": [ { "category": "description", "text": "A flaw was found in Intel processors where a local attacker is able to gain information about registers used for vector calculations by observing register states from other processes running on the system. This results in a race condition where store buffers, which were not cleared, could be read by another process or a CPU sibling. The highest threat from this vulnerability is data confidentiality where an attacker could read arbitrary data as it passes through the processor.", "title": "Vulnerability description" }, { "category": "summary", "text": "hw: Vector Register Data Sampling", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7ComputeNode-7.6.EUS:microcode_ctl-2:2.1-47.14.el7_6.src", "7ComputeNode-7.6.EUS:microcode_ctl-2:2.1-47.14.el7_6.x86_64", "7ComputeNode-7.6.EUS:microcode_ctl-debuginfo-2:2.1-47.14.el7_6.x86_64", "7Server-7.6.EUS:microcode_ctl-2:2.1-47.14.el7_6.src", "7Server-7.6.EUS:microcode_ctl-2:2.1-47.14.el7_6.x86_64", "7Server-7.6.EUS:microcode_ctl-debuginfo-2:2.1-47.14.el7_6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-0548" }, { "category": "external", "summary": "RHBZ#1788786", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1788786" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-0548", "url": "https://www.cve.org/CVERecord?id=CVE-2020-0548" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-0548", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-0548" }, { "category": "external", "summary": "https://access.redhat.com/solutions/l1d-cache-eviction-and-vector-register-sampling", "url": "https://access.redhat.com/solutions/l1d-cache-eviction-and-vector-register-sampling" }, { "category": "external", "summary": "https://blogs.intel.com/technology/2020/01/ipas-intel-sa-00329/", "url": "https://blogs.intel.com/technology/2020/01/ipas-intel-sa-00329/" }, { "category": "external", "summary": "https://cacheoutattack.com/CacheOut.pdf", "url": "https://cacheoutattack.com/CacheOut.pdf" }, { "category": "external", "summary": "https://software.intel.com/security-software-guidance/software-guidance/l1d-eviction-sampling", "url": "https://software.intel.com/security-software-guidance/software-guidance/l1d-eviction-sampling" } ], "release_date": "2020-01-27T13:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-07T10:31:30+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7ComputeNode-7.6.EUS:microcode_ctl-2:2.1-47.14.el7_6.src", "7ComputeNode-7.6.EUS:microcode_ctl-2:2.1-47.14.el7_6.x86_64", "7ComputeNode-7.6.EUS:microcode_ctl-debuginfo-2:2.1-47.14.el7_6.x86_64", "7Server-7.6.EUS:microcode_ctl-2:2.1-47.14.el7_6.src", "7Server-7.6.EUS:microcode_ctl-2:2.1-47.14.el7_6.x86_64", "7Server-7.6.EUS:microcode_ctl-debuginfo-2:2.1-47.14.el7_6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2842" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 2.8, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.0" }, "products": [ "7ComputeNode-7.6.EUS:microcode_ctl-2:2.1-47.14.el7_6.src", "7ComputeNode-7.6.EUS:microcode_ctl-2:2.1-47.14.el7_6.x86_64", "7ComputeNode-7.6.EUS:microcode_ctl-debuginfo-2:2.1-47.14.el7_6.x86_64", "7Server-7.6.EUS:microcode_ctl-2:2.1-47.14.el7_6.src", "7Server-7.6.EUS:microcode_ctl-2:2.1-47.14.el7_6.x86_64", "7Server-7.6.EUS:microcode_ctl-debuginfo-2:2.1-47.14.el7_6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "hw: Vector Register Data Sampling" }, { "cve": "CVE-2020-0549", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2020-01-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1788788" } ], "notes": [ { "category": "description", "text": "A microarchitectural timing flaw was found on some Intel processors. A corner case exists where data in-flight during the eviction process can end up in the \u201cfill buffers\u201d and not properly cleared by the MDS mitigations. The fill buffer contents (which were expected to be blank) can be inferred using MDS or TAA style attack methods to allow a local attacker to infer fill buffer values.", "title": "Vulnerability description" }, { "category": "summary", "text": "hw: L1D Cache Eviction Sampling", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7ComputeNode-7.6.EUS:microcode_ctl-2:2.1-47.14.el7_6.src", "7ComputeNode-7.6.EUS:microcode_ctl-2:2.1-47.14.el7_6.x86_64", "7ComputeNode-7.6.EUS:microcode_ctl-debuginfo-2:2.1-47.14.el7_6.x86_64", "7Server-7.6.EUS:microcode_ctl-2:2.1-47.14.el7_6.src", "7Server-7.6.EUS:microcode_ctl-2:2.1-47.14.el7_6.x86_64", "7Server-7.6.EUS:microcode_ctl-debuginfo-2:2.1-47.14.el7_6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-0549" }, { "category": "external", "summary": "RHBZ#1788788", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1788788" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-0549", "url": "https://www.cve.org/CVERecord?id=CVE-2020-0549" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-0549", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-0549" }, { "category": "external", "summary": "https://access.redhat.com/solutions/l1d-cache-eviction-and-vector-register-sampling", "url": "https://access.redhat.com/solutions/l1d-cache-eviction-and-vector-register-sampling" }, { "category": "external", "summary": "https://blogs.intel.com/technology/2020/01/ipas-intel-sa-00329/", "url": "https://blogs.intel.com/technology/2020/01/ipas-intel-sa-00329/" }, { "category": "external", "summary": "https://cacheoutattack.com/CacheOut.pdf", "url": "https://cacheoutattack.com/CacheOut.pdf" }, { "category": "external", "summary": "https://software.intel.com/security-software-guidance/software-guidance/l1d-eviction-sampling", "url": "https://software.intel.com/security-software-guidance/software-guidance/l1d-eviction-sampling" } ], "release_date": "2020-01-27T13:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-07T10:31:30+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7ComputeNode-7.6.EUS:microcode_ctl-2:2.1-47.14.el7_6.src", "7ComputeNode-7.6.EUS:microcode_ctl-2:2.1-47.14.el7_6.x86_64", "7ComputeNode-7.6.EUS:microcode_ctl-debuginfo-2:2.1-47.14.el7_6.x86_64", "7Server-7.6.EUS:microcode_ctl-2:2.1-47.14.el7_6.src", "7Server-7.6.EUS:microcode_ctl-2:2.1-47.14.el7_6.x86_64", "7Server-7.6.EUS:microcode_ctl-debuginfo-2:2.1-47.14.el7_6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2842" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "7ComputeNode-7.6.EUS:microcode_ctl-2:2.1-47.14.el7_6.src", "7ComputeNode-7.6.EUS:microcode_ctl-2:2.1-47.14.el7_6.x86_64", "7ComputeNode-7.6.EUS:microcode_ctl-debuginfo-2:2.1-47.14.el7_6.x86_64", "7Server-7.6.EUS:microcode_ctl-2:2.1-47.14.el7_6.src", "7Server-7.6.EUS:microcode_ctl-2:2.1-47.14.el7_6.x86_64", "7Server-7.6.EUS:microcode_ctl-debuginfo-2:2.1-47.14.el7_6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "hw: L1D Cache Eviction Sampling" } ] }
rhsa-2021:3028
Vulnerability from csaf_redhat
Published
2021-08-09 10:18
Modified
2025-08-02 09:53
Summary
Red Hat Security Advisory: microcode_ctl security, bug fix and enhancement update
Notes
Topic
An update for microcode_ctl is now available for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.
Details
The microcode_ctl packages provide microcode updates for Intel.
Security Fix(es):
* hw: Special Register Buffer Data Sampling (SRBDS) (CVE-2020-0543)
* hw: Vector Register Data Sampling (CVE-2020-0548)
* hw: L1D Cache Eviction Sampling (CVE-2020-0549)
* hw: vt-d related privilege escalation (CVE-2020-24489)
* hw: improper isolation of shared resources in some Intel Processors
(CVE-2020-24511)
* hw: observable timing discrepancy in some Intel Processors
(CVE-2020-24512)
* hw: Information disclosure issue in Intel SGX via RAPL interface
(CVE-2020-8695)
* hw: Vector Register Leakage-Active (CVE-2020-8696)
* hw: Fast forward store predictor (CVE-2020-8698)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for microcode_ctl is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact\nof Important. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available for each vulnerability\nfrom the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The microcode_ctl packages provide microcode updates for Intel.\n\nSecurity Fix(es):\n\n* hw: Special Register Buffer Data Sampling (SRBDS) (CVE-2020-0543)\n\n* hw: Vector Register Data Sampling (CVE-2020-0548)\n\n* hw: L1D Cache Eviction Sampling (CVE-2020-0549)\n\n* hw: vt-d related privilege escalation (CVE-2020-24489)\n\n* hw: improper isolation of shared resources in some Intel Processors\n(CVE-2020-24511)\n\n* hw: observable timing discrepancy in some Intel Processors\n(CVE-2020-24512)\n\n* hw: Information disclosure issue in Intel SGX via RAPL interface\n(CVE-2020-8695)\n\n* hw: Vector Register Leakage-Active (CVE-2020-8696)\n\n* hw: Fast forward store predictor (CVE-2020-8698)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2021:3028", "url": "https://access.redhat.com/errata/RHSA-2021:3028" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1788786", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1788786" }, { "category": "external", "summary": "1788788", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1788788" }, { "category": "external", "summary": "1827165", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1827165" }, { "category": "external", "summary": "1828583", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1828583" }, { "category": "external", "summary": "1890355", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890355" }, { "category": "external", "summary": "1890356", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890356" }, { "category": "external", "summary": "1897684", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1897684" }, { "category": "external", "summary": "1962650", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1962650" }, { "category": "external", "summary": "1962702", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1962702" }, { "category": "external", "summary": "1962722", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1962722" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3028.json" } ], "title": "Red Hat Security Advisory: microcode_ctl security, bug fix and enhancement update", "tracking": { "current_release_date": "2025-08-02T09:53:02+00:00", "generator": { "date": "2025-08-02T09:53:02+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2021:3028", "initial_release_date": "2021-08-09T10:18:52+00:00", "revision_history": [ { "date": "2021-08-09T10:18:52+00:00", "number": "1", "summary": "Initial version" }, { "date": "2021-08-09T10:18:52+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-02T09:53:02+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Client (v. 7)", "product": { "name": "Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 7)", "product": { "name": "Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation (v. 7)", "product": { "name": "Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "microcode_ctl-2:2.1-73.11.el7_9.src", "product": { "name": "microcode_ctl-2:2.1-73.11.el7_9.src", "product_id": "microcode_ctl-2:2.1-73.11.el7_9.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/microcode_ctl@2.1-73.11.el7_9?arch=src\u0026epoch=2" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "microcode_ctl-2:2.1-73.11.el7_9.x86_64", "product": { "name": "microcode_ctl-2:2.1-73.11.el7_9.x86_64", "product_id": "microcode_ctl-2:2.1-73.11.el7_9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/microcode_ctl@2.1-73.11.el7_9?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "microcode_ctl-debuginfo-2:2.1-73.11.el7_9.x86_64", "product": { "name": "microcode_ctl-debuginfo-2:2.1-73.11.el7_9.x86_64", "product_id": "microcode_ctl-debuginfo-2:2.1-73.11.el7_9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/microcode_ctl-debuginfo@2.1-73.11.el7_9?arch=x86_64\u0026epoch=2" } } } ], "category": "architecture", "name": "x86_64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "microcode_ctl-2:2.1-73.11.el7_9.src as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:microcode_ctl-2:2.1-73.11.el7_9.src" }, "product_reference": "microcode_ctl-2:2.1-73.11.el7_9.src", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "microcode_ctl-2:2.1-73.11.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:microcode_ctl-2:2.1-73.11.el7_9.x86_64" }, "product_reference": "microcode_ctl-2:2.1-73.11.el7_9.x86_64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "microcode_ctl-debuginfo-2:2.1-73.11.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:microcode_ctl-debuginfo-2:2.1-73.11.el7_9.x86_64" }, "product_reference": "microcode_ctl-debuginfo-2:2.1-73.11.el7_9.x86_64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "microcode_ctl-2:2.1-73.11.el7_9.src as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:microcode_ctl-2:2.1-73.11.el7_9.src" }, "product_reference": "microcode_ctl-2:2.1-73.11.el7_9.src", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "microcode_ctl-2:2.1-73.11.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:microcode_ctl-2:2.1-73.11.el7_9.x86_64" }, "product_reference": "microcode_ctl-2:2.1-73.11.el7_9.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "microcode_ctl-debuginfo-2:2.1-73.11.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:microcode_ctl-debuginfo-2:2.1-73.11.el7_9.x86_64" }, "product_reference": "microcode_ctl-debuginfo-2:2.1-73.11.el7_9.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "microcode_ctl-2:2.1-73.11.el7_9.src as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:microcode_ctl-2:2.1-73.11.el7_9.src" }, "product_reference": "microcode_ctl-2:2.1-73.11.el7_9.src", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "microcode_ctl-2:2.1-73.11.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:microcode_ctl-2:2.1-73.11.el7_9.x86_64" }, "product_reference": "microcode_ctl-2:2.1-73.11.el7_9.x86_64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "microcode_ctl-debuginfo-2:2.1-73.11.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:microcode_ctl-debuginfo-2:2.1-73.11.el7_9.x86_64" }, "product_reference": "microcode_ctl-debuginfo-2:2.1-73.11.el7_9.x86_64", "relates_to_product_reference": "7Workstation-7.9.Z" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Intel" ] } ], "cve": "CVE-2020-0543", "discovery_date": "2020-04-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1827165" } ], "notes": [ { "category": "description", "text": "A new domain bypass transient execution attack known as Special Register Buffer Data Sampling (SRBDS) has been found. This flaw allows data values from special internal registers to be leaked by an attacker able to execute code on any core of the CPU. An unprivileged, local attacker can use this flaw to infer values returned by affected instructions known to be commonly used during cryptographic operations that rely on uniqueness, secrecy, or both.", "title": "Vulnerability description" }, { "category": "summary", "text": "hw: Special Register Buffer Data Sampling (SRBDS)", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/solutions/5142691", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.9.Z:microcode_ctl-2:2.1-73.11.el7_9.src", "7Client-7.9.Z:microcode_ctl-2:2.1-73.11.el7_9.x86_64", "7Client-7.9.Z:microcode_ctl-debuginfo-2:2.1-73.11.el7_9.x86_64", "7Server-7.9.Z:microcode_ctl-2:2.1-73.11.el7_9.src", "7Server-7.9.Z:microcode_ctl-2:2.1-73.11.el7_9.x86_64", "7Server-7.9.Z:microcode_ctl-debuginfo-2:2.1-73.11.el7_9.x86_64", "7Workstation-7.9.Z:microcode_ctl-2:2.1-73.11.el7_9.src", "7Workstation-7.9.Z:microcode_ctl-2:2.1-73.11.el7_9.x86_64", "7Workstation-7.9.Z:microcode_ctl-debuginfo-2:2.1-73.11.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-0543" }, { "category": "external", "summary": "RHBZ#1827165", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1827165" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-0543", "url": "https://www.cve.org/CVERecord?id=CVE-2020-0543" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-0543", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-0543" }, { "category": "external", "summary": "https://access.redhat.com/solutions/5142691", "url": "https://access.redhat.com/solutions/5142691" }, { "category": "external", "summary": "https://access.redhat.com/solutions/5142751", "url": "https://access.redhat.com/solutions/5142751" }, { "category": "external", "summary": "https://blogs.intel.com/technology/2020/06/ipas-security-advisories-for-june-2020/#gs.6uyhri", "url": "https://blogs.intel.com/technology/2020/06/ipas-security-advisories-for-june-2020/#gs.6uyhri" }, { "category": "external", "summary": "https://software.intel.com/security-software-guidance/insights/deep-dive-special-register-buffer-data-sampling", "url": "https://software.intel.com/security-software-guidance/insights/deep-dive-special-register-buffer-data-sampling" }, { "category": "external", "summary": "https://xenbits.xen.org/xsa/advisory-320.html", "url": "https://xenbits.xen.org/xsa/advisory-320.html" } ], "release_date": "2020-06-09T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-08-09T10:18:52+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Client-7.9.Z:microcode_ctl-2:2.1-73.11.el7_9.src", "7Client-7.9.Z:microcode_ctl-2:2.1-73.11.el7_9.x86_64", "7Client-7.9.Z:microcode_ctl-debuginfo-2:2.1-73.11.el7_9.x86_64", "7Server-7.9.Z:microcode_ctl-2:2.1-73.11.el7_9.src", "7Server-7.9.Z:microcode_ctl-2:2.1-73.11.el7_9.x86_64", "7Server-7.9.Z:microcode_ctl-debuginfo-2:2.1-73.11.el7_9.x86_64", "7Workstation-7.9.Z:microcode_ctl-2:2.1-73.11.el7_9.src", "7Workstation-7.9.Z:microcode_ctl-2:2.1-73.11.el7_9.x86_64", "7Workstation-7.9.Z:microcode_ctl-debuginfo-2:2.1-73.11.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3028" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "7Client-7.9.Z:microcode_ctl-2:2.1-73.11.el7_9.src", "7Client-7.9.Z:microcode_ctl-2:2.1-73.11.el7_9.x86_64", "7Client-7.9.Z:microcode_ctl-debuginfo-2:2.1-73.11.el7_9.x86_64", "7Server-7.9.Z:microcode_ctl-2:2.1-73.11.el7_9.src", "7Server-7.9.Z:microcode_ctl-2:2.1-73.11.el7_9.x86_64", "7Server-7.9.Z:microcode_ctl-debuginfo-2:2.1-73.11.el7_9.x86_64", "7Workstation-7.9.Z:microcode_ctl-2:2.1-73.11.el7_9.src", "7Workstation-7.9.Z:microcode_ctl-2:2.1-73.11.el7_9.x86_64", "7Workstation-7.9.Z:microcode_ctl-debuginfo-2:2.1-73.11.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "7Client-7.9.Z:microcode_ctl-2:2.1-73.11.el7_9.src", "7Client-7.9.Z:microcode_ctl-2:2.1-73.11.el7_9.x86_64", "7Client-7.9.Z:microcode_ctl-debuginfo-2:2.1-73.11.el7_9.x86_64", "7Server-7.9.Z:microcode_ctl-2:2.1-73.11.el7_9.src", "7Server-7.9.Z:microcode_ctl-2:2.1-73.11.el7_9.x86_64", "7Server-7.9.Z:microcode_ctl-debuginfo-2:2.1-73.11.el7_9.x86_64", "7Workstation-7.9.Z:microcode_ctl-2:2.1-73.11.el7_9.src", "7Workstation-7.9.Z:microcode_ctl-2:2.1-73.11.el7_9.x86_64", "7Workstation-7.9.Z:microcode_ctl-debuginfo-2:2.1-73.11.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "hw: Special Register Buffer Data Sampling (SRBDS)" }, { "cve": "CVE-2020-0548", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2020-01-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1788786" } ], "notes": [ { "category": "description", "text": "A flaw was found in Intel processors where a local attacker is able to gain information about registers used for vector calculations by observing register states from other processes running on the system. This results in a race condition where store buffers, which were not cleared, could be read by another process or a CPU sibling. The highest threat from this vulnerability is data confidentiality where an attacker could read arbitrary data as it passes through the processor.", "title": "Vulnerability description" }, { "category": "summary", "text": "hw: Vector Register Data Sampling", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.9.Z:microcode_ctl-2:2.1-73.11.el7_9.src", "7Client-7.9.Z:microcode_ctl-2:2.1-73.11.el7_9.x86_64", "7Client-7.9.Z:microcode_ctl-debuginfo-2:2.1-73.11.el7_9.x86_64", "7Server-7.9.Z:microcode_ctl-2:2.1-73.11.el7_9.src", "7Server-7.9.Z:microcode_ctl-2:2.1-73.11.el7_9.x86_64", "7Server-7.9.Z:microcode_ctl-debuginfo-2:2.1-73.11.el7_9.x86_64", "7Workstation-7.9.Z:microcode_ctl-2:2.1-73.11.el7_9.src", "7Workstation-7.9.Z:microcode_ctl-2:2.1-73.11.el7_9.x86_64", "7Workstation-7.9.Z:microcode_ctl-debuginfo-2:2.1-73.11.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-0548" }, { "category": "external", "summary": "RHBZ#1788786", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1788786" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-0548", "url": "https://www.cve.org/CVERecord?id=CVE-2020-0548" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-0548", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-0548" }, { "category": "external", "summary": "https://access.redhat.com/solutions/l1d-cache-eviction-and-vector-register-sampling", "url": "https://access.redhat.com/solutions/l1d-cache-eviction-and-vector-register-sampling" }, { "category": "external", "summary": "https://blogs.intel.com/technology/2020/01/ipas-intel-sa-00329/", "url": "https://blogs.intel.com/technology/2020/01/ipas-intel-sa-00329/" }, { "category": "external", "summary": "https://cacheoutattack.com/CacheOut.pdf", "url": "https://cacheoutattack.com/CacheOut.pdf" }, { "category": "external", "summary": "https://software.intel.com/security-software-guidance/software-guidance/l1d-eviction-sampling", "url": "https://software.intel.com/security-software-guidance/software-guidance/l1d-eviction-sampling" } ], "release_date": "2020-01-27T13:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-08-09T10:18:52+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Client-7.9.Z:microcode_ctl-2:2.1-73.11.el7_9.src", "7Client-7.9.Z:microcode_ctl-2:2.1-73.11.el7_9.x86_64", "7Client-7.9.Z:microcode_ctl-debuginfo-2:2.1-73.11.el7_9.x86_64", "7Server-7.9.Z:microcode_ctl-2:2.1-73.11.el7_9.src", "7Server-7.9.Z:microcode_ctl-2:2.1-73.11.el7_9.x86_64", "7Server-7.9.Z:microcode_ctl-debuginfo-2:2.1-73.11.el7_9.x86_64", "7Workstation-7.9.Z:microcode_ctl-2:2.1-73.11.el7_9.src", "7Workstation-7.9.Z:microcode_ctl-2:2.1-73.11.el7_9.x86_64", "7Workstation-7.9.Z:microcode_ctl-debuginfo-2:2.1-73.11.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3028" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 2.8, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.0" }, "products": [ "7Client-7.9.Z:microcode_ctl-2:2.1-73.11.el7_9.src", "7Client-7.9.Z:microcode_ctl-2:2.1-73.11.el7_9.x86_64", "7Client-7.9.Z:microcode_ctl-debuginfo-2:2.1-73.11.el7_9.x86_64", "7Server-7.9.Z:microcode_ctl-2:2.1-73.11.el7_9.src", "7Server-7.9.Z:microcode_ctl-2:2.1-73.11.el7_9.x86_64", "7Server-7.9.Z:microcode_ctl-debuginfo-2:2.1-73.11.el7_9.x86_64", "7Workstation-7.9.Z:microcode_ctl-2:2.1-73.11.el7_9.src", "7Workstation-7.9.Z:microcode_ctl-2:2.1-73.11.el7_9.x86_64", "7Workstation-7.9.Z:microcode_ctl-debuginfo-2:2.1-73.11.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "hw: Vector Register Data Sampling" }, { "cve": "CVE-2020-0549", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2020-01-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1788788" } ], "notes": [ { "category": "description", "text": "A microarchitectural timing flaw was found on some Intel processors. A corner case exists where data in-flight during the eviction process can end up in the \u201cfill buffers\u201d and not properly cleared by the MDS mitigations. The fill buffer contents (which were expected to be blank) can be inferred using MDS or TAA style attack methods to allow a local attacker to infer fill buffer values.", "title": "Vulnerability description" }, { "category": "summary", "text": "hw: L1D Cache Eviction Sampling", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.9.Z:microcode_ctl-2:2.1-73.11.el7_9.src", "7Client-7.9.Z:microcode_ctl-2:2.1-73.11.el7_9.x86_64", "7Client-7.9.Z:microcode_ctl-debuginfo-2:2.1-73.11.el7_9.x86_64", "7Server-7.9.Z:microcode_ctl-2:2.1-73.11.el7_9.src", "7Server-7.9.Z:microcode_ctl-2:2.1-73.11.el7_9.x86_64", "7Server-7.9.Z:microcode_ctl-debuginfo-2:2.1-73.11.el7_9.x86_64", "7Workstation-7.9.Z:microcode_ctl-2:2.1-73.11.el7_9.src", "7Workstation-7.9.Z:microcode_ctl-2:2.1-73.11.el7_9.x86_64", "7Workstation-7.9.Z:microcode_ctl-debuginfo-2:2.1-73.11.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-0549" }, { "category": "external", "summary": "RHBZ#1788788", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1788788" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-0549", "url": "https://www.cve.org/CVERecord?id=CVE-2020-0549" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-0549", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-0549" }, { "category": "external", "summary": "https://access.redhat.com/solutions/l1d-cache-eviction-and-vector-register-sampling", "url": "https://access.redhat.com/solutions/l1d-cache-eviction-and-vector-register-sampling" }, { "category": "external", "summary": "https://blogs.intel.com/technology/2020/01/ipas-intel-sa-00329/", "url": "https://blogs.intel.com/technology/2020/01/ipas-intel-sa-00329/" }, { "category": "external", "summary": "https://cacheoutattack.com/CacheOut.pdf", "url": "https://cacheoutattack.com/CacheOut.pdf" }, { "category": "external", "summary": "https://software.intel.com/security-software-guidance/software-guidance/l1d-eviction-sampling", "url": "https://software.intel.com/security-software-guidance/software-guidance/l1d-eviction-sampling" } ], "release_date": "2020-01-27T13:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-08-09T10:18:52+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Client-7.9.Z:microcode_ctl-2:2.1-73.11.el7_9.src", "7Client-7.9.Z:microcode_ctl-2:2.1-73.11.el7_9.x86_64", "7Client-7.9.Z:microcode_ctl-debuginfo-2:2.1-73.11.el7_9.x86_64", "7Server-7.9.Z:microcode_ctl-2:2.1-73.11.el7_9.src", "7Server-7.9.Z:microcode_ctl-2:2.1-73.11.el7_9.x86_64", "7Server-7.9.Z:microcode_ctl-debuginfo-2:2.1-73.11.el7_9.x86_64", "7Workstation-7.9.Z:microcode_ctl-2:2.1-73.11.el7_9.src", "7Workstation-7.9.Z:microcode_ctl-2:2.1-73.11.el7_9.x86_64", "7Workstation-7.9.Z:microcode_ctl-debuginfo-2:2.1-73.11.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3028" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "7Client-7.9.Z:microcode_ctl-2:2.1-73.11.el7_9.src", "7Client-7.9.Z:microcode_ctl-2:2.1-73.11.el7_9.x86_64", "7Client-7.9.Z:microcode_ctl-debuginfo-2:2.1-73.11.el7_9.x86_64", "7Server-7.9.Z:microcode_ctl-2:2.1-73.11.el7_9.src", "7Server-7.9.Z:microcode_ctl-2:2.1-73.11.el7_9.x86_64", "7Server-7.9.Z:microcode_ctl-debuginfo-2:2.1-73.11.el7_9.x86_64", "7Workstation-7.9.Z:microcode_ctl-2:2.1-73.11.el7_9.src", "7Workstation-7.9.Z:microcode_ctl-2:2.1-73.11.el7_9.x86_64", "7Workstation-7.9.Z:microcode_ctl-debuginfo-2:2.1-73.11.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "hw: L1D Cache Eviction Sampling" }, { "acknowledgments": [ { "names": [ "Intel" ] } ], "cve": "CVE-2020-8695", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2020-04-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1828583" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in Intel\u0027s implementation of RAPL (Running Average Power Limit). An attacker with a local account could query the power management functionality to intelligently infer SGX enclave computation values by measuring power usage in the RAPL subsystem.", "title": "Vulnerability description" }, { "category": "summary", "text": "hw: Information disclosure issue in Intel SGX via RAPL interface", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.9.Z:microcode_ctl-2:2.1-73.11.el7_9.src", "7Client-7.9.Z:microcode_ctl-2:2.1-73.11.el7_9.x86_64", "7Client-7.9.Z:microcode_ctl-debuginfo-2:2.1-73.11.el7_9.x86_64", "7Server-7.9.Z:microcode_ctl-2:2.1-73.11.el7_9.src", "7Server-7.9.Z:microcode_ctl-2:2.1-73.11.el7_9.x86_64", "7Server-7.9.Z:microcode_ctl-debuginfo-2:2.1-73.11.el7_9.x86_64", "7Workstation-7.9.Z:microcode_ctl-2:2.1-73.11.el7_9.src", "7Workstation-7.9.Z:microcode_ctl-2:2.1-73.11.el7_9.x86_64", "7Workstation-7.9.Z:microcode_ctl-debuginfo-2:2.1-73.11.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-8695" }, { "category": "external", "summary": "RHBZ#1828583", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1828583" }, { "category": "external", "summary": "RHSB-5569051", "url": "https://access.redhat.com/articles/5569051" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-8695", "url": "https://www.cve.org/CVERecord?id=CVE-2020-8695" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-8695", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8695" }, { "category": "external", "summary": "https://en.wikipedia.org/wiki/Power_analysis", "url": "https://en.wikipedia.org/wiki/Power_analysis" }, { "category": "external", "summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00389.html", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00389.html" } ], "release_date": "2020-11-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-08-09T10:18:52+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Client-7.9.Z:microcode_ctl-2:2.1-73.11.el7_9.src", "7Client-7.9.Z:microcode_ctl-2:2.1-73.11.el7_9.x86_64", "7Client-7.9.Z:microcode_ctl-debuginfo-2:2.1-73.11.el7_9.x86_64", "7Server-7.9.Z:microcode_ctl-2:2.1-73.11.el7_9.src", "7Server-7.9.Z:microcode_ctl-2:2.1-73.11.el7_9.x86_64", "7Server-7.9.Z:microcode_ctl-debuginfo-2:2.1-73.11.el7_9.x86_64", "7Workstation-7.9.Z:microcode_ctl-2:2.1-73.11.el7_9.src", "7Workstation-7.9.Z:microcode_ctl-2:2.1-73.11.el7_9.x86_64", "7Workstation-7.9.Z:microcode_ctl-debuginfo-2:2.1-73.11.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3028" }, { "category": "workaround", "details": "Until a firmware update and reboot can be applied, the attack vector can be reduced by limiting read access to the sysfs attributes that export this functionality to userspace. \n\nThe command:\n~~~\nsudo chmod 400 /sys/class/powercap/intel_rapl/*/energy_uj\n~~~\nWill do this for the current boot, it will need to be scripted to run at each boot to remain persistent across reboots.", "product_ids": [ "7Client-7.9.Z:microcode_ctl-2:2.1-73.11.el7_9.src", "7Client-7.9.Z:microcode_ctl-2:2.1-73.11.el7_9.x86_64", "7Client-7.9.Z:microcode_ctl-debuginfo-2:2.1-73.11.el7_9.x86_64", "7Server-7.9.Z:microcode_ctl-2:2.1-73.11.el7_9.src", "7Server-7.9.Z:microcode_ctl-2:2.1-73.11.el7_9.x86_64", "7Server-7.9.Z:microcode_ctl-debuginfo-2:2.1-73.11.el7_9.x86_64", "7Workstation-7.9.Z:microcode_ctl-2:2.1-73.11.el7_9.src", "7Workstation-7.9.Z:microcode_ctl-2:2.1-73.11.el7_9.x86_64", "7Workstation-7.9.Z:microcode_ctl-debuginfo-2:2.1-73.11.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "7Client-7.9.Z:microcode_ctl-2:2.1-73.11.el7_9.src", "7Client-7.9.Z:microcode_ctl-2:2.1-73.11.el7_9.x86_64", "7Client-7.9.Z:microcode_ctl-debuginfo-2:2.1-73.11.el7_9.x86_64", "7Server-7.9.Z:microcode_ctl-2:2.1-73.11.el7_9.src", "7Server-7.9.Z:microcode_ctl-2:2.1-73.11.el7_9.x86_64", "7Server-7.9.Z:microcode_ctl-debuginfo-2:2.1-73.11.el7_9.x86_64", "7Workstation-7.9.Z:microcode_ctl-2:2.1-73.11.el7_9.src", "7Workstation-7.9.Z:microcode_ctl-2:2.1-73.11.el7_9.x86_64", "7Workstation-7.9.Z:microcode_ctl-debuginfo-2:2.1-73.11.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "hw: Information disclosure issue in Intel SGX via RAPL interface" }, { "acknowledgments": [ { "names": [ "Intel" ] } ], "cve": "CVE-2020-8696", "cwe": { "id": "CWE-212", "name": "Improper Removal of Sensitive Information Before Storage or Transfer" }, "discovery_date": "2020-10-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1890355" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Intel Advanced Vector Extensions (AVX) implementation, where a local authenticated attacker with the ability to execute AVX instructions can gather the AVX register state from previous AVX executions. This vulnerability allows information disclosure of the AVX register state.", "title": "Vulnerability description" }, { "category": "summary", "text": "hw: Vector Register Leakage-Active", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.9.Z:microcode_ctl-2:2.1-73.11.el7_9.src", "7Client-7.9.Z:microcode_ctl-2:2.1-73.11.el7_9.x86_64", "7Client-7.9.Z:microcode_ctl-debuginfo-2:2.1-73.11.el7_9.x86_64", "7Server-7.9.Z:microcode_ctl-2:2.1-73.11.el7_9.src", "7Server-7.9.Z:microcode_ctl-2:2.1-73.11.el7_9.x86_64", "7Server-7.9.Z:microcode_ctl-debuginfo-2:2.1-73.11.el7_9.x86_64", "7Workstation-7.9.Z:microcode_ctl-2:2.1-73.11.el7_9.src", "7Workstation-7.9.Z:microcode_ctl-2:2.1-73.11.el7_9.x86_64", "7Workstation-7.9.Z:microcode_ctl-debuginfo-2:2.1-73.11.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-8696" }, { "category": "external", "summary": "RHBZ#1890355", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890355" }, { "category": "external", "summary": "RHSB-5569051", "url": "https://access.redhat.com/articles/5569051" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-8696", "url": "https://www.cve.org/CVERecord?id=CVE-2020-8696" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-8696", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8696" }, { "category": "external", "summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00381.html", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00381.html" } ], "release_date": "2020-11-10T13:55:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-08-09T10:18:52+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Client-7.9.Z:microcode_ctl-2:2.1-73.11.el7_9.src", "7Client-7.9.Z:microcode_ctl-2:2.1-73.11.el7_9.x86_64", "7Client-7.9.Z:microcode_ctl-debuginfo-2:2.1-73.11.el7_9.x86_64", "7Server-7.9.Z:microcode_ctl-2:2.1-73.11.el7_9.src", "7Server-7.9.Z:microcode_ctl-2:2.1-73.11.el7_9.x86_64", "7Server-7.9.Z:microcode_ctl-debuginfo-2:2.1-73.11.el7_9.x86_64", "7Workstation-7.9.Z:microcode_ctl-2:2.1-73.11.el7_9.src", "7Workstation-7.9.Z:microcode_ctl-2:2.1-73.11.el7_9.x86_64", "7Workstation-7.9.Z:microcode_ctl-debuginfo-2:2.1-73.11.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3028" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 2.8, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.1" }, "products": [ "7Client-7.9.Z:microcode_ctl-2:2.1-73.11.el7_9.src", "7Client-7.9.Z:microcode_ctl-2:2.1-73.11.el7_9.x86_64", "7Client-7.9.Z:microcode_ctl-debuginfo-2:2.1-73.11.el7_9.x86_64", "7Server-7.9.Z:microcode_ctl-2:2.1-73.11.el7_9.src", "7Server-7.9.Z:microcode_ctl-2:2.1-73.11.el7_9.x86_64", "7Server-7.9.Z:microcode_ctl-debuginfo-2:2.1-73.11.el7_9.x86_64", "7Workstation-7.9.Z:microcode_ctl-2:2.1-73.11.el7_9.src", "7Workstation-7.9.Z:microcode_ctl-2:2.1-73.11.el7_9.x86_64", "7Workstation-7.9.Z:microcode_ctl-debuginfo-2:2.1-73.11.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "hw: Vector Register Leakage-Active" }, { "acknowledgments": [ { "names": [ "Intel" ] } ], "cve": "CVE-2020-8698", "cwe": { "id": "CWE-212", "name": "Improper Removal of Sensitive Information Before Storage or Transfer" }, "discovery_date": "2020-10-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1890356" } ], "notes": [ { "category": "description", "text": "A flaw was found in the CPU microarchitecture where a local attacker is able to abuse a timing issue which may allow them to infer internal architectural state from previous executions on the CPU.", "title": "Vulnerability description" }, { "category": "summary", "text": "hw: Fast forward store predictor", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.9.Z:microcode_ctl-2:2.1-73.11.el7_9.src", "7Client-7.9.Z:microcode_ctl-2:2.1-73.11.el7_9.x86_64", "7Client-7.9.Z:microcode_ctl-debuginfo-2:2.1-73.11.el7_9.x86_64", "7Server-7.9.Z:microcode_ctl-2:2.1-73.11.el7_9.src", "7Server-7.9.Z:microcode_ctl-2:2.1-73.11.el7_9.x86_64", "7Server-7.9.Z:microcode_ctl-debuginfo-2:2.1-73.11.el7_9.x86_64", "7Workstation-7.9.Z:microcode_ctl-2:2.1-73.11.el7_9.src", "7Workstation-7.9.Z:microcode_ctl-2:2.1-73.11.el7_9.x86_64", "7Workstation-7.9.Z:microcode_ctl-debuginfo-2:2.1-73.11.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-8698" }, { "category": "external", "summary": "RHBZ#1890356", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890356" }, { "category": "external", "summary": "RHSB-5569051", "url": "https://access.redhat.com/articles/5569051" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-8698", "url": "https://www.cve.org/CVERecord?id=CVE-2020-8698" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-8698", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8698" }, { "category": "external", "summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00381.html", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00381.html" } ], "release_date": "2020-11-10T13:55:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-08-09T10:18:52+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Client-7.9.Z:microcode_ctl-2:2.1-73.11.el7_9.src", "7Client-7.9.Z:microcode_ctl-2:2.1-73.11.el7_9.x86_64", "7Client-7.9.Z:microcode_ctl-debuginfo-2:2.1-73.11.el7_9.x86_64", "7Server-7.9.Z:microcode_ctl-2:2.1-73.11.el7_9.src", "7Server-7.9.Z:microcode_ctl-2:2.1-73.11.el7_9.x86_64", "7Server-7.9.Z:microcode_ctl-debuginfo-2:2.1-73.11.el7_9.x86_64", "7Workstation-7.9.Z:microcode_ctl-2:2.1-73.11.el7_9.src", "7Workstation-7.9.Z:microcode_ctl-2:2.1-73.11.el7_9.x86_64", "7Workstation-7.9.Z:microcode_ctl-debuginfo-2:2.1-73.11.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3028" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "7Client-7.9.Z:microcode_ctl-2:2.1-73.11.el7_9.src", "7Client-7.9.Z:microcode_ctl-2:2.1-73.11.el7_9.x86_64", "7Client-7.9.Z:microcode_ctl-debuginfo-2:2.1-73.11.el7_9.x86_64", "7Server-7.9.Z:microcode_ctl-2:2.1-73.11.el7_9.src", "7Server-7.9.Z:microcode_ctl-2:2.1-73.11.el7_9.x86_64", "7Server-7.9.Z:microcode_ctl-debuginfo-2:2.1-73.11.el7_9.x86_64", "7Workstation-7.9.Z:microcode_ctl-2:2.1-73.11.el7_9.src", "7Workstation-7.9.Z:microcode_ctl-2:2.1-73.11.el7_9.x86_64", "7Workstation-7.9.Z:microcode_ctl-debuginfo-2:2.1-73.11.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "hw: Fast forward store predictor" }, { "acknowledgments": [ { "names": [ "Intel" ] } ], "cve": "CVE-2020-24489", "cwe": { "id": "CWE-459", "name": "Incomplete Cleanup" }, "discovery_date": "2021-05-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1962650" } ], "notes": [ { "category": "description", "text": "A flaw was found in Intel\u00ae VT-d products. Entries from the context cache on some types of context cache invalidations may not be properly invalidated which may allow an authenticated user to potentially enable escalation of privilege via local access. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "hw: vt-d related privilege escalation", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.9.Z:microcode_ctl-2:2.1-73.11.el7_9.src", "7Client-7.9.Z:microcode_ctl-2:2.1-73.11.el7_9.x86_64", "7Client-7.9.Z:microcode_ctl-debuginfo-2:2.1-73.11.el7_9.x86_64", "7Server-7.9.Z:microcode_ctl-2:2.1-73.11.el7_9.src", "7Server-7.9.Z:microcode_ctl-2:2.1-73.11.el7_9.x86_64", "7Server-7.9.Z:microcode_ctl-debuginfo-2:2.1-73.11.el7_9.x86_64", "7Workstation-7.9.Z:microcode_ctl-2:2.1-73.11.el7_9.src", "7Workstation-7.9.Z:microcode_ctl-2:2.1-73.11.el7_9.x86_64", "7Workstation-7.9.Z:microcode_ctl-debuginfo-2:2.1-73.11.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-24489" }, { "category": "external", "summary": "RHBZ#1962650", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1962650" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-24489", "url": "https://www.cve.org/CVERecord?id=CVE-2020-24489" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-24489", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-24489" } ], "release_date": "2021-06-08T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-08-09T10:18:52+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Client-7.9.Z:microcode_ctl-2:2.1-73.11.el7_9.src", "7Client-7.9.Z:microcode_ctl-2:2.1-73.11.el7_9.x86_64", "7Client-7.9.Z:microcode_ctl-debuginfo-2:2.1-73.11.el7_9.x86_64", "7Server-7.9.Z:microcode_ctl-2:2.1-73.11.el7_9.src", "7Server-7.9.Z:microcode_ctl-2:2.1-73.11.el7_9.x86_64", "7Server-7.9.Z:microcode_ctl-debuginfo-2:2.1-73.11.el7_9.x86_64", "7Workstation-7.9.Z:microcode_ctl-2:2.1-73.11.el7_9.src", "7Workstation-7.9.Z:microcode_ctl-2:2.1-73.11.el7_9.x86_64", "7Workstation-7.9.Z:microcode_ctl-debuginfo-2:2.1-73.11.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3028" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Client-7.9.Z:microcode_ctl-2:2.1-73.11.el7_9.src", "7Client-7.9.Z:microcode_ctl-2:2.1-73.11.el7_9.x86_64", "7Client-7.9.Z:microcode_ctl-debuginfo-2:2.1-73.11.el7_9.x86_64", "7Server-7.9.Z:microcode_ctl-2:2.1-73.11.el7_9.src", "7Server-7.9.Z:microcode_ctl-2:2.1-73.11.el7_9.x86_64", "7Server-7.9.Z:microcode_ctl-debuginfo-2:2.1-73.11.el7_9.x86_64", "7Workstation-7.9.Z:microcode_ctl-2:2.1-73.11.el7_9.src", "7Workstation-7.9.Z:microcode_ctl-2:2.1-73.11.el7_9.x86_64", "7Workstation-7.9.Z:microcode_ctl-debuginfo-2:2.1-73.11.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "hw: vt-d related privilege escalation" }, { "acknowledgments": [ { "names": [ "Intel" ] } ], "cve": "CVE-2020-24511", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2021-05-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1962702" } ], "notes": [ { "category": "description", "text": "Microcode misconfiguration in some Intel processors may cause EIBRS mitigation (CVE-2017-5715) to be incomplete. As a consequence, this issue may allow an authenticated user to potentially enable information disclosure via local access.", "title": "Vulnerability description" }, { "category": "summary", "text": "hw: improper isolation of shared resources in some Intel Processors", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.9.Z:microcode_ctl-2:2.1-73.11.el7_9.src", "7Client-7.9.Z:microcode_ctl-2:2.1-73.11.el7_9.x86_64", "7Client-7.9.Z:microcode_ctl-debuginfo-2:2.1-73.11.el7_9.x86_64", "7Server-7.9.Z:microcode_ctl-2:2.1-73.11.el7_9.src", "7Server-7.9.Z:microcode_ctl-2:2.1-73.11.el7_9.x86_64", "7Server-7.9.Z:microcode_ctl-debuginfo-2:2.1-73.11.el7_9.x86_64", "7Workstation-7.9.Z:microcode_ctl-2:2.1-73.11.el7_9.src", "7Workstation-7.9.Z:microcode_ctl-2:2.1-73.11.el7_9.x86_64", "7Workstation-7.9.Z:microcode_ctl-debuginfo-2:2.1-73.11.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-24511" }, { "category": "external", "summary": "RHBZ#1962702", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1962702" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-24511", "url": "https://www.cve.org/CVERecord?id=CVE-2020-24511" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-24511", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-24511" } ], "release_date": "2021-06-08T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-08-09T10:18:52+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Client-7.9.Z:microcode_ctl-2:2.1-73.11.el7_9.src", "7Client-7.9.Z:microcode_ctl-2:2.1-73.11.el7_9.x86_64", "7Client-7.9.Z:microcode_ctl-debuginfo-2:2.1-73.11.el7_9.x86_64", "7Server-7.9.Z:microcode_ctl-2:2.1-73.11.el7_9.src", "7Server-7.9.Z:microcode_ctl-2:2.1-73.11.el7_9.x86_64", "7Server-7.9.Z:microcode_ctl-debuginfo-2:2.1-73.11.el7_9.x86_64", "7Workstation-7.9.Z:microcode_ctl-2:2.1-73.11.el7_9.src", "7Workstation-7.9.Z:microcode_ctl-2:2.1-73.11.el7_9.x86_64", "7Workstation-7.9.Z:microcode_ctl-debuginfo-2:2.1-73.11.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3028" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "7Client-7.9.Z:microcode_ctl-2:2.1-73.11.el7_9.src", "7Client-7.9.Z:microcode_ctl-2:2.1-73.11.el7_9.x86_64", "7Client-7.9.Z:microcode_ctl-debuginfo-2:2.1-73.11.el7_9.x86_64", "7Server-7.9.Z:microcode_ctl-2:2.1-73.11.el7_9.src", "7Server-7.9.Z:microcode_ctl-2:2.1-73.11.el7_9.x86_64", "7Server-7.9.Z:microcode_ctl-debuginfo-2:2.1-73.11.el7_9.x86_64", "7Workstation-7.9.Z:microcode_ctl-2:2.1-73.11.el7_9.src", "7Workstation-7.9.Z:microcode_ctl-2:2.1-73.11.el7_9.x86_64", "7Workstation-7.9.Z:microcode_ctl-debuginfo-2:2.1-73.11.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "hw: improper isolation of shared resources in some Intel Processors" }, { "acknowledgments": [ { "names": [ "Intel" ] } ], "cve": "CVE-2020-24512", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2021-05-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1962722" } ], "notes": [ { "category": "description", "text": "Observable timing discrepancy in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.", "title": "Vulnerability description" }, { "category": "summary", "text": "hw: observable timing discrepancy in some Intel Processors", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.9.Z:microcode_ctl-2:2.1-73.11.el7_9.src", "7Client-7.9.Z:microcode_ctl-2:2.1-73.11.el7_9.x86_64", "7Client-7.9.Z:microcode_ctl-debuginfo-2:2.1-73.11.el7_9.x86_64", "7Server-7.9.Z:microcode_ctl-2:2.1-73.11.el7_9.src", "7Server-7.9.Z:microcode_ctl-2:2.1-73.11.el7_9.x86_64", "7Server-7.9.Z:microcode_ctl-debuginfo-2:2.1-73.11.el7_9.x86_64", "7Workstation-7.9.Z:microcode_ctl-2:2.1-73.11.el7_9.src", "7Workstation-7.9.Z:microcode_ctl-2:2.1-73.11.el7_9.x86_64", "7Workstation-7.9.Z:microcode_ctl-debuginfo-2:2.1-73.11.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-24512" }, { "category": "external", "summary": "RHBZ#1962722", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1962722" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-24512", "url": "https://www.cve.org/CVERecord?id=CVE-2020-24512" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-24512", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-24512" } ], "release_date": "2021-06-08T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-08-09T10:18:52+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Client-7.9.Z:microcode_ctl-2:2.1-73.11.el7_9.src", "7Client-7.9.Z:microcode_ctl-2:2.1-73.11.el7_9.x86_64", "7Client-7.9.Z:microcode_ctl-debuginfo-2:2.1-73.11.el7_9.x86_64", "7Server-7.9.Z:microcode_ctl-2:2.1-73.11.el7_9.src", "7Server-7.9.Z:microcode_ctl-2:2.1-73.11.el7_9.x86_64", "7Server-7.9.Z:microcode_ctl-debuginfo-2:2.1-73.11.el7_9.x86_64", "7Workstation-7.9.Z:microcode_ctl-2:2.1-73.11.el7_9.src", "7Workstation-7.9.Z:microcode_ctl-2:2.1-73.11.el7_9.x86_64", "7Workstation-7.9.Z:microcode_ctl-debuginfo-2:2.1-73.11.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3028" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 2.8, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.1" }, "products": [ "7Client-7.9.Z:microcode_ctl-2:2.1-73.11.el7_9.src", "7Client-7.9.Z:microcode_ctl-2:2.1-73.11.el7_9.x86_64", "7Client-7.9.Z:microcode_ctl-debuginfo-2:2.1-73.11.el7_9.x86_64", "7Server-7.9.Z:microcode_ctl-2:2.1-73.11.el7_9.src", "7Server-7.9.Z:microcode_ctl-2:2.1-73.11.el7_9.x86_64", "7Server-7.9.Z:microcode_ctl-debuginfo-2:2.1-73.11.el7_9.x86_64", "7Workstation-7.9.Z:microcode_ctl-2:2.1-73.11.el7_9.src", "7Workstation-7.9.Z:microcode_ctl-2:2.1-73.11.el7_9.x86_64", "7Workstation-7.9.Z:microcode_ctl-debuginfo-2:2.1-73.11.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "hw: observable timing discrepancy in some Intel Processors" } ] }
rhsa-2021:3317
Vulnerability from csaf_redhat
Published
2021-08-31 08:30
Modified
2025-08-02 09:53
Summary
Red Hat Security Advisory: microcode_ctl security, bug fix and enhancement update
Notes
Topic
An update for microcode_ctl is now available for Red Hat Enterprise Linux
7.6 Advanced Update Support.
Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.
Details
* hw: Vector Register Data Sampling (CVE-2020-0548)
* hw: L1D Cache Eviction Sampling (CVE-2020-0549)
* hw: Special Register Buffer Data Sampling (SRBDS) (CVE-2020-0543)
* hw: Information disclosure issue in Intel SGX via RAPL interface
(CVE-2020-8695)
* hw: Vector Register Leakage-Active (CVE-2020-8696)
* hw: Fast forward store predictor (CVE-2020-8698)
* hw: vt-d related privilege escalation (CVE-2020-24489)
* hw: improper isolation of shared resources in some Intel Processors
(CVE-2020-24511)
* hw: observable timing discrepancy in some Intel Processors
(CVE-2020-24512)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for microcode_ctl is now available for Red Hat Enterprise Linux\n7.6 Advanced Update Support.\n\nRed Hat Product Security has rated this update as having a security impact\nof Moderate. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available for each vulnerability from\nthe CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "* hw: Vector Register Data Sampling (CVE-2020-0548)\n\n* hw: L1D Cache Eviction Sampling (CVE-2020-0549)\n\n* hw: Special Register Buffer Data Sampling (SRBDS) (CVE-2020-0543)\n\n* hw: Information disclosure issue in Intel SGX via RAPL interface\n(CVE-2020-8695)\n\n* hw: Vector Register Leakage-Active (CVE-2020-8696)\n\n* hw: Fast forward store predictor (CVE-2020-8698)\n\n* hw: vt-d related privilege escalation (CVE-2020-24489)\n\n* hw: improper isolation of shared resources in some Intel Processors\n(CVE-2020-24511)\n\n* hw: observable timing discrepancy in some Intel Processors\n(CVE-2020-24512)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE\npage(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2021:3317", "url": "https://access.redhat.com/errata/RHSA-2021:3317" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1788786", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1788786" }, { "category": "external", "summary": "1788788", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1788788" }, { "category": "external", "summary": "1827165", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1827165" }, { "category": "external", "summary": "1828583", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1828583" }, { "category": "external", "summary": "1890355", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890355" }, { "category": "external", "summary": "1890356", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890356" }, { "category": "external", "summary": "1962650", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1962650" }, { "category": "external", "summary": "1962702", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1962702" }, { "category": "external", "summary": "1962722", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1962722" }, { "category": "external", "summary": "1972333", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1972333" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3317.json" } ], "title": "Red Hat Security Advisory: microcode_ctl security, bug fix and enhancement update", "tracking": { "current_release_date": "2025-08-02T09:53:12+00:00", "generator": { "date": "2025-08-02T09:53:12+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2021:3317", "initial_release_date": "2021-08-31T08:30:36+00:00", "revision_history": [ { "date": "2021-08-31T08:30:36+00:00", "number": "1", "summary": "Initial version" }, { "date": "2021-08-31T08:30:36+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-02T09:53:12+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Server AUS (v. 7.6)", "product": { "name": "Red Hat Enterprise Linux Server AUS (v. 7.6)", "product_id": "7Server-7.6.AUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_aus:7.6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server E4S (v. 7.6)", "product": { "name": "Red Hat Enterprise Linux Server E4S (v. 7.6)", "product_id": "7Server-7.6.E4S", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_e4s:7.6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server TUS (v. 7.6)", "product": { "name": "Red Hat Enterprise Linux Server TUS (v. 7.6)", "product_id": "7Server-7.6.TUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_tus:7.6::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "microcode_ctl-2:2.1-47.23.el7_6.src", "product": { "name": "microcode_ctl-2:2.1-47.23.el7_6.src", "product_id": "microcode_ctl-2:2.1-47.23.el7_6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/microcode_ctl@2.1-47.23.el7_6?arch=src\u0026epoch=2" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "microcode_ctl-2:2.1-47.23.el7_6.x86_64", "product": { "name": "microcode_ctl-2:2.1-47.23.el7_6.x86_64", "product_id": "microcode_ctl-2:2.1-47.23.el7_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/microcode_ctl@2.1-47.23.el7_6?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "microcode_ctl-debuginfo-2:2.1-47.23.el7_6.x86_64", "product": { "name": "microcode_ctl-debuginfo-2:2.1-47.23.el7_6.x86_64", "product_id": "microcode_ctl-debuginfo-2:2.1-47.23.el7_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/microcode_ctl-debuginfo@2.1-47.23.el7_6?arch=x86_64\u0026epoch=2" } } } ], "category": "architecture", "name": "x86_64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "microcode_ctl-2:2.1-47.23.el7_6.src as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)", "product_id": "7Server-7.6.AUS:microcode_ctl-2:2.1-47.23.el7_6.src" }, "product_reference": "microcode_ctl-2:2.1-47.23.el7_6.src", "relates_to_product_reference": "7Server-7.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "microcode_ctl-2:2.1-47.23.el7_6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)", "product_id": "7Server-7.6.AUS:microcode_ctl-2:2.1-47.23.el7_6.x86_64" }, "product_reference": "microcode_ctl-2:2.1-47.23.el7_6.x86_64", "relates_to_product_reference": "7Server-7.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "microcode_ctl-debuginfo-2:2.1-47.23.el7_6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)", "product_id": "7Server-7.6.AUS:microcode_ctl-debuginfo-2:2.1-47.23.el7_6.x86_64" }, "product_reference": "microcode_ctl-debuginfo-2:2.1-47.23.el7_6.x86_64", "relates_to_product_reference": "7Server-7.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "microcode_ctl-2:2.1-47.23.el7_6.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)", "product_id": "7Server-7.6.E4S:microcode_ctl-2:2.1-47.23.el7_6.src" }, "product_reference": "microcode_ctl-2:2.1-47.23.el7_6.src", "relates_to_product_reference": "7Server-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "microcode_ctl-2:2.1-47.23.el7_6.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)", "product_id": "7Server-7.6.E4S:microcode_ctl-2:2.1-47.23.el7_6.x86_64" }, "product_reference": "microcode_ctl-2:2.1-47.23.el7_6.x86_64", "relates_to_product_reference": "7Server-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "microcode_ctl-debuginfo-2:2.1-47.23.el7_6.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)", "product_id": "7Server-7.6.E4S:microcode_ctl-debuginfo-2:2.1-47.23.el7_6.x86_64" }, "product_reference": "microcode_ctl-debuginfo-2:2.1-47.23.el7_6.x86_64", "relates_to_product_reference": "7Server-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "microcode_ctl-2:2.1-47.23.el7_6.src as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)", "product_id": "7Server-7.6.TUS:microcode_ctl-2:2.1-47.23.el7_6.src" }, "product_reference": "microcode_ctl-2:2.1-47.23.el7_6.src", "relates_to_product_reference": "7Server-7.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "microcode_ctl-2:2.1-47.23.el7_6.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)", "product_id": "7Server-7.6.TUS:microcode_ctl-2:2.1-47.23.el7_6.x86_64" }, "product_reference": "microcode_ctl-2:2.1-47.23.el7_6.x86_64", "relates_to_product_reference": "7Server-7.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "microcode_ctl-debuginfo-2:2.1-47.23.el7_6.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)", "product_id": "7Server-7.6.TUS:microcode_ctl-debuginfo-2:2.1-47.23.el7_6.x86_64" }, "product_reference": "microcode_ctl-debuginfo-2:2.1-47.23.el7_6.x86_64", "relates_to_product_reference": "7Server-7.6.TUS" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Intel" ] } ], "cve": "CVE-2020-0543", "discovery_date": "2020-04-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1827165" } ], "notes": [ { "category": "description", "text": "A new domain bypass transient execution attack known as Special Register Buffer Data Sampling (SRBDS) has been found. This flaw allows data values from special internal registers to be leaked by an attacker able to execute code on any core of the CPU. An unprivileged, local attacker can use this flaw to infer values returned by affected instructions known to be commonly used during cryptographic operations that rely on uniqueness, secrecy, or both.", "title": "Vulnerability description" }, { "category": "summary", "text": "hw: Special Register Buffer Data Sampling (SRBDS)", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/solutions/5142691", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-7.6.AUS:microcode_ctl-2:2.1-47.23.el7_6.src", "7Server-7.6.AUS:microcode_ctl-2:2.1-47.23.el7_6.x86_64", "7Server-7.6.AUS:microcode_ctl-debuginfo-2:2.1-47.23.el7_6.x86_64", "7Server-7.6.E4S:microcode_ctl-2:2.1-47.23.el7_6.src", "7Server-7.6.E4S:microcode_ctl-2:2.1-47.23.el7_6.x86_64", "7Server-7.6.E4S:microcode_ctl-debuginfo-2:2.1-47.23.el7_6.x86_64", "7Server-7.6.TUS:microcode_ctl-2:2.1-47.23.el7_6.src", "7Server-7.6.TUS:microcode_ctl-2:2.1-47.23.el7_6.x86_64", "7Server-7.6.TUS:microcode_ctl-debuginfo-2:2.1-47.23.el7_6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-0543" }, { "category": "external", "summary": "RHBZ#1827165", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1827165" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-0543", "url": "https://www.cve.org/CVERecord?id=CVE-2020-0543" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-0543", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-0543" }, { "category": "external", "summary": "https://access.redhat.com/solutions/5142691", "url": "https://access.redhat.com/solutions/5142691" }, { "category": "external", "summary": "https://access.redhat.com/solutions/5142751", "url": "https://access.redhat.com/solutions/5142751" }, { "category": "external", "summary": "https://blogs.intel.com/technology/2020/06/ipas-security-advisories-for-june-2020/#gs.6uyhri", "url": "https://blogs.intel.com/technology/2020/06/ipas-security-advisories-for-june-2020/#gs.6uyhri" }, { "category": "external", "summary": "https://software.intel.com/security-software-guidance/insights/deep-dive-special-register-buffer-data-sampling", "url": "https://software.intel.com/security-software-guidance/insights/deep-dive-special-register-buffer-data-sampling" }, { "category": "external", "summary": "https://xenbits.xen.org/xsa/advisory-320.html", "url": "https://xenbits.xen.org/xsa/advisory-320.html" } ], "release_date": "2020-06-09T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-08-31T08:30:36+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-7.6.AUS:microcode_ctl-2:2.1-47.23.el7_6.src", "7Server-7.6.AUS:microcode_ctl-2:2.1-47.23.el7_6.x86_64", "7Server-7.6.AUS:microcode_ctl-debuginfo-2:2.1-47.23.el7_6.x86_64", "7Server-7.6.E4S:microcode_ctl-2:2.1-47.23.el7_6.src", "7Server-7.6.E4S:microcode_ctl-2:2.1-47.23.el7_6.x86_64", "7Server-7.6.E4S:microcode_ctl-debuginfo-2:2.1-47.23.el7_6.x86_64", "7Server-7.6.TUS:microcode_ctl-2:2.1-47.23.el7_6.src", "7Server-7.6.TUS:microcode_ctl-2:2.1-47.23.el7_6.x86_64", "7Server-7.6.TUS:microcode_ctl-debuginfo-2:2.1-47.23.el7_6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3317" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "7Server-7.6.AUS:microcode_ctl-2:2.1-47.23.el7_6.src", "7Server-7.6.AUS:microcode_ctl-2:2.1-47.23.el7_6.x86_64", "7Server-7.6.AUS:microcode_ctl-debuginfo-2:2.1-47.23.el7_6.x86_64", "7Server-7.6.E4S:microcode_ctl-2:2.1-47.23.el7_6.src", "7Server-7.6.E4S:microcode_ctl-2:2.1-47.23.el7_6.x86_64", "7Server-7.6.E4S:microcode_ctl-debuginfo-2:2.1-47.23.el7_6.x86_64", "7Server-7.6.TUS:microcode_ctl-2:2.1-47.23.el7_6.src", "7Server-7.6.TUS:microcode_ctl-2:2.1-47.23.el7_6.x86_64", "7Server-7.6.TUS:microcode_ctl-debuginfo-2:2.1-47.23.el7_6.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "7Server-7.6.AUS:microcode_ctl-2:2.1-47.23.el7_6.src", "7Server-7.6.AUS:microcode_ctl-2:2.1-47.23.el7_6.x86_64", "7Server-7.6.AUS:microcode_ctl-debuginfo-2:2.1-47.23.el7_6.x86_64", "7Server-7.6.E4S:microcode_ctl-2:2.1-47.23.el7_6.src", "7Server-7.6.E4S:microcode_ctl-2:2.1-47.23.el7_6.x86_64", "7Server-7.6.E4S:microcode_ctl-debuginfo-2:2.1-47.23.el7_6.x86_64", "7Server-7.6.TUS:microcode_ctl-2:2.1-47.23.el7_6.src", "7Server-7.6.TUS:microcode_ctl-2:2.1-47.23.el7_6.x86_64", "7Server-7.6.TUS:microcode_ctl-debuginfo-2:2.1-47.23.el7_6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "hw: Special Register Buffer Data Sampling (SRBDS)" }, { "cve": "CVE-2020-0548", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2020-01-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1788786" } ], "notes": [ { "category": "description", "text": "A flaw was found in Intel processors where a local attacker is able to gain information about registers used for vector calculations by observing register states from other processes running on the system. This results in a race condition where store buffers, which were not cleared, could be read by another process or a CPU sibling. The highest threat from this vulnerability is data confidentiality where an attacker could read arbitrary data as it passes through the processor.", "title": "Vulnerability description" }, { "category": "summary", "text": "hw: Vector Register Data Sampling", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-7.6.AUS:microcode_ctl-2:2.1-47.23.el7_6.src", "7Server-7.6.AUS:microcode_ctl-2:2.1-47.23.el7_6.x86_64", "7Server-7.6.AUS:microcode_ctl-debuginfo-2:2.1-47.23.el7_6.x86_64", "7Server-7.6.E4S:microcode_ctl-2:2.1-47.23.el7_6.src", "7Server-7.6.E4S:microcode_ctl-2:2.1-47.23.el7_6.x86_64", "7Server-7.6.E4S:microcode_ctl-debuginfo-2:2.1-47.23.el7_6.x86_64", "7Server-7.6.TUS:microcode_ctl-2:2.1-47.23.el7_6.src", "7Server-7.6.TUS:microcode_ctl-2:2.1-47.23.el7_6.x86_64", "7Server-7.6.TUS:microcode_ctl-debuginfo-2:2.1-47.23.el7_6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-0548" }, { "category": "external", "summary": "RHBZ#1788786", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1788786" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-0548", "url": "https://www.cve.org/CVERecord?id=CVE-2020-0548" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-0548", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-0548" }, { "category": "external", "summary": "https://access.redhat.com/solutions/l1d-cache-eviction-and-vector-register-sampling", "url": "https://access.redhat.com/solutions/l1d-cache-eviction-and-vector-register-sampling" }, { "category": "external", "summary": "https://blogs.intel.com/technology/2020/01/ipas-intel-sa-00329/", "url": "https://blogs.intel.com/technology/2020/01/ipas-intel-sa-00329/" }, { "category": "external", "summary": "https://cacheoutattack.com/CacheOut.pdf", "url": "https://cacheoutattack.com/CacheOut.pdf" }, { "category": "external", "summary": "https://software.intel.com/security-software-guidance/software-guidance/l1d-eviction-sampling", "url": "https://software.intel.com/security-software-guidance/software-guidance/l1d-eviction-sampling" } ], "release_date": "2020-01-27T13:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-08-31T08:30:36+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-7.6.AUS:microcode_ctl-2:2.1-47.23.el7_6.src", "7Server-7.6.AUS:microcode_ctl-2:2.1-47.23.el7_6.x86_64", "7Server-7.6.AUS:microcode_ctl-debuginfo-2:2.1-47.23.el7_6.x86_64", "7Server-7.6.E4S:microcode_ctl-2:2.1-47.23.el7_6.src", "7Server-7.6.E4S:microcode_ctl-2:2.1-47.23.el7_6.x86_64", "7Server-7.6.E4S:microcode_ctl-debuginfo-2:2.1-47.23.el7_6.x86_64", "7Server-7.6.TUS:microcode_ctl-2:2.1-47.23.el7_6.src", "7Server-7.6.TUS:microcode_ctl-2:2.1-47.23.el7_6.x86_64", "7Server-7.6.TUS:microcode_ctl-debuginfo-2:2.1-47.23.el7_6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3317" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 2.8, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.0" }, "products": [ "7Server-7.6.AUS:microcode_ctl-2:2.1-47.23.el7_6.src", "7Server-7.6.AUS:microcode_ctl-2:2.1-47.23.el7_6.x86_64", "7Server-7.6.AUS:microcode_ctl-debuginfo-2:2.1-47.23.el7_6.x86_64", "7Server-7.6.E4S:microcode_ctl-2:2.1-47.23.el7_6.src", "7Server-7.6.E4S:microcode_ctl-2:2.1-47.23.el7_6.x86_64", "7Server-7.6.E4S:microcode_ctl-debuginfo-2:2.1-47.23.el7_6.x86_64", "7Server-7.6.TUS:microcode_ctl-2:2.1-47.23.el7_6.src", "7Server-7.6.TUS:microcode_ctl-2:2.1-47.23.el7_6.x86_64", "7Server-7.6.TUS:microcode_ctl-debuginfo-2:2.1-47.23.el7_6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "hw: Vector Register Data Sampling" }, { "cve": "CVE-2020-0549", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2020-01-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1788788" } ], "notes": [ { "category": "description", "text": "A microarchitectural timing flaw was found on some Intel processors. A corner case exists where data in-flight during the eviction process can end up in the \u201cfill buffers\u201d and not properly cleared by the MDS mitigations. The fill buffer contents (which were expected to be blank) can be inferred using MDS or TAA style attack methods to allow a local attacker to infer fill buffer values.", "title": "Vulnerability description" }, { "category": "summary", "text": "hw: L1D Cache Eviction Sampling", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-7.6.AUS:microcode_ctl-2:2.1-47.23.el7_6.src", "7Server-7.6.AUS:microcode_ctl-2:2.1-47.23.el7_6.x86_64", "7Server-7.6.AUS:microcode_ctl-debuginfo-2:2.1-47.23.el7_6.x86_64", "7Server-7.6.E4S:microcode_ctl-2:2.1-47.23.el7_6.src", "7Server-7.6.E4S:microcode_ctl-2:2.1-47.23.el7_6.x86_64", "7Server-7.6.E4S:microcode_ctl-debuginfo-2:2.1-47.23.el7_6.x86_64", "7Server-7.6.TUS:microcode_ctl-2:2.1-47.23.el7_6.src", "7Server-7.6.TUS:microcode_ctl-2:2.1-47.23.el7_6.x86_64", "7Server-7.6.TUS:microcode_ctl-debuginfo-2:2.1-47.23.el7_6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-0549" }, { "category": "external", "summary": "RHBZ#1788788", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1788788" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-0549", "url": "https://www.cve.org/CVERecord?id=CVE-2020-0549" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-0549", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-0549" }, { "category": "external", "summary": "https://access.redhat.com/solutions/l1d-cache-eviction-and-vector-register-sampling", "url": "https://access.redhat.com/solutions/l1d-cache-eviction-and-vector-register-sampling" }, { "category": "external", "summary": "https://blogs.intel.com/technology/2020/01/ipas-intel-sa-00329/", "url": "https://blogs.intel.com/technology/2020/01/ipas-intel-sa-00329/" }, { "category": "external", "summary": "https://cacheoutattack.com/CacheOut.pdf", "url": "https://cacheoutattack.com/CacheOut.pdf" }, { "category": "external", "summary": "https://software.intel.com/security-software-guidance/software-guidance/l1d-eviction-sampling", "url": "https://software.intel.com/security-software-guidance/software-guidance/l1d-eviction-sampling" } ], "release_date": "2020-01-27T13:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-08-31T08:30:36+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-7.6.AUS:microcode_ctl-2:2.1-47.23.el7_6.src", "7Server-7.6.AUS:microcode_ctl-2:2.1-47.23.el7_6.x86_64", "7Server-7.6.AUS:microcode_ctl-debuginfo-2:2.1-47.23.el7_6.x86_64", "7Server-7.6.E4S:microcode_ctl-2:2.1-47.23.el7_6.src", "7Server-7.6.E4S:microcode_ctl-2:2.1-47.23.el7_6.x86_64", "7Server-7.6.E4S:microcode_ctl-debuginfo-2:2.1-47.23.el7_6.x86_64", "7Server-7.6.TUS:microcode_ctl-2:2.1-47.23.el7_6.src", "7Server-7.6.TUS:microcode_ctl-2:2.1-47.23.el7_6.x86_64", "7Server-7.6.TUS:microcode_ctl-debuginfo-2:2.1-47.23.el7_6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3317" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "7Server-7.6.AUS:microcode_ctl-2:2.1-47.23.el7_6.src", "7Server-7.6.AUS:microcode_ctl-2:2.1-47.23.el7_6.x86_64", "7Server-7.6.AUS:microcode_ctl-debuginfo-2:2.1-47.23.el7_6.x86_64", "7Server-7.6.E4S:microcode_ctl-2:2.1-47.23.el7_6.src", "7Server-7.6.E4S:microcode_ctl-2:2.1-47.23.el7_6.x86_64", "7Server-7.6.E4S:microcode_ctl-debuginfo-2:2.1-47.23.el7_6.x86_64", "7Server-7.6.TUS:microcode_ctl-2:2.1-47.23.el7_6.src", "7Server-7.6.TUS:microcode_ctl-2:2.1-47.23.el7_6.x86_64", "7Server-7.6.TUS:microcode_ctl-debuginfo-2:2.1-47.23.el7_6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "hw: L1D Cache Eviction Sampling" }, { "acknowledgments": [ { "names": [ "Intel" ] } ], "cve": "CVE-2020-8695", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2020-04-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1828583" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in Intel\u0027s implementation of RAPL (Running Average Power Limit). An attacker with a local account could query the power management functionality to intelligently infer SGX enclave computation values by measuring power usage in the RAPL subsystem.", "title": "Vulnerability description" }, { "category": "summary", "text": "hw: Information disclosure issue in Intel SGX via RAPL interface", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-7.6.AUS:microcode_ctl-2:2.1-47.23.el7_6.src", "7Server-7.6.AUS:microcode_ctl-2:2.1-47.23.el7_6.x86_64", "7Server-7.6.AUS:microcode_ctl-debuginfo-2:2.1-47.23.el7_6.x86_64", "7Server-7.6.E4S:microcode_ctl-2:2.1-47.23.el7_6.src", "7Server-7.6.E4S:microcode_ctl-2:2.1-47.23.el7_6.x86_64", "7Server-7.6.E4S:microcode_ctl-debuginfo-2:2.1-47.23.el7_6.x86_64", "7Server-7.6.TUS:microcode_ctl-2:2.1-47.23.el7_6.src", "7Server-7.6.TUS:microcode_ctl-2:2.1-47.23.el7_6.x86_64", "7Server-7.6.TUS:microcode_ctl-debuginfo-2:2.1-47.23.el7_6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-8695" }, { "category": "external", "summary": "RHBZ#1828583", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1828583" }, { "category": "external", "summary": "RHSB-5569051", "url": "https://access.redhat.com/articles/5569051" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-8695", "url": "https://www.cve.org/CVERecord?id=CVE-2020-8695" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-8695", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8695" }, { "category": "external", "summary": "https://en.wikipedia.org/wiki/Power_analysis", "url": "https://en.wikipedia.org/wiki/Power_analysis" }, { "category": "external", "summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00389.html", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00389.html" } ], "release_date": "2020-11-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-08-31T08:30:36+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-7.6.AUS:microcode_ctl-2:2.1-47.23.el7_6.src", "7Server-7.6.AUS:microcode_ctl-2:2.1-47.23.el7_6.x86_64", "7Server-7.6.AUS:microcode_ctl-debuginfo-2:2.1-47.23.el7_6.x86_64", "7Server-7.6.E4S:microcode_ctl-2:2.1-47.23.el7_6.src", "7Server-7.6.E4S:microcode_ctl-2:2.1-47.23.el7_6.x86_64", "7Server-7.6.E4S:microcode_ctl-debuginfo-2:2.1-47.23.el7_6.x86_64", "7Server-7.6.TUS:microcode_ctl-2:2.1-47.23.el7_6.src", "7Server-7.6.TUS:microcode_ctl-2:2.1-47.23.el7_6.x86_64", "7Server-7.6.TUS:microcode_ctl-debuginfo-2:2.1-47.23.el7_6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3317" }, { "category": "workaround", "details": "Until a firmware update and reboot can be applied, the attack vector can be reduced by limiting read access to the sysfs attributes that export this functionality to userspace. \n\nThe command:\n~~~\nsudo chmod 400 /sys/class/powercap/intel_rapl/*/energy_uj\n~~~\nWill do this for the current boot, it will need to be scripted to run at each boot to remain persistent across reboots.", "product_ids": [ "7Server-7.6.AUS:microcode_ctl-2:2.1-47.23.el7_6.src", "7Server-7.6.AUS:microcode_ctl-2:2.1-47.23.el7_6.x86_64", "7Server-7.6.AUS:microcode_ctl-debuginfo-2:2.1-47.23.el7_6.x86_64", "7Server-7.6.E4S:microcode_ctl-2:2.1-47.23.el7_6.src", "7Server-7.6.E4S:microcode_ctl-2:2.1-47.23.el7_6.x86_64", "7Server-7.6.E4S:microcode_ctl-debuginfo-2:2.1-47.23.el7_6.x86_64", "7Server-7.6.TUS:microcode_ctl-2:2.1-47.23.el7_6.src", "7Server-7.6.TUS:microcode_ctl-2:2.1-47.23.el7_6.x86_64", "7Server-7.6.TUS:microcode_ctl-debuginfo-2:2.1-47.23.el7_6.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "7Server-7.6.AUS:microcode_ctl-2:2.1-47.23.el7_6.src", "7Server-7.6.AUS:microcode_ctl-2:2.1-47.23.el7_6.x86_64", "7Server-7.6.AUS:microcode_ctl-debuginfo-2:2.1-47.23.el7_6.x86_64", "7Server-7.6.E4S:microcode_ctl-2:2.1-47.23.el7_6.src", "7Server-7.6.E4S:microcode_ctl-2:2.1-47.23.el7_6.x86_64", "7Server-7.6.E4S:microcode_ctl-debuginfo-2:2.1-47.23.el7_6.x86_64", "7Server-7.6.TUS:microcode_ctl-2:2.1-47.23.el7_6.src", "7Server-7.6.TUS:microcode_ctl-2:2.1-47.23.el7_6.x86_64", "7Server-7.6.TUS:microcode_ctl-debuginfo-2:2.1-47.23.el7_6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "hw: Information disclosure issue in Intel SGX via RAPL interface" }, { "acknowledgments": [ { "names": [ "Intel" ] } ], "cve": "CVE-2020-8696", "cwe": { "id": "CWE-212", "name": "Improper Removal of Sensitive Information Before Storage or Transfer" }, "discovery_date": "2020-10-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1890355" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Intel Advanced Vector Extensions (AVX) implementation, where a local authenticated attacker with the ability to execute AVX instructions can gather the AVX register state from previous AVX executions. This vulnerability allows information disclosure of the AVX register state.", "title": "Vulnerability description" }, { "category": "summary", "text": "hw: Vector Register Leakage-Active", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-7.6.AUS:microcode_ctl-2:2.1-47.23.el7_6.src", "7Server-7.6.AUS:microcode_ctl-2:2.1-47.23.el7_6.x86_64", "7Server-7.6.AUS:microcode_ctl-debuginfo-2:2.1-47.23.el7_6.x86_64", "7Server-7.6.E4S:microcode_ctl-2:2.1-47.23.el7_6.src", "7Server-7.6.E4S:microcode_ctl-2:2.1-47.23.el7_6.x86_64", "7Server-7.6.E4S:microcode_ctl-debuginfo-2:2.1-47.23.el7_6.x86_64", "7Server-7.6.TUS:microcode_ctl-2:2.1-47.23.el7_6.src", "7Server-7.6.TUS:microcode_ctl-2:2.1-47.23.el7_6.x86_64", "7Server-7.6.TUS:microcode_ctl-debuginfo-2:2.1-47.23.el7_6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-8696" }, { "category": "external", "summary": "RHBZ#1890355", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890355" }, { "category": "external", "summary": "RHSB-5569051", "url": "https://access.redhat.com/articles/5569051" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-8696", "url": "https://www.cve.org/CVERecord?id=CVE-2020-8696" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-8696", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8696" }, { "category": "external", "summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00381.html", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00381.html" } ], "release_date": "2020-11-10T13:55:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-08-31T08:30:36+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-7.6.AUS:microcode_ctl-2:2.1-47.23.el7_6.src", "7Server-7.6.AUS:microcode_ctl-2:2.1-47.23.el7_6.x86_64", "7Server-7.6.AUS:microcode_ctl-debuginfo-2:2.1-47.23.el7_6.x86_64", "7Server-7.6.E4S:microcode_ctl-2:2.1-47.23.el7_6.src", "7Server-7.6.E4S:microcode_ctl-2:2.1-47.23.el7_6.x86_64", "7Server-7.6.E4S:microcode_ctl-debuginfo-2:2.1-47.23.el7_6.x86_64", "7Server-7.6.TUS:microcode_ctl-2:2.1-47.23.el7_6.src", "7Server-7.6.TUS:microcode_ctl-2:2.1-47.23.el7_6.x86_64", "7Server-7.6.TUS:microcode_ctl-debuginfo-2:2.1-47.23.el7_6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3317" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 2.8, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.1" }, "products": [ "7Server-7.6.AUS:microcode_ctl-2:2.1-47.23.el7_6.src", "7Server-7.6.AUS:microcode_ctl-2:2.1-47.23.el7_6.x86_64", "7Server-7.6.AUS:microcode_ctl-debuginfo-2:2.1-47.23.el7_6.x86_64", "7Server-7.6.E4S:microcode_ctl-2:2.1-47.23.el7_6.src", "7Server-7.6.E4S:microcode_ctl-2:2.1-47.23.el7_6.x86_64", "7Server-7.6.E4S:microcode_ctl-debuginfo-2:2.1-47.23.el7_6.x86_64", "7Server-7.6.TUS:microcode_ctl-2:2.1-47.23.el7_6.src", "7Server-7.6.TUS:microcode_ctl-2:2.1-47.23.el7_6.x86_64", "7Server-7.6.TUS:microcode_ctl-debuginfo-2:2.1-47.23.el7_6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "hw: Vector Register Leakage-Active" }, { "acknowledgments": [ { "names": [ "Intel" ] } ], "cve": "CVE-2020-8698", "cwe": { "id": "CWE-212", "name": "Improper Removal of Sensitive Information Before Storage or Transfer" }, "discovery_date": "2020-10-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1890356" } ], "notes": [ { "category": "description", "text": "A flaw was found in the CPU microarchitecture where a local attacker is able to abuse a timing issue which may allow them to infer internal architectural state from previous executions on the CPU.", "title": "Vulnerability description" }, { "category": "summary", "text": "hw: Fast forward store predictor", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-7.6.AUS:microcode_ctl-2:2.1-47.23.el7_6.src", "7Server-7.6.AUS:microcode_ctl-2:2.1-47.23.el7_6.x86_64", "7Server-7.6.AUS:microcode_ctl-debuginfo-2:2.1-47.23.el7_6.x86_64", "7Server-7.6.E4S:microcode_ctl-2:2.1-47.23.el7_6.src", "7Server-7.6.E4S:microcode_ctl-2:2.1-47.23.el7_6.x86_64", "7Server-7.6.E4S:microcode_ctl-debuginfo-2:2.1-47.23.el7_6.x86_64", "7Server-7.6.TUS:microcode_ctl-2:2.1-47.23.el7_6.src", "7Server-7.6.TUS:microcode_ctl-2:2.1-47.23.el7_6.x86_64", "7Server-7.6.TUS:microcode_ctl-debuginfo-2:2.1-47.23.el7_6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-8698" }, { "category": "external", "summary": "RHBZ#1890356", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890356" }, { "category": "external", "summary": "RHSB-5569051", "url": "https://access.redhat.com/articles/5569051" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-8698", "url": "https://www.cve.org/CVERecord?id=CVE-2020-8698" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-8698", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8698" }, { "category": "external", "summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00381.html", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00381.html" } ], "release_date": "2020-11-10T13:55:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-08-31T08:30:36+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-7.6.AUS:microcode_ctl-2:2.1-47.23.el7_6.src", "7Server-7.6.AUS:microcode_ctl-2:2.1-47.23.el7_6.x86_64", "7Server-7.6.AUS:microcode_ctl-debuginfo-2:2.1-47.23.el7_6.x86_64", "7Server-7.6.E4S:microcode_ctl-2:2.1-47.23.el7_6.src", "7Server-7.6.E4S:microcode_ctl-2:2.1-47.23.el7_6.x86_64", "7Server-7.6.E4S:microcode_ctl-debuginfo-2:2.1-47.23.el7_6.x86_64", "7Server-7.6.TUS:microcode_ctl-2:2.1-47.23.el7_6.src", "7Server-7.6.TUS:microcode_ctl-2:2.1-47.23.el7_6.x86_64", "7Server-7.6.TUS:microcode_ctl-debuginfo-2:2.1-47.23.el7_6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3317" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "7Server-7.6.AUS:microcode_ctl-2:2.1-47.23.el7_6.src", "7Server-7.6.AUS:microcode_ctl-2:2.1-47.23.el7_6.x86_64", "7Server-7.6.AUS:microcode_ctl-debuginfo-2:2.1-47.23.el7_6.x86_64", "7Server-7.6.E4S:microcode_ctl-2:2.1-47.23.el7_6.src", "7Server-7.6.E4S:microcode_ctl-2:2.1-47.23.el7_6.x86_64", "7Server-7.6.E4S:microcode_ctl-debuginfo-2:2.1-47.23.el7_6.x86_64", "7Server-7.6.TUS:microcode_ctl-2:2.1-47.23.el7_6.src", "7Server-7.6.TUS:microcode_ctl-2:2.1-47.23.el7_6.x86_64", "7Server-7.6.TUS:microcode_ctl-debuginfo-2:2.1-47.23.el7_6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "hw: Fast forward store predictor" }, { "acknowledgments": [ { "names": [ "Intel" ] } ], "cve": "CVE-2020-24489", "cwe": { "id": "CWE-459", "name": "Incomplete Cleanup" }, "discovery_date": "2021-05-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1962650" } ], "notes": [ { "category": "description", "text": "A flaw was found in Intel\u00ae VT-d products. Entries from the context cache on some types of context cache invalidations may not be properly invalidated which may allow an authenticated user to potentially enable escalation of privilege via local access. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "hw: vt-d related privilege escalation", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-7.6.AUS:microcode_ctl-2:2.1-47.23.el7_6.src", "7Server-7.6.AUS:microcode_ctl-2:2.1-47.23.el7_6.x86_64", "7Server-7.6.AUS:microcode_ctl-debuginfo-2:2.1-47.23.el7_6.x86_64", "7Server-7.6.E4S:microcode_ctl-2:2.1-47.23.el7_6.src", "7Server-7.6.E4S:microcode_ctl-2:2.1-47.23.el7_6.x86_64", "7Server-7.6.E4S:microcode_ctl-debuginfo-2:2.1-47.23.el7_6.x86_64", "7Server-7.6.TUS:microcode_ctl-2:2.1-47.23.el7_6.src", "7Server-7.6.TUS:microcode_ctl-2:2.1-47.23.el7_6.x86_64", "7Server-7.6.TUS:microcode_ctl-debuginfo-2:2.1-47.23.el7_6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-24489" }, { "category": "external", "summary": "RHBZ#1962650", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1962650" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-24489", "url": "https://www.cve.org/CVERecord?id=CVE-2020-24489" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-24489", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-24489" } ], "release_date": "2021-06-08T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-08-31T08:30:36+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-7.6.AUS:microcode_ctl-2:2.1-47.23.el7_6.src", "7Server-7.6.AUS:microcode_ctl-2:2.1-47.23.el7_6.x86_64", "7Server-7.6.AUS:microcode_ctl-debuginfo-2:2.1-47.23.el7_6.x86_64", "7Server-7.6.E4S:microcode_ctl-2:2.1-47.23.el7_6.src", "7Server-7.6.E4S:microcode_ctl-2:2.1-47.23.el7_6.x86_64", "7Server-7.6.E4S:microcode_ctl-debuginfo-2:2.1-47.23.el7_6.x86_64", "7Server-7.6.TUS:microcode_ctl-2:2.1-47.23.el7_6.src", "7Server-7.6.TUS:microcode_ctl-2:2.1-47.23.el7_6.x86_64", "7Server-7.6.TUS:microcode_ctl-debuginfo-2:2.1-47.23.el7_6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3317" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-7.6.AUS:microcode_ctl-2:2.1-47.23.el7_6.src", "7Server-7.6.AUS:microcode_ctl-2:2.1-47.23.el7_6.x86_64", "7Server-7.6.AUS:microcode_ctl-debuginfo-2:2.1-47.23.el7_6.x86_64", "7Server-7.6.E4S:microcode_ctl-2:2.1-47.23.el7_6.src", "7Server-7.6.E4S:microcode_ctl-2:2.1-47.23.el7_6.x86_64", "7Server-7.6.E4S:microcode_ctl-debuginfo-2:2.1-47.23.el7_6.x86_64", "7Server-7.6.TUS:microcode_ctl-2:2.1-47.23.el7_6.src", "7Server-7.6.TUS:microcode_ctl-2:2.1-47.23.el7_6.x86_64", "7Server-7.6.TUS:microcode_ctl-debuginfo-2:2.1-47.23.el7_6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "hw: vt-d related privilege escalation" }, { "acknowledgments": [ { "names": [ "Intel" ] } ], "cve": "CVE-2020-24511", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2021-05-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1962702" } ], "notes": [ { "category": "description", "text": "Microcode misconfiguration in some Intel processors may cause EIBRS mitigation (CVE-2017-5715) to be incomplete. As a consequence, this issue may allow an authenticated user to potentially enable information disclosure via local access.", "title": "Vulnerability description" }, { "category": "summary", "text": "hw: improper isolation of shared resources in some Intel Processors", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-7.6.AUS:microcode_ctl-2:2.1-47.23.el7_6.src", "7Server-7.6.AUS:microcode_ctl-2:2.1-47.23.el7_6.x86_64", "7Server-7.6.AUS:microcode_ctl-debuginfo-2:2.1-47.23.el7_6.x86_64", "7Server-7.6.E4S:microcode_ctl-2:2.1-47.23.el7_6.src", "7Server-7.6.E4S:microcode_ctl-2:2.1-47.23.el7_6.x86_64", "7Server-7.6.E4S:microcode_ctl-debuginfo-2:2.1-47.23.el7_6.x86_64", "7Server-7.6.TUS:microcode_ctl-2:2.1-47.23.el7_6.src", "7Server-7.6.TUS:microcode_ctl-2:2.1-47.23.el7_6.x86_64", "7Server-7.6.TUS:microcode_ctl-debuginfo-2:2.1-47.23.el7_6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-24511" }, { "category": "external", "summary": "RHBZ#1962702", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1962702" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-24511", "url": "https://www.cve.org/CVERecord?id=CVE-2020-24511" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-24511", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-24511" } ], "release_date": "2021-06-08T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-08-31T08:30:36+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-7.6.AUS:microcode_ctl-2:2.1-47.23.el7_6.src", "7Server-7.6.AUS:microcode_ctl-2:2.1-47.23.el7_6.x86_64", "7Server-7.6.AUS:microcode_ctl-debuginfo-2:2.1-47.23.el7_6.x86_64", "7Server-7.6.E4S:microcode_ctl-2:2.1-47.23.el7_6.src", "7Server-7.6.E4S:microcode_ctl-2:2.1-47.23.el7_6.x86_64", "7Server-7.6.E4S:microcode_ctl-debuginfo-2:2.1-47.23.el7_6.x86_64", "7Server-7.6.TUS:microcode_ctl-2:2.1-47.23.el7_6.src", "7Server-7.6.TUS:microcode_ctl-2:2.1-47.23.el7_6.x86_64", "7Server-7.6.TUS:microcode_ctl-debuginfo-2:2.1-47.23.el7_6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3317" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "7Server-7.6.AUS:microcode_ctl-2:2.1-47.23.el7_6.src", "7Server-7.6.AUS:microcode_ctl-2:2.1-47.23.el7_6.x86_64", "7Server-7.6.AUS:microcode_ctl-debuginfo-2:2.1-47.23.el7_6.x86_64", "7Server-7.6.E4S:microcode_ctl-2:2.1-47.23.el7_6.src", "7Server-7.6.E4S:microcode_ctl-2:2.1-47.23.el7_6.x86_64", "7Server-7.6.E4S:microcode_ctl-debuginfo-2:2.1-47.23.el7_6.x86_64", "7Server-7.6.TUS:microcode_ctl-2:2.1-47.23.el7_6.src", "7Server-7.6.TUS:microcode_ctl-2:2.1-47.23.el7_6.x86_64", "7Server-7.6.TUS:microcode_ctl-debuginfo-2:2.1-47.23.el7_6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "hw: improper isolation of shared resources in some Intel Processors" }, { "acknowledgments": [ { "names": [ "Intel" ] } ], "cve": "CVE-2020-24512", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2021-05-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1962722" } ], "notes": [ { "category": "description", "text": "Observable timing discrepancy in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.", "title": "Vulnerability description" }, { "category": "summary", "text": "hw: observable timing discrepancy in some Intel Processors", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-7.6.AUS:microcode_ctl-2:2.1-47.23.el7_6.src", "7Server-7.6.AUS:microcode_ctl-2:2.1-47.23.el7_6.x86_64", "7Server-7.6.AUS:microcode_ctl-debuginfo-2:2.1-47.23.el7_6.x86_64", "7Server-7.6.E4S:microcode_ctl-2:2.1-47.23.el7_6.src", "7Server-7.6.E4S:microcode_ctl-2:2.1-47.23.el7_6.x86_64", "7Server-7.6.E4S:microcode_ctl-debuginfo-2:2.1-47.23.el7_6.x86_64", "7Server-7.6.TUS:microcode_ctl-2:2.1-47.23.el7_6.src", "7Server-7.6.TUS:microcode_ctl-2:2.1-47.23.el7_6.x86_64", "7Server-7.6.TUS:microcode_ctl-debuginfo-2:2.1-47.23.el7_6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-24512" }, { "category": "external", "summary": "RHBZ#1962722", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1962722" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-24512", "url": "https://www.cve.org/CVERecord?id=CVE-2020-24512" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-24512", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-24512" } ], "release_date": "2021-06-08T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-08-31T08:30:36+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-7.6.AUS:microcode_ctl-2:2.1-47.23.el7_6.src", "7Server-7.6.AUS:microcode_ctl-2:2.1-47.23.el7_6.x86_64", "7Server-7.6.AUS:microcode_ctl-debuginfo-2:2.1-47.23.el7_6.x86_64", "7Server-7.6.E4S:microcode_ctl-2:2.1-47.23.el7_6.src", "7Server-7.6.E4S:microcode_ctl-2:2.1-47.23.el7_6.x86_64", "7Server-7.6.E4S:microcode_ctl-debuginfo-2:2.1-47.23.el7_6.x86_64", "7Server-7.6.TUS:microcode_ctl-2:2.1-47.23.el7_6.src", "7Server-7.6.TUS:microcode_ctl-2:2.1-47.23.el7_6.x86_64", "7Server-7.6.TUS:microcode_ctl-debuginfo-2:2.1-47.23.el7_6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3317" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 2.8, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.1" }, "products": [ "7Server-7.6.AUS:microcode_ctl-2:2.1-47.23.el7_6.src", "7Server-7.6.AUS:microcode_ctl-2:2.1-47.23.el7_6.x86_64", "7Server-7.6.AUS:microcode_ctl-debuginfo-2:2.1-47.23.el7_6.x86_64", "7Server-7.6.E4S:microcode_ctl-2:2.1-47.23.el7_6.src", "7Server-7.6.E4S:microcode_ctl-2:2.1-47.23.el7_6.x86_64", "7Server-7.6.E4S:microcode_ctl-debuginfo-2:2.1-47.23.el7_6.x86_64", "7Server-7.6.TUS:microcode_ctl-2:2.1-47.23.el7_6.src", "7Server-7.6.TUS:microcode_ctl-2:2.1-47.23.el7_6.x86_64", "7Server-7.6.TUS:microcode_ctl-debuginfo-2:2.1-47.23.el7_6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "hw: observable timing discrepancy in some Intel Processors" } ] }
rhsa-2020:2432
Vulnerability from csaf_redhat
Published
2020-06-10 11:12
Modified
2025-02-28 01:28
Summary
Red Hat Security Advisory: microcode_ctl security, bug fix and enhancement update
Notes
Topic
Updated microcode_ctl packages that fix several security bugs and add various enhancements are now available.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Security Fix(es):
* hw: Special Register Buffer Data Sampling (SRBDS) (CVE-2020-0543)
* hw: L1D Cache Eviction Sampling (CVE-2020-0549)
* hw: Vector Register Data Sampling (CVE-2020-0548)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* Update Intel CPU microcode to microcode-20200602 release, addresses:
- Update of 06-2d-06/0x6d (SNB-E/EN/EP C1/M0) microcode from revision 0x61f
up to 0x621;
- Update of 06-2d-07/0x6d (SNB-E/EN/EP C2/M1) microcode from revision 0x718
up to 0x71a;
- Update of 06-3c-03/0x32 (HSW C0) microcode from revision 0x27 up to 0x28;
- Update of 06-3d-04/0xc0 (BDW-U/Y E0/F0) microcode from revision 0x2e
up to 0x2f;
- Update of 06-45-01/0x72 (HSW-U C0/D0) microcode from revision 0x25
up to 0x26;
- Update of 06-46-01/0x32 (HSW-H C0) microcode from revision 0x1b up to 0x1c;
- Update of 06-47-01/0x22 (BDW-H/Xeon E3 E0/G0) microcode from revision 0x21
up to 0x22;
- Update of 06-4e-03/0xc0 (SKL-U/Y D0) microcode from revision 0xd6
up to 0xdc;
- Update of 06-55-03/0x97 (SKX-SP B1) microcode from revision 0x1000151
up to 0x1000157;
- Update of 06-55-04/0xb7 (SKX-SP H0/M0/U0, SKX-D M1) microcode
(in intel-06-55-04/intel-ucode/06-55-04) from revision 0x2000065
up to 0x2006906;
- Update of 06-55-06/0xbf (CLX-SP B0) microcode from revision 0x400002c
up to 0x4002f01;
- Update of 06-55-07/0xbf (CLX-SP B1) microcode from revision 0x500002c
up to 0x5002f01;
- Update of 06-5e-03/0x36 (SKL-H/S R0/N0) microcode from revision 0xd6
up to 0xdc;
- Update of 06-7e-05/0x80 (ICL-U/Y D1) microcode from revision 0x46
up to 0x78;
- Update of 06-8e-09/0x10 (AML-Y22 H0) microcode from revision 0xca
up to 0xd6;
- Update of 06-8e-09/0xc0 (KBL-U/Y H0) microcode from revision 0xca
up to 0xd6;
- Update of 06-8e-0a/0xc0 (CFL-U43e D0) microcode from revision 0xca
up to 0xd6;
- Update of 06-8e-0b/0xd0 (WHL-U W0) microcode from revision 0xca
up to 0xd6;
- Update of 06-8e-0c/0x94 (AML-Y42 V0, CML-Y42 V0, WHL-U V0) microcode
from revision 0xca up to 0xd6;
- Update of 06-9e-09/0x2a (KBL-G/H/S/X/Xeon E3 B0) microcode from revision
0xca up to 0xd6;
- Update of 06-9e-0a/0x22 (CFL-H/S/Xeon E3 U0) microcode from revision 0xca
up to 0xd6;
- Update of 06-9e-0b/0x02 (CFL-S B0) microcode from revision 0xca up to 0xd6;
- Update of 06-9e-0c/0x22 (CFL-H/S P0) microcode from revision 0xca
up to 0xd6;
- Update of 06-9e-0d/0x22 (CFL-H R0) microcode from revision 0xca up to 0xd6.
- Change the URL in the intel-microcode2ucode.8 to point to the GitHub
repository since the microcode download section at Intel Download Center
does not exist anymore.
* Narrow down SKL-SP/W/X blacklist to exclude Server/FPGA/Fabric segment
models.
* Re-generate initramfs not only for the currently running kernel,
but for several recently installed kernels as well.
* Avoid find being SIGPIPE'd on early "grep -q" exit in the dracut script.
* Update stale posttrans dependency, add triggers for proper handling
of the debug kernel flavour along with kernel-rt.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated microcode_ctl packages that fix several security bugs and add various enhancements are now available.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Security Fix(es):\n\n* hw: Special Register Buffer Data Sampling (SRBDS) (CVE-2020-0543)\n\n* hw: L1D Cache Eviction Sampling (CVE-2020-0549)\n\n* hw: Vector Register Data Sampling (CVE-2020-0548)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* Update Intel CPU microcode to microcode-20200602 release, addresses:\n - Update of 06-2d-06/0x6d (SNB-E/EN/EP C1/M0) microcode from revision 0x61f\n up to 0x621;\n - Update of 06-2d-07/0x6d (SNB-E/EN/EP C2/M1) microcode from revision 0x718\n up to 0x71a;\n - Update of 06-3c-03/0x32 (HSW C0) microcode from revision 0x27 up to 0x28;\n - Update of 06-3d-04/0xc0 (BDW-U/Y E0/F0) microcode from revision 0x2e\n up to 0x2f;\n - Update of 06-45-01/0x72 (HSW-U C0/D0) microcode from revision 0x25\n up to 0x26;\n - Update of 06-46-01/0x32 (HSW-H C0) microcode from revision 0x1b up to 0x1c;\n - Update of 06-47-01/0x22 (BDW-H/Xeon E3 E0/G0) microcode from revision 0x21\n up to 0x22;\n - Update of 06-4e-03/0xc0 (SKL-U/Y D0) microcode from revision 0xd6\n up to 0xdc;\n - Update of 06-55-03/0x97 (SKX-SP B1) microcode from revision 0x1000151\n up to 0x1000157;\n - Update of 06-55-04/0xb7 (SKX-SP H0/M0/U0, SKX-D M1) microcode\n (in intel-06-55-04/intel-ucode/06-55-04) from revision 0x2000065\n up to 0x2006906;\n - Update of 06-55-06/0xbf (CLX-SP B0) microcode from revision 0x400002c\n up to 0x4002f01;\n - Update of 06-55-07/0xbf (CLX-SP B1) microcode from revision 0x500002c\n up to 0x5002f01;\n - Update of 06-5e-03/0x36 (SKL-H/S R0/N0) microcode from revision 0xd6\n up to 0xdc;\n - Update of 06-7e-05/0x80 (ICL-U/Y D1) microcode from revision 0x46\n up to 0x78;\n - Update of 06-8e-09/0x10 (AML-Y22 H0) microcode from revision 0xca\n up to 0xd6;\n - Update of 06-8e-09/0xc0 (KBL-U/Y H0) microcode from revision 0xca\n up to 0xd6;\n - Update of 06-8e-0a/0xc0 (CFL-U43e D0) microcode from revision 0xca\n up to 0xd6;\n - Update of 06-8e-0b/0xd0 (WHL-U W0) microcode from revision 0xca\n up to 0xd6;\n - Update of 06-8e-0c/0x94 (AML-Y42 V0, CML-Y42 V0, WHL-U V0) microcode\n from revision 0xca up to 0xd6;\n - Update of 06-9e-09/0x2a (KBL-G/H/S/X/Xeon E3 B0) microcode from revision\n 0xca up to 0xd6;\n - Update of 06-9e-0a/0x22 (CFL-H/S/Xeon E3 U0) microcode from revision 0xca\n up to 0xd6;\n - Update of 06-9e-0b/0x02 (CFL-S B0) microcode from revision 0xca up to 0xd6;\n - Update of 06-9e-0c/0x22 (CFL-H/S P0) microcode from revision 0xca\n up to 0xd6;\n - Update of 06-9e-0d/0x22 (CFL-H R0) microcode from revision 0xca up to 0xd6.\n- Change the URL in the intel-microcode2ucode.8 to point to the GitHub\n repository since the microcode download section at Intel Download Center\n does not exist anymore.\n\n* Narrow down SKL-SP/W/X blacklist to exclude Server/FPGA/Fabric segment\n models.\n\n* Re-generate initramfs not only for the currently running kernel,\n but for several recently installed kernels as well.\n\n* Avoid find being SIGPIPE\u0027d on early \"grep -q\" exit in the dracut script.\n\n* Update stale posttrans dependency, add triggers for proper handling\n of the debug kernel flavour along with kernel-rt.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2020:2432", "url": "https://access.redhat.com/errata/RHSA-2020:2432" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "https://access.redhat.com/solutions/5142751", "url": "https://access.redhat.com/solutions/5142751" }, { "category": "external", "summary": "https://access.redhat.com/solutions/5142691", "url": "https://access.redhat.com/solutions/5142691" }, { "category": "external", "summary": "1788786", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1788786" }, { "category": "external", "summary": "1788788", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1788788" }, { "category": "external", "summary": "1827165", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1827165" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_2432.json" } ], "title": "Red Hat Security Advisory: microcode_ctl security, bug fix and enhancement update", "tracking": { "current_release_date": "2025-02-28T01:28:01+00:00", "generator": { "date": "2025-02-28T01:28:01+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.3.1" } }, "id": "RHSA-2020:2432", "initial_release_date": "2020-06-10T11:12:48+00:00", "revision_history": [ { "date": "2020-06-10T11:12:48+00:00", "number": "1", "summary": "Initial version" }, { "date": "2020-06-10T11:12:48+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-02-28T01:28:01+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Client (v. 7)", "product": { "name": "Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.8.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ComputeNode (v. 7)", "product": { "name": "Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.8.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 7)", "product": { "name": "Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.8.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation (v. 7)", "product": { "name": "Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.8.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "microcode_ctl-2:2.1-61.6.el7_8.x86_64", "product": { "name": "microcode_ctl-2:2.1-61.6.el7_8.x86_64", "product_id": "microcode_ctl-2:2.1-61.6.el7_8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/microcode_ctl@2.1-61.6.el7_8?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "microcode_ctl-debuginfo-2:2.1-61.6.el7_8.x86_64", "product": { "name": "microcode_ctl-debuginfo-2:2.1-61.6.el7_8.x86_64", "product_id": "microcode_ctl-debuginfo-2:2.1-61.6.el7_8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/microcode_ctl-debuginfo@2.1-61.6.el7_8?arch=x86_64\u0026epoch=2" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "microcode_ctl-2:2.1-61.6.el7_8.src", "product": { "name": "microcode_ctl-2:2.1-61.6.el7_8.src", "product_id": "microcode_ctl-2:2.1-61.6.el7_8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/microcode_ctl@2.1-61.6.el7_8?arch=src\u0026epoch=2" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "microcode_ctl-2:2.1-61.6.el7_8.src as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.8.Z:microcode_ctl-2:2.1-61.6.el7_8.src" }, "product_reference": "microcode_ctl-2:2.1-61.6.el7_8.src", "relates_to_product_reference": "7Client-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "microcode_ctl-2:2.1-61.6.el7_8.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.8.Z:microcode_ctl-2:2.1-61.6.el7_8.x86_64" }, "product_reference": "microcode_ctl-2:2.1-61.6.el7_8.x86_64", "relates_to_product_reference": "7Client-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "microcode_ctl-debuginfo-2:2.1-61.6.el7_8.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.8.Z:microcode_ctl-debuginfo-2:2.1-61.6.el7_8.x86_64" }, "product_reference": "microcode_ctl-debuginfo-2:2.1-61.6.el7_8.x86_64", "relates_to_product_reference": "7Client-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "microcode_ctl-2:2.1-61.6.el7_8.src as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.8.Z:microcode_ctl-2:2.1-61.6.el7_8.src" }, "product_reference": "microcode_ctl-2:2.1-61.6.el7_8.src", "relates_to_product_reference": "7ComputeNode-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "microcode_ctl-2:2.1-61.6.el7_8.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.8.Z:microcode_ctl-2:2.1-61.6.el7_8.x86_64" }, "product_reference": "microcode_ctl-2:2.1-61.6.el7_8.x86_64", "relates_to_product_reference": "7ComputeNode-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "microcode_ctl-debuginfo-2:2.1-61.6.el7_8.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.8.Z:microcode_ctl-debuginfo-2:2.1-61.6.el7_8.x86_64" }, "product_reference": "microcode_ctl-debuginfo-2:2.1-61.6.el7_8.x86_64", "relates_to_product_reference": "7ComputeNode-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "microcode_ctl-2:2.1-61.6.el7_8.src as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.8.Z:microcode_ctl-2:2.1-61.6.el7_8.src" }, "product_reference": "microcode_ctl-2:2.1-61.6.el7_8.src", "relates_to_product_reference": "7Server-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "microcode_ctl-2:2.1-61.6.el7_8.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.8.Z:microcode_ctl-2:2.1-61.6.el7_8.x86_64" }, "product_reference": "microcode_ctl-2:2.1-61.6.el7_8.x86_64", "relates_to_product_reference": "7Server-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "microcode_ctl-debuginfo-2:2.1-61.6.el7_8.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.8.Z:microcode_ctl-debuginfo-2:2.1-61.6.el7_8.x86_64" }, "product_reference": "microcode_ctl-debuginfo-2:2.1-61.6.el7_8.x86_64", "relates_to_product_reference": "7Server-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "microcode_ctl-2:2.1-61.6.el7_8.src as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.8.Z:microcode_ctl-2:2.1-61.6.el7_8.src" }, "product_reference": "microcode_ctl-2:2.1-61.6.el7_8.src", "relates_to_product_reference": "7Workstation-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "microcode_ctl-2:2.1-61.6.el7_8.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.8.Z:microcode_ctl-2:2.1-61.6.el7_8.x86_64" }, "product_reference": "microcode_ctl-2:2.1-61.6.el7_8.x86_64", "relates_to_product_reference": "7Workstation-7.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "microcode_ctl-debuginfo-2:2.1-61.6.el7_8.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.8.Z:microcode_ctl-debuginfo-2:2.1-61.6.el7_8.x86_64" }, "product_reference": "microcode_ctl-debuginfo-2:2.1-61.6.el7_8.x86_64", "relates_to_product_reference": "7Workstation-7.8.Z" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Intel" ] } ], "cve": "CVE-2020-0543", "discovery_date": "2020-04-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1827165" } ], "notes": [ { "category": "description", "text": "A new domain bypass transient execution attack known as Special Register Buffer Data Sampling (SRBDS) has been found. This flaw allows data values from special internal registers to be leaked by an attacker able to execute code on any core of the CPU. An unprivileged, local attacker can use this flaw to infer values returned by affected instructions known to be commonly used during cryptographic operations that rely on uniqueness, secrecy, or both.", "title": "Vulnerability description" }, { "category": "summary", "text": "hw: Special Register Buffer Data Sampling (SRBDS)", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/solutions/5142691", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.8.Z:microcode_ctl-2:2.1-61.6.el7_8.src", "7Client-7.8.Z:microcode_ctl-2:2.1-61.6.el7_8.x86_64", "7Client-7.8.Z:microcode_ctl-debuginfo-2:2.1-61.6.el7_8.x86_64", "7ComputeNode-7.8.Z:microcode_ctl-2:2.1-61.6.el7_8.src", "7ComputeNode-7.8.Z:microcode_ctl-2:2.1-61.6.el7_8.x86_64", "7ComputeNode-7.8.Z:microcode_ctl-debuginfo-2:2.1-61.6.el7_8.x86_64", "7Server-7.8.Z:microcode_ctl-2:2.1-61.6.el7_8.src", "7Server-7.8.Z:microcode_ctl-2:2.1-61.6.el7_8.x86_64", "7Server-7.8.Z:microcode_ctl-debuginfo-2:2.1-61.6.el7_8.x86_64", "7Workstation-7.8.Z:microcode_ctl-2:2.1-61.6.el7_8.src", "7Workstation-7.8.Z:microcode_ctl-2:2.1-61.6.el7_8.x86_64", "7Workstation-7.8.Z:microcode_ctl-debuginfo-2:2.1-61.6.el7_8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-0543" }, { "category": "external", "summary": "RHBZ#1827165", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1827165" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-0543", "url": "https://www.cve.org/CVERecord?id=CVE-2020-0543" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-0543", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-0543" }, { "category": "external", "summary": "https://access.redhat.com/solutions/5142691", "url": "https://access.redhat.com/solutions/5142691" }, { "category": "external", "summary": "https://access.redhat.com/solutions/5142751", "url": "https://access.redhat.com/solutions/5142751" }, { "category": "external", "summary": "https://blogs.intel.com/technology/2020/06/ipas-security-advisories-for-june-2020/#gs.6uyhri", "url": "https://blogs.intel.com/technology/2020/06/ipas-security-advisories-for-june-2020/#gs.6uyhri" }, { "category": "external", "summary": "https://software.intel.com/security-software-guidance/insights/deep-dive-special-register-buffer-data-sampling", "url": "https://software.intel.com/security-software-guidance/insights/deep-dive-special-register-buffer-data-sampling" }, { "category": "external", "summary": "https://xenbits.xen.org/xsa/advisory-320.html", "url": "https://xenbits.xen.org/xsa/advisory-320.html" } ], "release_date": "2020-06-09T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-06-10T11:12:48+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Client-7.8.Z:microcode_ctl-2:2.1-61.6.el7_8.src", "7Client-7.8.Z:microcode_ctl-2:2.1-61.6.el7_8.x86_64", "7Client-7.8.Z:microcode_ctl-debuginfo-2:2.1-61.6.el7_8.x86_64", "7ComputeNode-7.8.Z:microcode_ctl-2:2.1-61.6.el7_8.src", "7ComputeNode-7.8.Z:microcode_ctl-2:2.1-61.6.el7_8.x86_64", "7ComputeNode-7.8.Z:microcode_ctl-debuginfo-2:2.1-61.6.el7_8.x86_64", "7Server-7.8.Z:microcode_ctl-2:2.1-61.6.el7_8.src", "7Server-7.8.Z:microcode_ctl-2:2.1-61.6.el7_8.x86_64", "7Server-7.8.Z:microcode_ctl-debuginfo-2:2.1-61.6.el7_8.x86_64", "7Workstation-7.8.Z:microcode_ctl-2:2.1-61.6.el7_8.src", "7Workstation-7.8.Z:microcode_ctl-2:2.1-61.6.el7_8.x86_64", "7Workstation-7.8.Z:microcode_ctl-debuginfo-2:2.1-61.6.el7_8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2432" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "7Client-7.8.Z:microcode_ctl-2:2.1-61.6.el7_8.src", "7Client-7.8.Z:microcode_ctl-2:2.1-61.6.el7_8.x86_64", "7Client-7.8.Z:microcode_ctl-debuginfo-2:2.1-61.6.el7_8.x86_64", "7ComputeNode-7.8.Z:microcode_ctl-2:2.1-61.6.el7_8.src", "7ComputeNode-7.8.Z:microcode_ctl-2:2.1-61.6.el7_8.x86_64", "7ComputeNode-7.8.Z:microcode_ctl-debuginfo-2:2.1-61.6.el7_8.x86_64", "7Server-7.8.Z:microcode_ctl-2:2.1-61.6.el7_8.src", "7Server-7.8.Z:microcode_ctl-2:2.1-61.6.el7_8.x86_64", "7Server-7.8.Z:microcode_ctl-debuginfo-2:2.1-61.6.el7_8.x86_64", "7Workstation-7.8.Z:microcode_ctl-2:2.1-61.6.el7_8.src", "7Workstation-7.8.Z:microcode_ctl-2:2.1-61.6.el7_8.x86_64", "7Workstation-7.8.Z:microcode_ctl-debuginfo-2:2.1-61.6.el7_8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "7Client-7.8.Z:microcode_ctl-2:2.1-61.6.el7_8.src", "7Client-7.8.Z:microcode_ctl-2:2.1-61.6.el7_8.x86_64", "7Client-7.8.Z:microcode_ctl-debuginfo-2:2.1-61.6.el7_8.x86_64", "7ComputeNode-7.8.Z:microcode_ctl-2:2.1-61.6.el7_8.src", "7ComputeNode-7.8.Z:microcode_ctl-2:2.1-61.6.el7_8.x86_64", "7ComputeNode-7.8.Z:microcode_ctl-debuginfo-2:2.1-61.6.el7_8.x86_64", "7Server-7.8.Z:microcode_ctl-2:2.1-61.6.el7_8.src", "7Server-7.8.Z:microcode_ctl-2:2.1-61.6.el7_8.x86_64", "7Server-7.8.Z:microcode_ctl-debuginfo-2:2.1-61.6.el7_8.x86_64", "7Workstation-7.8.Z:microcode_ctl-2:2.1-61.6.el7_8.src", "7Workstation-7.8.Z:microcode_ctl-2:2.1-61.6.el7_8.x86_64", "7Workstation-7.8.Z:microcode_ctl-debuginfo-2:2.1-61.6.el7_8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "hw: Special Register Buffer Data Sampling (SRBDS)" }, { "cve": "CVE-2020-0548", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2020-01-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1788786" } ], "notes": [ { "category": "description", "text": "A flaw was found in Intel processors where a local attacker is able to gain information about registers used for vector calculations by observing register states from other processes running on the system. This results in a race condition where store buffers, which were not cleared, could be read by another process or a CPU sibling. The highest threat from this vulnerability is data confidentiality where an attacker could read arbitrary data as it passes through the processor.", "title": "Vulnerability description" }, { "category": "summary", "text": "hw: Vector Register Data Sampling", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.8.Z:microcode_ctl-2:2.1-61.6.el7_8.src", "7Client-7.8.Z:microcode_ctl-2:2.1-61.6.el7_8.x86_64", "7Client-7.8.Z:microcode_ctl-debuginfo-2:2.1-61.6.el7_8.x86_64", "7ComputeNode-7.8.Z:microcode_ctl-2:2.1-61.6.el7_8.src", "7ComputeNode-7.8.Z:microcode_ctl-2:2.1-61.6.el7_8.x86_64", "7ComputeNode-7.8.Z:microcode_ctl-debuginfo-2:2.1-61.6.el7_8.x86_64", "7Server-7.8.Z:microcode_ctl-2:2.1-61.6.el7_8.src", "7Server-7.8.Z:microcode_ctl-2:2.1-61.6.el7_8.x86_64", "7Server-7.8.Z:microcode_ctl-debuginfo-2:2.1-61.6.el7_8.x86_64", "7Workstation-7.8.Z:microcode_ctl-2:2.1-61.6.el7_8.src", "7Workstation-7.8.Z:microcode_ctl-2:2.1-61.6.el7_8.x86_64", "7Workstation-7.8.Z:microcode_ctl-debuginfo-2:2.1-61.6.el7_8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-0548" }, { "category": "external", "summary": "RHBZ#1788786", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1788786" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-0548", "url": "https://www.cve.org/CVERecord?id=CVE-2020-0548" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-0548", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-0548" }, { "category": "external", "summary": "https://access.redhat.com/solutions/l1d-cache-eviction-and-vector-register-sampling", "url": "https://access.redhat.com/solutions/l1d-cache-eviction-and-vector-register-sampling" }, { "category": "external", "summary": "https://blogs.intel.com/technology/2020/01/ipas-intel-sa-00329/", "url": "https://blogs.intel.com/technology/2020/01/ipas-intel-sa-00329/" }, { "category": "external", "summary": "https://cacheoutattack.com/CacheOut.pdf", "url": "https://cacheoutattack.com/CacheOut.pdf" }, { "category": "external", "summary": "https://software.intel.com/security-software-guidance/software-guidance/l1d-eviction-sampling", "url": "https://software.intel.com/security-software-guidance/software-guidance/l1d-eviction-sampling" } ], "release_date": "2020-01-27T13:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-06-10T11:12:48+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Client-7.8.Z:microcode_ctl-2:2.1-61.6.el7_8.src", "7Client-7.8.Z:microcode_ctl-2:2.1-61.6.el7_8.x86_64", "7Client-7.8.Z:microcode_ctl-debuginfo-2:2.1-61.6.el7_8.x86_64", "7ComputeNode-7.8.Z:microcode_ctl-2:2.1-61.6.el7_8.src", "7ComputeNode-7.8.Z:microcode_ctl-2:2.1-61.6.el7_8.x86_64", "7ComputeNode-7.8.Z:microcode_ctl-debuginfo-2:2.1-61.6.el7_8.x86_64", "7Server-7.8.Z:microcode_ctl-2:2.1-61.6.el7_8.src", "7Server-7.8.Z:microcode_ctl-2:2.1-61.6.el7_8.x86_64", "7Server-7.8.Z:microcode_ctl-debuginfo-2:2.1-61.6.el7_8.x86_64", "7Workstation-7.8.Z:microcode_ctl-2:2.1-61.6.el7_8.src", "7Workstation-7.8.Z:microcode_ctl-2:2.1-61.6.el7_8.x86_64", "7Workstation-7.8.Z:microcode_ctl-debuginfo-2:2.1-61.6.el7_8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2432" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 2.8, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.0" }, "products": [ "7Client-7.8.Z:microcode_ctl-2:2.1-61.6.el7_8.src", "7Client-7.8.Z:microcode_ctl-2:2.1-61.6.el7_8.x86_64", "7Client-7.8.Z:microcode_ctl-debuginfo-2:2.1-61.6.el7_8.x86_64", "7ComputeNode-7.8.Z:microcode_ctl-2:2.1-61.6.el7_8.src", "7ComputeNode-7.8.Z:microcode_ctl-2:2.1-61.6.el7_8.x86_64", "7ComputeNode-7.8.Z:microcode_ctl-debuginfo-2:2.1-61.6.el7_8.x86_64", "7Server-7.8.Z:microcode_ctl-2:2.1-61.6.el7_8.src", "7Server-7.8.Z:microcode_ctl-2:2.1-61.6.el7_8.x86_64", "7Server-7.8.Z:microcode_ctl-debuginfo-2:2.1-61.6.el7_8.x86_64", "7Workstation-7.8.Z:microcode_ctl-2:2.1-61.6.el7_8.src", "7Workstation-7.8.Z:microcode_ctl-2:2.1-61.6.el7_8.x86_64", "7Workstation-7.8.Z:microcode_ctl-debuginfo-2:2.1-61.6.el7_8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "hw: Vector Register Data Sampling" }, { "cve": "CVE-2020-0549", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2020-01-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1788788" } ], "notes": [ { "category": "description", "text": "A microarchitectural timing flaw was found on some Intel processors. A corner case exists where data in-flight during the eviction process can end up in the \u201cfill buffers\u201d and not properly cleared by the MDS mitigations. The fill buffer contents (which were expected to be blank) can be inferred using MDS or TAA style attack methods to allow a local attacker to infer fill buffer values.", "title": "Vulnerability description" }, { "category": "summary", "text": "hw: L1D Cache Eviction Sampling", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.8.Z:microcode_ctl-2:2.1-61.6.el7_8.src", "7Client-7.8.Z:microcode_ctl-2:2.1-61.6.el7_8.x86_64", "7Client-7.8.Z:microcode_ctl-debuginfo-2:2.1-61.6.el7_8.x86_64", "7ComputeNode-7.8.Z:microcode_ctl-2:2.1-61.6.el7_8.src", "7ComputeNode-7.8.Z:microcode_ctl-2:2.1-61.6.el7_8.x86_64", "7ComputeNode-7.8.Z:microcode_ctl-debuginfo-2:2.1-61.6.el7_8.x86_64", "7Server-7.8.Z:microcode_ctl-2:2.1-61.6.el7_8.src", "7Server-7.8.Z:microcode_ctl-2:2.1-61.6.el7_8.x86_64", "7Server-7.8.Z:microcode_ctl-debuginfo-2:2.1-61.6.el7_8.x86_64", "7Workstation-7.8.Z:microcode_ctl-2:2.1-61.6.el7_8.src", "7Workstation-7.8.Z:microcode_ctl-2:2.1-61.6.el7_8.x86_64", "7Workstation-7.8.Z:microcode_ctl-debuginfo-2:2.1-61.6.el7_8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-0549" }, { "category": "external", "summary": "RHBZ#1788788", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1788788" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-0549", "url": "https://www.cve.org/CVERecord?id=CVE-2020-0549" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-0549", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-0549" }, { "category": "external", "summary": "https://access.redhat.com/solutions/l1d-cache-eviction-and-vector-register-sampling", "url": "https://access.redhat.com/solutions/l1d-cache-eviction-and-vector-register-sampling" }, { "category": "external", "summary": "https://blogs.intel.com/technology/2020/01/ipas-intel-sa-00329/", "url": "https://blogs.intel.com/technology/2020/01/ipas-intel-sa-00329/" }, { "category": "external", "summary": "https://cacheoutattack.com/CacheOut.pdf", "url": "https://cacheoutattack.com/CacheOut.pdf" }, { "category": "external", "summary": "https://software.intel.com/security-software-guidance/software-guidance/l1d-eviction-sampling", "url": "https://software.intel.com/security-software-guidance/software-guidance/l1d-eviction-sampling" } ], "release_date": "2020-01-27T13:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-06-10T11:12:48+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Client-7.8.Z:microcode_ctl-2:2.1-61.6.el7_8.src", "7Client-7.8.Z:microcode_ctl-2:2.1-61.6.el7_8.x86_64", "7Client-7.8.Z:microcode_ctl-debuginfo-2:2.1-61.6.el7_8.x86_64", "7ComputeNode-7.8.Z:microcode_ctl-2:2.1-61.6.el7_8.src", "7ComputeNode-7.8.Z:microcode_ctl-2:2.1-61.6.el7_8.x86_64", "7ComputeNode-7.8.Z:microcode_ctl-debuginfo-2:2.1-61.6.el7_8.x86_64", "7Server-7.8.Z:microcode_ctl-2:2.1-61.6.el7_8.src", "7Server-7.8.Z:microcode_ctl-2:2.1-61.6.el7_8.x86_64", "7Server-7.8.Z:microcode_ctl-debuginfo-2:2.1-61.6.el7_8.x86_64", "7Workstation-7.8.Z:microcode_ctl-2:2.1-61.6.el7_8.src", "7Workstation-7.8.Z:microcode_ctl-2:2.1-61.6.el7_8.x86_64", "7Workstation-7.8.Z:microcode_ctl-debuginfo-2:2.1-61.6.el7_8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2432" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "7Client-7.8.Z:microcode_ctl-2:2.1-61.6.el7_8.src", "7Client-7.8.Z:microcode_ctl-2:2.1-61.6.el7_8.x86_64", "7Client-7.8.Z:microcode_ctl-debuginfo-2:2.1-61.6.el7_8.x86_64", "7ComputeNode-7.8.Z:microcode_ctl-2:2.1-61.6.el7_8.src", "7ComputeNode-7.8.Z:microcode_ctl-2:2.1-61.6.el7_8.x86_64", "7ComputeNode-7.8.Z:microcode_ctl-debuginfo-2:2.1-61.6.el7_8.x86_64", "7Server-7.8.Z:microcode_ctl-2:2.1-61.6.el7_8.src", "7Server-7.8.Z:microcode_ctl-2:2.1-61.6.el7_8.x86_64", "7Server-7.8.Z:microcode_ctl-debuginfo-2:2.1-61.6.el7_8.x86_64", "7Workstation-7.8.Z:microcode_ctl-2:2.1-61.6.el7_8.src", "7Workstation-7.8.Z:microcode_ctl-2:2.1-61.6.el7_8.x86_64", "7Workstation-7.8.Z:microcode_ctl-debuginfo-2:2.1-61.6.el7_8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "hw: L1D Cache Eviction Sampling" } ] }
rhsa-2021:3322
Vulnerability from csaf_redhat
Published
2021-08-31 08:15
Modified
2025-08-02 09:53
Summary
Red Hat Security Advisory: microcode_ctl security, bug fix and enhancement update
Notes
Topic
An update for microcode_ctl is now available for Red Hat Enterprise Linux 7.3 Advanced Update Support.
Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.
Details
The microcode_ctl packages provide microcode updates for Intel.
Security Fix(es):
* hw: Vector Register Data Sampling (CVE-2020-0548)
* hw: L1D Cache Eviction Sampling (CVE-2020-0549)
* hw: Special Register Buffer Data Sampling (SRBDS) (CVE-2020-0543)
* hw: Information disclosure issue in Intel SGX via RAPL interface
(CVE-2020-8695)
* hw: Vector Register Leakage-Active (CVE-2020-8696)
* hw: Fast forward store predictor (CVE-2020-8698)
* hw: vt-d related privilege escalation (CVE-2020-24489)
* hw: improper isolation of shared resources in some Intel Processors
(CVE-2020-24511)
* hw: observable timing discrepancy in some Intel Processors
(CVE-2020-24512)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for microcode_ctl is now available for Red Hat Enterprise Linux 7.3 Advanced Update Support.\n\nRed Hat Product Security has rated this update as having a security impact\nof Moderate. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available for each vulnerability from\nthe CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The microcode_ctl packages provide microcode updates for Intel.\n\nSecurity Fix(es):\n\n* hw: Vector Register Data Sampling (CVE-2020-0548)\n\n* hw: L1D Cache Eviction Sampling (CVE-2020-0549)\n\n* hw: Special Register Buffer Data Sampling (SRBDS) (CVE-2020-0543)\n\n* hw: Information disclosure issue in Intel SGX via RAPL interface\n(CVE-2020-8695)\n\n* hw: Vector Register Leakage-Active (CVE-2020-8696)\n\n* hw: Fast forward store predictor (CVE-2020-8698)\n\n* hw: vt-d related privilege escalation (CVE-2020-24489)\n\n* hw: improper isolation of shared resources in some Intel Processors\n(CVE-2020-24511)\n\n* hw: observable timing discrepancy in some Intel Processors\n(CVE-2020-24512)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE\npage(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2021:3322", "url": "https://access.redhat.com/errata/RHSA-2021:3322" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1788786", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1788786" }, { "category": "external", "summary": "1788788", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1788788" }, { "category": "external", "summary": "1827165", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1827165" }, { "category": "external", "summary": "1828583", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1828583" }, { "category": "external", "summary": "1890355", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890355" }, { "category": "external", "summary": "1890356", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890356" }, { "category": "external", "summary": "1962650", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1962650" }, { "category": "external", "summary": "1962702", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1962702" }, { "category": "external", "summary": "1962722", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1962722" }, { "category": "external", "summary": "1972335", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1972335" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3322.json" } ], "title": "Red Hat Security Advisory: microcode_ctl security, bug fix and enhancement update", "tracking": { "current_release_date": "2025-08-02T09:53:25+00:00", "generator": { "date": "2025-08-02T09:53:25+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2021:3322", "initial_release_date": "2021-08-31T08:15:28+00:00", "revision_history": [ { "date": "2021-08-31T08:15:28+00:00", "number": "1", "summary": "Initial version" }, { "date": "2021-08-31T08:15:28+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-02T09:53:25+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Server AUS (v. 7.3)", "product": { "name": "Red Hat Enterprise Linux Server AUS (v. 7.3)", "product_id": "7Server-7.3.AUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_aus:7.3::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "microcode_ctl-2:2.1-16.42.el7_3.src", "product": { "name": "microcode_ctl-2:2.1-16.42.el7_3.src", "product_id": "microcode_ctl-2:2.1-16.42.el7_3.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/microcode_ctl@2.1-16.42.el7_3?arch=src\u0026epoch=2" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "microcode_ctl-2:2.1-16.42.el7_3.x86_64", "product": { "name": "microcode_ctl-2:2.1-16.42.el7_3.x86_64", "product_id": "microcode_ctl-2:2.1-16.42.el7_3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/microcode_ctl@2.1-16.42.el7_3?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "microcode_ctl-debuginfo-2:2.1-16.42.el7_3.x86_64", "product": { "name": "microcode_ctl-debuginfo-2:2.1-16.42.el7_3.x86_64", "product_id": "microcode_ctl-debuginfo-2:2.1-16.42.el7_3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/microcode_ctl-debuginfo@2.1-16.42.el7_3?arch=x86_64\u0026epoch=2" } } } ], "category": "architecture", "name": "x86_64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "microcode_ctl-2:2.1-16.42.el7_3.src as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)", "product_id": "7Server-7.3.AUS:microcode_ctl-2:2.1-16.42.el7_3.src" }, "product_reference": "microcode_ctl-2:2.1-16.42.el7_3.src", "relates_to_product_reference": "7Server-7.3.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "microcode_ctl-2:2.1-16.42.el7_3.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)", "product_id": "7Server-7.3.AUS:microcode_ctl-2:2.1-16.42.el7_3.x86_64" }, "product_reference": "microcode_ctl-2:2.1-16.42.el7_3.x86_64", "relates_to_product_reference": "7Server-7.3.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "microcode_ctl-debuginfo-2:2.1-16.42.el7_3.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)", "product_id": "7Server-7.3.AUS:microcode_ctl-debuginfo-2:2.1-16.42.el7_3.x86_64" }, "product_reference": "microcode_ctl-debuginfo-2:2.1-16.42.el7_3.x86_64", "relates_to_product_reference": "7Server-7.3.AUS" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Intel" ] } ], "cve": "CVE-2020-0543", "discovery_date": "2020-04-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1827165" } ], "notes": [ { "category": "description", "text": "A new domain bypass transient execution attack known as Special Register Buffer Data Sampling (SRBDS) has been found. This flaw allows data values from special internal registers to be leaked by an attacker able to execute code on any core of the CPU. An unprivileged, local attacker can use this flaw to infer values returned by affected instructions known to be commonly used during cryptographic operations that rely on uniqueness, secrecy, or both.", "title": "Vulnerability description" }, { "category": "summary", "text": "hw: Special Register Buffer Data Sampling (SRBDS)", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/solutions/5142691", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-7.3.AUS:microcode_ctl-2:2.1-16.42.el7_3.src", "7Server-7.3.AUS:microcode_ctl-2:2.1-16.42.el7_3.x86_64", "7Server-7.3.AUS:microcode_ctl-debuginfo-2:2.1-16.42.el7_3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-0543" }, { "category": "external", "summary": "RHBZ#1827165", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1827165" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-0543", "url": "https://www.cve.org/CVERecord?id=CVE-2020-0543" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-0543", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-0543" }, { "category": "external", "summary": "https://access.redhat.com/solutions/5142691", "url": "https://access.redhat.com/solutions/5142691" }, { "category": "external", "summary": "https://access.redhat.com/solutions/5142751", "url": "https://access.redhat.com/solutions/5142751" }, { "category": "external", "summary": "https://blogs.intel.com/technology/2020/06/ipas-security-advisories-for-june-2020/#gs.6uyhri", "url": "https://blogs.intel.com/technology/2020/06/ipas-security-advisories-for-june-2020/#gs.6uyhri" }, { "category": "external", "summary": "https://software.intel.com/security-software-guidance/insights/deep-dive-special-register-buffer-data-sampling", "url": "https://software.intel.com/security-software-guidance/insights/deep-dive-special-register-buffer-data-sampling" }, { "category": "external", "summary": "https://xenbits.xen.org/xsa/advisory-320.html", "url": "https://xenbits.xen.org/xsa/advisory-320.html" } ], "release_date": "2020-06-09T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-08-31T08:15:28+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-7.3.AUS:microcode_ctl-2:2.1-16.42.el7_3.src", "7Server-7.3.AUS:microcode_ctl-2:2.1-16.42.el7_3.x86_64", "7Server-7.3.AUS:microcode_ctl-debuginfo-2:2.1-16.42.el7_3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3322" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "7Server-7.3.AUS:microcode_ctl-2:2.1-16.42.el7_3.src", "7Server-7.3.AUS:microcode_ctl-2:2.1-16.42.el7_3.x86_64", "7Server-7.3.AUS:microcode_ctl-debuginfo-2:2.1-16.42.el7_3.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "7Server-7.3.AUS:microcode_ctl-2:2.1-16.42.el7_3.src", "7Server-7.3.AUS:microcode_ctl-2:2.1-16.42.el7_3.x86_64", "7Server-7.3.AUS:microcode_ctl-debuginfo-2:2.1-16.42.el7_3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "hw: Special Register Buffer Data Sampling (SRBDS)" }, { "cve": "CVE-2020-0548", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2020-01-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1788786" } ], "notes": [ { "category": "description", "text": "A flaw was found in Intel processors where a local attacker is able to gain information about registers used for vector calculations by observing register states from other processes running on the system. This results in a race condition where store buffers, which were not cleared, could be read by another process or a CPU sibling. The highest threat from this vulnerability is data confidentiality where an attacker could read arbitrary data as it passes through the processor.", "title": "Vulnerability description" }, { "category": "summary", "text": "hw: Vector Register Data Sampling", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-7.3.AUS:microcode_ctl-2:2.1-16.42.el7_3.src", "7Server-7.3.AUS:microcode_ctl-2:2.1-16.42.el7_3.x86_64", "7Server-7.3.AUS:microcode_ctl-debuginfo-2:2.1-16.42.el7_3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-0548" }, { "category": "external", "summary": "RHBZ#1788786", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1788786" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-0548", "url": "https://www.cve.org/CVERecord?id=CVE-2020-0548" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-0548", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-0548" }, { "category": "external", "summary": "https://access.redhat.com/solutions/l1d-cache-eviction-and-vector-register-sampling", "url": "https://access.redhat.com/solutions/l1d-cache-eviction-and-vector-register-sampling" }, { "category": "external", "summary": "https://blogs.intel.com/technology/2020/01/ipas-intel-sa-00329/", "url": "https://blogs.intel.com/technology/2020/01/ipas-intel-sa-00329/" }, { "category": "external", "summary": "https://cacheoutattack.com/CacheOut.pdf", "url": "https://cacheoutattack.com/CacheOut.pdf" }, { "category": "external", "summary": "https://software.intel.com/security-software-guidance/software-guidance/l1d-eviction-sampling", "url": "https://software.intel.com/security-software-guidance/software-guidance/l1d-eviction-sampling" } ], "release_date": "2020-01-27T13:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-08-31T08:15:28+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-7.3.AUS:microcode_ctl-2:2.1-16.42.el7_3.src", "7Server-7.3.AUS:microcode_ctl-2:2.1-16.42.el7_3.x86_64", "7Server-7.3.AUS:microcode_ctl-debuginfo-2:2.1-16.42.el7_3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3322" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 2.8, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.0" }, "products": [ "7Server-7.3.AUS:microcode_ctl-2:2.1-16.42.el7_3.src", "7Server-7.3.AUS:microcode_ctl-2:2.1-16.42.el7_3.x86_64", "7Server-7.3.AUS:microcode_ctl-debuginfo-2:2.1-16.42.el7_3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "hw: Vector Register Data Sampling" }, { "cve": "CVE-2020-0549", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2020-01-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1788788" } ], "notes": [ { "category": "description", "text": "A microarchitectural timing flaw was found on some Intel processors. A corner case exists where data in-flight during the eviction process can end up in the \u201cfill buffers\u201d and not properly cleared by the MDS mitigations. The fill buffer contents (which were expected to be blank) can be inferred using MDS or TAA style attack methods to allow a local attacker to infer fill buffer values.", "title": "Vulnerability description" }, { "category": "summary", "text": "hw: L1D Cache Eviction Sampling", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-7.3.AUS:microcode_ctl-2:2.1-16.42.el7_3.src", "7Server-7.3.AUS:microcode_ctl-2:2.1-16.42.el7_3.x86_64", "7Server-7.3.AUS:microcode_ctl-debuginfo-2:2.1-16.42.el7_3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-0549" }, { "category": "external", "summary": "RHBZ#1788788", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1788788" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-0549", "url": "https://www.cve.org/CVERecord?id=CVE-2020-0549" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-0549", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-0549" }, { "category": "external", "summary": "https://access.redhat.com/solutions/l1d-cache-eviction-and-vector-register-sampling", "url": "https://access.redhat.com/solutions/l1d-cache-eviction-and-vector-register-sampling" }, { "category": "external", "summary": "https://blogs.intel.com/technology/2020/01/ipas-intel-sa-00329/", "url": "https://blogs.intel.com/technology/2020/01/ipas-intel-sa-00329/" }, { "category": "external", "summary": "https://cacheoutattack.com/CacheOut.pdf", "url": "https://cacheoutattack.com/CacheOut.pdf" }, { "category": "external", "summary": "https://software.intel.com/security-software-guidance/software-guidance/l1d-eviction-sampling", "url": "https://software.intel.com/security-software-guidance/software-guidance/l1d-eviction-sampling" } ], "release_date": "2020-01-27T13:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-08-31T08:15:28+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-7.3.AUS:microcode_ctl-2:2.1-16.42.el7_3.src", "7Server-7.3.AUS:microcode_ctl-2:2.1-16.42.el7_3.x86_64", "7Server-7.3.AUS:microcode_ctl-debuginfo-2:2.1-16.42.el7_3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3322" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "7Server-7.3.AUS:microcode_ctl-2:2.1-16.42.el7_3.src", "7Server-7.3.AUS:microcode_ctl-2:2.1-16.42.el7_3.x86_64", "7Server-7.3.AUS:microcode_ctl-debuginfo-2:2.1-16.42.el7_3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "hw: L1D Cache Eviction Sampling" }, { "acknowledgments": [ { "names": [ "Intel" ] } ], "cve": "CVE-2020-8695", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2020-04-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1828583" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in Intel\u0027s implementation of RAPL (Running Average Power Limit). An attacker with a local account could query the power management functionality to intelligently infer SGX enclave computation values by measuring power usage in the RAPL subsystem.", "title": "Vulnerability description" }, { "category": "summary", "text": "hw: Information disclosure issue in Intel SGX via RAPL interface", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-7.3.AUS:microcode_ctl-2:2.1-16.42.el7_3.src", "7Server-7.3.AUS:microcode_ctl-2:2.1-16.42.el7_3.x86_64", "7Server-7.3.AUS:microcode_ctl-debuginfo-2:2.1-16.42.el7_3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-8695" }, { "category": "external", "summary": "RHBZ#1828583", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1828583" }, { "category": "external", "summary": "RHSB-5569051", "url": "https://access.redhat.com/articles/5569051" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-8695", "url": "https://www.cve.org/CVERecord?id=CVE-2020-8695" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-8695", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8695" }, { "category": "external", "summary": "https://en.wikipedia.org/wiki/Power_analysis", "url": "https://en.wikipedia.org/wiki/Power_analysis" }, { "category": "external", "summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00389.html", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00389.html" } ], "release_date": "2020-11-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-08-31T08:15:28+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-7.3.AUS:microcode_ctl-2:2.1-16.42.el7_3.src", "7Server-7.3.AUS:microcode_ctl-2:2.1-16.42.el7_3.x86_64", "7Server-7.3.AUS:microcode_ctl-debuginfo-2:2.1-16.42.el7_3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3322" }, { "category": "workaround", "details": "Until a firmware update and reboot can be applied, the attack vector can be reduced by limiting read access to the sysfs attributes that export this functionality to userspace. \n\nThe command:\n~~~\nsudo chmod 400 /sys/class/powercap/intel_rapl/*/energy_uj\n~~~\nWill do this for the current boot, it will need to be scripted to run at each boot to remain persistent across reboots.", "product_ids": [ "7Server-7.3.AUS:microcode_ctl-2:2.1-16.42.el7_3.src", "7Server-7.3.AUS:microcode_ctl-2:2.1-16.42.el7_3.x86_64", "7Server-7.3.AUS:microcode_ctl-debuginfo-2:2.1-16.42.el7_3.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "7Server-7.3.AUS:microcode_ctl-2:2.1-16.42.el7_3.src", "7Server-7.3.AUS:microcode_ctl-2:2.1-16.42.el7_3.x86_64", "7Server-7.3.AUS:microcode_ctl-debuginfo-2:2.1-16.42.el7_3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "hw: Information disclosure issue in Intel SGX via RAPL interface" }, { "acknowledgments": [ { "names": [ "Intel" ] } ], "cve": "CVE-2020-8696", "cwe": { "id": "CWE-212", "name": "Improper Removal of Sensitive Information Before Storage or Transfer" }, "discovery_date": "2020-10-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1890355" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Intel Advanced Vector Extensions (AVX) implementation, where a local authenticated attacker with the ability to execute AVX instructions can gather the AVX register state from previous AVX executions. This vulnerability allows information disclosure of the AVX register state.", "title": "Vulnerability description" }, { "category": "summary", "text": "hw: Vector Register Leakage-Active", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-7.3.AUS:microcode_ctl-2:2.1-16.42.el7_3.src", "7Server-7.3.AUS:microcode_ctl-2:2.1-16.42.el7_3.x86_64", "7Server-7.3.AUS:microcode_ctl-debuginfo-2:2.1-16.42.el7_3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-8696" }, { "category": "external", "summary": "RHBZ#1890355", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890355" }, { "category": "external", "summary": "RHSB-5569051", "url": "https://access.redhat.com/articles/5569051" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-8696", "url": "https://www.cve.org/CVERecord?id=CVE-2020-8696" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-8696", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8696" }, { "category": "external", "summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00381.html", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00381.html" } ], "release_date": "2020-11-10T13:55:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-08-31T08:15:28+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-7.3.AUS:microcode_ctl-2:2.1-16.42.el7_3.src", "7Server-7.3.AUS:microcode_ctl-2:2.1-16.42.el7_3.x86_64", "7Server-7.3.AUS:microcode_ctl-debuginfo-2:2.1-16.42.el7_3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3322" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 2.8, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.1" }, "products": [ "7Server-7.3.AUS:microcode_ctl-2:2.1-16.42.el7_3.src", "7Server-7.3.AUS:microcode_ctl-2:2.1-16.42.el7_3.x86_64", "7Server-7.3.AUS:microcode_ctl-debuginfo-2:2.1-16.42.el7_3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "hw: Vector Register Leakage-Active" }, { "acknowledgments": [ { "names": [ "Intel" ] } ], "cve": "CVE-2020-8698", "cwe": { "id": "CWE-212", "name": "Improper Removal of Sensitive Information Before Storage or Transfer" }, "discovery_date": "2020-10-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1890356" } ], "notes": [ { "category": "description", "text": "A flaw was found in the CPU microarchitecture where a local attacker is able to abuse a timing issue which may allow them to infer internal architectural state from previous executions on the CPU.", "title": "Vulnerability description" }, { "category": "summary", "text": "hw: Fast forward store predictor", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-7.3.AUS:microcode_ctl-2:2.1-16.42.el7_3.src", "7Server-7.3.AUS:microcode_ctl-2:2.1-16.42.el7_3.x86_64", "7Server-7.3.AUS:microcode_ctl-debuginfo-2:2.1-16.42.el7_3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-8698" }, { "category": "external", "summary": "RHBZ#1890356", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890356" }, { "category": "external", "summary": "RHSB-5569051", "url": "https://access.redhat.com/articles/5569051" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-8698", "url": "https://www.cve.org/CVERecord?id=CVE-2020-8698" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-8698", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8698" }, { "category": "external", "summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00381.html", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00381.html" } ], "release_date": "2020-11-10T13:55:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-08-31T08:15:28+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-7.3.AUS:microcode_ctl-2:2.1-16.42.el7_3.src", "7Server-7.3.AUS:microcode_ctl-2:2.1-16.42.el7_3.x86_64", "7Server-7.3.AUS:microcode_ctl-debuginfo-2:2.1-16.42.el7_3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3322" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "7Server-7.3.AUS:microcode_ctl-2:2.1-16.42.el7_3.src", "7Server-7.3.AUS:microcode_ctl-2:2.1-16.42.el7_3.x86_64", "7Server-7.3.AUS:microcode_ctl-debuginfo-2:2.1-16.42.el7_3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "hw: Fast forward store predictor" }, { "acknowledgments": [ { "names": [ "Intel" ] } ], "cve": "CVE-2020-24489", "cwe": { "id": "CWE-459", "name": "Incomplete Cleanup" }, "discovery_date": "2021-05-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1962650" } ], "notes": [ { "category": "description", "text": "A flaw was found in Intel\u00ae VT-d products. Entries from the context cache on some types of context cache invalidations may not be properly invalidated which may allow an authenticated user to potentially enable escalation of privilege via local access. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "hw: vt-d related privilege escalation", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-7.3.AUS:microcode_ctl-2:2.1-16.42.el7_3.src", "7Server-7.3.AUS:microcode_ctl-2:2.1-16.42.el7_3.x86_64", "7Server-7.3.AUS:microcode_ctl-debuginfo-2:2.1-16.42.el7_3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-24489" }, { "category": "external", "summary": "RHBZ#1962650", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1962650" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-24489", "url": "https://www.cve.org/CVERecord?id=CVE-2020-24489" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-24489", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-24489" } ], "release_date": "2021-06-08T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-08-31T08:15:28+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-7.3.AUS:microcode_ctl-2:2.1-16.42.el7_3.src", "7Server-7.3.AUS:microcode_ctl-2:2.1-16.42.el7_3.x86_64", "7Server-7.3.AUS:microcode_ctl-debuginfo-2:2.1-16.42.el7_3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3322" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-7.3.AUS:microcode_ctl-2:2.1-16.42.el7_3.src", "7Server-7.3.AUS:microcode_ctl-2:2.1-16.42.el7_3.x86_64", "7Server-7.3.AUS:microcode_ctl-debuginfo-2:2.1-16.42.el7_3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "hw: vt-d related privilege escalation" }, { "acknowledgments": [ { "names": [ "Intel" ] } ], "cve": "CVE-2020-24511", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2021-05-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1962702" } ], "notes": [ { "category": "description", "text": "Microcode misconfiguration in some Intel processors may cause EIBRS mitigation (CVE-2017-5715) to be incomplete. As a consequence, this issue may allow an authenticated user to potentially enable information disclosure via local access.", "title": "Vulnerability description" }, { "category": "summary", "text": "hw: improper isolation of shared resources in some Intel Processors", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-7.3.AUS:microcode_ctl-2:2.1-16.42.el7_3.src", "7Server-7.3.AUS:microcode_ctl-2:2.1-16.42.el7_3.x86_64", "7Server-7.3.AUS:microcode_ctl-debuginfo-2:2.1-16.42.el7_3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-24511" }, { "category": "external", "summary": "RHBZ#1962702", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1962702" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-24511", "url": "https://www.cve.org/CVERecord?id=CVE-2020-24511" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-24511", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-24511" } ], "release_date": "2021-06-08T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-08-31T08:15:28+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-7.3.AUS:microcode_ctl-2:2.1-16.42.el7_3.src", "7Server-7.3.AUS:microcode_ctl-2:2.1-16.42.el7_3.x86_64", "7Server-7.3.AUS:microcode_ctl-debuginfo-2:2.1-16.42.el7_3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3322" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "7Server-7.3.AUS:microcode_ctl-2:2.1-16.42.el7_3.src", "7Server-7.3.AUS:microcode_ctl-2:2.1-16.42.el7_3.x86_64", "7Server-7.3.AUS:microcode_ctl-debuginfo-2:2.1-16.42.el7_3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "hw: improper isolation of shared resources in some Intel Processors" }, { "acknowledgments": [ { "names": [ "Intel" ] } ], "cve": "CVE-2020-24512", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2021-05-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1962722" } ], "notes": [ { "category": "description", "text": "Observable timing discrepancy in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.", "title": "Vulnerability description" }, { "category": "summary", "text": "hw: observable timing discrepancy in some Intel Processors", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-7.3.AUS:microcode_ctl-2:2.1-16.42.el7_3.src", "7Server-7.3.AUS:microcode_ctl-2:2.1-16.42.el7_3.x86_64", "7Server-7.3.AUS:microcode_ctl-debuginfo-2:2.1-16.42.el7_3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-24512" }, { "category": "external", "summary": "RHBZ#1962722", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1962722" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-24512", "url": "https://www.cve.org/CVERecord?id=CVE-2020-24512" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-24512", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-24512" } ], "release_date": "2021-06-08T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-08-31T08:15:28+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-7.3.AUS:microcode_ctl-2:2.1-16.42.el7_3.src", "7Server-7.3.AUS:microcode_ctl-2:2.1-16.42.el7_3.x86_64", "7Server-7.3.AUS:microcode_ctl-debuginfo-2:2.1-16.42.el7_3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3322" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 2.8, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.1" }, "products": [ "7Server-7.3.AUS:microcode_ctl-2:2.1-16.42.el7_3.src", "7Server-7.3.AUS:microcode_ctl-2:2.1-16.42.el7_3.x86_64", "7Server-7.3.AUS:microcode_ctl-debuginfo-2:2.1-16.42.el7_3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "hw: observable timing discrepancy in some Intel Processors" } ] }
rhsa-2020:2679
Vulnerability from csaf_redhat
Published
2020-06-23 13:48
Modified
2025-02-28 01:28
Summary
Red Hat Security Advisory: microcode_ctl security, bug fix and enhancement update
Notes
Topic
Updated microcode_ctl packages that fix several security bugs and add various
enhancements are now available.
Red Hat Product Security has rated this update as having a security impact of
Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a
detailed severity rating, is available for each vulnerability from the CVE
link(s) in the References section.
Details
Security Fix(es):
* hw: Special Register Buffer Data Sampling (SRBDS) (CVE-2020-0543)
* hw: L1D Cache Eviction Sampling (CVE-2020-0549)
* hw: Vector Register Data Sampling (CVE-2020-0548)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE page(s)
listed in the References section.
Bug Fix(es):
* Update Intel CPU microcode to microcode-20200609 release:
- Update of 06-2d-06/0x6d (SNB-E/EN/EP C1/M0) microcode from revision 0x61f
up to 0x621;
- Update of 06-2d-07/0x6d (SNB-E/EN/EP C2/M1) microcode from revision 0x718
up to 0x71a;
- Update of 06-3c-03/0x32 (HSW C0) microcode from revision 0x27 up to 0x28;
- Update of 06-3d-04/0xc0 (BDW-U/Y E0/F0) microcode from revision 0x2e
up to 0x2f;
- Update of 06-45-01/0x72 (HSW-U C0/D0) microcode from revision 0x25
up to 0x26;
- Update of 06-46-01/0x32 (HSW-H C0) microcode from revision 0x1b up to 0x1c;
- Update of 06-47-01/0x22 (BDW-H/Xeon E3 E0/G0) microcode from revision 0x21
up to 0x22;
- Update of 06-4e-03/0xc0 (SKL-U/Y D0) microcode from revision 0xd6
up to 0xdc;
- Update of 06-55-03/0x97 (SKX-SP B1) microcode from revision 0x1000151
up to 0x1000157;
- Update of 06-55-04/0xb7 (SKX-SP H0/M0/U0, SKX-D M1) microcode
(in intel-06-55-04/intel-ucode/06-55-04) from revision 0x2000065
up to 0x2006906;
- Update of 06-55-06/0xbf (CLX-SP B0) microcode from revision 0x400002c
up to 0x4002f01;
- Update of 06-55-07/0xbf (CLX-SP B1) microcode from revision 0x500002c
up to 0x5002f01;
- Update of 06-5e-03/0x36 (SKL-H/S R0/N0) microcode from revision 0xd6
up to 0xdc;
- Update of 06-7e-05/0x80 (ICL-U/Y D1) microcode from revision 0x46
up to 0x78;
- Update of 06-8e-09/0x10 (AML-Y22 H0) microcode from revision 0xca
up to 0xd6;
- Update of 06-8e-09/0xc0 (KBL-U/Y H0) microcode from revision 0xca
up to 0xd6;
- Update of 06-8e-0a/0xc0 (CFL-U43e D0) microcode from revision 0xca
up to 0xd6;
- Update of 06-8e-0b/0xd0 (WHL-U W0) microcode from revision 0xca
up to 0xd6;
- Update of 06-8e-0c/0x94 (AML-Y42 V0, CML-Y42 V0, WHL-U V0) microcode
from revision 0xca up to 0xd6;
- Update of 06-9e-09/0x2a (KBL-G/H/S/X/Xeon E3 B0) microcode from revision
0xca up to 0xd6;
- Update of 06-9e-0a/0x22 (CFL-H/S/Xeon E3 U0) microcode from revision 0xca
up to 0xd6;
- Update of 06-9e-0b/0x02 (CFL-S B0) microcode from revision 0xca up to 0xd6;
- Update of 06-9e-0c/0x22 (CFL-H/S P0) microcode from revision 0xca
up to 0xd6;
- Update of 06-9e-0d/0x22 (CFL-H R0) microcode from revision 0xca up to 0xd6.
* Do not update 06-4e-03 (SKL-U/Y) and 06-5e-03 (SKL-H/S/Xeon E3 v5) to revision
0xdc, use 0xd6 by default.
* Enable 06-2d-07 (SNB-E/EN/EP) caveat by default.
* Enable 06-55-04 (SKL-SP/X/W) caveat by default.
* Avoid find being SIGPIPE'd on early "grep -q" exit in the dracut script.
* Re-generate initramfs not only for the currently running kernel,
but for several recently installed kernels as well.
* Change the URL in the intel-microcode2ucode.8 to point to the GitHub
repository since the microcode download section at Intel Download Center
does not exist anymore.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated microcode_ctl packages that fix several security bugs and add various\nenhancements are now available.\n\nRed Hat Product Security has rated this update as having a security impact of\nModerate. A Common Vulnerability Scoring System (CVSS) base score, which gives a\ndetailed severity rating, is available for each vulnerability from the CVE\nlink(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Security Fix(es):\n\n* hw: Special Register Buffer Data Sampling (SRBDS) (CVE-2020-0543)\n\n* hw: L1D Cache Eviction Sampling (CVE-2020-0549)\n\n* hw: Vector Register Data Sampling (CVE-2020-0548)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE page(s)\nlisted in the References section.\n\nBug Fix(es):\n\n* Update Intel CPU microcode to microcode-20200609 release:\n - Update of 06-2d-06/0x6d (SNB-E/EN/EP C1/M0) microcode from revision 0x61f\n up to 0x621;\n - Update of 06-2d-07/0x6d (SNB-E/EN/EP C2/M1) microcode from revision 0x718\n up to 0x71a;\n - Update of 06-3c-03/0x32 (HSW C0) microcode from revision 0x27 up to 0x28;\n - Update of 06-3d-04/0xc0 (BDW-U/Y E0/F0) microcode from revision 0x2e\n up to 0x2f;\n - Update of 06-45-01/0x72 (HSW-U C0/D0) microcode from revision 0x25\n up to 0x26;\n - Update of 06-46-01/0x32 (HSW-H C0) microcode from revision 0x1b up to 0x1c;\n - Update of 06-47-01/0x22 (BDW-H/Xeon E3 E0/G0) microcode from revision 0x21\n up to 0x22;\n - Update of 06-4e-03/0xc0 (SKL-U/Y D0) microcode from revision 0xd6\n up to 0xdc;\n - Update of 06-55-03/0x97 (SKX-SP B1) microcode from revision 0x1000151\n up to 0x1000157;\n - Update of 06-55-04/0xb7 (SKX-SP H0/M0/U0, SKX-D M1) microcode\n (in intel-06-55-04/intel-ucode/06-55-04) from revision 0x2000065\n up to 0x2006906;\n - Update of 06-55-06/0xbf (CLX-SP B0) microcode from revision 0x400002c\n up to 0x4002f01;\n - Update of 06-55-07/0xbf (CLX-SP B1) microcode from revision 0x500002c\n up to 0x5002f01;\n - Update of 06-5e-03/0x36 (SKL-H/S R0/N0) microcode from revision 0xd6\n up to 0xdc;\n - Update of 06-7e-05/0x80 (ICL-U/Y D1) microcode from revision 0x46\n up to 0x78;\n - Update of 06-8e-09/0x10 (AML-Y22 H0) microcode from revision 0xca\n up to 0xd6;\n - Update of 06-8e-09/0xc0 (KBL-U/Y H0) microcode from revision 0xca\n up to 0xd6;\n - Update of 06-8e-0a/0xc0 (CFL-U43e D0) microcode from revision 0xca\n up to 0xd6;\n - Update of 06-8e-0b/0xd0 (WHL-U W0) microcode from revision 0xca\n up to 0xd6;\n - Update of 06-8e-0c/0x94 (AML-Y42 V0, CML-Y42 V0, WHL-U V0) microcode\n from revision 0xca up to 0xd6;\n - Update of 06-9e-09/0x2a (KBL-G/H/S/X/Xeon E3 B0) microcode from revision\n 0xca up to 0xd6;\n - Update of 06-9e-0a/0x22 (CFL-H/S/Xeon E3 U0) microcode from revision 0xca\n up to 0xd6;\n - Update of 06-9e-0b/0x02 (CFL-S B0) microcode from revision 0xca up to 0xd6;\n - Update of 06-9e-0c/0x22 (CFL-H/S P0) microcode from revision 0xca\n up to 0xd6;\n - Update of 06-9e-0d/0x22 (CFL-H R0) microcode from revision 0xca up to 0xd6.\n* Do not update 06-4e-03 (SKL-U/Y) and 06-5e-03 (SKL-H/S/Xeon E3 v5) to revision\n 0xdc, use 0xd6 by default.\n* Enable 06-2d-07 (SNB-E/EN/EP) caveat by default.\n* Enable 06-55-04 (SKL-SP/X/W) caveat by default.\n* Avoid find being SIGPIPE\u0027d on early \"grep -q\" exit in the dracut script.\n* Re-generate initramfs not only for the currently running kernel,\n but for several recently installed kernels as well.\n* Change the URL in the intel-microcode2ucode.8 to point to the GitHub\n repository since the microcode download section at Intel Download Center\n does not exist anymore.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2020:2679", "url": "https://access.redhat.com/errata/RHSA-2020:2679" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "https://access.redhat.com/solutions/5142691", "url": "https://access.redhat.com/solutions/5142691" }, { "category": "external", "summary": "https://access.redhat.com/solutions/l1d-cache-eviction-and-vector-register-sampling", "url": "https://access.redhat.com/solutions/l1d-cache-eviction-and-vector-register-sampling" }, { "category": "external", "summary": "1788786", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1788786" }, { "category": "external", "summary": "1788788", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1788788" }, { "category": "external", "summary": "1827165", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1827165" }, { "category": "external", "summary": "1849059", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1849059" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_2679.json" } ], "title": "Red Hat Security Advisory: microcode_ctl security, bug fix and enhancement update", "tracking": { "current_release_date": "2025-02-28T01:28:17+00:00", "generator": { "date": "2025-02-28T01:28:17+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.3.1" } }, "id": "RHSA-2020:2679", "initial_release_date": "2020-06-23T13:48:01+00:00", "revision_history": [ { "date": "2020-06-23T13:48:01+00:00", "number": "1", "summary": "Initial version" }, { "date": "2020-06-23T13:48:01+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-02-28T01:28:17+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Server AUS (v. 7.2)", "product": { "name": "Red Hat Enterprise Linux Server AUS (v. 7.2)", "product_id": "7Server-7.2.AUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_aus:7.2::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "microcode_ctl-2:2.1-12.30.el7_2.x86_64", "product": { "name": "microcode_ctl-2:2.1-12.30.el7_2.x86_64", "product_id": "microcode_ctl-2:2.1-12.30.el7_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/microcode_ctl@2.1-12.30.el7_2?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "microcode_ctl-debuginfo-2:2.1-12.30.el7_2.x86_64", "product": { "name": "microcode_ctl-debuginfo-2:2.1-12.30.el7_2.x86_64", "product_id": "microcode_ctl-debuginfo-2:2.1-12.30.el7_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/microcode_ctl-debuginfo@2.1-12.30.el7_2?arch=x86_64\u0026epoch=2" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "microcode_ctl-2:2.1-12.30.el7_2.src", "product": { "name": "microcode_ctl-2:2.1-12.30.el7_2.src", "product_id": "microcode_ctl-2:2.1-12.30.el7_2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/microcode_ctl@2.1-12.30.el7_2?arch=src\u0026epoch=2" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "microcode_ctl-2:2.1-12.30.el7_2.src as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)", "product_id": "7Server-7.2.AUS:microcode_ctl-2:2.1-12.30.el7_2.src" }, "product_reference": "microcode_ctl-2:2.1-12.30.el7_2.src", "relates_to_product_reference": "7Server-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "microcode_ctl-2:2.1-12.30.el7_2.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)", "product_id": "7Server-7.2.AUS:microcode_ctl-2:2.1-12.30.el7_2.x86_64" }, "product_reference": "microcode_ctl-2:2.1-12.30.el7_2.x86_64", "relates_to_product_reference": "7Server-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "microcode_ctl-debuginfo-2:2.1-12.30.el7_2.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)", "product_id": "7Server-7.2.AUS:microcode_ctl-debuginfo-2:2.1-12.30.el7_2.x86_64" }, "product_reference": "microcode_ctl-debuginfo-2:2.1-12.30.el7_2.x86_64", "relates_to_product_reference": "7Server-7.2.AUS" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Intel" ] } ], "cve": "CVE-2020-0543", "discovery_date": "2020-04-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1827165" } ], "notes": [ { "category": "description", "text": "A new domain bypass transient execution attack known as Special Register Buffer Data Sampling (SRBDS) has been found. This flaw allows data values from special internal registers to be leaked by an attacker able to execute code on any core of the CPU. An unprivileged, local attacker can use this flaw to infer values returned by affected instructions known to be commonly used during cryptographic operations that rely on uniqueness, secrecy, or both.", "title": "Vulnerability description" }, { "category": "summary", "text": "hw: Special Register Buffer Data Sampling (SRBDS)", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/solutions/5142691", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-7.2.AUS:microcode_ctl-2:2.1-12.30.el7_2.src", "7Server-7.2.AUS:microcode_ctl-2:2.1-12.30.el7_2.x86_64", "7Server-7.2.AUS:microcode_ctl-debuginfo-2:2.1-12.30.el7_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-0543" }, { "category": "external", "summary": "RHBZ#1827165", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1827165" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-0543", "url": "https://www.cve.org/CVERecord?id=CVE-2020-0543" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-0543", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-0543" }, { "category": "external", "summary": "https://access.redhat.com/solutions/5142691", "url": "https://access.redhat.com/solutions/5142691" }, { "category": "external", "summary": "https://access.redhat.com/solutions/5142751", "url": "https://access.redhat.com/solutions/5142751" }, { "category": "external", "summary": "https://blogs.intel.com/technology/2020/06/ipas-security-advisories-for-june-2020/#gs.6uyhri", "url": "https://blogs.intel.com/technology/2020/06/ipas-security-advisories-for-june-2020/#gs.6uyhri" }, { "category": "external", "summary": "https://software.intel.com/security-software-guidance/insights/deep-dive-special-register-buffer-data-sampling", "url": "https://software.intel.com/security-software-guidance/insights/deep-dive-special-register-buffer-data-sampling" }, { "category": "external", "summary": "https://xenbits.xen.org/xsa/advisory-320.html", "url": "https://xenbits.xen.org/xsa/advisory-320.html" } ], "release_date": "2020-06-09T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-06-23T13:48:01+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-7.2.AUS:microcode_ctl-2:2.1-12.30.el7_2.src", "7Server-7.2.AUS:microcode_ctl-2:2.1-12.30.el7_2.x86_64", "7Server-7.2.AUS:microcode_ctl-debuginfo-2:2.1-12.30.el7_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2679" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "7Server-7.2.AUS:microcode_ctl-2:2.1-12.30.el7_2.src", "7Server-7.2.AUS:microcode_ctl-2:2.1-12.30.el7_2.x86_64", "7Server-7.2.AUS:microcode_ctl-debuginfo-2:2.1-12.30.el7_2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "7Server-7.2.AUS:microcode_ctl-2:2.1-12.30.el7_2.src", "7Server-7.2.AUS:microcode_ctl-2:2.1-12.30.el7_2.x86_64", "7Server-7.2.AUS:microcode_ctl-debuginfo-2:2.1-12.30.el7_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "hw: Special Register Buffer Data Sampling (SRBDS)" }, { "cve": "CVE-2020-0548", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2020-01-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1788786" } ], "notes": [ { "category": "description", "text": "A flaw was found in Intel processors where a local attacker is able to gain information about registers used for vector calculations by observing register states from other processes running on the system. This results in a race condition where store buffers, which were not cleared, could be read by another process or a CPU sibling. The highest threat from this vulnerability is data confidentiality where an attacker could read arbitrary data as it passes through the processor.", "title": "Vulnerability description" }, { "category": "summary", "text": "hw: Vector Register Data Sampling", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-7.2.AUS:microcode_ctl-2:2.1-12.30.el7_2.src", "7Server-7.2.AUS:microcode_ctl-2:2.1-12.30.el7_2.x86_64", "7Server-7.2.AUS:microcode_ctl-debuginfo-2:2.1-12.30.el7_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-0548" }, { "category": "external", "summary": "RHBZ#1788786", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1788786" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-0548", "url": "https://www.cve.org/CVERecord?id=CVE-2020-0548" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-0548", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-0548" }, { "category": "external", "summary": "https://access.redhat.com/solutions/l1d-cache-eviction-and-vector-register-sampling", "url": "https://access.redhat.com/solutions/l1d-cache-eviction-and-vector-register-sampling" }, { "category": "external", "summary": "https://blogs.intel.com/technology/2020/01/ipas-intel-sa-00329/", "url": "https://blogs.intel.com/technology/2020/01/ipas-intel-sa-00329/" }, { "category": "external", "summary": "https://cacheoutattack.com/CacheOut.pdf", "url": "https://cacheoutattack.com/CacheOut.pdf" }, { "category": "external", "summary": "https://software.intel.com/security-software-guidance/software-guidance/l1d-eviction-sampling", "url": "https://software.intel.com/security-software-guidance/software-guidance/l1d-eviction-sampling" } ], "release_date": "2020-01-27T13:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-06-23T13:48:01+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-7.2.AUS:microcode_ctl-2:2.1-12.30.el7_2.src", "7Server-7.2.AUS:microcode_ctl-2:2.1-12.30.el7_2.x86_64", "7Server-7.2.AUS:microcode_ctl-debuginfo-2:2.1-12.30.el7_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2679" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 2.8, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.0" }, "products": [ "7Server-7.2.AUS:microcode_ctl-2:2.1-12.30.el7_2.src", "7Server-7.2.AUS:microcode_ctl-2:2.1-12.30.el7_2.x86_64", "7Server-7.2.AUS:microcode_ctl-debuginfo-2:2.1-12.30.el7_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "hw: Vector Register Data Sampling" }, { "cve": "CVE-2020-0549", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2020-01-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1788788" } ], "notes": [ { "category": "description", "text": "A microarchitectural timing flaw was found on some Intel processors. A corner case exists where data in-flight during the eviction process can end up in the \u201cfill buffers\u201d and not properly cleared by the MDS mitigations. The fill buffer contents (which were expected to be blank) can be inferred using MDS or TAA style attack methods to allow a local attacker to infer fill buffer values.", "title": "Vulnerability description" }, { "category": "summary", "text": "hw: L1D Cache Eviction Sampling", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-7.2.AUS:microcode_ctl-2:2.1-12.30.el7_2.src", "7Server-7.2.AUS:microcode_ctl-2:2.1-12.30.el7_2.x86_64", "7Server-7.2.AUS:microcode_ctl-debuginfo-2:2.1-12.30.el7_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-0549" }, { "category": "external", "summary": "RHBZ#1788788", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1788788" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-0549", "url": "https://www.cve.org/CVERecord?id=CVE-2020-0549" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-0549", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-0549" }, { "category": "external", "summary": "https://access.redhat.com/solutions/l1d-cache-eviction-and-vector-register-sampling", "url": "https://access.redhat.com/solutions/l1d-cache-eviction-and-vector-register-sampling" }, { "category": "external", "summary": "https://blogs.intel.com/technology/2020/01/ipas-intel-sa-00329/", "url": "https://blogs.intel.com/technology/2020/01/ipas-intel-sa-00329/" }, { "category": "external", "summary": "https://cacheoutattack.com/CacheOut.pdf", "url": "https://cacheoutattack.com/CacheOut.pdf" }, { "category": "external", "summary": "https://software.intel.com/security-software-guidance/software-guidance/l1d-eviction-sampling", "url": "https://software.intel.com/security-software-guidance/software-guidance/l1d-eviction-sampling" } ], "release_date": "2020-01-27T13:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-06-23T13:48:01+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-7.2.AUS:microcode_ctl-2:2.1-12.30.el7_2.src", "7Server-7.2.AUS:microcode_ctl-2:2.1-12.30.el7_2.x86_64", "7Server-7.2.AUS:microcode_ctl-debuginfo-2:2.1-12.30.el7_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2679" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "7Server-7.2.AUS:microcode_ctl-2:2.1-12.30.el7_2.src", "7Server-7.2.AUS:microcode_ctl-2:2.1-12.30.el7_2.x86_64", "7Server-7.2.AUS:microcode_ctl-debuginfo-2:2.1-12.30.el7_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "hw: L1D Cache Eviction Sampling" } ] }
rhsa-2020:2680
Vulnerability from csaf_redhat
Published
2020-06-23 13:55
Modified
2025-02-28 01:27
Summary
Red Hat Security Advisory: microcode_ctl security, bug fix and enhancement update
Notes
Topic
Updated microcode_ctl packages that fix several security bugs and add various
enhancements are now available.
Red Hat Product Security has rated this update as having a security impact of
Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a
detailed severity rating, is available for each vulnerability from the CVE
link(s) in the References section.
Details
Security Fix(es):
* hw: Special Register Buffer Data Sampling (SRBDS) (CVE-2020-0543)
* hw: L1D Cache Eviction Sampling (CVE-2020-0549)
* hw: Vector Register Data Sampling (CVE-2020-0548)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE page(s)
listed in the References section.
Bug Fix(es):
* Update Intel CPU microcode to microcode-20200609 release:
- Update of 06-2d-06/0x6d (SNB-E/EN/EP C1/M0) microcode from revision 0x61f
up to 0x621;
- Update of 06-2d-07/0x6d (SNB-E/EN/EP C2/M1) microcode from revision 0x718
up to 0x71a;
- Update of 06-3c-03/0x32 (HSW C0) microcode from revision 0x27 up to 0x28;
- Update of 06-3d-04/0xc0 (BDW-U/Y E0/F0) microcode from revision 0x2e
up to 0x2f;
- Update of 06-45-01/0x72 (HSW-U C0/D0) microcode from revision 0x25
up to 0x26;
- Update of 06-46-01/0x32 (HSW-H C0) microcode from revision 0x1b up to 0x1c;
- Update of 06-47-01/0x22 (BDW-H/Xeon E3 E0/G0) microcode from revision 0x21
up to 0x22;
- Update of 06-4e-03/0xc0 (SKL-U/Y D0) microcode from revision 0xd6
up to 0xdc;
- Update of 06-55-03/0x97 (SKX-SP B1) microcode from revision 0x1000151
up to 0x1000157;
- Update of 06-55-04/0xb7 (SKX-SP H0/M0/U0, SKX-D M1) microcode
(in intel-06-55-04/intel-ucode/06-55-04) from revision 0x2000065
up to 0x2006906;
- Update of 06-55-06/0xbf (CLX-SP B0) microcode from revision 0x400002c
up to 0x4002f01;
- Update of 06-55-07/0xbf (CLX-SP B1) microcode from revision 0x500002c
up to 0x5002f01;
- Update of 06-5e-03/0x36 (SKL-H/S R0/N0) microcode from revision 0xd6
up to 0xdc;
- Update of 06-7e-05/0x80 (ICL-U/Y D1) microcode from revision 0x46
up to 0x78;
- Update of 06-8e-09/0x10 (AML-Y22 H0) microcode from revision 0xca
up to 0xd6;
- Update of 06-8e-09/0xc0 (KBL-U/Y H0) microcode from revision 0xca
up to 0xd6;
- Update of 06-8e-0a/0xc0 (CFL-U43e D0) microcode from revision 0xca
up to 0xd6;
- Update of 06-8e-0b/0xd0 (WHL-U W0) microcode from revision 0xca
up to 0xd6;
- Update of 06-8e-0c/0x94 (AML-Y42 V0, CML-Y42 V0, WHL-U V0) microcode
from revision 0xca up to 0xd6;
- Update of 06-9e-09/0x2a (KBL-G/H/S/X/Xeon E3 B0) microcode from revision
0xca up to 0xd6;
- Update of 06-9e-0a/0x22 (CFL-H/S/Xeon E3 U0) microcode from revision 0xca
up to 0xd6;
- Update of 06-9e-0b/0x02 (CFL-S B0) microcode from revision 0xca up to 0xd6;
- Update of 06-9e-0c/0x22 (CFL-H/S P0) microcode from revision 0xca
up to 0xd6;
- Update of 06-9e-0d/0x22 (CFL-H R0) microcode from revision 0xca up to 0xd6.
* Do not update 06-4e-03 (SKL-U/Y) and 06-5e-03 (SKL-H/S/Xeon E3 v5) to revision
0xdc, use 0xd6 by default.
* Enable 06-2d-07 (SNB-E/EN/EP) caveat by default.
* Enable 06-55-04 (SKL-SP/X/W) caveat by default.
* Avoid find being SIGPIPE'd on early "grep -q" exit in the dracut script.
* Re-generate initramfs not only for the currently running kernel,
but for several recently installed kernels as well.
* Change the URL in the intel-microcode2ucode.8 to point to the GitHub
repository since the microcode download section at Intel Download Center
does not exist anymore.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated microcode_ctl packages that fix several security bugs and add various\nenhancements are now available.\n\nRed Hat Product Security has rated this update as having a security impact of\nModerate. A Common Vulnerability Scoring System (CVSS) base score, which gives a\ndetailed severity rating, is available for each vulnerability from the CVE\nlink(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Security Fix(es):\n\n* hw: Special Register Buffer Data Sampling (SRBDS) (CVE-2020-0543)\n\n* hw: L1D Cache Eviction Sampling (CVE-2020-0549)\n\n* hw: Vector Register Data Sampling (CVE-2020-0548)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE page(s)\nlisted in the References section.\n\nBug Fix(es):\n\n* Update Intel CPU microcode to microcode-20200609 release:\n - Update of 06-2d-06/0x6d (SNB-E/EN/EP C1/M0) microcode from revision 0x61f\n up to 0x621;\n - Update of 06-2d-07/0x6d (SNB-E/EN/EP C2/M1) microcode from revision 0x718\n up to 0x71a;\n - Update of 06-3c-03/0x32 (HSW C0) microcode from revision 0x27 up to 0x28;\n - Update of 06-3d-04/0xc0 (BDW-U/Y E0/F0) microcode from revision 0x2e\n up to 0x2f;\n - Update of 06-45-01/0x72 (HSW-U C0/D0) microcode from revision 0x25\n up to 0x26;\n - Update of 06-46-01/0x32 (HSW-H C0) microcode from revision 0x1b up to 0x1c;\n - Update of 06-47-01/0x22 (BDW-H/Xeon E3 E0/G0) microcode from revision 0x21\n up to 0x22;\n - Update of 06-4e-03/0xc0 (SKL-U/Y D0) microcode from revision 0xd6\n up to 0xdc;\n - Update of 06-55-03/0x97 (SKX-SP B1) microcode from revision 0x1000151\n up to 0x1000157;\n - Update of 06-55-04/0xb7 (SKX-SP H0/M0/U0, SKX-D M1) microcode\n (in intel-06-55-04/intel-ucode/06-55-04) from revision 0x2000065\n up to 0x2006906;\n - Update of 06-55-06/0xbf (CLX-SP B0) microcode from revision 0x400002c\n up to 0x4002f01;\n - Update of 06-55-07/0xbf (CLX-SP B1) microcode from revision 0x500002c\n up to 0x5002f01;\n - Update of 06-5e-03/0x36 (SKL-H/S R0/N0) microcode from revision 0xd6\n up to 0xdc;\n - Update of 06-7e-05/0x80 (ICL-U/Y D1) microcode from revision 0x46\n up to 0x78;\n - Update of 06-8e-09/0x10 (AML-Y22 H0) microcode from revision 0xca\n up to 0xd6;\n - Update of 06-8e-09/0xc0 (KBL-U/Y H0) microcode from revision 0xca\n up to 0xd6;\n - Update of 06-8e-0a/0xc0 (CFL-U43e D0) microcode from revision 0xca\n up to 0xd6;\n - Update of 06-8e-0b/0xd0 (WHL-U W0) microcode from revision 0xca\n up to 0xd6;\n - Update of 06-8e-0c/0x94 (AML-Y42 V0, CML-Y42 V0, WHL-U V0) microcode\n from revision 0xca up to 0xd6;\n - Update of 06-9e-09/0x2a (KBL-G/H/S/X/Xeon E3 B0) microcode from revision\n 0xca up to 0xd6;\n - Update of 06-9e-0a/0x22 (CFL-H/S/Xeon E3 U0) microcode from revision 0xca\n up to 0xd6;\n - Update of 06-9e-0b/0x02 (CFL-S B0) microcode from revision 0xca up to 0xd6;\n - Update of 06-9e-0c/0x22 (CFL-H/S P0) microcode from revision 0xca\n up to 0xd6;\n - Update of 06-9e-0d/0x22 (CFL-H R0) microcode from revision 0xca up to 0xd6.\n* Do not update 06-4e-03 (SKL-U/Y) and 06-5e-03 (SKL-H/S/Xeon E3 v5) to revision\n 0xdc, use 0xd6 by default.\n* Enable 06-2d-07 (SNB-E/EN/EP) caveat by default.\n* Enable 06-55-04 (SKL-SP/X/W) caveat by default.\n* Avoid find being SIGPIPE\u0027d on early \"grep -q\" exit in the dracut script.\n* Re-generate initramfs not only for the currently running kernel,\n but for several recently installed kernels as well.\n* Change the URL in the intel-microcode2ucode.8 to point to the GitHub\n repository since the microcode download section at Intel Download Center\n does not exist anymore.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2020:2680", "url": "https://access.redhat.com/errata/RHSA-2020:2680" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "https://access.redhat.com/solutions/5142691", "url": "https://access.redhat.com/solutions/5142691" }, { "category": "external", "summary": "https://access.redhat.com/solutions/l1d-cache-eviction-and-vector-register-sampling", "url": "https://access.redhat.com/solutions/l1d-cache-eviction-and-vector-register-sampling" }, { "category": "external", "summary": "1788786", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1788786" }, { "category": "external", "summary": "1788788", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1788788" }, { "category": "external", "summary": "1827165", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1827165" }, { "category": "external", "summary": "1849060", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1849060" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_2680.json" } ], "title": "Red Hat Security Advisory: microcode_ctl security, bug fix and enhancement update", "tracking": { "current_release_date": "2025-02-28T01:27:51+00:00", "generator": { "date": "2025-02-28T01:27:51+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.3.1" } }, "id": "RHSA-2020:2680", "initial_release_date": "2020-06-23T13:55:42+00:00", "revision_history": [ { "date": "2020-06-23T13:55:42+00:00", "number": "1", "summary": "Initial version" }, { "date": "2020-06-23T13:55:42+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-02-28T01:27:51+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Server AUS (v. 7.3)", "product": { "name": "Red Hat Enterprise Linux Server AUS (v. 7.3)", "product_id": "7Server-7.3.AUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_aus:7.3::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server E4S (v. 7.3)", "product": { "name": "Red Hat Enterprise Linux Server E4S (v. 7.3)", "product_id": "7Server-7.3.E4S", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_e4s:7.3::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server TUS (v. 7.3)", "product": { "name": "Red Hat Enterprise Linux Server TUS (v. 7.3)", "product_id": "7Server-7.3.TUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_tus:7.3::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "microcode_ctl-2:2.1-16.33.el7_3.x86_64", "product": { "name": "microcode_ctl-2:2.1-16.33.el7_3.x86_64", "product_id": "microcode_ctl-2:2.1-16.33.el7_3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/microcode_ctl@2.1-16.33.el7_3?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "microcode_ctl-debuginfo-2:2.1-16.33.el7_3.x86_64", "product": { "name": "microcode_ctl-debuginfo-2:2.1-16.33.el7_3.x86_64", "product_id": "microcode_ctl-debuginfo-2:2.1-16.33.el7_3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/microcode_ctl-debuginfo@2.1-16.33.el7_3?arch=x86_64\u0026epoch=2" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "microcode_ctl-2:2.1-16.33.el7_3.src", "product": { "name": "microcode_ctl-2:2.1-16.33.el7_3.src", "product_id": "microcode_ctl-2:2.1-16.33.el7_3.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/microcode_ctl@2.1-16.33.el7_3?arch=src\u0026epoch=2" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "microcode_ctl-2:2.1-16.33.el7_3.src as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)", "product_id": "7Server-7.3.AUS:microcode_ctl-2:2.1-16.33.el7_3.src" }, "product_reference": "microcode_ctl-2:2.1-16.33.el7_3.src", "relates_to_product_reference": "7Server-7.3.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "microcode_ctl-2:2.1-16.33.el7_3.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)", "product_id": "7Server-7.3.AUS:microcode_ctl-2:2.1-16.33.el7_3.x86_64" }, "product_reference": "microcode_ctl-2:2.1-16.33.el7_3.x86_64", "relates_to_product_reference": "7Server-7.3.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "microcode_ctl-debuginfo-2:2.1-16.33.el7_3.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)", "product_id": "7Server-7.3.AUS:microcode_ctl-debuginfo-2:2.1-16.33.el7_3.x86_64" }, "product_reference": "microcode_ctl-debuginfo-2:2.1-16.33.el7_3.x86_64", "relates_to_product_reference": "7Server-7.3.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "microcode_ctl-2:2.1-16.33.el7_3.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)", "product_id": "7Server-7.3.E4S:microcode_ctl-2:2.1-16.33.el7_3.src" }, "product_reference": "microcode_ctl-2:2.1-16.33.el7_3.src", "relates_to_product_reference": "7Server-7.3.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "microcode_ctl-2:2.1-16.33.el7_3.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)", "product_id": "7Server-7.3.E4S:microcode_ctl-2:2.1-16.33.el7_3.x86_64" }, "product_reference": "microcode_ctl-2:2.1-16.33.el7_3.x86_64", "relates_to_product_reference": "7Server-7.3.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "microcode_ctl-debuginfo-2:2.1-16.33.el7_3.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)", "product_id": "7Server-7.3.E4S:microcode_ctl-debuginfo-2:2.1-16.33.el7_3.x86_64" }, "product_reference": "microcode_ctl-debuginfo-2:2.1-16.33.el7_3.x86_64", "relates_to_product_reference": "7Server-7.3.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "microcode_ctl-2:2.1-16.33.el7_3.src as a component of Red Hat Enterprise Linux Server TUS (v. 7.3)", "product_id": "7Server-7.3.TUS:microcode_ctl-2:2.1-16.33.el7_3.src" }, "product_reference": "microcode_ctl-2:2.1-16.33.el7_3.src", "relates_to_product_reference": "7Server-7.3.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "microcode_ctl-2:2.1-16.33.el7_3.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.3)", "product_id": "7Server-7.3.TUS:microcode_ctl-2:2.1-16.33.el7_3.x86_64" }, "product_reference": "microcode_ctl-2:2.1-16.33.el7_3.x86_64", "relates_to_product_reference": "7Server-7.3.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "microcode_ctl-debuginfo-2:2.1-16.33.el7_3.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.3)", "product_id": "7Server-7.3.TUS:microcode_ctl-debuginfo-2:2.1-16.33.el7_3.x86_64" }, "product_reference": "microcode_ctl-debuginfo-2:2.1-16.33.el7_3.x86_64", "relates_to_product_reference": "7Server-7.3.TUS" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Intel" ] } ], "cve": "CVE-2020-0543", "discovery_date": "2020-04-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1827165" } ], "notes": [ { "category": "description", "text": "A new domain bypass transient execution attack known as Special Register Buffer Data Sampling (SRBDS) has been found. This flaw allows data values from special internal registers to be leaked by an attacker able to execute code on any core of the CPU. An unprivileged, local attacker can use this flaw to infer values returned by affected instructions known to be commonly used during cryptographic operations that rely on uniqueness, secrecy, or both.", "title": "Vulnerability description" }, { "category": "summary", "text": "hw: Special Register Buffer Data Sampling (SRBDS)", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/solutions/5142691", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-7.3.AUS:microcode_ctl-2:2.1-16.33.el7_3.src", "7Server-7.3.AUS:microcode_ctl-2:2.1-16.33.el7_3.x86_64", "7Server-7.3.AUS:microcode_ctl-debuginfo-2:2.1-16.33.el7_3.x86_64", "7Server-7.3.E4S:microcode_ctl-2:2.1-16.33.el7_3.src", "7Server-7.3.E4S:microcode_ctl-2:2.1-16.33.el7_3.x86_64", "7Server-7.3.E4S:microcode_ctl-debuginfo-2:2.1-16.33.el7_3.x86_64", "7Server-7.3.TUS:microcode_ctl-2:2.1-16.33.el7_3.src", "7Server-7.3.TUS:microcode_ctl-2:2.1-16.33.el7_3.x86_64", "7Server-7.3.TUS:microcode_ctl-debuginfo-2:2.1-16.33.el7_3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-0543" }, { "category": "external", "summary": "RHBZ#1827165", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1827165" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-0543", "url": "https://www.cve.org/CVERecord?id=CVE-2020-0543" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-0543", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-0543" }, { "category": "external", "summary": "https://access.redhat.com/solutions/5142691", "url": "https://access.redhat.com/solutions/5142691" }, { "category": "external", "summary": "https://access.redhat.com/solutions/5142751", "url": "https://access.redhat.com/solutions/5142751" }, { "category": "external", "summary": "https://blogs.intel.com/technology/2020/06/ipas-security-advisories-for-june-2020/#gs.6uyhri", "url": "https://blogs.intel.com/technology/2020/06/ipas-security-advisories-for-june-2020/#gs.6uyhri" }, { "category": "external", "summary": "https://software.intel.com/security-software-guidance/insights/deep-dive-special-register-buffer-data-sampling", "url": "https://software.intel.com/security-software-guidance/insights/deep-dive-special-register-buffer-data-sampling" }, { "category": "external", "summary": "https://xenbits.xen.org/xsa/advisory-320.html", "url": "https://xenbits.xen.org/xsa/advisory-320.html" } ], "release_date": "2020-06-09T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-06-23T13:55:42+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-7.3.AUS:microcode_ctl-2:2.1-16.33.el7_3.src", "7Server-7.3.AUS:microcode_ctl-2:2.1-16.33.el7_3.x86_64", "7Server-7.3.AUS:microcode_ctl-debuginfo-2:2.1-16.33.el7_3.x86_64", "7Server-7.3.E4S:microcode_ctl-2:2.1-16.33.el7_3.src", "7Server-7.3.E4S:microcode_ctl-2:2.1-16.33.el7_3.x86_64", "7Server-7.3.E4S:microcode_ctl-debuginfo-2:2.1-16.33.el7_3.x86_64", "7Server-7.3.TUS:microcode_ctl-2:2.1-16.33.el7_3.src", "7Server-7.3.TUS:microcode_ctl-2:2.1-16.33.el7_3.x86_64", "7Server-7.3.TUS:microcode_ctl-debuginfo-2:2.1-16.33.el7_3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2680" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "7Server-7.3.AUS:microcode_ctl-2:2.1-16.33.el7_3.src", "7Server-7.3.AUS:microcode_ctl-2:2.1-16.33.el7_3.x86_64", "7Server-7.3.AUS:microcode_ctl-debuginfo-2:2.1-16.33.el7_3.x86_64", "7Server-7.3.E4S:microcode_ctl-2:2.1-16.33.el7_3.src", "7Server-7.3.E4S:microcode_ctl-2:2.1-16.33.el7_3.x86_64", "7Server-7.3.E4S:microcode_ctl-debuginfo-2:2.1-16.33.el7_3.x86_64", "7Server-7.3.TUS:microcode_ctl-2:2.1-16.33.el7_3.src", "7Server-7.3.TUS:microcode_ctl-2:2.1-16.33.el7_3.x86_64", "7Server-7.3.TUS:microcode_ctl-debuginfo-2:2.1-16.33.el7_3.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "7Server-7.3.AUS:microcode_ctl-2:2.1-16.33.el7_3.src", "7Server-7.3.AUS:microcode_ctl-2:2.1-16.33.el7_3.x86_64", "7Server-7.3.AUS:microcode_ctl-debuginfo-2:2.1-16.33.el7_3.x86_64", "7Server-7.3.E4S:microcode_ctl-2:2.1-16.33.el7_3.src", "7Server-7.3.E4S:microcode_ctl-2:2.1-16.33.el7_3.x86_64", "7Server-7.3.E4S:microcode_ctl-debuginfo-2:2.1-16.33.el7_3.x86_64", "7Server-7.3.TUS:microcode_ctl-2:2.1-16.33.el7_3.src", "7Server-7.3.TUS:microcode_ctl-2:2.1-16.33.el7_3.x86_64", "7Server-7.3.TUS:microcode_ctl-debuginfo-2:2.1-16.33.el7_3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "hw: Special Register Buffer Data Sampling (SRBDS)" }, { "cve": "CVE-2020-0548", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2020-01-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1788786" } ], "notes": [ { "category": "description", "text": "A flaw was found in Intel processors where a local attacker is able to gain information about registers used for vector calculations by observing register states from other processes running on the system. This results in a race condition where store buffers, which were not cleared, could be read by another process or a CPU sibling. The highest threat from this vulnerability is data confidentiality where an attacker could read arbitrary data as it passes through the processor.", "title": "Vulnerability description" }, { "category": "summary", "text": "hw: Vector Register Data Sampling", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-7.3.AUS:microcode_ctl-2:2.1-16.33.el7_3.src", "7Server-7.3.AUS:microcode_ctl-2:2.1-16.33.el7_3.x86_64", "7Server-7.3.AUS:microcode_ctl-debuginfo-2:2.1-16.33.el7_3.x86_64", "7Server-7.3.E4S:microcode_ctl-2:2.1-16.33.el7_3.src", "7Server-7.3.E4S:microcode_ctl-2:2.1-16.33.el7_3.x86_64", "7Server-7.3.E4S:microcode_ctl-debuginfo-2:2.1-16.33.el7_3.x86_64", "7Server-7.3.TUS:microcode_ctl-2:2.1-16.33.el7_3.src", "7Server-7.3.TUS:microcode_ctl-2:2.1-16.33.el7_3.x86_64", "7Server-7.3.TUS:microcode_ctl-debuginfo-2:2.1-16.33.el7_3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-0548" }, { "category": "external", "summary": "RHBZ#1788786", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1788786" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-0548", "url": "https://www.cve.org/CVERecord?id=CVE-2020-0548" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-0548", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-0548" }, { "category": "external", "summary": "https://access.redhat.com/solutions/l1d-cache-eviction-and-vector-register-sampling", "url": "https://access.redhat.com/solutions/l1d-cache-eviction-and-vector-register-sampling" }, { "category": "external", "summary": "https://blogs.intel.com/technology/2020/01/ipas-intel-sa-00329/", "url": "https://blogs.intel.com/technology/2020/01/ipas-intel-sa-00329/" }, { "category": "external", "summary": "https://cacheoutattack.com/CacheOut.pdf", "url": "https://cacheoutattack.com/CacheOut.pdf" }, { "category": "external", "summary": "https://software.intel.com/security-software-guidance/software-guidance/l1d-eviction-sampling", "url": "https://software.intel.com/security-software-guidance/software-guidance/l1d-eviction-sampling" } ], "release_date": "2020-01-27T13:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-06-23T13:55:42+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-7.3.AUS:microcode_ctl-2:2.1-16.33.el7_3.src", "7Server-7.3.AUS:microcode_ctl-2:2.1-16.33.el7_3.x86_64", "7Server-7.3.AUS:microcode_ctl-debuginfo-2:2.1-16.33.el7_3.x86_64", "7Server-7.3.E4S:microcode_ctl-2:2.1-16.33.el7_3.src", "7Server-7.3.E4S:microcode_ctl-2:2.1-16.33.el7_3.x86_64", "7Server-7.3.E4S:microcode_ctl-debuginfo-2:2.1-16.33.el7_3.x86_64", "7Server-7.3.TUS:microcode_ctl-2:2.1-16.33.el7_3.src", "7Server-7.3.TUS:microcode_ctl-2:2.1-16.33.el7_3.x86_64", "7Server-7.3.TUS:microcode_ctl-debuginfo-2:2.1-16.33.el7_3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2680" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 2.8, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.0" }, "products": [ "7Server-7.3.AUS:microcode_ctl-2:2.1-16.33.el7_3.src", "7Server-7.3.AUS:microcode_ctl-2:2.1-16.33.el7_3.x86_64", "7Server-7.3.AUS:microcode_ctl-debuginfo-2:2.1-16.33.el7_3.x86_64", "7Server-7.3.E4S:microcode_ctl-2:2.1-16.33.el7_3.src", "7Server-7.3.E4S:microcode_ctl-2:2.1-16.33.el7_3.x86_64", "7Server-7.3.E4S:microcode_ctl-debuginfo-2:2.1-16.33.el7_3.x86_64", "7Server-7.3.TUS:microcode_ctl-2:2.1-16.33.el7_3.src", "7Server-7.3.TUS:microcode_ctl-2:2.1-16.33.el7_3.x86_64", "7Server-7.3.TUS:microcode_ctl-debuginfo-2:2.1-16.33.el7_3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "hw: Vector Register Data Sampling" }, { "cve": "CVE-2020-0549", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2020-01-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1788788" } ], "notes": [ { "category": "description", "text": "A microarchitectural timing flaw was found on some Intel processors. A corner case exists where data in-flight during the eviction process can end up in the \u201cfill buffers\u201d and not properly cleared by the MDS mitigations. The fill buffer contents (which were expected to be blank) can be inferred using MDS or TAA style attack methods to allow a local attacker to infer fill buffer values.", "title": "Vulnerability description" }, { "category": "summary", "text": "hw: L1D Cache Eviction Sampling", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-7.3.AUS:microcode_ctl-2:2.1-16.33.el7_3.src", "7Server-7.3.AUS:microcode_ctl-2:2.1-16.33.el7_3.x86_64", "7Server-7.3.AUS:microcode_ctl-debuginfo-2:2.1-16.33.el7_3.x86_64", "7Server-7.3.E4S:microcode_ctl-2:2.1-16.33.el7_3.src", "7Server-7.3.E4S:microcode_ctl-2:2.1-16.33.el7_3.x86_64", "7Server-7.3.E4S:microcode_ctl-debuginfo-2:2.1-16.33.el7_3.x86_64", "7Server-7.3.TUS:microcode_ctl-2:2.1-16.33.el7_3.src", "7Server-7.3.TUS:microcode_ctl-2:2.1-16.33.el7_3.x86_64", "7Server-7.3.TUS:microcode_ctl-debuginfo-2:2.1-16.33.el7_3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-0549" }, { "category": "external", "summary": "RHBZ#1788788", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1788788" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-0549", "url": "https://www.cve.org/CVERecord?id=CVE-2020-0549" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-0549", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-0549" }, { "category": "external", "summary": "https://access.redhat.com/solutions/l1d-cache-eviction-and-vector-register-sampling", "url": "https://access.redhat.com/solutions/l1d-cache-eviction-and-vector-register-sampling" }, { "category": "external", "summary": "https://blogs.intel.com/technology/2020/01/ipas-intel-sa-00329/", "url": "https://blogs.intel.com/technology/2020/01/ipas-intel-sa-00329/" }, { "category": "external", "summary": "https://cacheoutattack.com/CacheOut.pdf", "url": "https://cacheoutattack.com/CacheOut.pdf" }, { "category": "external", "summary": "https://software.intel.com/security-software-guidance/software-guidance/l1d-eviction-sampling", "url": "https://software.intel.com/security-software-guidance/software-guidance/l1d-eviction-sampling" } ], "release_date": "2020-01-27T13:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-06-23T13:55:42+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-7.3.AUS:microcode_ctl-2:2.1-16.33.el7_3.src", "7Server-7.3.AUS:microcode_ctl-2:2.1-16.33.el7_3.x86_64", "7Server-7.3.AUS:microcode_ctl-debuginfo-2:2.1-16.33.el7_3.x86_64", "7Server-7.3.E4S:microcode_ctl-2:2.1-16.33.el7_3.src", "7Server-7.3.E4S:microcode_ctl-2:2.1-16.33.el7_3.x86_64", "7Server-7.3.E4S:microcode_ctl-debuginfo-2:2.1-16.33.el7_3.x86_64", "7Server-7.3.TUS:microcode_ctl-2:2.1-16.33.el7_3.src", "7Server-7.3.TUS:microcode_ctl-2:2.1-16.33.el7_3.x86_64", "7Server-7.3.TUS:microcode_ctl-debuginfo-2:2.1-16.33.el7_3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2680" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "7Server-7.3.AUS:microcode_ctl-2:2.1-16.33.el7_3.src", "7Server-7.3.AUS:microcode_ctl-2:2.1-16.33.el7_3.x86_64", "7Server-7.3.AUS:microcode_ctl-debuginfo-2:2.1-16.33.el7_3.x86_64", "7Server-7.3.E4S:microcode_ctl-2:2.1-16.33.el7_3.src", "7Server-7.3.E4S:microcode_ctl-2:2.1-16.33.el7_3.x86_64", "7Server-7.3.E4S:microcode_ctl-debuginfo-2:2.1-16.33.el7_3.x86_64", "7Server-7.3.TUS:microcode_ctl-2:2.1-16.33.el7_3.src", "7Server-7.3.TUS:microcode_ctl-2:2.1-16.33.el7_3.x86_64", "7Server-7.3.TUS:microcode_ctl-debuginfo-2:2.1-16.33.el7_3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "hw: L1D Cache Eviction Sampling" } ] }
suse-su-2021:1497-1
Vulnerability from csaf_suse
Published
2021-05-04 15:16
Modified
2021-05-04 15:16
Summary
Security update for sca-patterns-sle11
Notes
Title of the patch
Security update for sca-patterns-sle11
Description of the patch
This update for sca-patterns-sle11 fixes the following issues:
- New regular patterns (1) for version 1.3.1
* Special Register Buffer Data Sampling aka CrossTalk (CVE-2020-0543) (bsc#1154824)
Patchnames
SUSE-2021-1497,SUSE-SLE-Module-Server-Applications-15-SP2-2021-1497,SUSE-SLE-Product-HPC-15-2021-1497,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2021-1497,SUSE-SLE-Product-HPC-15-SP1-LTSS-2021-1497,SUSE-SLE-Product-SLES-15-2021-1497,SUSE-SLE-Product-SLES-15-SP1-BCL-2021-1497,SUSE-SLE-Product-SLES-15-SP1-LTSS-2021-1497,SUSE-SLE-Product-SLES_SAP-15-2021-1497,SUSE-SLE-Product-SLES_SAP-15-SP1-2021-1497,SUSE-SLE-Product-SUSE-Manager-Proxy-4.0-2021-1497,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.0-2021-1497,SUSE-SLE-Product-SUSE-Manager-Server-4.0-2021-1497,SUSE-Storage-6-2021-1497
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for sca-patterns-sle11", "title": "Title of the patch" }, { "category": "description", "text": "This update for sca-patterns-sle11 fixes the following issues:\n\n- New regular patterns (1) for version 1.3.1\n * Special Register Buffer Data Sampling aka CrossTalk (CVE-2020-0543) (bsc#1154824)\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2021-1497,SUSE-SLE-Module-Server-Applications-15-SP2-2021-1497,SUSE-SLE-Product-HPC-15-2021-1497,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2021-1497,SUSE-SLE-Product-HPC-15-SP1-LTSS-2021-1497,SUSE-SLE-Product-SLES-15-2021-1497,SUSE-SLE-Product-SLES-15-SP1-BCL-2021-1497,SUSE-SLE-Product-SLES-15-SP1-LTSS-2021-1497,SUSE-SLE-Product-SLES_SAP-15-2021-1497,SUSE-SLE-Product-SLES_SAP-15-SP1-2021-1497,SUSE-SLE-Product-SUSE-Manager-Proxy-4.0-2021-1497,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.0-2021-1497,SUSE-SLE-Product-SUSE-Manager-Server-4.0-2021-1497,SUSE-Storage-6-2021-1497", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_1497-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2021:1497-1", "url": "https://www.suse.com/support/update/announcement/2021/suse-su-20211497-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2021:1497-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-May/008731.html" }, { "category": "self", "summary": "SUSE Bug 1154824", "url": "https://bugzilla.suse.com/1154824" }, { "category": "self", "summary": "SUSE CVE CVE-2020-0543 page", "url": "https://www.suse.com/security/cve/CVE-2020-0543/" } ], "title": "Security update for sca-patterns-sle11", "tracking": { "current_release_date": "2021-05-04T15:16:38Z", "generator": { "date": "2021-05-04T15:16:38Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2021:1497-1", "initial_release_date": "2021-05-04T15:16:38Z", "revision_history": [ { "date": "2021-05-04T15:16:38Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "sca-patterns-sle11-1.3.1-7.6.1.noarch", "product": { "name": "sca-patterns-sle11-1.3.1-7.6.1.noarch", "product_id": "sca-patterns-sle11-1.3.1-7.6.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Module for Server Applications 15 SP2", "product": { "name": "SUSE Linux Enterprise Module for Server Applications 15 SP2", "product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-server-applications:15:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-espos:15" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15-LTSS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-ltss:15" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-espos:15:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 15-LTSS", "product": { "name": "SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:15" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 15 SP1-BCL", "product": { "name": "SUSE Linux Enterprise Server 15 SP1-BCL", "product_id": "SUSE Linux Enterprise Server 15 SP1-BCL", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_bcl:15:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 15 SP1-LTSS", "product": { "name": "SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:15:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 15", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:15" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:15:sp1" } } }, { "category": "product_name", "name": "SUSE Manager Proxy 4.0", "product": { "name": "SUSE Manager Proxy 4.0", "product_id": "SUSE Manager Proxy 4.0", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-manager-proxy:4.0" } } }, { "category": "product_name", "name": "SUSE Manager Retail Branch Server 4.0", "product": { "name": "SUSE Manager Retail Branch Server 4.0", "product_id": "SUSE Manager Retail Branch Server 4.0", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-manager-retail-branch-server:4.0" } } }, { "category": "product_name", "name": "SUSE Manager Server 4.0", "product": { "name": "SUSE Manager Server 4.0", "product_id": "SUSE Manager Server 4.0", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-manager-server:4.0" } } }, { "category": "product_name", "name": "SUSE Enterprise Storage 6", "product": { "name": "SUSE Enterprise Storage 6", "product_id": "SUSE Enterprise Storage 6", "product_identification_helper": { "cpe": "cpe:/o:suse:ses:6" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "sca-patterns-sle11-1.3.1-7.6.1.noarch as component of SUSE Linux Enterprise Module for Server Applications 15 SP2", "product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP2:sca-patterns-sle11-1.3.1-7.6.1.noarch" }, "product_reference": "sca-patterns-sle11-1.3.1-7.6.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "sca-patterns-sle11-1.3.1-7.6.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:sca-patterns-sle11-1.3.1-7.6.1.noarch" }, "product_reference": "sca-patterns-sle11-1.3.1-7.6.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "sca-patterns-sle11-1.3.1-7.6.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:sca-patterns-sle11-1.3.1-7.6.1.noarch" }, "product_reference": "sca-patterns-sle11-1.3.1-7.6.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "sca-patterns-sle11-1.3.1-7.6.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:sca-patterns-sle11-1.3.1-7.6.1.noarch" }, "product_reference": "sca-patterns-sle11-1.3.1-7.6.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "sca-patterns-sle11-1.3.1-7.6.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:sca-patterns-sle11-1.3.1-7.6.1.noarch" }, "product_reference": "sca-patterns-sle11-1.3.1-7.6.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "sca-patterns-sle11-1.3.1-7.6.1.noarch as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:sca-patterns-sle11-1.3.1-7.6.1.noarch" }, "product_reference": "sca-patterns-sle11-1.3.1-7.6.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "sca-patterns-sle11-1.3.1-7.6.1.noarch as component of SUSE Linux Enterprise Server 15 SP1-BCL", "product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:sca-patterns-sle11-1.3.1-7.6.1.noarch" }, "product_reference": "sca-patterns-sle11-1.3.1-7.6.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "sca-patterns-sle11-1.3.1-7.6.1.noarch as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:sca-patterns-sle11-1.3.1-7.6.1.noarch" }, "product_reference": "sca-patterns-sle11-1.3.1-7.6.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "sca-patterns-sle11-1.3.1-7.6.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:sca-patterns-sle11-1.3.1-7.6.1.noarch" }, "product_reference": "sca-patterns-sle11-1.3.1-7.6.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "sca-patterns-sle11-1.3.1-7.6.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:sca-patterns-sle11-1.3.1-7.6.1.noarch" }, "product_reference": "sca-patterns-sle11-1.3.1-7.6.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "sca-patterns-sle11-1.3.1-7.6.1.noarch as component of SUSE Manager Proxy 4.0", "product_id": "SUSE Manager Proxy 4.0:sca-patterns-sle11-1.3.1-7.6.1.noarch" }, "product_reference": "sca-patterns-sle11-1.3.1-7.6.1.noarch", "relates_to_product_reference": "SUSE Manager Proxy 4.0" }, { "category": "default_component_of", "full_product_name": { "name": "sca-patterns-sle11-1.3.1-7.6.1.noarch as component of SUSE Manager Retail Branch Server 4.0", "product_id": "SUSE Manager Retail Branch Server 4.0:sca-patterns-sle11-1.3.1-7.6.1.noarch" }, "product_reference": "sca-patterns-sle11-1.3.1-7.6.1.noarch", "relates_to_product_reference": "SUSE Manager Retail Branch Server 4.0" }, { "category": "default_component_of", "full_product_name": { "name": "sca-patterns-sle11-1.3.1-7.6.1.noarch as component of SUSE Manager Server 4.0", "product_id": "SUSE Manager Server 4.0:sca-patterns-sle11-1.3.1-7.6.1.noarch" }, "product_reference": "sca-patterns-sle11-1.3.1-7.6.1.noarch", "relates_to_product_reference": "SUSE Manager Server 4.0" }, { "category": "default_component_of", "full_product_name": { "name": "sca-patterns-sle11-1.3.1-7.6.1.noarch as component of SUSE Enterprise Storage 6", "product_id": "SUSE Enterprise Storage 6:sca-patterns-sle11-1.3.1-7.6.1.noarch" }, "product_reference": "sca-patterns-sle11-1.3.1-7.6.1.noarch", "relates_to_product_reference": "SUSE Enterprise Storage 6" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-0543", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-0543" } ], "notes": [ { "category": "general", "text": "Incomplete cleanup from specific special register read operations in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 6:sca-patterns-sle11-1.3.1-7.6.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:sca-patterns-sle11-1.3.1-7.6.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:sca-patterns-sle11-1.3.1-7.6.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:sca-patterns-sle11-1.3.1-7.6.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:sca-patterns-sle11-1.3.1-7.6.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP2:sca-patterns-sle11-1.3.1-7.6.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:sca-patterns-sle11-1.3.1-7.6.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:sca-patterns-sle11-1.3.1-7.6.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:sca-patterns-sle11-1.3.1-7.6.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:sca-patterns-sle11-1.3.1-7.6.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:sca-patterns-sle11-1.3.1-7.6.1.noarch", "SUSE Manager Proxy 4.0:sca-patterns-sle11-1.3.1-7.6.1.noarch", "SUSE Manager Retail Branch Server 4.0:sca-patterns-sle11-1.3.1-7.6.1.noarch", "SUSE Manager Server 4.0:sca-patterns-sle11-1.3.1-7.6.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2020-0543", "url": "https://www.suse.com/security/cve/CVE-2020-0543" }, { "category": "external", "summary": "SUSE Bug 1154824 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1154824" }, { "category": "external", "summary": "SUSE Bug 1172205 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172205" }, { "category": "external", "summary": "SUSE Bug 1172206 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172206" }, { "category": "external", "summary": "SUSE Bug 1172207 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172207" }, { "category": "external", "summary": "SUSE Bug 1172770 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172770" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 6:sca-patterns-sle11-1.3.1-7.6.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:sca-patterns-sle11-1.3.1-7.6.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:sca-patterns-sle11-1.3.1-7.6.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:sca-patterns-sle11-1.3.1-7.6.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:sca-patterns-sle11-1.3.1-7.6.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP2:sca-patterns-sle11-1.3.1-7.6.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:sca-patterns-sle11-1.3.1-7.6.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:sca-patterns-sle11-1.3.1-7.6.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:sca-patterns-sle11-1.3.1-7.6.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:sca-patterns-sle11-1.3.1-7.6.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:sca-patterns-sle11-1.3.1-7.6.1.noarch", "SUSE Manager Proxy 4.0:sca-patterns-sle11-1.3.1-7.6.1.noarch", "SUSE Manager Retail Branch Server 4.0:sca-patterns-sle11-1.3.1-7.6.1.noarch", "SUSE Manager Server 4.0:sca-patterns-sle11-1.3.1-7.6.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 6:sca-patterns-sle11-1.3.1-7.6.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:sca-patterns-sle11-1.3.1-7.6.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:sca-patterns-sle11-1.3.1-7.6.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:sca-patterns-sle11-1.3.1-7.6.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:sca-patterns-sle11-1.3.1-7.6.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP2:sca-patterns-sle11-1.3.1-7.6.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:sca-patterns-sle11-1.3.1-7.6.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:sca-patterns-sle11-1.3.1-7.6.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:sca-patterns-sle11-1.3.1-7.6.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:sca-patterns-sle11-1.3.1-7.6.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:sca-patterns-sle11-1.3.1-7.6.1.noarch", "SUSE Manager Proxy 4.0:sca-patterns-sle11-1.3.1-7.6.1.noarch", "SUSE Manager Retail Branch Server 4.0:sca-patterns-sle11-1.3.1-7.6.1.noarch", "SUSE Manager Server 4.0:sca-patterns-sle11-1.3.1-7.6.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2021-05-04T15:16:38Z", "details": "moderate" } ], "title": "CVE-2020-0543" } ] }
suse-fu-2022:4496-1
Vulnerability from csaf_suse
Published
2022-12-15 09:43
Modified
2022-12-15 09:43
Summary
Feature update for SCA patterns
Notes
Title of the patch
Feature update for SCA patterns
Description of the patch
This update for SCA patterns fixes the following issues:
sca-patterns-base:
- Version update from 1.3.1 to 1.5.0 to implement the conversion of SCA Tool to Python3 (jsc#SLE-25064, jsc#SLE-24335):
* Convert SCA Tool from Python2 to Python3 (bsc#1191005, SLE-21579)
* Added Core.loadFullFile for sectionless parsing (bsc#1187194)
* Added SUSE.getNetworkInterfaces (bsc#1144162)
* Changed required dependencies from python to python3-base (bsc#1191199)
* Fix SUSE.getFileSystems invalid index error (bsc#1185594)
* Fix SUSE.getFileSystems unbound local SWAP variable (bsc#1185593)
* Removed Novell/OES references from libraries (bsc#1186034)
* Updated documentation for SUSE.compareKernel
* Updated kernel version constants for all SUSE libraries (bsc#1189483)
sca-patterns-hae:
- Version update from 1.3.1 to 1.5.1 to implement the conversion of SCA Tool to Python3 (jsc#SLE-25064, jsc#SLE-24335):
* Convert SCA Tool from Python2 to Python3 (bsc#1191005, SLE-21579)
* Added distribution and service pack subdirectories (bsc#1193878)
* False positive hit from /usr/lib/sca/patterns/HAE/stonith-00002.pl (bsc#1124793)
* HAE Policies Quorum 2 node cluster requires ignore policy (bsc#1167689)
* supportconfig indicates IPv6 required by HAE, is already enabled (bsc#1045605)
sca-patterns-suma:
- Version update from 1.0 to 1.5.1 to implement the conversion of SCA Tool to Python3 (jsc#SLE-25064, jsc#SLE-24335):
* Convert SCA Tool from Python2 to Python3 (bsc#1191005, SLE-21579)
sca-server-report:
- Version update from 1.0.1 to 1.5.1 to implement the conversion of SCA Tool to Python3 (jsc#SLE-25064, jsc#SLE-24335):
* Convert SCA Tool from Python2 to Python3 (bsc#1191005, SLE-21579)
* Changed absolute paths to relative ones (bsc#1186316)
* Changed required dependencies from python to python3-base (bsc#1191199)
* Ensure that the legacy SuSE-release file works (bsc#1196730)
* Fix sca report header supportconfig file (bsc#1186442)
* Fix the report file output path (bsc#1180894)
* Removed preprocessor elements for OES Filr eDir (bsc#1186420)
sca-patterns-sle15:
- Version update from 1.0.1 to 1.5.1 to implement the conversion of SCA Tool to Python3 (jsc#SLE-25064, jsc#SLE-24335):
* Convert SCA Tool from Python2 to Python3 (bsc#1191005, SLE-21579)
* Added Video link to coredumpctl-000018634.py
* Added video links to patterns (bsc#1190460):
* bhc-scc-expired.py, bhc-scc-registered.py, bhc-diskused-00001.pl, bhc-memused-00001.pl
* Fixed crosstalk message strings (bsc#1186312)
* Fixed field reference in sle15all/lvm-00003.pl
* Fixed metadata tags in scc-registered.py
* Fixed percent used calculation for bhc-memused-00001.pl (bsc#1189889)
* Removed outdated TID2 link in bhc-diskused-00001.pl (bsc#1190260)
* Requires Core library 1.3.3 which contains Core.logFullFile function
* Updated registration link in bhc-scc-registered.py
* Updated renewal link in bhc-scc-expired.py
- New security announcement patterns:
* Apr 2022 (13) for SUSE-SU-2022:1293-1 SUSE-SU-2022:1313-1 SUSE-SU-2022:1250-1 SUSE-SU-2022:1108-1
SUSE-SU-2022:1292-1 SUSE-SU-2022:1313-1 SUSE-SU-2022:1448-1 SUSE-SU-2022:1250-1 SUSE-SU-2022:1255-1
SUSE-SU-2022:1255-1 SUSE-SU-2022:1288-1 SUSE-SU-2022:1427-1 SUSE-SU-2022:1139-1
* Mar 2022 (48) for SUSE-SU-2022:1293-1 SUSE-SU-2022:1313-1 SUSE-SU-2022:1250-1 SUSE-SU-2022:1108-1
SUSE-SU-2022:1292-1 SUSE-SU-2022:1313-1 SUSE-SU-2022:1448-1 SUSE-SU-2022:1250-1 SUSE-SU-2022:1255-1
SUSE-SU-2022:1255-1 SUSE-SU-2022:1288-1 SUSE-SU-2022:1427-1 SUSE-SU-2022:1139-1 SUSE-SU-2022:0931-1
SUSE-SU-2022:0703-1 SUSE-SU-2022:0779-1 SUSE-SU-2022:0695-1 SUSE-SU-2022:0826-1 SUSE-SU-2022:0825-1
SUSE-SU-2022:1058-1 SUSE-SU-2022:0679-1 SUSE-SU-2022:0853-1 SUSE-SU-2022:0819-1 SUSE-SU-2022:0778-1
SUSE-SU-2022:0676-1 SUSE-SU-2022:0725-1 SUSE-SU-2022:0754-1 SUSE-SU-2022:0929-1 SUSE-SU-2022:0732-1
SUSE-SU-2022:0703-1 SUSE-SU-2022:0810-1 SUSE-SU-2022:0694-1 SUSE-SU-2022:0826-1 SUSE-SU-2022:0825-1
SUSE-SU-2022:1057-1 SUSE-SU-2022:0679-1 SUSE-SU-2022:0851-1 SUSE-SU-2022:1041-1 SUSE-SU-2022:0819-1
SUSE-SU-2022:0778-1 SUSE-SU-2022:0676-1 SUSE-SU-2022:0725-1 SUSE-SU-2022:0754-1 SUSE-SU-2022:0766-1
SUSE-SU-2022:0766-1 SUSE-SU-2022:0933-1 SUSE-SU-2022:0934-1 SUSE-SU-2022:0929-1
* Feb 2022 (60) for SUSE-SU-2022:1293-1 SUSE-SU-2022:1313-1 SUSE-SU-2022:1250-1 SUSE-SU-2022:1108-1
SUSE-SU-2022:1292-1 SUSE-SU-2022:1313-1 SUSE-SU-2022:1448-1 SUSE-SU-2022:1250-1 SUSE-SU-2022:1255-1
SUSE-SU-2022:1255-1 SUSE-SU-2022:1288-1 SUSE-SU-2022:1427-1 SUSE-SU-2022:1139-1 SUSE-SU-2022:0931-1
SUSE-SU-2022:0703-1 SUSE-SU-2022:0779-1 SUSE-SU-2022:0695-1 SUSE-SU-2022:0826-1 SUSE-SU-2022:0825-1
SUSE-SU-2022:1058-1 SUSE-SU-2022:0679-1 SUSE-SU-2022:0853-1 SUSE-SU-2022:0819-1 SUSE-SU-2022:0778-1
SUSE-SU-2022:0676-1 SUSE-SU-2022:0725-1 SUSE-SU-2022:0754-1 SUSE-SU-2022:0929-1 SUSE-SU-2022:0732-1
SUSE-SU-2022:0703-1 SUSE-SU-2022:0810-1 SUSE-SU-2022:0694-1 SUSE-SU-2022:0826-1 SUSE-SU-2022:0825-1
SUSE-SU-2022:1057-1 SUSE-SU-2022:0679-1 SUSE-SU-2022:0851-1 SUSE-SU-2022:1041-1 SUSE-SU-2022:0819-1
SUSE-SU-2022:0778-1 SUSE-SU-2022:0676-1 SUSE-SU-2022:0725-1 SUSE-SU-2022:0754-1 SUSE-SU-2022:0766-1
SUSE-SU-2022:0766-1 SUSE-SU-2022:0933-1 SUSE-SU-2022:0934-1 SUSE-SU-2022:0929-1 SUSE-SU-2022:0277-1
SUSE-SU-2022:0283-1 SUSE-SU-2022:0500-1 SUSE-SU-2022:0468-1 SUSE-SU-2022:0541-1 SUSE-SU-2022:0284-1
SUSE-SU-2022:0563-1 SUSE-SU-2022:0500-1 SUSE-SU-2022:0563-1 SUSE-SU-2022:0301-1 SUSE-SU-2022:0367-1
SUSE-SU-2022:0367-1
* Jan 2022 (92) for SUSE-SU-2022:1293-1 SUSE-SU-2022:1313-1 SUSE-SU-2022:1250-1 SUSE-SU-2022:1108-1
SUSE-SU-2022:1292-1 SUSE-SU-2022:1313-1 SUSE-SU-2022:1448-1 SUSE-SU-2022:1250-1 SUSE-SU-2022:1255-1
SUSE-SU-2022:1255-1 SUSE-SU-2022:1288-1 SUSE-SU-2022:1427-1 SUSE-SU-2022:1139-1 SUSE-SU-2022:0931-1
SUSE-SU-2022:0703-1 SUSE-SU-2022:0779-1 SUSE-SU-2022:0695-1 SUSE-SU-2022:0826-1 SUSE-SU-2022:0825-1
SUSE-SU-2022:1058-1 SUSE-SU-2022:0679-1 SUSE-SU-2022:0853-1 SUSE-SU-2022:0819-1 SUSE-SU-2022:0778-1
SUSE-SU-2022:0676-1 SUSE-SU-2022:0725-1 SUSE-SU-2022:0754-1 SUSE-SU-2022:0929-1 SUSE-SU-2022:0732-1
SUSE-SU-2022:0703-1 SUSE-SU-2022:0810-1 SUSE-SU-2022:0694-1 SUSE-SU-2022:0826-1 SUSE-SU-2022:0825-1
SUSE-SU-2022:1057-1 SUSE-SU-2022:0679-1 SUSE-SU-2022:0851-1 SUSE-SU-2022:1041-1 SUSE-SU-2022:0819-1
SUSE-SU-2022:0778-1 SUSE-SU-2022:0676-1 SUSE-SU-2022:0725-1 SUSE-SU-2022:0754-1 SUSE-SU-2022:0766-1
SUSE-SU-2022:0766-1 SUSE-SU-2022:0933-1 SUSE-SU-2022:0934-1 SUSE-SU-2022:0929-1 SUSE-SU-2022:0277-1
SUSE-SU-2022:0283-1 SUSE-SU-2022:0500-1 SUSE-SU-2022:0468-1 SUSE-SU-2022:0541-1 SUSE-SU-2022:0284-1
SUSE-SU-2022:0563-1 SUSE-SU-2022:0500-1 SUSE-SU-2022:0563-1 SUSE-SU-2022:0301-1 SUSE-SU-2022:0367-1
SUSE-SU-2022:0367-1 SUSE-SU-2022:0043-1 SUSE-SU-2022:0177-1 SUSE-SU-2022:0064-1 SUSE-SU-2022:0134-1
SUSE-SU-2022:0141-1 SUSE-SU-2022:0050-1 SUSE-SU-2022:0021-1 SUSE-SU-2022:0069-1 SUSE-SU-2022:0198-1
SUSE-SU-2022:0131-1 SUSE-SU-2022:0088-1 SUSE-SU-2022:0144-1 SUSE-SU-2022:0151-1 SUSE-SU-2022:0091-1
SUSE-SU-2022:0091-1 SUSE-SU-2022:0183-1 SUSE-SU-2022:0211-1 SUSE-SU-2022:0191-1 SUSE-SU-2022:0050-1
SUSE-SU-2022:0137-1 SUSE-SU-2022:0214-1 SUSE-SU-2022:0128-1 SUSE-SU-2022:0119-1 SUSE-SU-2022:0183-1
SUSE-SU-2022:0211-1 SUSE-SU-2022:0251-1 SUSE-SU-2022:0200-1 SUSE-SU-2022:0191-1 SUSE-SU-2022:0137-1
SUSE-SU-2022:0214-1 SUSE-SU-2022:0031-1 SUSE-SU-2022:0119-1
* Jul 2021 (20) for SUSE-SU-2021:2457-1 SUSE-SU-2021:2410-1 SUSE-SU-2021:2442-1 SUSE-SU-2021:2352-1
SUSE-SU-2021:1863-2 SUSE-SU-2021:2415-1 SUSE-SU-2021:2555-1 SUSE-SU-2021:2439-1 SUSE-SU-2021:2459-1
SUSE-SU-2021:2291-1 SUSE-SU-2021:2457-1 SUSE-SU-2021:2404-1 SUSE-SU-2021:2474-1 SUSE-SU-2021:2471-1
SUSE-SU-2021:2438-1 SUSE-SU-2021:2325-1 SUSE-SU-2021:2439-1 SUSE-SU-2021:2461-1 SUSE-SU-2021:2421-1
SUSE-SU-2021:2470-1
* Jun 2021 (46) for SUSE-SU-2021:2011-1 SUSE-SU-2021:1933-1 SUSE-SU-2021:1998-1 SUSE-SU-2021:2106-1
SUSE-SU-2021:1951-1 SUSE-SU-2021:2213-1 SUSE-SU-2021:1942-1 SUSE-SU-2021:2012-1 SUSE-SU-2021:1859-1
SUSE-SU-2021:1843-1 SUSE-SU-2021:1825-1 SUSE-SU-2021:2196-1 SUSE-SU-2021:1917-1 SUSE-SU-2021:1958-1
SUSE-SU-2021:2184-1 SUSE-SU-2021:1977-1 SUSE-SU-2021:1819-1 SUSE-SU-2021:1944-1 SUSE-SU-2021:1834-1
SUSE-SU-2021:1826-1 SUSE-SU-2021:2127-1 SUSE-SU-2021:2011-1 SUSE-SU-2021:1933-1 SUSE-SU-2021:1999-1
SUSE-SU-2021:2106-1 SUSE-SU-2021:2212-1 SUSE-SU-2021:1893-1 SUSE-SU-2021:1859-1 SUSE-SU-2021:1994-1
SUSE-SU-2021:1970-1 SUSE-SU-2021:1843-1 SUSE-SU-2021:2196-1 SUSE-SU-2021:1917-1 SUSE-SU-2021:1958-1
SUSE-SU-2021:1890-1 SUSE-SU-2021:1819-1 SUSE-SU-2021:1834-1 SUSE-SU-2021:2127-1 SUSE-SU-2021:1901-1
SUSE-SU-2021:1911-1 SUSE-SU-2021:2104-1 SUSE-SU-2021:1895-1 SUSE-SU-2021:2155-1 SUSE-SU-2021:2122-1
SUSE-SU-2021:2211-1 SUSE-SU-2021:1845-1
* May 2021 (39) for SUSE-SU-2021:1557-1 SUSE-SU-2021:1806-1 SUSE-SU-2021:1785-1 SUSE-SU-2021:1466-1
SUSE-SU-2021:1491-1 SUSE-SU-2021:1577-1 SUSE-SU-2021:1654-1 SUSE-SU-2021:1523-1 SUSE-SU-2021:1765-1
SUSE-SU-2021:1755-1 SUSE-SU-2021:1599-1 SUSE-SU-2021:1761-1 SUSE-SU-2021:1655-1 SUSE-SU-2021:1598-1
SUSE-SU-2021:1762-1 SUSE-SU-2021:1474-1 SUSE-SU-2021:1493-1 SUSE-SU-2021:1557-1 SUSE-SU-2021:1806-1
SUSE-SU-2021:1785-1 SUSE-SU-2021:1466-1 SUSE-SU-2021:1491-1 SUSE-SU-2021:1577-1 SUSE-SU-2021:1654-1
SUSE-SU-2021:1523-1 SUSE-SU-2021:1765-1 SUSE-SU-2021:1755-1 SUSE-SU-2021:1574-1 SUSE-SU-2021:1599-1
SUSE-SU-2021:1761-1 SUSE-SU-2021:1636-1 SUSE-SU-2021:1655-1 SUSE-SU-2021:1598-1 SUSE-SU-2021:1762-1
SUSE-SU-2021:1474-1 SUSE-SU-2021:1493-1 SUSE-SU-2021:1500-1 SUSE-SU-2021:1792-1 SUSE-SU-2021:1573-1
* May 2021 (30) for SUSE-SU-2021:1182-1 SUSE-SU-2021:1430-1 SUSE-SU-2021:1168-1 SUSE-SU-2021:1408-1
SUSE-SU-2021:1409-1 SUSE-SU-2021:1182-1 SUSE-SU-2021:1028-1 SUSE-SU-2021:1166-1 SUSE-SU-2021:1430-1
SUSE-SU-2021:1113-1 SUSE-SU-2021:1444-1 SUSE-SU-2021:1280-1 SUSE-SU-2021:1243-1 SUSE-SU-2021:1168-1
SUSE-SU-2021:1408-1 SUSE-SU-2021:1094-1 SUSE-SU-2021:1029-1 SUSE-SU-2021:1238-1 SUSE-SU-2021:1409-1
SUSE-SU-2021:1006-1 SUSE-SU-2021:1161-1 SUSE-SU-2021:1108-1 SUSE-SU-2021:1282-1 SUSE-SU-2021:1179-1
SUSE-SU-2021:1153-1 SUSE-SU-2021:1445-1 SUSE-SU-2021:1244-1 SUSE-SU-2021:1292-1 SUSE-SU-2021:1103-1
SUSE-SU-2021:1455-1
- New regular patterns:
* sle15sp3/oldlvm-000019878.py, sle15sp2/oldlvm-000019878.py: Physical Volume is using an old PV header (bsc#1179170)
* sle15sp3/intelpstate_153-000020273.py: Frequency scaling driver intel_pstate not loading on some Intel Xeon
Scalable processors (bsc#1185758)
* sle15sp3/dasdkvm-000020295.py: DASD partitions not recognized on SUSE Linux Enterprise 15 Service Pack 3 KVM guest
* sle15sp2/rpmnfs-000020364.py, sle15sp3/rpmnfs-000020364.py: Upgrading an RPM reports cpio chmod failed
(bsc#1189394)
* sle15sp2/nfstimeout_152-000019943.py: Delayed outgoing packets causing NFS timeouts (bsc#1183405)
* sle15sp2/mpiopmem-000019884.py: Executing multipath -ll on Optane memory based pmem devices returns HDIO_GETGEO
failed with 25 (bsc#1182917)
* sle15sp2/ipmitool-000020250.py: hanging on getting cipher suites (bsc#1185684)
* sle15sp2/intelpstate_152-000020273.py: Frequency scaling driver intel_pstate not loading on some Intel Xeon Scalable
processors (bsc#1185758)
* sle15sp2/ghostcat_152-000019606.py: Ghostcat - Apache Tomcat AJP File Read/Inclusion Vulnerability (bsc#1164692)
* sle15sp2/fcoe-000019889.py: System with FCoE connected devices fails to boot randomly due to wicked ordering cycle
problems (bsc#1176140)
* sle15sp1/qlogic-000019630.py: System crashes when the system is rebooted with SR-IOV enabled QLogic cards
(bsc#1155990)
* sle15sp1/passthrough-000019579.py: Passthrough of Raid Controller to KVM guest results in NMI and unresponsiveness
on host (bsc#1152800)
* sle15sp1/nfsperf-151-000019615.py: Performance loss when writing large files over NFS (bsc#1163403)
* sle15sp1/nfsipv6_151-000019618.py: Timeout when attempting NFS mount over IPv6 (bsc#1144162)
* sle15sp1/nfit-000019688.py: dmesg shows NFIT related messages after updating the kernel (bsc#1159356)
* sle15sp1/namespace-000019571.py: Activation of multiple namespaces simultaneously may lead to an activation
failure (bsc#1157778)
* sle15sp1/ipmi-000019602.py: IPMI driver can be unloaded when being accessed by user space (bsc#1154768)
* sle15sp1/ghostcat_151-000019606.py: Ghostcat - Apache Tomcat AJP File Read/Inclusion Vulnerability (bsc#1164692)
* sle15sp1/edac-000019537.py: A kernel message shows EDAC amd64 Error F0 not found, device 0x1460 broken BIOS
(bsc#1131489)
* sle15sp1/docore_151-000019881.py: System crash in do_coredump() when a process is restarted (bsc#1177753)
* sle15sp0/mpiofindpaths-000019511.py: Using the find_multipaths yes option in multipath.conf (bsc#1138452)
* sle15sp0/ghostcat_150-000019606.py: Ghostcat - Apache Tomcat AJP File Read/Inclusion Vulnerability (bsc#1164692)
* sle15all/zypproxy-000020275.py: zypper commands return Error code HTTP response 0
* sle15all/vmcore-00002.pl: Detects the need for a kernel core analysis
* sle15all/vmcore-00001.pl: Identifies kernel core dumps for review
* sle15all/udevmac-000020260.py: systemd-udevd Could not generate persistent MAC address for br0 No such file or
directory (bsc#1185357)
* sle15all/systemd-current-failed-7017137.py: Check for failed systemd services
* sle15all/sysdjobs-000020261.py: Troubleshooting systemd jobs that are hung or stuck
* sle15all/softlock-000018705.py: soft lockup messages about
* sle15all/slapd-000019711.py: slapd.service not enabled/failed after upgrade from SUSE Linux Enterprise 11 Service
Pack 4 to SUSE Linux Enterprise 15 (bsc#1156353)
* sle15all/sizingbtrfs-000018798.py: How to resize/extend a btrfs formatted root partition
* sle15all/sdagentconfig-000020301.py: SCA Appliance configuration reports ERROR 2002 HY000 Cannot connect to MySQL
server (bsc#1183464)
* sle15all/scc-registered.py: Check system registration status
* sle15all/scc-expired.py: Identify if SCC registrations have expired
* sle15all/scatool-000020253.py: scatool fails to analyze supportconfigs with xz compression (bsc#1155181)
* sle15all/scatool-000004685.py: scatool fails with traceback
* sle15all/proxy-00003.pl: Checks for proxy environment variables
* sle15all/postfix-000020356.py: Postfix fails to start with IPv6 disabled
* sle15all/oomvsftpd-000020252.py: vsftpd and other processes terminated due to OOM scenario (bsc#1182905)
* sle15all/nobarrier-000020240.py: XFS nobarrier option has been completely deprecated starting from SUSE Linux
Enterprise 15 Service Pack 2 (bsc#1176375)
* sle15all/mysqlperf-000020354.py: mysqld segfault when the system is under stress (bsc#1186792)
* sle15all/lvmsnapshot-000019858.py: LVM snapshot changed state to Invalid and should be removed (bsc#1179170)
* sle15all/lvm-00005.pl: Duplicate volume groups are usually a configuration issue
* sle15all/lvm-00004.pl: LMV Check sum errors may indicate corrupted LVM metadata
* sle15all/lvm-00003.pl: Physical volumes can be removed or damaged and appear missing. This pattern looks for
missing physical volumes.
* sle15all/iscsimnts-000019648.py: Proper mount options for iSCSI drives
* sle15all/cronlimit-000020338.py: crontab - More than 1000 entries in crontab file, can't install (bsc#1187508)
* sle15all/coredumpctl-000018634.py: How to obtain systemd service core dumps
* sle15all/btrfsmaster-000018779.py: BTRFS Master TID
* sle15all/blacklist-000019607.py: System exit to emergency shell at boot with multipath enabled
* sle15all/bhc-scc.sh: Pattern removed (bsc#1184594, bsc#1186317)
* sle15all/acpid-000019708.py: acpid.service failed to start after upgrade (bsc#1158890)
* CVE-2020-0543: Special Register Buffer Data Sampling aka CrossTalk (bsc#1154824)
+ sle15sp2/crosstalk_152-000019643.py
+ sle15sp1/crosstalk_151-000019643.py
* CVE-2020-0548, CVE-2020-0549: L1D data cache eviction and Vector Register sampling (bsc#1156353)
+ sle15sp2/ucodeintel_152-000019635.py
+ sle15sp1/ucodeintel_151-000019635.py
+ sle15sp0/ucodeintel_150-000019635.py
- Renamed pattern files for filename standard
* Renamed patterns/SLE/sle15all/scc-expired.py to patterns/SLE/sle15all/bhc-scc-expired.py
* Renamed /SLE/sle15all/scc-registered.py to patterns/SLE/sle15all/bhc-scc-registered.py
- Updated regular patterns:
* sle15all/lvm-00003.pl: Physical volumes can be removed or damaged and appear missing. This pattern looks for
missing physical volumes
sca-patterns-sle12:
- Version update from 1.0.2 to 1.5.1 to implement the conversion of SCA Tool to Python3 (jsc#SLE-25064, jsc#SLE-24335):
* Convert SCA Tool from Python2 to Python3 (bsc#1191005, SLE-21579)
* Added Video link to coredumpctl-000018634.py
* Added video links to patterns (bsc#1190460):
+ bhc-scc-expired.py, bhc-scc-registered.py, bhc-diskused-00001.pl, bhc-memused-00001.pl
* Fixed crosstalk message strings (bsc#1186312)
* Fixed metadata tags for scc-registered.py
* Removed outdated TID2 link in bhc-diskused-00001.pl (bsc#1190260)
* Requires Core library 1.3.3 which contains Core.logFullFile function
* Updated registration link in bhc-scc-registered.py
* Updated renewal link in bhc-scc-expired.py
* Updated scc-registered.py pattern to fix registration detection
- New security announcement patterns:
* Apr 2022 (53) for SUSE-SU-2022:1254-1 SUSE-SU-2022:1160-1 SUSE-SU-2022:1294-1 SUSE-SU-2022:1151-1
SUSE-SU-2022:1094-1 SUSE-SU-2022:1129-1 SUSE-SU-2022:1478-1 SUSE-SU-2022:1113-1 SUSE-SU-2022:1308-1
SUSE-SU-2022:1168-1 SUSE-SU-2022:1312-1 SUSE-SU-2022:1272-1 SUSE-SU-2022:1217-1 SUSE-SU-2022:1266-1
SUSE-SU-2022:1474-1 SUSE-SU-2022:1475-1 SUSE-SU-2022:1306-1 SUSE-SU-2022:1289-1 SUSE-SU-2022:1429-1
SUSE-SU-2022:1417-1 SUSE-SU-2022:1160-1 SUSE-SU-2022:1285-1 SUSE-SU-2022:1105-1 SUSE-SU-2022:1294-1
SUSE-SU-2022:1258-1 SUSE-SU-2022:1129-1 SUSE-SU-2022:1113-1 SUSE-SU-2022:1308-1 SUSE-SU-2022:1168-1
SUSE-SU-2022:1312-1 SUSE-SU-2022:1217-1 SUSE-SU-2022:1267-1 SUSE-SU-2022:1267-1 SUSE-SU-2022:1275-1
SUSE-SU-2022:1306-1 SUSE-SU-2022:1289-1 SUSE-SU-2022:1429-1 SUSE-SU-2022:1160-1 SUSE-SU-2022:1408-1
SUSE-SU-2022:1294-1 SUSE-SU-2022:1129-1 SUSE-SU-2022:1113-1 SUSE-SU-2022:1308-1 SUSE-SU-2022:1168-1
SUSE-SU-2022:1440-1 SUSE-SU-2022:1312-1 SUSE-SU-2022:1270-1 SUSE-SU-2022:1270-1 SUSE-SU-2022:1275-1
SUSE-SU-2022:1123-1 SUSE-SU-2022:1306-1 SUSE-SU-2022:1289-1 SUSE-SU-2022:1428-1
* Mar 2022 (127) for SUSE-SU-2022:1254-1 SUSE-SU-2022:1160-1 SUSE-SU-2022:1294-1 SUSE-SU-2022:1151-1
SUSE-SU-2022:1094-1 SUSE-SU-2022:1129-1 SUSE-SU-2022:1478-1 SUSE-SU-2022:1113-1 SUSE-SU-2022:1308-1
SUSE-SU-2022:1168-1 SUSE-SU-2022:1312-1 SUSE-SU-2022:1272-1 SUSE-SU-2022:1217-1 SUSE-SU-2022:1266-1
SUSE-SU-2022:1474-1 SUSE-SU-2022:1475-1 SUSE-SU-2022:1306-1 SUSE-SU-2022:1289-1 SUSE-SU-2022:1429-1
SUSE-SU-2022:1417-1 SUSE-SU-2022:1160-1 SUSE-SU-2022:1285-1 SUSE-SU-2022:1105-1 SUSE-SU-2022:1294-1
SUSE-SU-2022:1258-1 SUSE-SU-2022:1129-1 SUSE-SU-2022:1113-1 SUSE-SU-2022:1308-1 SUSE-SU-2022:1168-1
SUSE-SU-2022:1312-1 SUSE-SU-2022:1217-1 SUSE-SU-2022:1267-1 SUSE-SU-2022:1267-1 SUSE-SU-2022:1275-1
SUSE-SU-2022:1306-1 SUSE-SU-2022:1289-1 SUSE-SU-2022:1429-1 SUSE-SU-2022:1160-1 SUSE-SU-2022:1408-1
SUSE-SU-2022:1294-1 SUSE-SU-2022:1129-1 SUSE-SU-2022:1113-1 SUSE-SU-2022:1308-1 SUSE-SU-2022:1168-1
SUSE-SU-2022:1440-1 SUSE-SU-2022:1312-1 SUSE-SU-2022:1270-1 SUSE-SU-2022:1270-1 SUSE-SU-2022:1275-1
SUSE-SU-2022:1123-1 SUSE-SU-2022:1306-1 SUSE-SU-2022:1289-1 SUSE-SU-2022:1428-1 SUSE-SU-2022:0733-1
SUSE-SU-2022:1023-1 SUSE-SU-2022:0939-1 SUSE-SU-2022:0811-1 SUSE-SU-2022:0690-1 SUSE-SU-2022:0784-1
SUSE-SU-2022:0895-1 SUSE-SU-2022:0860-1 SUSE-SU-2022:0857-1 SUSE-SU-2022:0822-1 SUSE-SU-2022:0777-1
SUSE-SU-2022:0782-1 SUSE-SU-2022:0820-1 SUSE-SU-2022:0913-1 SUSE-SU-2022:1026-1 SUSE-SU-2022:1025-1
SUSE-SU-2022:1024-1 SUSE-SU-2022:0765-1 SUSE-SU-2022:0910-1 SUSE-SU-2022:0871-1 SUSE-SU-2022:0730-1
SUSE-SU-2022:0678-1 SUSE-SU-2022:0677-1 SUSE-SU-2022:0842-1 SUSE-SU-2022:0698-1 SUSE-SU-2022:0908-1
SUSE-SU-2022:0881-1 SUSE-SU-2022:0928-1 SUSE-SU-2022:0733-1 SUSE-SU-2022:1062-1 SUSE-SU-2022:0811-1
SUSE-SU-2022:0690-1 SUSE-SU-2022:0784-1 SUSE-SU-2022:0860-1 SUSE-SU-2022:0857-1 SUSE-SU-2022:0822-1
SUSE-SU-2022:0777-1 SUSE-SU-2022:0782-1 SUSE-SU-2022:0820-1 SUSE-SU-2022:1026-1 SUSE-SU-2022:1025-1
SUSE-SU-2022:1024-1 SUSE-SU-2022:0910-1 SUSE-SU-2022:0871-1 SUSE-SU-2022:0842-1 SUSE-SU-2022:0698-1
SUSE-SU-2022:0908-1 SUSE-SU-2022:0918-1 SUSE-SU-2022:0733-1 SUSE-SU-2022:1043-1 SUSE-SU-2022:0811-1
SUSE-SU-2022:0690-1 SUSE-SU-2022:0854-1 SUSE-SU-2022:0822-1 SUSE-SU-2022:0777-1 SUSE-SU-2022:0820-1
SUSE-SU-2022:1036-1 SUSE-SU-2022:1026-1 SUSE-SU-2022:1025-1 SUSE-SU-2022:1024-1 SUSE-SU-2022:1012-1
SUSE-SU-2022:1003-1 SUSE-SU-2022:0668-1 SUSE-SU-2022:0667-1 SUSE-SU-2022:0653-1 SUSE-SU-2022:0762-1
SUSE-SU-2022:0762-1 SUSE-SU-2022:0871-1 SUSE-SU-2022:0909-1 SUSE-SU-2022:0842-1 SUSE-SU-2022:0698-1
SUSE-SU-2022:0918-1 SUSE-SU-2022:1044-1 SUSE-SU-2022:0882-1
* Feb 2022 (169) for SUSE-SU-2022:1254-1 SUSE-SU-2022:1160-1 SUSE-SU-2022:1294-1 SUSE-SU-2022:1151-1
SUSE-SU-2022:1094-1 SUSE-SU-2022:1129-1 SUSE-SU-2022:1478-1 SUSE-SU-2022:1113-1 SUSE-SU-2022:1308-1
SUSE-SU-2022:1168-1 SUSE-SU-2022:1312-1 SUSE-SU-2022:1272-1 SUSE-SU-2022:1217-1 SUSE-SU-2022:1266-1
SUSE-SU-2022:1474-1 SUSE-SU-2022:1475-1 SUSE-SU-2022:1306-1 SUSE-SU-2022:1289-1 SUSE-SU-2022:1429-1
SUSE-SU-2022:1417-1 SUSE-SU-2022:1160-1 SUSE-SU-2022:1285-1 SUSE-SU-2022:1105-1 SUSE-SU-2022:1294-1
SUSE-SU-2022:1258-1 SUSE-SU-2022:1129-1 SUSE-SU-2022:1113-1 SUSE-SU-2022:1308-1 SUSE-SU-2022:1168-1
SUSE-SU-2022:1312-1 SUSE-SU-2022:1217-1 SUSE-SU-2022:1267-1 SUSE-SU-2022:1267-1 SUSE-SU-2022:1275-1
SUSE-SU-2022:1306-1 SUSE-SU-2022:1289-1 SUSE-SU-2022:1429-1 SUSE-SU-2022:1160-1 SUSE-SU-2022:1408-1
SUSE-SU-2022:1294-1 SUSE-SU-2022:1129-1 SUSE-SU-2022:1113-1 SUSE-SU-2022:1308-1 SUSE-SU-2022:1168-1
SUSE-SU-2022:1440-1 SUSE-SU-2022:1312-1 SUSE-SU-2022:1270-1 SUSE-SU-2022:1270-1 SUSE-SU-2022:1275-1
SUSE-SU-2022:1123-1 SUSE-SU-2022:1306-1 SUSE-SU-2022:1289-1 SUSE-SU-2022:1428-1 SUSE-SU-2022:0733-1
SUSE-SU-2022:1023-1 SUSE-SU-2022:0939-1 SUSE-SU-2022:0811-1 SUSE-SU-2022:0690-1 SUSE-SU-2022:0784-1
SUSE-SU-2022:0895-1 SUSE-SU-2022:0860-1 SUSE-SU-2022:0857-1 SUSE-SU-2022:0822-1 SUSE-SU-2022:0777-1
SUSE-SU-2022:0782-1 SUSE-SU-2022:0820-1 SUSE-SU-2022:0913-1 SUSE-SU-2022:1026-1 SUSE-SU-2022:1025-1
SUSE-SU-2022:1024-1 SUSE-SU-2022:0765-1 SUSE-SU-2022:0910-1 SUSE-SU-2022:0871-1 SUSE-SU-2022:0730-1
SUSE-SU-2022:0678-1 SUSE-SU-2022:0677-1 SUSE-SU-2022:0842-1 SUSE-SU-2022:0698-1 SUSE-SU-2022:0908-1
SUSE-SU-2022:0881-1 SUSE-SU-2022:0928-1 SUSE-SU-2022:0733-1 SUSE-SU-2022:1062-1 SUSE-SU-2022:0811-1
SUSE-SU-2022:0690-1 SUSE-SU-2022:0784-1 SUSE-SU-2022:0860-1 SUSE-SU-2022:0857-1 SUSE-SU-2022:0822-1
SUSE-SU-2022:0777-1 SUSE-SU-2022:0782-1 SUSE-SU-2022:0820-1 SUSE-SU-2022:1026-1 SUSE-SU-2022:1025-1
SUSE-SU-2022:1024-1 SUSE-SU-2022:0910-1 SUSE-SU-2022:0871-1 SUSE-SU-2022:0842-1 SUSE-SU-2022:0698-1
SUSE-SU-2022:0908-1 SUSE-SU-2022:0918-1 SUSE-SU-2022:0733-1 SUSE-SU-2022:1043-1 SUSE-SU-2022:0811-1
SUSE-SU-2022:0690-1 SUSE-SU-2022:0854-1 SUSE-SU-2022:0822-1 SUSE-SU-2022:0777-1 SUSE-SU-2022:0820-1
SUSE-SU-2022:1036-1 SUSE-SU-2022:1026-1 SUSE-SU-2022:1025-1 SUSE-SU-2022:1024-1 SUSE-SU-2022:1012-1
SUSE-SU-2022:1003-1 SUSE-SU-2022:0668-1 SUSE-SU-2022:0667-1 SUSE-SU-2022:0653-1 SUSE-SU-2022:0762-1
SUSE-SU-2022:0762-1 SUSE-SU-2022:0871-1 SUSE-SU-2022:0909-1 SUSE-SU-2022:0842-1 SUSE-SU-2022:0698-1
SUSE-SU-2022:0918-1 SUSE-SU-2022:1044-1 SUSE-SU-2022:0882-1 SUSE-SU-2022:0542-1 SUSE-SU-2022:0469-1
SUSE-SU-2022:0504-1 SUSE-SU-2022:0478-1 SUSE-SU-2022:0576-1 SUSE-SU-2022:0496-1 SUSE-SU-2022:0505-1
SUSE-SU-2022:0323-1 SUSE-SU-2022:0565-1 SUSE-SU-2022:0441-1 SUSE-SU-2022:0372-1 SUSE-SU-2022:0561-1
SUSE-SU-2022:0495-1 SUSE-SU-2022:0440-1 SUSE-SU-2022:0542-1 SUSE-SU-2022:0331-1 SUSE-SU-2022:0478-1
SUSE-SU-2022:0575-1 SUSE-SU-2022:0496-1 SUSE-SU-2022:0505-1 SUSE-SU-2022:0565-1 SUSE-SU-2022:0441-1
SUSE-SU-2022:0271-1 SUSE-SU-2022:0495-1 SUSE-SU-2022:0358-1 SUSE-SU-2022:0542-1 SUSE-SU-2022:0359-1
SUSE-SU-2022:0478-1 SUSE-SU-2022:0575-1 SUSE-SU-2022:0496-1 SUSE-SU-2022:0505-1 SUSE-SU-2022:0565-1
SUSE-SU-2022:0552-1 SUSE-SU-2022:0329-1 SUSE-SU-2022:0328-1 SUSE-SU-2022:0327-1 SUSE-SU-2022:0325-1
SUSE-SU-2022:0271-1 SUSE-SU-2022:0362-1 SUSE-SU-2022:0362-1 SUSE-SU-2022:0495-1 SUSE-SU-2022:0358-1
* Jan 2022 (218) for SUSE-SU-2022:1254-1 SUSE-SU-2022:1160-1 SUSE-SU-2022:1294-1 SUSE-SU-2022:1151-1
SUSE-SU-2022:1094-1 SUSE-SU-2022:1129-1 SUSE-SU-2022:1478-1 SUSE-SU-2022:1113-1 SUSE-SU-2022:1308-1
SUSE-SU-2022:1168-1 SUSE-SU-2022:1312-1 SUSE-SU-2022:1272-1 SUSE-SU-2022:1217-1 SUSE-SU-2022:1266-1
SUSE-SU-2022:1474-1 SUSE-SU-2022:1475-1 SUSE-SU-2022:1306-1 SUSE-SU-2022:1289-1 SUSE-SU-2022:1429-1
SUSE-SU-2022:1417-1 SUSE-SU-2022:1160-1 SUSE-SU-2022:1285-1 SUSE-SU-2022:1105-1 SUSE-SU-2022:1294-1
SUSE-SU-2022:1258-1 SUSE-SU-2022:1129-1 SUSE-SU-2022:1113-1 SUSE-SU-2022:1308-1 SUSE-SU-2022:1168-1
SUSE-SU-2022:1312-1 SUSE-SU-2022:1217-1 SUSE-SU-2022:1267-1 SUSE-SU-2022:1267-1 SUSE-SU-2022:1275-1
SUSE-SU-2022:1306-1 SUSE-SU-2022:1289-1 SUSE-SU-2022:1429-1 SUSE-SU-2022:1160-1 SUSE-SU-2022:1408-1
SUSE-SU-2022:1294-1 SUSE-SU-2022:1129-1 SUSE-SU-2022:1113-1 SUSE-SU-2022:1308-1 SUSE-SU-2022:1168-1
SUSE-SU-2022:1440-1 SUSE-SU-2022:1312-1 SUSE-SU-2022:1270-1 SUSE-SU-2022:1270-1 SUSE-SU-2022:1275-1
SUSE-SU-2022:1123-1 SUSE-SU-2022:1306-1 SUSE-SU-2022:1289-1 SUSE-SU-2022:1428-1 SUSE-SU-2022:0733-1
SUSE-SU-2022:1023-1 SUSE-SU-2022:0939-1 SUSE-SU-2022:0811-1 SUSE-SU-2022:0690-1 SUSE-SU-2022:0784-1
SUSE-SU-2022:0895-1 SUSE-SU-2022:0860-1 SUSE-SU-2022:0857-1 SUSE-SU-2022:0822-1 SUSE-SU-2022:0777-1
SUSE-SU-2022:0782-1 SUSE-SU-2022:0820-1 SUSE-SU-2022:0913-1 SUSE-SU-2022:1026-1 SUSE-SU-2022:1025-1
SUSE-SU-2022:1024-1 SUSE-SU-2022:0765-1 SUSE-SU-2022:0910-1 SUSE-SU-2022:0871-1 SUSE-SU-2022:0730-1
SUSE-SU-2022:0678-1 SUSE-SU-2022:0677-1 SUSE-SU-2022:0842-1 SUSE-SU-2022:0698-1 SUSE-SU-2022:0908-1
SUSE-SU-2022:0881-1 SUSE-SU-2022:0928-1 SUSE-SU-2022:0733-1 SUSE-SU-2022:1062-1 SUSE-SU-2022:0811-1
SUSE-SU-2022:0690-1 SUSE-SU-2022:0784-1 SUSE-SU-2022:0860-1 SUSE-SU-2022:0857-1 SUSE-SU-2022:0822-1
SUSE-SU-2022:0777-1 SUSE-SU-2022:0782-1 SUSE-SU-2022:0820-1 SUSE-SU-2022:1026-1 SUSE-SU-2022:1025-1
SUSE-SU-2022:1024-1 SUSE-SU-2022:0910-1 SUSE-SU-2022:0871-1 SUSE-SU-2022:0842-1 SUSE-SU-2022:0698-1
SUSE-SU-2022:0908-1 SUSE-SU-2022:0918-1 SUSE-SU-2022:0733-1 SUSE-SU-2022:1043-1 SUSE-SU-2022:0811-1
SUSE-SU-2022:0690-1 SUSE-SU-2022:0854-1 SUSE-SU-2022:0822-1 SUSE-SU-2022:0777-1 SUSE-SU-2022:0820-1
SUSE-SU-2022:1036-1 SUSE-SU-2022:1026-1 SUSE-SU-2022:1025-1 SUSE-SU-2022:1024-1 SUSE-SU-2022:1012-1
SUSE-SU-2022:1003-1 SUSE-SU-2022:0668-1 SUSE-SU-2022:0667-1 SUSE-SU-2022:0653-1 SUSE-SU-2022:0762-1
SUSE-SU-2022:0762-1 SUSE-SU-2022:0871-1 SUSE-SU-2022:0909-1 SUSE-SU-2022:0842-1 SUSE-SU-2022:0698-1
SUSE-SU-2022:0918-1 SUSE-SU-2022:1044-1 SUSE-SU-2022:0882-1 SUSE-SU-2022:0542-1 SUSE-SU-2022:0469-1
SUSE-SU-2022:0504-1 SUSE-SU-2022:0478-1 SUSE-SU-2022:0576-1 SUSE-SU-2022:0496-1 SUSE-SU-2022:0505-1
SUSE-SU-2022:0323-1 SUSE-SU-2022:0565-1 SUSE-SU-2022:0441-1 SUSE-SU-2022:0372-1 SUSE-SU-2022:0561-1
SUSE-SU-2022:0495-1 SUSE-SU-2022:0440-1 SUSE-SU-2022:0542-1 SUSE-SU-2022:0331-1 SUSE-SU-2022:0478-1
SUSE-SU-2022:0575-1 SUSE-SU-2022:0496-1 SUSE-SU-2022:0505-1 SUSE-SU-2022:0565-1 SUSE-SU-2022:0441-1
SUSE-SU-2022:0271-1 SUSE-SU-2022:0495-1 SUSE-SU-2022:0358-1 SUSE-SU-2022:0542-1 SUSE-SU-2022:0359-1
SUSE-SU-2022:0478-1 SUSE-SU-2022:0575-1 SUSE-SU-2022:0496-1 SUSE-SU-2022:0505-1 SUSE-SU-2022:0565-1
SUSE-SU-2022:0552-1 SUSE-SU-2022:0329-1 SUSE-SU-2022:0328-1 SUSE-SU-2022:0327-1 SUSE-SU-2022:0325-1
SUSE-SU-2022:0271-1 SUSE-SU-2022:0362-1 SUSE-SU-2022:0362-1 SUSE-SU-2022:0495-1 SUSE-SU-2022:0358-1
SUSE-SU-2022:0161-1 SUSE-SU-2022:0142-1 SUSE-SU-2022:0110-1 SUSE-SU-2022:0202-1 SUSE-SU-2022:0060-1
SUSE-SU-2022:0118-1 SUSE-SU-2022:0189-1 SUSE-SU-2022:0061-1 SUSE-SU-2022:0030-1 SUSE-SU-2022:0115-1
SUSE-SU-2022:0212-1 SUSE-SU-2022:0032-1 SUSE-SU-2022:0034-1 SUSE-SU-2022:0080-1 SUSE-SU-2022:0068-1
SUSE-SU-2022:0166-1 SUSE-SU-2022:0107-1 SUSE-SU-2022:0081-1 SUSE-SU-2022:0179-1 SUSE-SU-2022:0160-1
SUSE-SU-2022:0145-1 SUSE-SU-2022:0161-1 SUSE-SU-2022:0142-1 SUSE-SU-2022:0202-1 SUSE-SU-2022:0189-1
SUSE-SU-2022:0030-1 SUSE-SU-2022:0115-1 SUSE-SU-2022:0212-1 SUSE-SU-2022:0042-1 SUSE-SU-2022:0034-1
SUSE-SU-2022:0166-1 SUSE-SU-2022:0107-1 SUSE-SU-2022:0179-1 SUSE-SU-2022:0065-1 SUSE-SU-2022:0145-1
SUSE-SU-2022:0161-1 SUSE-SU-2022:0142-1 SUSE-SU-2022:0202-1 SUSE-SU-2022:0189-1 SUSE-SU-2022:0030-1
SUSE-SU-2022:0115-1 SUSE-SU-2022:0212-1 SUSE-SU-2022:0041-1 SUSE-SU-2022:0034-1 SUSE-SU-2022:0166-1
SUSE-SU-2022:0107-1 SUSE-SU-2022:0179-1 SUSE-SU-2022:0065-1 SUSE-SU-2022:0145-1
* Jun 2021 (80) for SUSE-SU-2021:2014-1 SUSE-SU-2021:1990-1 SUSE-SU-2021:1929-1 SUSE-SU-2021:1838-1
SUSE-SU-2021:1906-1 SUSE-SU-2021:1880-1 SUSE-SU-2021:1837-1 SUSE-SU-2021:1842-1 SUSE-SU-2021:2152-1
SUSE-SU-2021:2159-1 SUSE-SU-2021:1886-1 SUSE-SU-2021:1892-1 SUSE-SU-2021:1830-1 SUSE-SU-2021:2180-1
SUSE-SU-2021:2135-1 SUSE-SU-2021:1957-1 SUSE-SU-2021:2156-1 SUSE-SU-2021:2016-1 SUSE-SU-2021:1913-1
SUSE-SU-2021:1887-1 SUSE-SU-2021:1980-1 SUSE-SU-2021:1875-1 SUSE-SU-2021:1959-1 SUSE-SU-2021:1822-1
SUSE-SU-2021:2137-1 SUSE-SU-2021:1943-1 SUSE-SU-2021:2175-1 SUSE-SU-2021:2006-1 SUSE-SU-2021:1900-1
SUSE-SU-2021:2014-1 SUSE-SU-2021:1990-1 SUSE-SU-2021:1930-1 SUSE-SU-2021:1906-1 SUSE-SU-2021:1947-1
SUSE-SU-2021:1842-1 SUSE-SU-2021:2152-1 SUSE-SU-2021:2159-1 SUSE-SU-2021:1886-1 SUSE-SU-2021:1892-1
SUSE-SU-2021:1830-1 SUSE-SU-2021:2180-1 SUSE-SU-2021:2135-1 SUSE-SU-2021:2156-1 SUSE-SU-2021:1891-1
SUSE-SU-2021:1980-1 SUSE-SU-2021:1875-1 SUSE-SU-2021:1960-1 SUSE-SU-2021:1822-1 SUSE-SU-2021:1943-1
SUSE-SU-2021:1494-2 SUSE-SU-2021:2175-1 SUSE-SU-2021:2006-1 SUSE-SU-2021:1900-1 SUSE-SU-2021:2014-1
SUSE-SU-2021:1990-1 SUSE-SU-2021:1930-1 SUSE-SU-2021:1906-1 SUSE-SU-2021:1894-1 SUSE-SU-2021:1842-1
SUSE-SU-2021:2119-1 SUSE-SU-2021:2159-1 SUSE-SU-2021:1886-1 SUSE-SU-2021:1892-1 SUSE-SU-2021:1830-1
SUSE-SU-2021:2180-1 SUSE-SU-2021:2135-1 SUSE-SU-2021:2156-1 SUSE-SU-2021:2060-1 SUSE-SU-2021:2042-1
SUSE-SU-2021:2026-1 SUSE-SU-2021:1870-1 SUSE-SU-2021:1865-1 SUSE-SU-2021:1980-1 SUSE-SU-2021:1875-1
SUSE-SU-2021:1960-1 SUSE-SU-2021:1822-1 SUSE-SU-2021:1943-1 SUSE-SU-2021:1494-2 SUSE-SU-2021:2175-1
SUSE-SU-2021:2006-1
* May 2021 (39) for SUSE-SU-2021:1580-1 SUSE-SU-2021:1621-1 SUSE-SU-2021:1490-1 SUSE-SU-2021:1783-1
SUSE-SU-2021:1782-1 SUSE-SU-2021:1576-1 SUSE-SU-2021:1658-1 SUSE-SU-2021:1524-1 SUSE-SU-2021:1766-1
SUSE-SU-2021:1595-1 SUSE-SU-2021:1572-1 SUSE-SU-2021:1760-1 SUSE-SU-2021:1646-1 SUSE-SU-2021:1813-1
SUSE-SU-2021:1645-1 SUSE-SU-2021:1763-1 SUSE-SU-2021:1468-1 SUSE-SU-2021:1494-1 SUSE-SU-2021:1648-1
SUSE-SU-2021:1492-1 SUSE-SU-2021:1621-1 SUSE-SU-2021:1658-1 SUSE-SU-2021:1596-1 SUSE-SU-2021:1646-1
SUSE-SU-2021:1813-1 SUSE-SU-2021:1645-1 SUSE-SU-2021:1786-1 SUSE-SU-2021:1468-1 SUSE-SU-2021:1492-1
SUSE-SU-2021:1621-1 SUSE-SU-2021:1658-1 SUSE-SU-2021:1623-1 SUSE-SU-2021:1646-1 SUSE-SU-2021:1813-1
SUSE-SU-2021:1645-1 SUSE-SU-2021:1469-1 SUSE-SU-2021:1621-1 SUSE-SU-2021:1617-1 SUSE-SU-2021:1469-1
* Apr 2021 (69) for SUSE-SU-2021:1181-1 SUSE-SU-2021:1023-1 SUSE-SU-2021:1274-1 SUSE-SU-2021:1438-1
SUSE-SU-2021:1242-1 SUSE-SU-2021:1401-1 SUSE-SU-2021:1399-1 SUSE-SU-2021:1396-1 SUSE-SU-2021:1325-1
SUSE-SU-2021:1152-1 SUSE-SU-2021:1125-1 SUSE-SU-2021:1248-1 SUSE-SU-2021:1210-1 SUSE-SU-2021:1175-1
SUSE-SU-2021:1435-1 SUSE-SU-2021:1314-1 SUSE-SU-2021:1277-1 SUSE-SU-2021:1030-1 SUSE-SU-2021:1165-1
SUSE-SU-2021:1111-1 SUSE-SU-2021:1453-1 SUSE-SU-2021:1174-1 SUSE-SU-2021:1159-1 SUSE-SU-2021:1315-1
SUSE-SU-2021:1180-1 SUSE-SU-2021:1251-1 SUSE-SU-2021:1273-1 SUSE-SU-2021:1241-1 SUSE-SU-2021:1429-1
SUSE-SU-2021:1401-1 SUSE-SU-2021:1399-1 SUSE-SU-2021:1325-1 SUSE-SU-2021:1152-1 SUSE-SU-2021:1435-1
SUSE-SU-2021:1165-1 SUSE-SU-2021:1111-1 SUSE-SU-2021:1453-1 SUSE-SU-2021:1189-1 SUSE-SU-2021:1187-1
SUSE-SU-2021:1252-1 SUSE-SU-2021:1431-1 SUSE-SU-2021:1273-1 SUSE-SU-2021:1240-1 SUSE-SU-2021:1401-1
SUSE-SU-2021:1399-1 SUSE-SU-2021:1373-1 SUSE-SU-2021:1341-1 SUSE-SU-2021:1325-1 SUSE-SU-2021:1152-1
SUSE-SU-2021:1075-1 SUSE-SU-2021:1074-1 SUSE-SU-2021:1435-1 SUSE-SU-2021:1111-1 SUSE-SU-2021:1453-1
SUSE-SU-2021:1189-1 SUSE-SU-2021:1187-1 SUSE-SU-2021:1431-1 SUSE-SU-2021:1267-1 SUSE-SU-2021:1442-1
SUSE-SU-2021:1439-1 SUSE-SU-2021:1305-1 SUSE-SU-2021:1401-1 SUSE-SU-2021:1399-1 SUSE-SU-2021:1325-1
SUSE-SU-2021:1152-1 SUSE-SU-2021:1148-1 SUSE-SU-2021:1145-1 SUSE-SU-2021:1453-1 SUSE-SU-2021:1189-1
* Mar 2021 New Security Announcement Patterns (79) for SUSE-SU-2021:0990-1 SUSE-SU-2021:0720-1
SUSE-SU-2021:0929-1 SUSE-SU-2021:0988-1 SUSE-SU-2021:0975-1 SUSE-SU-2021:0776-1 SUSE-SU-2021:0794-1
SUSE-SU-2021:0886-1 SUSE-SU-2021:0887-1 SUSE-SU-2021:0675-1 SUSE-SU-2021:0987-1 SUSE-SU-2021:0954-1
SUSE-SU-2021:0752-1 SUSE-SU-2021:0725-1 SUSE-SU-2021:0998-1 SUSE-SU-2021:0693-1 SUSE-SU-2021:0663-1
SUSE-SU-2021:0932-1 SUSE-SU-2021:0999-1 SUSE-SU-2021:0667-1 SUSE-SU-2021:0742-1 SUSE-SU-2021:0739-1
SUSE-SU-2021:0681-1 SUSE-SU-2021:0801-1 SUSE-SU-2021:0756-1 SUSE-SU-2021:0713-1 SUSE-SU-2021:0779-1
SUSE-SU-2021:0745-1 SUSE-SU-2021:0929-1 SUSE-SU-2021:0988-1 SUSE-SU-2021:0794-1 SUSE-SU-2021:0675-1
SUSE-SU-2020:2173-2 SUSE-SU-2021:0954-1 SUSE-SU-2021:0752-1 SUSE-SU-2021:0725-1 SUSE-SU-2021:0693-1
SUSE-SU-2021:0663-1 SUSE-SU-2021:0932-1 SUSE-SU-2021:0999-1 SUSE-SU-2021:0667-1 SUSE-SU-2021:0736-1
SUSE-SU-2021:0681-1 SUSE-SU-2021:0801-1 SUSE-SU-2021:0756-1 SUSE-SU-2021:0745-1 SUSE-SU-2021:0929-1
SUSE-SU-2021:0794-1 SUSE-SU-2021:0675-1 SUSE-SU-2020:2173-2 SUSE-SU-2021:0939-1 SUSE-SU-2021:0693-1
SUSE-SU-2021:0932-1 SUSE-SU-2021:0999-1 SUSE-SU-2021:0667-1 SUSE-SU-2021:0870-1 SUSE-SU-2021:0835-1
SUSE-SU-2021:0743-1 SUSE-SU-2021:0682-1 SUSE-SU-2021:0801-1 SUSE-SU-2021:0756-1 SUSE-SU-2021:0745-1
SUSE-SU-2021:0929-1 SUSE-SU-2021:0928-1 SUSE-SU-2021:0794-1 SUSE-SU-2021:0675-1 SUSE-SU-2020:2173-2
SUSE-SU-2021:0939-1 SUSE-SU-2021:0693-1 SUSE-SU-2021:0932-1 SUSE-SU-2021:0999-1 SUSE-SU-2021:0999-1
SUSE-SU-2021:0667-1 SUSE-SU-2021:0870-1 SUSE-SU-2021:0835-1 SUSE-SU-2021:0744-1 SUSE-SU-2021:0679-1
SUSE-SU-2021:0801-1 SUSE-SU-2021:0756-1
- New regular patterns:
* sle12sp5/vmtools-000004682.py: Extensive logging in vmware-vmsvc-root.log with open-vm-tools (bsc#1162119)
* sle12sp5/tailf-000019885.py: Aborting tailf causes bash session to be corrupted (bsc#1177369)
* sle12sp5/systemd-current-failed-7017137.py: Check for failed systemd services
* sle12sp5/systemd_SUSE-SU-2021_2405-1_12.5.py: Security fixes for SUSE Linux Enterprise 12 SP5
* sle12sp5/sdagentconfig-000020301.py: SCA Appliance configuration reports ERROR 2002 HY000 Cannot connect to MySQL
server (bsc#1183464)
* sle12sp5/qemu_SUSE-SU-2021_2448-1_12.5.py: Security fixes for SUSE Linux Enterprise 12 Service Pack 5
* sle12sp5/python-py_SUSE-SU-2021_2236-1_12.5.py: Security fixes for SUSE Linux Enterprise 12 Service Pack 5
* sle12sp5/permissions_SUSE-SU-2021_2280-1_12.5.py: Security fixes for SUSE Linux Enterprise 12 Service Pack 5
* sle12sp5/nobarrier-000020240.py: XFS nobarrier option has been completely deprecated starting from
SUSE Linux Enterprise 15 Service Pack 2 (bsc#1176375)
* sle12sp5/nfstimeout_125-000019943.py: Delayed outgoing packets causing NFS timeouts (bsc#1183405)
* sle12sp5/nfsperf-125-000019615.py: Performance loss when writing large files over NFS (bsc#1163403)
* sle12sp5/nfsipv6_125-000019618.py: Timeout when attempting NFS mount over IPv6 (bsc#1144162)
* sle12sp5/lscpu-000019784-12.py: lscpu segfaults on IBM Power8 - Assertion failed (bsc#1175623)
* sle12sp5/linuxptp_SUSE-SU-2021_2545-1_12.5.py: Security fixes for SUSE Linux Enterprise 12 SP5
* sle12sp5/kgraft-patch_SUSE-SU-2021_2462-1_12.5.py: Security fixes for SUSE Linux Kernel Live Patch 12 SP5
* sle12sp5/kgraft-patch_SUSE-SU-2021_2389-1_12.5.py: Security fixes for SUSE Linux Kernel Live Patch 12 SP5
* sle12sp5/kgraft-patch_SUSE-SU-2021_2324-1_12.5.py: Security fixes for SUSE Linux Kernel Live Patch 12 SP5
* sle12sp5/kernel_SUSE-SU-2021_2416-1_12.5.py: Security fixes for SUSE Linux Enterprise 12 SP5
* sle12sp5/kernel_SUSE-SU-2021_2407-1_12.5.py: Security fixes for SUSE Linux Enterprise 12 SP5
* sle12sp5/kernel_SUSE-SU-2021_2321-1_12.5.py: Security fixes for SUSE Linux Enterprise 12 SP5
* sle12sp5/intelpstate_125-000020273.py: Frequency scaling driver intel_pstate not loading on some Intel Xeon
Scalable processors (bsc#1185758)
* sle12sp5/glibc_SUSE-SU-2021_2480-1_12.5.py: Security fixes for SUSE Linux Enterprise 12 SP5
* sle12sp5/ghostcat_125-000019606.py: Ghostcat - Apache Tomcat AJP File Read/Inclusion Vulnerability (bsc#1164692)
* sle12sp5/docore_125-000019881.py: System crash in do_coredump() when a process is restarted (bsc#1182194)
* sle12sp5/dbus-1_SUSE-SU-2021_2424-1_12.5.py: Security fixes for SUSE Linux Enterprise 12 SP5
* sle12sp5/cronlimit-000020338.py: crontab - More than 1000 entries in crontab file, can't install (bsc#1187508)
* sle12sp5/btrfscrash-125-000019638.py: System crash during a BTRFS maintenance task (bsc#1163508)
* sle12sp5/btrfscrash-125-000019638.py: System crash during a BTRFS maintenance task (bsc#1163508)
* sle12sp4/vmtools-000004682.py: Extensive logging in vmware-vmsvc-root.log with open-vm-tools (bsc#1162119)
* sle12sp4/tcpdumpcore-000019666.py: Running tcpdump on a SUSE Linux Enterprise 12 Service Pack 4 System with Kernel
4.12.14-95.48-default may crash the system (bsc#1176579)
* sle12sp4/tailf-000019885.py: Aborting tailf causes bash session to be corrupted (bsc#1177369)
* sle12sp4/systemd-current-failed-7017137.py: Check for failed systemd services
* sle12sp4/systemd_SUSE-SU-2021_2423-1_12.4.ltss.py: Security fixes for SUSE Linux Enterprise 12 SP4 LTSS
* sle12sp4/sdagentconfig-000020301.py: SCA Appliance configuration reports ERROR 2002 HY000 Cannot connect to MySQL
server (bsc#1183464)
* sle12sp4/plymouth-000019595.py: plymouth hang - login to console not possible
* sle12sp4/nobarrier-000020240.py: XFS nobarrier option has been completely deprecated starting from SUSE Linux
Enterprise 15 Service Pack 2 (bsc#1176375)
* sle12sp4/nfsperf-124-000019615.py: Performance loss when writing large files over NFS (bsc#1163403)
* sle12sp4/mpiofindpaths-000019511.py: Using the find_multipaths yes option in multipath.conf (bsc#1138452)
* sle12sp4/linuxptp_SUSE-SU-2021_2443-1_12.4.ltss.py: Security fixes for SUSE Linux Enterprise 12 SP4 LTSS
* sle12sp4/kgraft-patch_SUSE-SU-2021_2546-1_12.4.ltss.py: Security fixes for SUSE Linux Kernel Live Patch 12 SP4 LTSS
* sle12sp4/kgraft-patch_SUSE-SU-2021_2389-1_12.4.ltss.py: Security fixes for SUSE Linux Kernel Live Patch 12 SP4 LTSS
* sle12sp4/kernel_SUSE-SU-2021_2422-1_12.4.ltss.py: Security fixes for SUSE Linux Enterprise 12 SP4 LTSS
* sle12sp4/ghostcat_124-000019606.py: Ghostcat - Apache Tomcat AJP File Read/Inclusion Vulnerability (bsc#1164692)
* sle12sp4/docore_124-000019881.py: System crash in do_coredump() when a process is restarted (bsc#1182194)
* sle12sp4/curl_SUSE-SU-2021_2425-1_12.4.ltss.py: Security fixes for SUSE Linux Enterprise 12 SP4 LTSS
* sle12sp4/cronlimit-000020338.py: crontab - More than 1000 entries in crontab file, can't install (bsc#1187508)
* sle12sp4/btrfscrash-124-000019638.py: System crash during a BTRFS maintenance task (bsc#1163508)
* sle12sp4/btrfscrash-124-000019638.py: System crash during a BTRFS maintenance task (bsc#1163508)
* sle12sp3/systemd-current-failed-7017137.py: Check for failed systemd services
* sle12sp3/systemd_SUSE-SU-2021_2423-1_12.3.ltss.py: Security fixes for SUSE Linux Enterprise 12 SP3 LTSS
* sle12sp3/mpiofindpaths-000019511.py: Using the find_multipaths yes option in multipath.conf (bsc#1138452)
* sle12sp3/linuxptp_SUSE-SU-2021_2443-1_12.3.ltss.py: Security fixes for SUSE Linux Enterprise 12 SP3 LTSS
* sle12sp3/kgraft-patch_SUSE-SU-2021_2563-1_12.3.ltss.py: Security fixes for SUSE Linux Kernel Live Patch 12 SP3 LTSS
* sle12sp3/kgraft-patch_SUSE-SU-2021_2538-1_12.3.ltss.py: Security fixes for SUSE Linux Kernel Live Patch 12 SP3 LTSS
* sle12sp3/kgraft-patch_SUSE-SU-2021_2451-1_12.3.ltss.py: Security fixes for SUSE Linux Kernel Live Patch 12 SP3 LTSS
* sle12sp3/kgraft-patch_SUSE-SU-2021_2433-1_12.3.ltss.py: Security fixes for SUSE Linux Kernel Live Patch 12 SP3 LTSS
* sle12sp3/kgraft-patch_SUSE-SU-2021_2389-1_12.3.ltss.py: Security fixes for SUSE Linux Kernel Live Patch 12 SP3 LTSS
* sle12sp3/ghostcat_123-000019606.py: Ghostcat - Apache Tomcat AJP File Read/Inclusion Vulnerability (bsc#1164692)
* sle12sp2/systemd-current-failed-7017137.py: Check for failed systemd services
* sle12sp2/ghostcat_122-000019606.py: Ghostcat - Apache Tomcat AJP File Read/Inclusion Vulnerability (bsc#1164692)
* sle12sp1/systemd-current-failed-7017137.py: Check for failed systemd services
* sle12sp1/ghostcat_121-000019606.py: Ghostcat - Apache Tomcat AJP File Read/Inclusion Vulnerability (bsc#1164692)
* sle12sp0/systemd-current-failed-7017137.py: Check for failed systemd services
* sle12all/zypproxy-000020275.py: zypper commands return Error code HTTP response 0
* sle12all/zerologon-000019713.py: Zerologon aka CVE-2020-1472 (bsc#1176579)
* sle12all/sysdjobs-000020261.py: Troubleshooting systemd jobs that are hung or stuck
* sle12all/softlock-000018705.py: soft lockup messages about
* sle12all/sizingbtrfs-000018798.py: How to resize/extend a btrfs formatted root partition
* sle12all/scatool-000020253.py: scatool fails to analyze supportconfigs with xz compression (bsc#1186316)
* sle12all/postfix-000020356.py: Postfix fails to start with IPv6 disabled
* sle12all/lvmsnapshot-000019858.py: LVM snapshot changed state to Invalid and should be removed
* sle12all/lvm-volume-list-7016683.py: Fixed execution error
* sle12all/iscsimnts-000019648.py: Proper mount options for iSCSI drives
* sle12all/coredumpctl-000018634.py: How to obtain systemd service core dumps
* sle12all/btrfsmaster-000018779.py: BTRFS Master TID
* sle12all/btrfscron-000019583.py: After upgrading BTRFS cron jobs are not working anymore (bsc#1159891)
* sle12all/blacklist-000019607.py: System exit to emergency shell at boot with multipath enabled
* CVE-2020-12351, CVE-2020-12352, CVE-2020-24490: BleedingTooth
+ sle12sp5/bleedingtooth_125-000019735.py
+ sle12sp4/bleedingtooth_124-000019735.py
+ sle12sp3/bleedingtooth_123-000019735.py
+ sle12sp2/bleedingtooth_122-000019735.py
* CVE-2020-0548, CVE-2020-0549: L1D data cache eviction and Vector Register sampling (bsc#1156353)
+ sle12sp5/ucodeintel_125-000019635.py
+ sle12sp4/ucodeintel_124-000019635.py
+ sle12sp3/ucodeintel_123-000019635.py
+ sle12sp2/ucodeintel_122-000019635.py
* CVE-2020-0543: Special Register Buffer Data Sampling aka CrossTalk (bsc#1154824)
+ sle12sp5/crosstalk_125-000019643.py
+ sle12sp4/crosstalk_124-000019643.py
+ sle12sp3/crosstalk_123-000019643.py
+ sle12sp2/crosstalk_122-000019643.py
- Updated patterns:
* sle12all/scc-expired.py: Identify if SCC registrations have expired
* sle12all/lvm-00003.pl: Physical volumes can be removed or damaged and appear missing. This pattern looks for
missing physical volumes
* sle12all/lvm-00004.pl: LMV Check sum errors may indicate corrupted LVM metadata
* sle12all/lvm-00005.pl: Duplicate volume groups are usually a configuration issue
- Renamed patterns for file standard:
* Renamed patterns/SLE/sle12all/scc-expired.py to patterns/SLE/sle12all/bhc-scc-expired.py
* Renamed patterns/SLE/sle12all/scc-registered.py to patterns/SLE/sle12all/bhc-scc-registered.py
- Deleted regular patterns (1)
* sle12all/systemd-current-failed-7017137.py: Moved to service packs with fixes (bsc#1187983)
* sle12all/bhc-scc.sh: Pattern removed (bsc#1184594)
* sle12all/pdc-00001.pl: Pattern removed OES Dependent
* sle12all/pdc-00002.pl: Pattern removed OES Dependent
* sle12all/lvm-00001.pl: Pattern removed
* sle12all/lvm-00002.pl: Pattern removed
sca-patterns-sle11:
- Version update from 1.3.1 to 1.5.1 to implement the conversion of SCA Tool to Python3 (jsc#SLE-25064, jsc#SLE-24335):
* Convert SCA Tool from Python2 to Python3 (bsc#1191005, SLE-21579)
* Removed OES dependent patterns (bsc#1196873)
- New security announcement patterns:
* Apr 2022 (5) for SUSE-SU-2022:14938-1 SUSE-SU-2022:14943-1 SUSE-SU-2022:14936-1 SUSE-SU-2022:14941-1
SUSE-SU-2022:14951-1
* Mar 2022 (19) for SUSE-SU-2022:14938-1 SUSE-SU-2022:14943-1 SUSE-SU-2022:14936-1 SUSE-SU-2022:14941-1
SUSE-SU-2022:14951-1 SUSE-SU-2022:14910-1 SUSE-SU-2022:14929-1 SUSE-SU-2022:14908-1 SUSE-SU-2022:14914-1
SUSE-SU-2022:14915-1 SUSE-SU-2022:14906-1 SUSE-SU-2022:14904-1 SUSE-SU-2022:14909-1 SUSE-SU-2022:14905-1
SUSE-SU-2022:14927-1 SUSE-SU-2022:14923-1 SUSE-SU-2022:14934-1 SUSE-SU-2022:14903-1 SUSE-SU-2022:14924-1
* Feb 2022 (27) for SUSE-SU-2022:14938-1 SUSE-SU-2022:14943-1 SUSE-SU-2022:14936-1 SUSE-SU-2022:14941-1
SUSE-SU-2022:14951-1 SUSE-SU-2022:14910-1 SUSE-SU-2022:14929-1 SUSE-SU-2022:14908-1 SUSE-SU-2022:14914-1
SUSE-SU-2022:14915-1 SUSE-SU-2022:14906-1 SUSE-SU-2022:14904-1 SUSE-SU-2022:14909-1 SUSE-SU-2022:14905-1
SUSE-SU-2022:14927-1 SUSE-SU-2022:14923-1 SUSE-SU-2022:14934-1 SUSE-SU-2022:14903-1 SUSE-SU-2022:14924-1
SUSE-SU-2022:14889-1 SUSE-SU-2022:14886-1 SUSE-SU-2022:14888-1 SUSE-SU-2022:14890-1 SUSE-SU-2022:14887-1
SUSE-SU-2022:14896-1 SUSE-SU-2022:14884-1 SUSE-SU-2022:14894-1
* Jan 2022 (34) for SUSE-SU-2022:14938-1 SUSE-SU-2022:14943-1 SUSE-SU-2022:14936-1 SUSE-SU-2022:14941-1
SUSE-SU-2022:14951-1 SUSE-SU-2022:14910-1 SUSE-SU-2022:14929-1 SUSE-SU-2022:14908-1 SUSE-SU-2022:14914-1
SUSE-SU-2022:14915-1 SUSE-SU-2022:14906-1 SUSE-SU-2022:14904-1 SUSE-SU-2022:14909-1 SUSE-SU-2022:14905-1
SUSE-SU-2022:14927-1 SUSE-SU-2022:14923-1 SUSE-SU-2022:14934-1 SUSE-SU-2022:14903-1 SUSE-SU-2022:14924-1
SUSE-SU-2022:14889-1 SUSE-SU-2022:14886-1 SUSE-SU-2022:14888-1 SUSE-SU-2022:14890-1 SUSE-SU-2022:14887-1
SUSE-SU-2022:14896-1 SUSE-SU-2022:14884-1 SUSE-SU-2022:14894-1 SUSE-SU-2022:14880-1 SUSE-SU-2022:14881-1
SUSE-SU-2022:14872-1 SUSE-SU-2022:14875-1 SUSE-SU-2022:14878-1 SUSE-SU-2022:14882-1 SUSE-SU-2022:14879-1
* Jul 2021 (5) for SUSE-SU-2021:14769-1 SUSE-SU-2021:14771-1 SUSE-SU-2021:14766-1 SUSE-SU-2021:14764-1
SUSE-SU-2021:14761-1
* Jun 2021 (12) for SUSE-SU-2021:14747-1 SUSE-SU-2021:14748-1 SUSE-SU-2021:14744-1 SUSE-SU-2021:14757-1
SUSE-SU-2021:14743-1 SUSE-SU-2021:14758-1 SUSE-SU-2021:14751-1 SUSE-SU-2021:14750-1 SUSE-SU-2021:14740-1
SUSE-SU-2021:14760-1 SUSE-SU-2021:14759-1 SUSE-SU-2021:14749-1
* May 2021 (5) for SUSE-SU-2021:14729-1 SUSE-SU-2021:14724-1 SUSE-SU-2021:14738-1 SUSE-SU-2021:14728-1
SUSE-SU-2021:14714-1
* Apr 2021 (10) for SUSE-SU-2021:14690-1 SUSE-SU-2021:14702-1 SUSE-SU-2021:14705-1 SUSE-SU-2021:14709-1
SUSE-SU-2021:14700-1 SUSE-SU-2021:14708-1 SUSE-SU-2021:14684-1 SUSE-SU-2021:14704-1 SUSE-SU-2021:14712-1
SUSE-SU-2021:14692-1
- New regular patterns:
* sle11sp4/ghostcat_114-000019606.py: Ghostcat - Apache Tomcat AJP File Read/Inclusion Vulnerability (bsc#1164692)
* sle11sp3/ghostcat_113-000019606.py: Ghostcat - Apache Tomcat AJP File Read/Inclusion Vulnerability (bsc#1164692)
* sle11all/softlock-000018705.py: soft lockup messages about
* sle11all/sizingbtrfs-000018798.py: How to resize/extend a btrfs formatted root partition
* sle11all/btrfsmaster-000018779.py: BTRFS Master TID
* CVE-2020-0543: sle11sp4/crosstalk_114-000019643.py: Special Register Buffer Data Sampling aka CrossTalk
(bsc#1154824)
- Deleted regular patterns:
* sle11all/bhc-scc.sh: Pattern removed (bsc#1184594)
Patchnames
SUSE-2022-4496,SUSE-SLE-Module-Server-Applications-15-SP3-2022-4496,openSUSE-SLE-15.3-2022-4496
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Feature update for SCA patterns", "title": "Title of the patch" }, { "category": "description", "text": "This update for SCA patterns fixes the following issues:\n\nsca-patterns-base:\n\n- Version update from 1.3.1 to 1.5.0 to implement the conversion of SCA Tool to Python3 (jsc#SLE-25064, jsc#SLE-24335):\n * Convert SCA Tool from Python2 to Python3 (bsc#1191005, SLE-21579)\n * Added Core.loadFullFile for sectionless parsing (bsc#1187194)\n * Added SUSE.getNetworkInterfaces (bsc#1144162)\n * Changed required dependencies from python to python3-base (bsc#1191199)\n * Fix SUSE.getFileSystems invalid index error (bsc#1185594)\n * Fix SUSE.getFileSystems unbound local SWAP variable (bsc#1185593)\n * Removed Novell/OES references from libraries (bsc#1186034)\n * Updated documentation for SUSE.compareKernel\n * Updated kernel version constants for all SUSE libraries (bsc#1189483)\n\nsca-patterns-hae:\n\n- Version update from 1.3.1 to 1.5.1 to implement the conversion of SCA Tool to Python3 (jsc#SLE-25064, jsc#SLE-24335):\n * Convert SCA Tool from Python2 to Python3 (bsc#1191005, SLE-21579)\n * Added distribution and service pack subdirectories (bsc#1193878)\n * False positive hit from /usr/lib/sca/patterns/HAE/stonith-00002.pl (bsc#1124793)\n * HAE Policies Quorum 2 node cluster requires ignore policy (bsc#1167689)\n * supportconfig indicates IPv6 required by HAE, is already enabled (bsc#1045605)\n\nsca-patterns-suma:\n\n- Version update from 1.0 to 1.5.1 to implement the conversion of SCA Tool to Python3 (jsc#SLE-25064, jsc#SLE-24335):\n * Convert SCA Tool from Python2 to Python3 (bsc#1191005, SLE-21579)\n\nsca-server-report:\n\n- Version update from 1.0.1 to 1.5.1 to implement the conversion of SCA Tool to Python3 (jsc#SLE-25064, jsc#SLE-24335):\n * Convert SCA Tool from Python2 to Python3 (bsc#1191005, SLE-21579)\n * Changed absolute paths to relative ones (bsc#1186316)\n * Changed required dependencies from python to python3-base (bsc#1191199)\n * Ensure that the legacy SuSE-release file works (bsc#1196730) \n * Fix sca report header supportconfig file (bsc#1186442)\n * Fix the report file output path (bsc#1180894)\n * Removed preprocessor elements for OES Filr eDir (bsc#1186420)\n\nsca-patterns-sle15:\n\n- Version update from 1.0.1 to 1.5.1 to implement the conversion of SCA Tool to Python3 (jsc#SLE-25064, jsc#SLE-24335):\n * Convert SCA Tool from Python2 to Python3 (bsc#1191005, SLE-21579)\n * Added Video link to coredumpctl-000018634.py\n * Added video links to patterns (bsc#1190460):\n * bhc-scc-expired.py, bhc-scc-registered.py, bhc-diskused-00001.pl, bhc-memused-00001.pl\n * Fixed crosstalk message strings (bsc#1186312)\n * Fixed field reference in sle15all/lvm-00003.pl\n * Fixed metadata tags in scc-registered.py\n * Fixed percent used calculation for bhc-memused-00001.pl (bsc#1189889)\n * Removed outdated TID2 link in bhc-diskused-00001.pl (bsc#1190260)\n * Requires Core library 1.3.3 which contains Core.logFullFile function\n * Updated registration link in bhc-scc-registered.py\n * Updated renewal link in bhc-scc-expired.py\n- New security announcement patterns:\n * Apr 2022 (13) for SUSE-SU-2022:1293-1 SUSE-SU-2022:1313-1 SUSE-SU-2022:1250-1 SUSE-SU-2022:1108-1\n SUSE-SU-2022:1292-1 SUSE-SU-2022:1313-1 SUSE-SU-2022:1448-1 SUSE-SU-2022:1250-1 SUSE-SU-2022:1255-1\n SUSE-SU-2022:1255-1 SUSE-SU-2022:1288-1 SUSE-SU-2022:1427-1 SUSE-SU-2022:1139-1\n * Mar 2022 (48) for SUSE-SU-2022:1293-1 SUSE-SU-2022:1313-1 SUSE-SU-2022:1250-1 SUSE-SU-2022:1108-1\n SUSE-SU-2022:1292-1 SUSE-SU-2022:1313-1 SUSE-SU-2022:1448-1 SUSE-SU-2022:1250-1 SUSE-SU-2022:1255-1\n SUSE-SU-2022:1255-1 SUSE-SU-2022:1288-1 SUSE-SU-2022:1427-1 SUSE-SU-2022:1139-1 SUSE-SU-2022:0931-1\n SUSE-SU-2022:0703-1 SUSE-SU-2022:0779-1 SUSE-SU-2022:0695-1 SUSE-SU-2022:0826-1 SUSE-SU-2022:0825-1\n SUSE-SU-2022:1058-1 SUSE-SU-2022:0679-1 SUSE-SU-2022:0853-1 SUSE-SU-2022:0819-1 SUSE-SU-2022:0778-1\n SUSE-SU-2022:0676-1 SUSE-SU-2022:0725-1 SUSE-SU-2022:0754-1 SUSE-SU-2022:0929-1 SUSE-SU-2022:0732-1\n SUSE-SU-2022:0703-1 SUSE-SU-2022:0810-1 SUSE-SU-2022:0694-1 SUSE-SU-2022:0826-1 SUSE-SU-2022:0825-1\n SUSE-SU-2022:1057-1 SUSE-SU-2022:0679-1 SUSE-SU-2022:0851-1 SUSE-SU-2022:1041-1 SUSE-SU-2022:0819-1\n SUSE-SU-2022:0778-1 SUSE-SU-2022:0676-1 SUSE-SU-2022:0725-1 SUSE-SU-2022:0754-1 SUSE-SU-2022:0766-1\n SUSE-SU-2022:0766-1 SUSE-SU-2022:0933-1 SUSE-SU-2022:0934-1 SUSE-SU-2022:0929-1\n * Feb 2022 (60) for SUSE-SU-2022:1293-1 SUSE-SU-2022:1313-1 SUSE-SU-2022:1250-1 SUSE-SU-2022:1108-1\n SUSE-SU-2022:1292-1 SUSE-SU-2022:1313-1 SUSE-SU-2022:1448-1 SUSE-SU-2022:1250-1 SUSE-SU-2022:1255-1\n SUSE-SU-2022:1255-1 SUSE-SU-2022:1288-1 SUSE-SU-2022:1427-1 SUSE-SU-2022:1139-1 SUSE-SU-2022:0931-1\n SUSE-SU-2022:0703-1 SUSE-SU-2022:0779-1 SUSE-SU-2022:0695-1 SUSE-SU-2022:0826-1 SUSE-SU-2022:0825-1\n SUSE-SU-2022:1058-1 SUSE-SU-2022:0679-1 SUSE-SU-2022:0853-1 SUSE-SU-2022:0819-1 SUSE-SU-2022:0778-1\n SUSE-SU-2022:0676-1 SUSE-SU-2022:0725-1 SUSE-SU-2022:0754-1 SUSE-SU-2022:0929-1 SUSE-SU-2022:0732-1\n SUSE-SU-2022:0703-1 SUSE-SU-2022:0810-1 SUSE-SU-2022:0694-1 SUSE-SU-2022:0826-1 SUSE-SU-2022:0825-1\n SUSE-SU-2022:1057-1 SUSE-SU-2022:0679-1 SUSE-SU-2022:0851-1 SUSE-SU-2022:1041-1 SUSE-SU-2022:0819-1\n SUSE-SU-2022:0778-1 SUSE-SU-2022:0676-1 SUSE-SU-2022:0725-1 SUSE-SU-2022:0754-1 SUSE-SU-2022:0766-1\n SUSE-SU-2022:0766-1 SUSE-SU-2022:0933-1 SUSE-SU-2022:0934-1 SUSE-SU-2022:0929-1 SUSE-SU-2022:0277-1\n SUSE-SU-2022:0283-1 SUSE-SU-2022:0500-1 SUSE-SU-2022:0468-1 SUSE-SU-2022:0541-1 SUSE-SU-2022:0284-1\n SUSE-SU-2022:0563-1 SUSE-SU-2022:0500-1 SUSE-SU-2022:0563-1 SUSE-SU-2022:0301-1 SUSE-SU-2022:0367-1\n SUSE-SU-2022:0367-1\n * Jan 2022 (92) for SUSE-SU-2022:1293-1 SUSE-SU-2022:1313-1 SUSE-SU-2022:1250-1 SUSE-SU-2022:1108-1\n SUSE-SU-2022:1292-1 SUSE-SU-2022:1313-1 SUSE-SU-2022:1448-1 SUSE-SU-2022:1250-1 SUSE-SU-2022:1255-1\n SUSE-SU-2022:1255-1 SUSE-SU-2022:1288-1 SUSE-SU-2022:1427-1 SUSE-SU-2022:1139-1 SUSE-SU-2022:0931-1\n SUSE-SU-2022:0703-1 SUSE-SU-2022:0779-1 SUSE-SU-2022:0695-1 SUSE-SU-2022:0826-1 SUSE-SU-2022:0825-1\n SUSE-SU-2022:1058-1 SUSE-SU-2022:0679-1 SUSE-SU-2022:0853-1 SUSE-SU-2022:0819-1 SUSE-SU-2022:0778-1\n SUSE-SU-2022:0676-1 SUSE-SU-2022:0725-1 SUSE-SU-2022:0754-1 SUSE-SU-2022:0929-1 SUSE-SU-2022:0732-1\n SUSE-SU-2022:0703-1 SUSE-SU-2022:0810-1 SUSE-SU-2022:0694-1 SUSE-SU-2022:0826-1 SUSE-SU-2022:0825-1\n SUSE-SU-2022:1057-1 SUSE-SU-2022:0679-1 SUSE-SU-2022:0851-1 SUSE-SU-2022:1041-1 SUSE-SU-2022:0819-1\n SUSE-SU-2022:0778-1 SUSE-SU-2022:0676-1 SUSE-SU-2022:0725-1 SUSE-SU-2022:0754-1 SUSE-SU-2022:0766-1\n SUSE-SU-2022:0766-1 SUSE-SU-2022:0933-1 SUSE-SU-2022:0934-1 SUSE-SU-2022:0929-1 SUSE-SU-2022:0277-1\n SUSE-SU-2022:0283-1 SUSE-SU-2022:0500-1 SUSE-SU-2022:0468-1 SUSE-SU-2022:0541-1 SUSE-SU-2022:0284-1\n SUSE-SU-2022:0563-1 SUSE-SU-2022:0500-1 SUSE-SU-2022:0563-1 SUSE-SU-2022:0301-1 SUSE-SU-2022:0367-1\n SUSE-SU-2022:0367-1 SUSE-SU-2022:0043-1 SUSE-SU-2022:0177-1 SUSE-SU-2022:0064-1 SUSE-SU-2022:0134-1\n SUSE-SU-2022:0141-1 SUSE-SU-2022:0050-1 SUSE-SU-2022:0021-1 SUSE-SU-2022:0069-1 SUSE-SU-2022:0198-1\n SUSE-SU-2022:0131-1 SUSE-SU-2022:0088-1 SUSE-SU-2022:0144-1 SUSE-SU-2022:0151-1 SUSE-SU-2022:0091-1\n SUSE-SU-2022:0091-1 SUSE-SU-2022:0183-1 SUSE-SU-2022:0211-1 SUSE-SU-2022:0191-1 SUSE-SU-2022:0050-1\n SUSE-SU-2022:0137-1 SUSE-SU-2022:0214-1 SUSE-SU-2022:0128-1 SUSE-SU-2022:0119-1 SUSE-SU-2022:0183-1\n SUSE-SU-2022:0211-1 SUSE-SU-2022:0251-1 SUSE-SU-2022:0200-1 SUSE-SU-2022:0191-1 SUSE-SU-2022:0137-1\n SUSE-SU-2022:0214-1 SUSE-SU-2022:0031-1 SUSE-SU-2022:0119-1\n * Jul 2021 (20) for SUSE-SU-2021:2457-1 SUSE-SU-2021:2410-1 SUSE-SU-2021:2442-1 SUSE-SU-2021:2352-1\n SUSE-SU-2021:1863-2 SUSE-SU-2021:2415-1 SUSE-SU-2021:2555-1 SUSE-SU-2021:2439-1 SUSE-SU-2021:2459-1\n SUSE-SU-2021:2291-1 SUSE-SU-2021:2457-1 SUSE-SU-2021:2404-1 SUSE-SU-2021:2474-1 SUSE-SU-2021:2471-1\n SUSE-SU-2021:2438-1 SUSE-SU-2021:2325-1 SUSE-SU-2021:2439-1 SUSE-SU-2021:2461-1 SUSE-SU-2021:2421-1\n SUSE-SU-2021:2470-1\n * Jun 2021 (46) for SUSE-SU-2021:2011-1 SUSE-SU-2021:1933-1 SUSE-SU-2021:1998-1 SUSE-SU-2021:2106-1\n SUSE-SU-2021:1951-1 SUSE-SU-2021:2213-1 SUSE-SU-2021:1942-1 SUSE-SU-2021:2012-1 SUSE-SU-2021:1859-1\n SUSE-SU-2021:1843-1 SUSE-SU-2021:1825-1 SUSE-SU-2021:2196-1 SUSE-SU-2021:1917-1 SUSE-SU-2021:1958-1\n SUSE-SU-2021:2184-1 SUSE-SU-2021:1977-1 SUSE-SU-2021:1819-1 SUSE-SU-2021:1944-1 SUSE-SU-2021:1834-1\n SUSE-SU-2021:1826-1 SUSE-SU-2021:2127-1 SUSE-SU-2021:2011-1 SUSE-SU-2021:1933-1 SUSE-SU-2021:1999-1\n SUSE-SU-2021:2106-1 SUSE-SU-2021:2212-1 SUSE-SU-2021:1893-1 SUSE-SU-2021:1859-1 SUSE-SU-2021:1994-1\n SUSE-SU-2021:1970-1 SUSE-SU-2021:1843-1 SUSE-SU-2021:2196-1 SUSE-SU-2021:1917-1 SUSE-SU-2021:1958-1\n SUSE-SU-2021:1890-1 SUSE-SU-2021:1819-1 SUSE-SU-2021:1834-1 SUSE-SU-2021:2127-1 SUSE-SU-2021:1901-1\n SUSE-SU-2021:1911-1 SUSE-SU-2021:2104-1 SUSE-SU-2021:1895-1 SUSE-SU-2021:2155-1 SUSE-SU-2021:2122-1\n SUSE-SU-2021:2211-1 SUSE-SU-2021:1845-1\n * May 2021 (39) for SUSE-SU-2021:1557-1 SUSE-SU-2021:1806-1 SUSE-SU-2021:1785-1 SUSE-SU-2021:1466-1\n SUSE-SU-2021:1491-1 SUSE-SU-2021:1577-1 SUSE-SU-2021:1654-1 SUSE-SU-2021:1523-1 SUSE-SU-2021:1765-1 \n SUSE-SU-2021:1755-1 SUSE-SU-2021:1599-1 SUSE-SU-2021:1761-1 SUSE-SU-2021:1655-1 SUSE-SU-2021:1598-1 \n SUSE-SU-2021:1762-1 SUSE-SU-2021:1474-1 SUSE-SU-2021:1493-1 SUSE-SU-2021:1557-1 SUSE-SU-2021:1806-1 \n SUSE-SU-2021:1785-1 SUSE-SU-2021:1466-1 SUSE-SU-2021:1491-1 SUSE-SU-2021:1577-1 SUSE-SU-2021:1654-1 \n SUSE-SU-2021:1523-1 SUSE-SU-2021:1765-1 SUSE-SU-2021:1755-1 SUSE-SU-2021:1574-1 SUSE-SU-2021:1599-1 \n SUSE-SU-2021:1761-1 SUSE-SU-2021:1636-1 SUSE-SU-2021:1655-1 SUSE-SU-2021:1598-1 SUSE-SU-2021:1762-1 \n SUSE-SU-2021:1474-1 SUSE-SU-2021:1493-1 SUSE-SU-2021:1500-1 SUSE-SU-2021:1792-1 SUSE-SU-2021:1573-1\n * May 2021 (30) for SUSE-SU-2021:1182-1 SUSE-SU-2021:1430-1 SUSE-SU-2021:1168-1 SUSE-SU-2021:1408-1 \n SUSE-SU-2021:1409-1 SUSE-SU-2021:1182-1 SUSE-SU-2021:1028-1 SUSE-SU-2021:1166-1 SUSE-SU-2021:1430-1\n SUSE-SU-2021:1113-1 SUSE-SU-2021:1444-1 SUSE-SU-2021:1280-1 SUSE-SU-2021:1243-1 SUSE-SU-2021:1168-1\n SUSE-SU-2021:1408-1 SUSE-SU-2021:1094-1 SUSE-SU-2021:1029-1 SUSE-SU-2021:1238-1 SUSE-SU-2021:1409-1\n SUSE-SU-2021:1006-1 SUSE-SU-2021:1161-1 SUSE-SU-2021:1108-1 SUSE-SU-2021:1282-1 SUSE-SU-2021:1179-1\n SUSE-SU-2021:1153-1 SUSE-SU-2021:1445-1 SUSE-SU-2021:1244-1 SUSE-SU-2021:1292-1 SUSE-SU-2021:1103-1\n SUSE-SU-2021:1455-1\n- New regular patterns:\n * sle15sp3/oldlvm-000019878.py, sle15sp2/oldlvm-000019878.py: Physical Volume is using an old PV header (bsc#1179170)\n * sle15sp3/intelpstate_153-000020273.py: Frequency scaling driver intel_pstate not loading on some Intel Xeon\n Scalable processors (bsc#1185758)\n * sle15sp3/dasdkvm-000020295.py: DASD partitions not recognized on SUSE Linux Enterprise 15 Service Pack 3 KVM guest\n * sle15sp2/rpmnfs-000020364.py, sle15sp3/rpmnfs-000020364.py: Upgrading an RPM reports cpio chmod failed\n (bsc#1189394)\n * sle15sp2/nfstimeout_152-000019943.py: Delayed outgoing packets causing NFS timeouts (bsc#1183405)\n * sle15sp2/mpiopmem-000019884.py: Executing multipath -ll on Optane memory based pmem devices returns HDIO_GETGEO\n failed with 25 (bsc#1182917)\n * sle15sp2/ipmitool-000020250.py: hanging on getting cipher suites (bsc#1185684)\n * sle15sp2/intelpstate_152-000020273.py: Frequency scaling driver intel_pstate not loading on some Intel Xeon Scalable\n processors (bsc#1185758)\n * sle15sp2/ghostcat_152-000019606.py: Ghostcat - Apache Tomcat AJP File Read/Inclusion Vulnerability (bsc#1164692)\n * sle15sp2/fcoe-000019889.py: System with FCoE connected devices fails to boot randomly due to wicked ordering cycle\n problems (bsc#1176140)\n * sle15sp1/qlogic-000019630.py: System crashes when the system is rebooted with SR-IOV enabled QLogic cards\n (bsc#1155990)\n * sle15sp1/passthrough-000019579.py: Passthrough of Raid Controller to KVM guest results in NMI and unresponsiveness\n on host (bsc#1152800)\n * sle15sp1/nfsperf-151-000019615.py: Performance loss when writing large files over NFS (bsc#1163403) \n * sle15sp1/nfsipv6_151-000019618.py: Timeout when attempting NFS mount over IPv6 (bsc#1144162)\n * sle15sp1/nfit-000019688.py: dmesg shows NFIT related messages after updating the kernel (bsc#1159356)\n * sle15sp1/namespace-000019571.py: Activation of multiple namespaces simultaneously may lead to an activation\n failure (bsc#1157778)\n * sle15sp1/ipmi-000019602.py: IPMI driver can be unloaded when being accessed by user space (bsc#1154768)\n * sle15sp1/ghostcat_151-000019606.py: Ghostcat - Apache Tomcat AJP File Read/Inclusion Vulnerability (bsc#1164692)\n * sle15sp1/edac-000019537.py: A kernel message shows EDAC amd64 Error F0 not found, device 0x1460 broken BIOS \n (bsc#1131489)\n * sle15sp1/docore_151-000019881.py: System crash in do_coredump() when a process is restarted (bsc#1177753)\n * sle15sp0/mpiofindpaths-000019511.py: Using the find_multipaths yes option in multipath.conf (bsc#1138452)\n * sle15sp0/ghostcat_150-000019606.py: Ghostcat - Apache Tomcat AJP File Read/Inclusion Vulnerability (bsc#1164692)\n * sle15all/zypproxy-000020275.py: zypper commands return Error code HTTP response 0\n * sle15all/vmcore-00002.pl: Detects the need for a kernel core analysis\n * sle15all/vmcore-00001.pl: Identifies kernel core dumps for review\n * sle15all/udevmac-000020260.py: systemd-udevd Could not generate persistent MAC address for br0 No such file or\n directory (bsc#1185357)\n * sle15all/systemd-current-failed-7017137.py: Check for failed systemd services\n * sle15all/sysdjobs-000020261.py: Troubleshooting systemd jobs that are hung or stuck\n * sle15all/softlock-000018705.py: soft lockup messages about\n * sle15all/slapd-000019711.py: slapd.service not enabled/failed after upgrade from SUSE Linux Enterprise 11 Service\n Pack 4 to SUSE Linux Enterprise 15 (bsc#1156353)\n * sle15all/sizingbtrfs-000018798.py: How to resize/extend a btrfs formatted root partition\n * sle15all/sdagentconfig-000020301.py: SCA Appliance configuration reports ERROR 2002 HY000 Cannot connect to MySQL\n server (bsc#1183464)\n * sle15all/scc-registered.py: Check system registration status\n * sle15all/scc-expired.py: Identify if SCC registrations have expired\n * sle15all/scatool-000020253.py: scatool fails to analyze supportconfigs with xz compression (bsc#1155181)\n * sle15all/scatool-000004685.py: scatool fails with traceback\n * sle15all/proxy-00003.pl: Checks for proxy environment variables\n * sle15all/postfix-000020356.py: Postfix fails to start with IPv6 disabled\n * sle15all/oomvsftpd-000020252.py: vsftpd and other processes terminated due to OOM scenario (bsc#1182905)\n * sle15all/nobarrier-000020240.py: XFS nobarrier option has been completely deprecated starting from SUSE Linux\n Enterprise 15 Service Pack 2 (bsc#1176375)\n * sle15all/mysqlperf-000020354.py: mysqld segfault when the system is under stress (bsc#1186792)\n * sle15all/lvmsnapshot-000019858.py: LVM snapshot changed state to Invalid and should be removed (bsc#1179170)\n * sle15all/lvm-00005.pl: Duplicate volume groups are usually a configuration issue\n * sle15all/lvm-00004.pl: LMV Check sum errors may indicate corrupted LVM metadata\n * sle15all/lvm-00003.pl: Physical volumes can be removed or damaged and appear missing. This pattern looks for\n missing physical volumes.\n * sle15all/iscsimnts-000019648.py: Proper mount options for iSCSI drives\n * sle15all/cronlimit-000020338.py: crontab - More than 1000 entries in crontab file, can\u0027t install (bsc#1187508)\n * sle15all/coredumpctl-000018634.py: How to obtain systemd service core dumps\n * sle15all/btrfsmaster-000018779.py: BTRFS Master TID\n * sle15all/blacklist-000019607.py: System exit to emergency shell at boot with multipath enabled\n * sle15all/bhc-scc.sh: Pattern removed (bsc#1184594, bsc#1186317)\n * sle15all/acpid-000019708.py: acpid.service failed to start after upgrade (bsc#1158890)\n * CVE-2020-0543: Special Register Buffer Data Sampling aka CrossTalk (bsc#1154824)\n + sle15sp2/crosstalk_152-000019643.py\n + sle15sp1/crosstalk_151-000019643.py\n * CVE-2020-0548, CVE-2020-0549: L1D data cache eviction and Vector Register sampling (bsc#1156353)\n + sle15sp2/ucodeintel_152-000019635.py\n + sle15sp1/ucodeintel_151-000019635.py\n + sle15sp0/ucodeintel_150-000019635.py\n- Renamed pattern files for filename standard\n * Renamed patterns/SLE/sle15all/scc-expired.py to patterns/SLE/sle15all/bhc-scc-expired.py\n * Renamed /SLE/sle15all/scc-registered.py to patterns/SLE/sle15all/bhc-scc-registered.py\n- Updated regular patterns:\n * sle15all/lvm-00003.pl: Physical volumes can be removed or damaged and appear missing. This pattern looks for\n missing physical volumes\n\nsca-patterns-sle12:\n\n- Version update from 1.0.2 to 1.5.1 to implement the conversion of SCA Tool to Python3 (jsc#SLE-25064, jsc#SLE-24335):\n * Convert SCA Tool from Python2 to Python3 (bsc#1191005, SLE-21579)\n * Added Video link to coredumpctl-000018634.py\n * Added video links to patterns (bsc#1190460): \n + bhc-scc-expired.py, bhc-scc-registered.py, bhc-diskused-00001.pl, bhc-memused-00001.pl\n * Fixed crosstalk message strings (bsc#1186312)\n * Fixed metadata tags for scc-registered.py\n * Removed outdated TID2 link in bhc-diskused-00001.pl (bsc#1190260)\n * Requires Core library 1.3.3 which contains Core.logFullFile function\n * Updated registration link in bhc-scc-registered.py\n * Updated renewal link in bhc-scc-expired.py\n * Updated scc-registered.py pattern to fix registration detection\n- New security announcement patterns:\n * Apr 2022 (53) for SUSE-SU-2022:1254-1 SUSE-SU-2022:1160-1 SUSE-SU-2022:1294-1 SUSE-SU-2022:1151-1\n SUSE-SU-2022:1094-1 SUSE-SU-2022:1129-1 SUSE-SU-2022:1478-1 SUSE-SU-2022:1113-1 SUSE-SU-2022:1308-1\n SUSE-SU-2022:1168-1 SUSE-SU-2022:1312-1 SUSE-SU-2022:1272-1 SUSE-SU-2022:1217-1 SUSE-SU-2022:1266-1\n SUSE-SU-2022:1474-1 SUSE-SU-2022:1475-1 SUSE-SU-2022:1306-1 SUSE-SU-2022:1289-1 SUSE-SU-2022:1429-1\n SUSE-SU-2022:1417-1 SUSE-SU-2022:1160-1 SUSE-SU-2022:1285-1 SUSE-SU-2022:1105-1 SUSE-SU-2022:1294-1\n SUSE-SU-2022:1258-1 SUSE-SU-2022:1129-1 SUSE-SU-2022:1113-1 SUSE-SU-2022:1308-1 SUSE-SU-2022:1168-1\n SUSE-SU-2022:1312-1 SUSE-SU-2022:1217-1 SUSE-SU-2022:1267-1 SUSE-SU-2022:1267-1 SUSE-SU-2022:1275-1\n SUSE-SU-2022:1306-1 SUSE-SU-2022:1289-1 SUSE-SU-2022:1429-1 SUSE-SU-2022:1160-1 SUSE-SU-2022:1408-1\n SUSE-SU-2022:1294-1 SUSE-SU-2022:1129-1 SUSE-SU-2022:1113-1 SUSE-SU-2022:1308-1 SUSE-SU-2022:1168-1\n SUSE-SU-2022:1440-1 SUSE-SU-2022:1312-1 SUSE-SU-2022:1270-1 SUSE-SU-2022:1270-1 SUSE-SU-2022:1275-1\n SUSE-SU-2022:1123-1 SUSE-SU-2022:1306-1 SUSE-SU-2022:1289-1 SUSE-SU-2022:1428-1\n * Mar 2022 (127) for SUSE-SU-2022:1254-1 SUSE-SU-2022:1160-1 SUSE-SU-2022:1294-1 SUSE-SU-2022:1151-1\n SUSE-SU-2022:1094-1 SUSE-SU-2022:1129-1 SUSE-SU-2022:1478-1 SUSE-SU-2022:1113-1 SUSE-SU-2022:1308-1\n SUSE-SU-2022:1168-1 SUSE-SU-2022:1312-1 SUSE-SU-2022:1272-1 SUSE-SU-2022:1217-1 SUSE-SU-2022:1266-1\n SUSE-SU-2022:1474-1 SUSE-SU-2022:1475-1 SUSE-SU-2022:1306-1 SUSE-SU-2022:1289-1 SUSE-SU-2022:1429-1\n SUSE-SU-2022:1417-1 SUSE-SU-2022:1160-1 SUSE-SU-2022:1285-1 SUSE-SU-2022:1105-1 SUSE-SU-2022:1294-1\n SUSE-SU-2022:1258-1 SUSE-SU-2022:1129-1 SUSE-SU-2022:1113-1 SUSE-SU-2022:1308-1 SUSE-SU-2022:1168-1\n SUSE-SU-2022:1312-1 SUSE-SU-2022:1217-1 SUSE-SU-2022:1267-1 SUSE-SU-2022:1267-1 SUSE-SU-2022:1275-1\n SUSE-SU-2022:1306-1 SUSE-SU-2022:1289-1 SUSE-SU-2022:1429-1 SUSE-SU-2022:1160-1 SUSE-SU-2022:1408-1\n SUSE-SU-2022:1294-1 SUSE-SU-2022:1129-1 SUSE-SU-2022:1113-1 SUSE-SU-2022:1308-1 SUSE-SU-2022:1168-1\n SUSE-SU-2022:1440-1 SUSE-SU-2022:1312-1 SUSE-SU-2022:1270-1 SUSE-SU-2022:1270-1 SUSE-SU-2022:1275-1\n SUSE-SU-2022:1123-1 SUSE-SU-2022:1306-1 SUSE-SU-2022:1289-1 SUSE-SU-2022:1428-1 SUSE-SU-2022:0733-1\n SUSE-SU-2022:1023-1 SUSE-SU-2022:0939-1 SUSE-SU-2022:0811-1 SUSE-SU-2022:0690-1 SUSE-SU-2022:0784-1\n SUSE-SU-2022:0895-1 SUSE-SU-2022:0860-1 SUSE-SU-2022:0857-1 SUSE-SU-2022:0822-1 SUSE-SU-2022:0777-1\n SUSE-SU-2022:0782-1 SUSE-SU-2022:0820-1 SUSE-SU-2022:0913-1 SUSE-SU-2022:1026-1 SUSE-SU-2022:1025-1\n SUSE-SU-2022:1024-1 SUSE-SU-2022:0765-1 SUSE-SU-2022:0910-1 SUSE-SU-2022:0871-1 SUSE-SU-2022:0730-1\n SUSE-SU-2022:0678-1 SUSE-SU-2022:0677-1 SUSE-SU-2022:0842-1 SUSE-SU-2022:0698-1 SUSE-SU-2022:0908-1\n SUSE-SU-2022:0881-1 SUSE-SU-2022:0928-1 SUSE-SU-2022:0733-1 SUSE-SU-2022:1062-1 SUSE-SU-2022:0811-1\n SUSE-SU-2022:0690-1 SUSE-SU-2022:0784-1 SUSE-SU-2022:0860-1 SUSE-SU-2022:0857-1 SUSE-SU-2022:0822-1\n SUSE-SU-2022:0777-1 SUSE-SU-2022:0782-1 SUSE-SU-2022:0820-1 SUSE-SU-2022:1026-1 SUSE-SU-2022:1025-1\n SUSE-SU-2022:1024-1 SUSE-SU-2022:0910-1 SUSE-SU-2022:0871-1 SUSE-SU-2022:0842-1 SUSE-SU-2022:0698-1\n SUSE-SU-2022:0908-1 SUSE-SU-2022:0918-1 SUSE-SU-2022:0733-1 SUSE-SU-2022:1043-1 SUSE-SU-2022:0811-1\n SUSE-SU-2022:0690-1 SUSE-SU-2022:0854-1 SUSE-SU-2022:0822-1 SUSE-SU-2022:0777-1 SUSE-SU-2022:0820-1\n SUSE-SU-2022:1036-1 SUSE-SU-2022:1026-1 SUSE-SU-2022:1025-1 SUSE-SU-2022:1024-1 SUSE-SU-2022:1012-1\n SUSE-SU-2022:1003-1 SUSE-SU-2022:0668-1 SUSE-SU-2022:0667-1 SUSE-SU-2022:0653-1 SUSE-SU-2022:0762-1\n SUSE-SU-2022:0762-1 SUSE-SU-2022:0871-1 SUSE-SU-2022:0909-1 SUSE-SU-2022:0842-1 SUSE-SU-2022:0698-1\n SUSE-SU-2022:0918-1 SUSE-SU-2022:1044-1 SUSE-SU-2022:0882-1\n * Feb 2022 (169) for SUSE-SU-2022:1254-1 SUSE-SU-2022:1160-1 SUSE-SU-2022:1294-1 SUSE-SU-2022:1151-1\n SUSE-SU-2022:1094-1 SUSE-SU-2022:1129-1 SUSE-SU-2022:1478-1 SUSE-SU-2022:1113-1 SUSE-SU-2022:1308-1\n SUSE-SU-2022:1168-1 SUSE-SU-2022:1312-1 SUSE-SU-2022:1272-1 SUSE-SU-2022:1217-1 SUSE-SU-2022:1266-1\n SUSE-SU-2022:1474-1 SUSE-SU-2022:1475-1 SUSE-SU-2022:1306-1 SUSE-SU-2022:1289-1 SUSE-SU-2022:1429-1\n SUSE-SU-2022:1417-1 SUSE-SU-2022:1160-1 SUSE-SU-2022:1285-1 SUSE-SU-2022:1105-1 SUSE-SU-2022:1294-1\n SUSE-SU-2022:1258-1 SUSE-SU-2022:1129-1 SUSE-SU-2022:1113-1 SUSE-SU-2022:1308-1 SUSE-SU-2022:1168-1\n SUSE-SU-2022:1312-1 SUSE-SU-2022:1217-1 SUSE-SU-2022:1267-1 SUSE-SU-2022:1267-1 SUSE-SU-2022:1275-1\n SUSE-SU-2022:1306-1 SUSE-SU-2022:1289-1 SUSE-SU-2022:1429-1 SUSE-SU-2022:1160-1 SUSE-SU-2022:1408-1\n SUSE-SU-2022:1294-1 SUSE-SU-2022:1129-1 SUSE-SU-2022:1113-1 SUSE-SU-2022:1308-1 SUSE-SU-2022:1168-1\n SUSE-SU-2022:1440-1 SUSE-SU-2022:1312-1 SUSE-SU-2022:1270-1 SUSE-SU-2022:1270-1 SUSE-SU-2022:1275-1\n SUSE-SU-2022:1123-1 SUSE-SU-2022:1306-1 SUSE-SU-2022:1289-1 SUSE-SU-2022:1428-1 SUSE-SU-2022:0733-1\n SUSE-SU-2022:1023-1 SUSE-SU-2022:0939-1 SUSE-SU-2022:0811-1 SUSE-SU-2022:0690-1 SUSE-SU-2022:0784-1\n SUSE-SU-2022:0895-1 SUSE-SU-2022:0860-1 SUSE-SU-2022:0857-1 SUSE-SU-2022:0822-1 SUSE-SU-2022:0777-1\n SUSE-SU-2022:0782-1 SUSE-SU-2022:0820-1 SUSE-SU-2022:0913-1 SUSE-SU-2022:1026-1 SUSE-SU-2022:1025-1\n SUSE-SU-2022:1024-1 SUSE-SU-2022:0765-1 SUSE-SU-2022:0910-1 SUSE-SU-2022:0871-1 SUSE-SU-2022:0730-1\n SUSE-SU-2022:0678-1 SUSE-SU-2022:0677-1 SUSE-SU-2022:0842-1 SUSE-SU-2022:0698-1 SUSE-SU-2022:0908-1\n SUSE-SU-2022:0881-1 SUSE-SU-2022:0928-1 SUSE-SU-2022:0733-1 SUSE-SU-2022:1062-1 SUSE-SU-2022:0811-1\n SUSE-SU-2022:0690-1 SUSE-SU-2022:0784-1 SUSE-SU-2022:0860-1 SUSE-SU-2022:0857-1 SUSE-SU-2022:0822-1\n SUSE-SU-2022:0777-1 SUSE-SU-2022:0782-1 SUSE-SU-2022:0820-1 SUSE-SU-2022:1026-1 SUSE-SU-2022:1025-1\n SUSE-SU-2022:1024-1 SUSE-SU-2022:0910-1 SUSE-SU-2022:0871-1 SUSE-SU-2022:0842-1 SUSE-SU-2022:0698-1\n SUSE-SU-2022:0908-1 SUSE-SU-2022:0918-1 SUSE-SU-2022:0733-1 SUSE-SU-2022:1043-1 SUSE-SU-2022:0811-1\n SUSE-SU-2022:0690-1 SUSE-SU-2022:0854-1 SUSE-SU-2022:0822-1 SUSE-SU-2022:0777-1 SUSE-SU-2022:0820-1\n SUSE-SU-2022:1036-1 SUSE-SU-2022:1026-1 SUSE-SU-2022:1025-1 SUSE-SU-2022:1024-1 SUSE-SU-2022:1012-1\n SUSE-SU-2022:1003-1 SUSE-SU-2022:0668-1 SUSE-SU-2022:0667-1 SUSE-SU-2022:0653-1 SUSE-SU-2022:0762-1\n SUSE-SU-2022:0762-1 SUSE-SU-2022:0871-1 SUSE-SU-2022:0909-1 SUSE-SU-2022:0842-1 SUSE-SU-2022:0698-1\n SUSE-SU-2022:0918-1 SUSE-SU-2022:1044-1 SUSE-SU-2022:0882-1 SUSE-SU-2022:0542-1 SUSE-SU-2022:0469-1 \n SUSE-SU-2022:0504-1 SUSE-SU-2022:0478-1 SUSE-SU-2022:0576-1 SUSE-SU-2022:0496-1 SUSE-SU-2022:0505-1\n SUSE-SU-2022:0323-1 SUSE-SU-2022:0565-1 SUSE-SU-2022:0441-1 SUSE-SU-2022:0372-1 SUSE-SU-2022:0561-1\n SUSE-SU-2022:0495-1 SUSE-SU-2022:0440-1 SUSE-SU-2022:0542-1 SUSE-SU-2022:0331-1 SUSE-SU-2022:0478-1\n SUSE-SU-2022:0575-1 SUSE-SU-2022:0496-1 SUSE-SU-2022:0505-1 SUSE-SU-2022:0565-1 SUSE-SU-2022:0441-1\n SUSE-SU-2022:0271-1 SUSE-SU-2022:0495-1 SUSE-SU-2022:0358-1 SUSE-SU-2022:0542-1 SUSE-SU-2022:0359-1\n SUSE-SU-2022:0478-1 SUSE-SU-2022:0575-1 SUSE-SU-2022:0496-1 SUSE-SU-2022:0505-1 SUSE-SU-2022:0565-1\n SUSE-SU-2022:0552-1 SUSE-SU-2022:0329-1 SUSE-SU-2022:0328-1 SUSE-SU-2022:0327-1 SUSE-SU-2022:0325-1\n SUSE-SU-2022:0271-1 SUSE-SU-2022:0362-1 SUSE-SU-2022:0362-1 SUSE-SU-2022:0495-1 SUSE-SU-2022:0358-1\n * Jan 2022 (218) for SUSE-SU-2022:1254-1 SUSE-SU-2022:1160-1 SUSE-SU-2022:1294-1 SUSE-SU-2022:1151-1\n SUSE-SU-2022:1094-1 SUSE-SU-2022:1129-1 SUSE-SU-2022:1478-1 SUSE-SU-2022:1113-1 SUSE-SU-2022:1308-1\n SUSE-SU-2022:1168-1 SUSE-SU-2022:1312-1 SUSE-SU-2022:1272-1 SUSE-SU-2022:1217-1 SUSE-SU-2022:1266-1\n SUSE-SU-2022:1474-1 SUSE-SU-2022:1475-1 SUSE-SU-2022:1306-1 SUSE-SU-2022:1289-1 SUSE-SU-2022:1429-1\n SUSE-SU-2022:1417-1 SUSE-SU-2022:1160-1 SUSE-SU-2022:1285-1 SUSE-SU-2022:1105-1 SUSE-SU-2022:1294-1\n SUSE-SU-2022:1258-1 SUSE-SU-2022:1129-1 SUSE-SU-2022:1113-1 SUSE-SU-2022:1308-1 SUSE-SU-2022:1168-1\n SUSE-SU-2022:1312-1 SUSE-SU-2022:1217-1 SUSE-SU-2022:1267-1 SUSE-SU-2022:1267-1 SUSE-SU-2022:1275-1\n SUSE-SU-2022:1306-1 SUSE-SU-2022:1289-1 SUSE-SU-2022:1429-1 SUSE-SU-2022:1160-1 SUSE-SU-2022:1408-1\n SUSE-SU-2022:1294-1 SUSE-SU-2022:1129-1 SUSE-SU-2022:1113-1 SUSE-SU-2022:1308-1 SUSE-SU-2022:1168-1\n SUSE-SU-2022:1440-1 SUSE-SU-2022:1312-1 SUSE-SU-2022:1270-1 SUSE-SU-2022:1270-1 SUSE-SU-2022:1275-1\n SUSE-SU-2022:1123-1 SUSE-SU-2022:1306-1 SUSE-SU-2022:1289-1 SUSE-SU-2022:1428-1 SUSE-SU-2022:0733-1\n SUSE-SU-2022:1023-1 SUSE-SU-2022:0939-1 SUSE-SU-2022:0811-1 SUSE-SU-2022:0690-1 SUSE-SU-2022:0784-1\n SUSE-SU-2022:0895-1 SUSE-SU-2022:0860-1 SUSE-SU-2022:0857-1 SUSE-SU-2022:0822-1 SUSE-SU-2022:0777-1\n SUSE-SU-2022:0782-1 SUSE-SU-2022:0820-1 SUSE-SU-2022:0913-1 SUSE-SU-2022:1026-1 SUSE-SU-2022:1025-1\n SUSE-SU-2022:1024-1 SUSE-SU-2022:0765-1 SUSE-SU-2022:0910-1 SUSE-SU-2022:0871-1 SUSE-SU-2022:0730-1\n SUSE-SU-2022:0678-1 SUSE-SU-2022:0677-1 SUSE-SU-2022:0842-1 SUSE-SU-2022:0698-1 SUSE-SU-2022:0908-1\n SUSE-SU-2022:0881-1 SUSE-SU-2022:0928-1 SUSE-SU-2022:0733-1 SUSE-SU-2022:1062-1 SUSE-SU-2022:0811-1\n SUSE-SU-2022:0690-1 SUSE-SU-2022:0784-1 SUSE-SU-2022:0860-1 SUSE-SU-2022:0857-1 SUSE-SU-2022:0822-1\n SUSE-SU-2022:0777-1 SUSE-SU-2022:0782-1 SUSE-SU-2022:0820-1 SUSE-SU-2022:1026-1 SUSE-SU-2022:1025-1\n SUSE-SU-2022:1024-1 SUSE-SU-2022:0910-1 SUSE-SU-2022:0871-1 SUSE-SU-2022:0842-1 SUSE-SU-2022:0698-1\n SUSE-SU-2022:0908-1 SUSE-SU-2022:0918-1 SUSE-SU-2022:0733-1 SUSE-SU-2022:1043-1 SUSE-SU-2022:0811-1\n SUSE-SU-2022:0690-1 SUSE-SU-2022:0854-1 SUSE-SU-2022:0822-1 SUSE-SU-2022:0777-1 SUSE-SU-2022:0820-1\n SUSE-SU-2022:1036-1 SUSE-SU-2022:1026-1 SUSE-SU-2022:1025-1 SUSE-SU-2022:1024-1 SUSE-SU-2022:1012-1\n SUSE-SU-2022:1003-1 SUSE-SU-2022:0668-1 SUSE-SU-2022:0667-1 SUSE-SU-2022:0653-1 SUSE-SU-2022:0762-1\n SUSE-SU-2022:0762-1 SUSE-SU-2022:0871-1 SUSE-SU-2022:0909-1 SUSE-SU-2022:0842-1 SUSE-SU-2022:0698-1\n SUSE-SU-2022:0918-1 SUSE-SU-2022:1044-1 SUSE-SU-2022:0882-1 SUSE-SU-2022:0542-1 SUSE-SU-2022:0469-1\n SUSE-SU-2022:0504-1 SUSE-SU-2022:0478-1 SUSE-SU-2022:0576-1 SUSE-SU-2022:0496-1 SUSE-SU-2022:0505-1\n SUSE-SU-2022:0323-1 SUSE-SU-2022:0565-1 SUSE-SU-2022:0441-1 SUSE-SU-2022:0372-1 SUSE-SU-2022:0561-1\n SUSE-SU-2022:0495-1 SUSE-SU-2022:0440-1 SUSE-SU-2022:0542-1 SUSE-SU-2022:0331-1 SUSE-SU-2022:0478-1\n SUSE-SU-2022:0575-1 SUSE-SU-2022:0496-1 SUSE-SU-2022:0505-1 SUSE-SU-2022:0565-1 SUSE-SU-2022:0441-1\n SUSE-SU-2022:0271-1 SUSE-SU-2022:0495-1 SUSE-SU-2022:0358-1 SUSE-SU-2022:0542-1 SUSE-SU-2022:0359-1\n SUSE-SU-2022:0478-1 SUSE-SU-2022:0575-1 SUSE-SU-2022:0496-1 SUSE-SU-2022:0505-1 SUSE-SU-2022:0565-1\n SUSE-SU-2022:0552-1 SUSE-SU-2022:0329-1 SUSE-SU-2022:0328-1 SUSE-SU-2022:0327-1 SUSE-SU-2022:0325-1\n SUSE-SU-2022:0271-1 SUSE-SU-2022:0362-1 SUSE-SU-2022:0362-1 SUSE-SU-2022:0495-1 SUSE-SU-2022:0358-1\n SUSE-SU-2022:0161-1 SUSE-SU-2022:0142-1 SUSE-SU-2022:0110-1 SUSE-SU-2022:0202-1 SUSE-SU-2022:0060-1\n SUSE-SU-2022:0118-1 SUSE-SU-2022:0189-1 SUSE-SU-2022:0061-1 SUSE-SU-2022:0030-1 SUSE-SU-2022:0115-1\n SUSE-SU-2022:0212-1 SUSE-SU-2022:0032-1 SUSE-SU-2022:0034-1 SUSE-SU-2022:0080-1 SUSE-SU-2022:0068-1\n SUSE-SU-2022:0166-1 SUSE-SU-2022:0107-1 SUSE-SU-2022:0081-1 SUSE-SU-2022:0179-1 SUSE-SU-2022:0160-1\n SUSE-SU-2022:0145-1 SUSE-SU-2022:0161-1 SUSE-SU-2022:0142-1 SUSE-SU-2022:0202-1 SUSE-SU-2022:0189-1\n SUSE-SU-2022:0030-1 SUSE-SU-2022:0115-1 SUSE-SU-2022:0212-1 SUSE-SU-2022:0042-1 SUSE-SU-2022:0034-1\n SUSE-SU-2022:0166-1 SUSE-SU-2022:0107-1 SUSE-SU-2022:0179-1 SUSE-SU-2022:0065-1 SUSE-SU-2022:0145-1\n SUSE-SU-2022:0161-1 SUSE-SU-2022:0142-1 SUSE-SU-2022:0202-1 SUSE-SU-2022:0189-1 SUSE-SU-2022:0030-1\n SUSE-SU-2022:0115-1 SUSE-SU-2022:0212-1 SUSE-SU-2022:0041-1 SUSE-SU-2022:0034-1 SUSE-SU-2022:0166-1\n SUSE-SU-2022:0107-1 SUSE-SU-2022:0179-1 SUSE-SU-2022:0065-1 SUSE-SU-2022:0145-1\n * Jun 2021 (80) for SUSE-SU-2021:2014-1 SUSE-SU-2021:1990-1 SUSE-SU-2021:1929-1 SUSE-SU-2021:1838-1\n SUSE-SU-2021:1906-1 SUSE-SU-2021:1880-1 SUSE-SU-2021:1837-1 SUSE-SU-2021:1842-1 SUSE-SU-2021:2152-1\n SUSE-SU-2021:2159-1 SUSE-SU-2021:1886-1 SUSE-SU-2021:1892-1 SUSE-SU-2021:1830-1 SUSE-SU-2021:2180-1\n SUSE-SU-2021:2135-1 SUSE-SU-2021:1957-1 SUSE-SU-2021:2156-1 SUSE-SU-2021:2016-1 SUSE-SU-2021:1913-1\n SUSE-SU-2021:1887-1 SUSE-SU-2021:1980-1 SUSE-SU-2021:1875-1 SUSE-SU-2021:1959-1 SUSE-SU-2021:1822-1\n SUSE-SU-2021:2137-1 SUSE-SU-2021:1943-1 SUSE-SU-2021:2175-1 SUSE-SU-2021:2006-1 SUSE-SU-2021:1900-1\n SUSE-SU-2021:2014-1 SUSE-SU-2021:1990-1 SUSE-SU-2021:1930-1 SUSE-SU-2021:1906-1 SUSE-SU-2021:1947-1\n SUSE-SU-2021:1842-1 SUSE-SU-2021:2152-1 SUSE-SU-2021:2159-1 SUSE-SU-2021:1886-1 SUSE-SU-2021:1892-1\n SUSE-SU-2021:1830-1 SUSE-SU-2021:2180-1 SUSE-SU-2021:2135-1 SUSE-SU-2021:2156-1 SUSE-SU-2021:1891-1\n SUSE-SU-2021:1980-1 SUSE-SU-2021:1875-1 SUSE-SU-2021:1960-1 SUSE-SU-2021:1822-1 SUSE-SU-2021:1943-1\n SUSE-SU-2021:1494-2 SUSE-SU-2021:2175-1 SUSE-SU-2021:2006-1 SUSE-SU-2021:1900-1 SUSE-SU-2021:2014-1\n SUSE-SU-2021:1990-1 SUSE-SU-2021:1930-1 SUSE-SU-2021:1906-1 SUSE-SU-2021:1894-1 SUSE-SU-2021:1842-1\n SUSE-SU-2021:2119-1 SUSE-SU-2021:2159-1 SUSE-SU-2021:1886-1 SUSE-SU-2021:1892-1 SUSE-SU-2021:1830-1\n SUSE-SU-2021:2180-1 SUSE-SU-2021:2135-1 SUSE-SU-2021:2156-1 SUSE-SU-2021:2060-1 SUSE-SU-2021:2042-1\n SUSE-SU-2021:2026-1 SUSE-SU-2021:1870-1 SUSE-SU-2021:1865-1 SUSE-SU-2021:1980-1 SUSE-SU-2021:1875-1\n SUSE-SU-2021:1960-1 SUSE-SU-2021:1822-1 SUSE-SU-2021:1943-1 SUSE-SU-2021:1494-2 SUSE-SU-2021:2175-1\n SUSE-SU-2021:2006-1\n * May 2021 (39) for SUSE-SU-2021:1580-1 SUSE-SU-2021:1621-1 SUSE-SU-2021:1490-1 SUSE-SU-2021:1783-1\n SUSE-SU-2021:1782-1 SUSE-SU-2021:1576-1 SUSE-SU-2021:1658-1 SUSE-SU-2021:1524-1 SUSE-SU-2021:1766-1\n SUSE-SU-2021:1595-1 SUSE-SU-2021:1572-1 SUSE-SU-2021:1760-1 SUSE-SU-2021:1646-1 SUSE-SU-2021:1813-1\n SUSE-SU-2021:1645-1 SUSE-SU-2021:1763-1 SUSE-SU-2021:1468-1 SUSE-SU-2021:1494-1 SUSE-SU-2021:1648-1\n SUSE-SU-2021:1492-1 SUSE-SU-2021:1621-1 SUSE-SU-2021:1658-1 SUSE-SU-2021:1596-1 SUSE-SU-2021:1646-1\n SUSE-SU-2021:1813-1 SUSE-SU-2021:1645-1 SUSE-SU-2021:1786-1 SUSE-SU-2021:1468-1 SUSE-SU-2021:1492-1\n SUSE-SU-2021:1621-1 SUSE-SU-2021:1658-1 SUSE-SU-2021:1623-1 SUSE-SU-2021:1646-1 SUSE-SU-2021:1813-1\n SUSE-SU-2021:1645-1 SUSE-SU-2021:1469-1 SUSE-SU-2021:1621-1 SUSE-SU-2021:1617-1 SUSE-SU-2021:1469-1\n * Apr 2021 (69) for SUSE-SU-2021:1181-1 SUSE-SU-2021:1023-1 SUSE-SU-2021:1274-1 SUSE-SU-2021:1438-1\n SUSE-SU-2021:1242-1 SUSE-SU-2021:1401-1 SUSE-SU-2021:1399-1 SUSE-SU-2021:1396-1 SUSE-SU-2021:1325-1\n SUSE-SU-2021:1152-1 SUSE-SU-2021:1125-1 SUSE-SU-2021:1248-1 SUSE-SU-2021:1210-1 SUSE-SU-2021:1175-1\n SUSE-SU-2021:1435-1 SUSE-SU-2021:1314-1 SUSE-SU-2021:1277-1 SUSE-SU-2021:1030-1 SUSE-SU-2021:1165-1\n SUSE-SU-2021:1111-1 SUSE-SU-2021:1453-1 SUSE-SU-2021:1174-1 SUSE-SU-2021:1159-1 SUSE-SU-2021:1315-1\n SUSE-SU-2021:1180-1 SUSE-SU-2021:1251-1 SUSE-SU-2021:1273-1 SUSE-SU-2021:1241-1 SUSE-SU-2021:1429-1\n SUSE-SU-2021:1401-1 SUSE-SU-2021:1399-1 SUSE-SU-2021:1325-1 SUSE-SU-2021:1152-1 SUSE-SU-2021:1435-1\n SUSE-SU-2021:1165-1 SUSE-SU-2021:1111-1 SUSE-SU-2021:1453-1 SUSE-SU-2021:1189-1 SUSE-SU-2021:1187-1\n SUSE-SU-2021:1252-1 SUSE-SU-2021:1431-1 SUSE-SU-2021:1273-1 SUSE-SU-2021:1240-1 SUSE-SU-2021:1401-1\n SUSE-SU-2021:1399-1 SUSE-SU-2021:1373-1 SUSE-SU-2021:1341-1 SUSE-SU-2021:1325-1 SUSE-SU-2021:1152-1\n SUSE-SU-2021:1075-1 SUSE-SU-2021:1074-1 SUSE-SU-2021:1435-1 SUSE-SU-2021:1111-1 SUSE-SU-2021:1453-1\n SUSE-SU-2021:1189-1 SUSE-SU-2021:1187-1 SUSE-SU-2021:1431-1 SUSE-SU-2021:1267-1 SUSE-SU-2021:1442-1\n SUSE-SU-2021:1439-1 SUSE-SU-2021:1305-1 SUSE-SU-2021:1401-1 SUSE-SU-2021:1399-1 SUSE-SU-2021:1325-1\n SUSE-SU-2021:1152-1 SUSE-SU-2021:1148-1 SUSE-SU-2021:1145-1 SUSE-SU-2021:1453-1 SUSE-SU-2021:1189-1\n * Mar 2021 New Security Announcement Patterns (79) for SUSE-SU-2021:0990-1 SUSE-SU-2021:0720-1\n SUSE-SU-2021:0929-1 SUSE-SU-2021:0988-1 SUSE-SU-2021:0975-1 SUSE-SU-2021:0776-1 SUSE-SU-2021:0794-1\n SUSE-SU-2021:0886-1 SUSE-SU-2021:0887-1 SUSE-SU-2021:0675-1 SUSE-SU-2021:0987-1 SUSE-SU-2021:0954-1\n SUSE-SU-2021:0752-1 SUSE-SU-2021:0725-1 SUSE-SU-2021:0998-1 SUSE-SU-2021:0693-1 SUSE-SU-2021:0663-1\n SUSE-SU-2021:0932-1 SUSE-SU-2021:0999-1 SUSE-SU-2021:0667-1 SUSE-SU-2021:0742-1 SUSE-SU-2021:0739-1\n SUSE-SU-2021:0681-1 SUSE-SU-2021:0801-1 SUSE-SU-2021:0756-1 SUSE-SU-2021:0713-1 SUSE-SU-2021:0779-1\n SUSE-SU-2021:0745-1 SUSE-SU-2021:0929-1 SUSE-SU-2021:0988-1 SUSE-SU-2021:0794-1 SUSE-SU-2021:0675-1\n SUSE-SU-2020:2173-2 SUSE-SU-2021:0954-1 SUSE-SU-2021:0752-1 SUSE-SU-2021:0725-1 SUSE-SU-2021:0693-1\n SUSE-SU-2021:0663-1 SUSE-SU-2021:0932-1 SUSE-SU-2021:0999-1 SUSE-SU-2021:0667-1 SUSE-SU-2021:0736-1\n SUSE-SU-2021:0681-1 SUSE-SU-2021:0801-1 SUSE-SU-2021:0756-1 SUSE-SU-2021:0745-1 SUSE-SU-2021:0929-1\n SUSE-SU-2021:0794-1 SUSE-SU-2021:0675-1 SUSE-SU-2020:2173-2 SUSE-SU-2021:0939-1 SUSE-SU-2021:0693-1\n SUSE-SU-2021:0932-1 SUSE-SU-2021:0999-1 SUSE-SU-2021:0667-1 SUSE-SU-2021:0870-1 SUSE-SU-2021:0835-1\n SUSE-SU-2021:0743-1 SUSE-SU-2021:0682-1 SUSE-SU-2021:0801-1 SUSE-SU-2021:0756-1 SUSE-SU-2021:0745-1\n SUSE-SU-2021:0929-1 SUSE-SU-2021:0928-1 SUSE-SU-2021:0794-1 SUSE-SU-2021:0675-1 SUSE-SU-2020:2173-2\n SUSE-SU-2021:0939-1 SUSE-SU-2021:0693-1 SUSE-SU-2021:0932-1 SUSE-SU-2021:0999-1 SUSE-SU-2021:0999-1\n SUSE-SU-2021:0667-1 SUSE-SU-2021:0870-1 SUSE-SU-2021:0835-1 SUSE-SU-2021:0744-1 SUSE-SU-2021:0679-1\n SUSE-SU-2021:0801-1 SUSE-SU-2021:0756-1\n- New regular patterns:\n * sle12sp5/vmtools-000004682.py: Extensive logging in vmware-vmsvc-root.log with open-vm-tools (bsc#1162119)\n * sle12sp5/tailf-000019885.py: Aborting tailf causes bash session to be corrupted (bsc#1177369)\n * sle12sp5/systemd-current-failed-7017137.py: Check for failed systemd services\n * sle12sp5/systemd_SUSE-SU-2021_2405-1_12.5.py: Security fixes for SUSE Linux Enterprise 12 SP5\n * sle12sp5/sdagentconfig-000020301.py: SCA Appliance configuration reports ERROR 2002 HY000 Cannot connect to MySQL\n server (bsc#1183464)\n * sle12sp5/qemu_SUSE-SU-2021_2448-1_12.5.py: Security fixes for SUSE Linux Enterprise 12 Service Pack 5\n * sle12sp5/python-py_SUSE-SU-2021_2236-1_12.5.py: Security fixes for SUSE Linux Enterprise 12 Service Pack 5\n * sle12sp5/permissions_SUSE-SU-2021_2280-1_12.5.py: Security fixes for SUSE Linux Enterprise 12 Service Pack 5\n * sle12sp5/nobarrier-000020240.py: XFS nobarrier option has been completely deprecated starting from\n SUSE Linux Enterprise 15 Service Pack 2 (bsc#1176375)\n * sle12sp5/nfstimeout_125-000019943.py: Delayed outgoing packets causing NFS timeouts (bsc#1183405)\n * sle12sp5/nfsperf-125-000019615.py: Performance loss when writing large files over NFS (bsc#1163403)\n * sle12sp5/nfsipv6_125-000019618.py: Timeout when attempting NFS mount over IPv6 (bsc#1144162)\n * sle12sp5/lscpu-000019784-12.py: lscpu segfaults on IBM Power8 - Assertion failed (bsc#1175623)\n * sle12sp5/linuxptp_SUSE-SU-2021_2545-1_12.5.py: Security fixes for SUSE Linux Enterprise 12 SP5\n * sle12sp5/kgraft-patch_SUSE-SU-2021_2462-1_12.5.py: Security fixes for SUSE Linux Kernel Live Patch 12 SP5\n * sle12sp5/kgraft-patch_SUSE-SU-2021_2389-1_12.5.py: Security fixes for SUSE Linux Kernel Live Patch 12 SP5\n * sle12sp5/kgraft-patch_SUSE-SU-2021_2324-1_12.5.py: Security fixes for SUSE Linux Kernel Live Patch 12 SP5\n * sle12sp5/kernel_SUSE-SU-2021_2416-1_12.5.py: Security fixes for SUSE Linux Enterprise 12 SP5\n * sle12sp5/kernel_SUSE-SU-2021_2407-1_12.5.py: Security fixes for SUSE Linux Enterprise 12 SP5\n * sle12sp5/kernel_SUSE-SU-2021_2321-1_12.5.py: Security fixes for SUSE Linux Enterprise 12 SP5\n * sle12sp5/intelpstate_125-000020273.py: Frequency scaling driver intel_pstate not loading on some Intel Xeon\n Scalable processors (bsc#1185758)\n * sle12sp5/glibc_SUSE-SU-2021_2480-1_12.5.py: Security fixes for SUSE Linux Enterprise 12 SP5\n * sle12sp5/ghostcat_125-000019606.py: Ghostcat - Apache Tomcat AJP File Read/Inclusion Vulnerability (bsc#1164692)\n * sle12sp5/docore_125-000019881.py: System crash in do_coredump() when a process is restarted (bsc#1182194)\n * sle12sp5/dbus-1_SUSE-SU-2021_2424-1_12.5.py: Security fixes for SUSE Linux Enterprise 12 SP5\n * sle12sp5/cronlimit-000020338.py: crontab - More than 1000 entries in crontab file, can\u0027t install (bsc#1187508)\n * sle12sp5/btrfscrash-125-000019638.py: System crash during a BTRFS maintenance task (bsc#1163508)\n * sle12sp5/btrfscrash-125-000019638.py: System crash during a BTRFS maintenance task (bsc#1163508)\n * sle12sp4/vmtools-000004682.py: Extensive logging in vmware-vmsvc-root.log with open-vm-tools (bsc#1162119)\n * sle12sp4/tcpdumpcore-000019666.py: Running tcpdump on a SUSE Linux Enterprise 12 Service Pack 4 System with Kernel\n 4.12.14-95.48-default may crash the system (bsc#1176579)\n * sle12sp4/tailf-000019885.py: Aborting tailf causes bash session to be corrupted (bsc#1177369)\n * sle12sp4/systemd-current-failed-7017137.py: Check for failed systemd services\n * sle12sp4/systemd_SUSE-SU-2021_2423-1_12.4.ltss.py: Security fixes for SUSE Linux Enterprise 12 SP4 LTSS\n * sle12sp4/sdagentconfig-000020301.py: SCA Appliance configuration reports ERROR 2002 HY000 Cannot connect to MySQL\n server (bsc#1183464)\n * sle12sp4/plymouth-000019595.py: plymouth hang - login to console not possible\n * sle12sp4/nobarrier-000020240.py: XFS nobarrier option has been completely deprecated starting from SUSE Linux \n Enterprise 15 Service Pack 2 (bsc#1176375)\n * sle12sp4/nfsperf-124-000019615.py: Performance loss when writing large files over NFS (bsc#1163403)\n * sle12sp4/mpiofindpaths-000019511.py: Using the find_multipaths yes option in multipath.conf (bsc#1138452)\n * sle12sp4/linuxptp_SUSE-SU-2021_2443-1_12.4.ltss.py: Security fixes for SUSE Linux Enterprise 12 SP4 LTSS\n * sle12sp4/kgraft-patch_SUSE-SU-2021_2546-1_12.4.ltss.py: Security fixes for SUSE Linux Kernel Live Patch 12 SP4 LTSS\n * sle12sp4/kgraft-patch_SUSE-SU-2021_2389-1_12.4.ltss.py: Security fixes for SUSE Linux Kernel Live Patch 12 SP4 LTSS\n * sle12sp4/kernel_SUSE-SU-2021_2422-1_12.4.ltss.py: Security fixes for SUSE Linux Enterprise 12 SP4 LTSS\n * sle12sp4/ghostcat_124-000019606.py: Ghostcat - Apache Tomcat AJP File Read/Inclusion Vulnerability (bsc#1164692)\n * sle12sp4/docore_124-000019881.py: System crash in do_coredump() when a process is restarted (bsc#1182194)\n * sle12sp4/curl_SUSE-SU-2021_2425-1_12.4.ltss.py: Security fixes for SUSE Linux Enterprise 12 SP4 LTSS\n * sle12sp4/cronlimit-000020338.py: crontab - More than 1000 entries in crontab file, can\u0027t install (bsc#1187508)\n * sle12sp4/btrfscrash-124-000019638.py: System crash during a BTRFS maintenance task (bsc#1163508)\n * sle12sp4/btrfscrash-124-000019638.py: System crash during a BTRFS maintenance task (bsc#1163508)\n * sle12sp3/systemd-current-failed-7017137.py: Check for failed systemd services\n * sle12sp3/systemd_SUSE-SU-2021_2423-1_12.3.ltss.py: Security fixes for SUSE Linux Enterprise 12 SP3 LTSS\n * sle12sp3/mpiofindpaths-000019511.py: Using the find_multipaths yes option in multipath.conf (bsc#1138452)\n * sle12sp3/linuxptp_SUSE-SU-2021_2443-1_12.3.ltss.py: Security fixes for SUSE Linux Enterprise 12 SP3 LTSS\n * sle12sp3/kgraft-patch_SUSE-SU-2021_2563-1_12.3.ltss.py: Security fixes for SUSE Linux Kernel Live Patch 12 SP3 LTSS\n * sle12sp3/kgraft-patch_SUSE-SU-2021_2538-1_12.3.ltss.py: Security fixes for SUSE Linux Kernel Live Patch 12 SP3 LTSS\n * sle12sp3/kgraft-patch_SUSE-SU-2021_2451-1_12.3.ltss.py: Security fixes for SUSE Linux Kernel Live Patch 12 SP3 LTSS\n * sle12sp3/kgraft-patch_SUSE-SU-2021_2433-1_12.3.ltss.py: Security fixes for SUSE Linux Kernel Live Patch 12 SP3 LTSS\n * sle12sp3/kgraft-patch_SUSE-SU-2021_2389-1_12.3.ltss.py: Security fixes for SUSE Linux Kernel Live Patch 12 SP3 LTSS\n * sle12sp3/ghostcat_123-000019606.py: Ghostcat - Apache Tomcat AJP File Read/Inclusion Vulnerability (bsc#1164692)\n * sle12sp2/systemd-current-failed-7017137.py: Check for failed systemd services\n * sle12sp2/ghostcat_122-000019606.py: Ghostcat - Apache Tomcat AJP File Read/Inclusion Vulnerability (bsc#1164692)\n * sle12sp1/systemd-current-failed-7017137.py: Check for failed systemd services\n * sle12sp1/ghostcat_121-000019606.py: Ghostcat - Apache Tomcat AJP File Read/Inclusion Vulnerability (bsc#1164692)\n * sle12sp0/systemd-current-failed-7017137.py: Check for failed systemd services\n * sle12all/zypproxy-000020275.py: zypper commands return Error code HTTP response 0\n * sle12all/zerologon-000019713.py: Zerologon aka CVE-2020-1472 (bsc#1176579)\n * sle12all/sysdjobs-000020261.py: Troubleshooting systemd jobs that are hung or stuck\n * sle12all/softlock-000018705.py: soft lockup messages about\n * sle12all/sizingbtrfs-000018798.py: How to resize/extend a btrfs formatted root partition\n * sle12all/scatool-000020253.py: scatool fails to analyze supportconfigs with xz compression (bsc#1186316)\n * sle12all/postfix-000020356.py: Postfix fails to start with IPv6 disabled\n * sle12all/lvmsnapshot-000019858.py: LVM snapshot changed state to Invalid and should be removed\n * sle12all/lvm-volume-list-7016683.py: Fixed execution error\n * sle12all/iscsimnts-000019648.py: Proper mount options for iSCSI drives\n * sle12all/coredumpctl-000018634.py: How to obtain systemd service core dumps\n * sle12all/btrfsmaster-000018779.py: BTRFS Master TID\n * sle12all/btrfscron-000019583.py: After upgrading BTRFS cron jobs are not working anymore (bsc#1159891)\n * sle12all/blacklist-000019607.py: System exit to emergency shell at boot with multipath enabled\n * CVE-2020-12351, CVE-2020-12352, CVE-2020-24490: BleedingTooth\n + sle12sp5/bleedingtooth_125-000019735.py\n + sle12sp4/bleedingtooth_124-000019735.py\n + sle12sp3/bleedingtooth_123-000019735.py\n + sle12sp2/bleedingtooth_122-000019735.py\n * CVE-2020-0548, CVE-2020-0549: L1D data cache eviction and Vector Register sampling (bsc#1156353)\n + sle12sp5/ucodeintel_125-000019635.py\n + sle12sp4/ucodeintel_124-000019635.py\n + sle12sp3/ucodeintel_123-000019635.py\n + sle12sp2/ucodeintel_122-000019635.py\n * CVE-2020-0543: Special Register Buffer Data Sampling aka CrossTalk (bsc#1154824)\n + sle12sp5/crosstalk_125-000019643.py\n + sle12sp4/crosstalk_124-000019643.py\n + sle12sp3/crosstalk_123-000019643.py\n + sle12sp2/crosstalk_122-000019643.py\n- Updated patterns:\n * sle12all/scc-expired.py: Identify if SCC registrations have expired\n * sle12all/lvm-00003.pl: Physical volumes can be removed or damaged and appear missing. This pattern looks for\n missing physical volumes\n * sle12all/lvm-00004.pl: LMV Check sum errors may indicate corrupted LVM metadata\n * sle12all/lvm-00005.pl: Duplicate volume groups are usually a configuration issue\n- Renamed patterns for file standard:\n * Renamed patterns/SLE/sle12all/scc-expired.py to patterns/SLE/sle12all/bhc-scc-expired.py\n * Renamed patterns/SLE/sle12all/scc-registered.py to patterns/SLE/sle12all/bhc-scc-registered.py\n- Deleted regular patterns (1)\n * sle12all/systemd-current-failed-7017137.py: Moved to service packs with fixes (bsc#1187983)\n * sle12all/bhc-scc.sh: Pattern removed (bsc#1184594)\n * sle12all/pdc-00001.pl: Pattern removed OES Dependent\n * sle12all/pdc-00002.pl: Pattern removed OES Dependent\n * sle12all/lvm-00001.pl: Pattern removed\n * sle12all/lvm-00002.pl: Pattern removed\n\nsca-patterns-sle11:\n\n- Version update from 1.3.1 to 1.5.1 to implement the conversion of SCA Tool to Python3 (jsc#SLE-25064, jsc#SLE-24335):\n * Convert SCA Tool from Python2 to Python3 (bsc#1191005, SLE-21579)\n * Removed OES dependent patterns (bsc#1196873)\n- New security announcement patterns:\n * Apr 2022 (5) for SUSE-SU-2022:14938-1 SUSE-SU-2022:14943-1 SUSE-SU-2022:14936-1 SUSE-SU-2022:14941-1 \n SUSE-SU-2022:14951-1\n * Mar 2022 (19) for SUSE-SU-2022:14938-1 SUSE-SU-2022:14943-1 SUSE-SU-2022:14936-1 SUSE-SU-2022:14941-1\n SUSE-SU-2022:14951-1 SUSE-SU-2022:14910-1 SUSE-SU-2022:14929-1 SUSE-SU-2022:14908-1 SUSE-SU-2022:14914-1\n SUSE-SU-2022:14915-1 SUSE-SU-2022:14906-1 SUSE-SU-2022:14904-1 SUSE-SU-2022:14909-1 SUSE-SU-2022:14905-1\n SUSE-SU-2022:14927-1 SUSE-SU-2022:14923-1 SUSE-SU-2022:14934-1 SUSE-SU-2022:14903-1 SUSE-SU-2022:14924-1\n * Feb 2022 (27) for SUSE-SU-2022:14938-1 SUSE-SU-2022:14943-1 SUSE-SU-2022:14936-1 SUSE-SU-2022:14941-1\n SUSE-SU-2022:14951-1 SUSE-SU-2022:14910-1 SUSE-SU-2022:14929-1 SUSE-SU-2022:14908-1 SUSE-SU-2022:14914-1\n SUSE-SU-2022:14915-1 SUSE-SU-2022:14906-1 SUSE-SU-2022:14904-1 SUSE-SU-2022:14909-1 SUSE-SU-2022:14905-1\n SUSE-SU-2022:14927-1 SUSE-SU-2022:14923-1 SUSE-SU-2022:14934-1 SUSE-SU-2022:14903-1 SUSE-SU-2022:14924-1\n SUSE-SU-2022:14889-1 SUSE-SU-2022:14886-1 SUSE-SU-2022:14888-1 SUSE-SU-2022:14890-1 SUSE-SU-2022:14887-1\n SUSE-SU-2022:14896-1 SUSE-SU-2022:14884-1 SUSE-SU-2022:14894-1\n * Jan 2022 (34) for SUSE-SU-2022:14938-1 SUSE-SU-2022:14943-1 SUSE-SU-2022:14936-1 SUSE-SU-2022:14941-1\n SUSE-SU-2022:14951-1 SUSE-SU-2022:14910-1 SUSE-SU-2022:14929-1 SUSE-SU-2022:14908-1 SUSE-SU-2022:14914-1\n SUSE-SU-2022:14915-1 SUSE-SU-2022:14906-1 SUSE-SU-2022:14904-1 SUSE-SU-2022:14909-1 SUSE-SU-2022:14905-1\n SUSE-SU-2022:14927-1 SUSE-SU-2022:14923-1 SUSE-SU-2022:14934-1 SUSE-SU-2022:14903-1 SUSE-SU-2022:14924-1\n SUSE-SU-2022:14889-1 SUSE-SU-2022:14886-1 SUSE-SU-2022:14888-1 SUSE-SU-2022:14890-1 SUSE-SU-2022:14887-1\n SUSE-SU-2022:14896-1 SUSE-SU-2022:14884-1 SUSE-SU-2022:14894-1 SUSE-SU-2022:14880-1 SUSE-SU-2022:14881-1\n SUSE-SU-2022:14872-1 SUSE-SU-2022:14875-1 SUSE-SU-2022:14878-1 SUSE-SU-2022:14882-1 SUSE-SU-2022:14879-1\n * Jul 2021 (5) for SUSE-SU-2021:14769-1 SUSE-SU-2021:14771-1 SUSE-SU-2021:14766-1 SUSE-SU-2021:14764-1\n SUSE-SU-2021:14761-1\n * Jun 2021 (12) for SUSE-SU-2021:14747-1 SUSE-SU-2021:14748-1 SUSE-SU-2021:14744-1 SUSE-SU-2021:14757-1\n SUSE-SU-2021:14743-1 SUSE-SU-2021:14758-1 SUSE-SU-2021:14751-1 SUSE-SU-2021:14750-1 SUSE-SU-2021:14740-1\n SUSE-SU-2021:14760-1 SUSE-SU-2021:14759-1 SUSE-SU-2021:14749-1\n * May 2021 (5) for SUSE-SU-2021:14729-1 SUSE-SU-2021:14724-1 SUSE-SU-2021:14738-1 SUSE-SU-2021:14728-1\n SUSE-SU-2021:14714-1\n * Apr 2021 (10) for SUSE-SU-2021:14690-1 SUSE-SU-2021:14702-1 SUSE-SU-2021:14705-1 SUSE-SU-2021:14709-1\n SUSE-SU-2021:14700-1 SUSE-SU-2021:14708-1 SUSE-SU-2021:14684-1 SUSE-SU-2021:14704-1 SUSE-SU-2021:14712-1\n SUSE-SU-2021:14692-1\n- New regular patterns:\n * sle11sp4/ghostcat_114-000019606.py: Ghostcat - Apache Tomcat AJP File Read/Inclusion Vulnerability (bsc#1164692)\n * sle11sp3/ghostcat_113-000019606.py: Ghostcat - Apache Tomcat AJP File Read/Inclusion Vulnerability (bsc#1164692)\n * sle11all/softlock-000018705.py: soft lockup messages about\n * sle11all/sizingbtrfs-000018798.py: How to resize/extend a btrfs formatted root partition\n * sle11all/btrfsmaster-000018779.py: BTRFS Master TID\n * CVE-2020-0543: sle11sp4/crosstalk_114-000019643.py: Special Register Buffer Data Sampling aka CrossTalk\n (bsc#1154824)\n- Deleted regular patterns:\n * sle11all/bhc-scc.sh: Pattern removed (bsc#1184594)\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2022-4496,SUSE-SLE-Module-Server-Applications-15-SP3-2022-4496,openSUSE-SLE-15.3-2022-4496", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-fu-2022_4496-1.json" }, { "category": "self", "summary": "URL for SUSE-FU-2022:4496-1", "url": "https://www.suse.com/support/update/announcement//suse-fu-20224496-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-FU-2022:4496-1", "url": "https://lists.suse.com/pipermail/sle-updates/2022-December/026906.html" }, { "category": "self", "summary": "SUSE Bug 1045605", "url": "https://bugzilla.suse.com/1045605" }, { "category": "self", "summary": "SUSE Bug 1124793", "url": "https://bugzilla.suse.com/1124793" }, { "category": "self", "summary": "SUSE Bug 1131489", "url": "https://bugzilla.suse.com/1131489" }, { "category": "self", "summary": "SUSE Bug 1138452", "url": "https://bugzilla.suse.com/1138452" }, { "category": "self", "summary": "SUSE Bug 1144162", "url": "https://bugzilla.suse.com/1144162" }, { "category": "self", "summary": "SUSE Bug 1152800", "url": "https://bugzilla.suse.com/1152800" }, { "category": "self", "summary": "SUSE Bug 1154768", "url": "https://bugzilla.suse.com/1154768" }, { "category": "self", "summary": "SUSE Bug 1154824", "url": "https://bugzilla.suse.com/1154824" }, { "category": "self", "summary": "SUSE Bug 1155181", "url": "https://bugzilla.suse.com/1155181" }, { "category": "self", "summary": "SUSE Bug 1155990", "url": "https://bugzilla.suse.com/1155990" }, { "category": "self", "summary": "SUSE Bug 1156353", "url": "https://bugzilla.suse.com/1156353" }, { "category": "self", "summary": "SUSE Bug 1157778", "url": "https://bugzilla.suse.com/1157778" }, { "category": "self", "summary": "SUSE Bug 1158890", "url": "https://bugzilla.suse.com/1158890" }, { "category": "self", "summary": "SUSE Bug 1159356", "url": "https://bugzilla.suse.com/1159356" }, { "category": "self", "summary": "SUSE Bug 1159891", "url": "https://bugzilla.suse.com/1159891" }, { "category": "self", "summary": "SUSE Bug 1162119", "url": "https://bugzilla.suse.com/1162119" }, { "category": "self", "summary": "SUSE Bug 1163403", "url": "https://bugzilla.suse.com/1163403" }, { "category": "self", "summary": "SUSE Bug 1163508", "url": "https://bugzilla.suse.com/1163508" }, { "category": "self", "summary": "SUSE Bug 1164692", "url": "https://bugzilla.suse.com/1164692" }, { "category": "self", "summary": "SUSE Bug 1167689", "url": "https://bugzilla.suse.com/1167689" }, { "category": "self", "summary": "SUSE Bug 1175623", "url": "https://bugzilla.suse.com/1175623" }, { "category": "self", "summary": "SUSE Bug 1176021", "url": "https://bugzilla.suse.com/1176021" }, { "category": "self", "summary": "SUSE Bug 1176140", "url": "https://bugzilla.suse.com/1176140" }, { "category": "self", "summary": "SUSE Bug 1176375", "url": "https://bugzilla.suse.com/1176375" }, { "category": "self", "summary": "SUSE Bug 1176579", "url": "https://bugzilla.suse.com/1176579" }, { "category": "self", "summary": "SUSE Bug 1177369", "url": "https://bugzilla.suse.com/1177369" }, { "category": "self", "summary": "SUSE Bug 1177753", "url": "https://bugzilla.suse.com/1177753" }, { "category": "self", "summary": "SUSE Bug 1179170", "url": "https://bugzilla.suse.com/1179170" }, { "category": "self", "summary": "SUSE Bug 1180894", "url": "https://bugzilla.suse.com/1180894" }, { "category": "self", "summary": "SUSE Bug 1182194", "url": "https://bugzilla.suse.com/1182194" }, { "category": "self", "summary": "SUSE Bug 1182905", "url": "https://bugzilla.suse.com/1182905" }, { "category": "self", "summary": "SUSE Bug 1182917", "url": "https://bugzilla.suse.com/1182917" }, { "category": "self", "summary": "SUSE Bug 1183405", "url": "https://bugzilla.suse.com/1183405" }, { "category": "self", "summary": "SUSE Bug 1183464", "url": "https://bugzilla.suse.com/1183464" }, { "category": "self", "summary": "SUSE Bug 1184594", "url": "https://bugzilla.suse.com/1184594" }, { "category": "self", "summary": "SUSE Bug 1185357", "url": "https://bugzilla.suse.com/1185357" }, { "category": "self", "summary": "SUSE Bug 1185593", "url": "https://bugzilla.suse.com/1185593" }, { "category": "self", "summary": "SUSE Bug 1185594", "url": "https://bugzilla.suse.com/1185594" }, { "category": "self", "summary": "SUSE Bug 1185684", "url": "https://bugzilla.suse.com/1185684" }, { "category": "self", "summary": "SUSE Bug 1185758", "url": "https://bugzilla.suse.com/1185758" }, { "category": "self", "summary": "SUSE Bug 1185857", "url": "https://bugzilla.suse.com/1185857" }, { "category": "self", "summary": "SUSE Bug 1186034", "url": "https://bugzilla.suse.com/1186034" }, { "category": "self", "summary": "SUSE Bug 1186312", "url": "https://bugzilla.suse.com/1186312" }, { "category": "self", "summary": "SUSE Bug 1186316", "url": "https://bugzilla.suse.com/1186316" }, { "category": "self", "summary": "SUSE Bug 1186317", "url": "https://bugzilla.suse.com/1186317" }, { "category": "self", "summary": "SUSE Bug 1186420", "url": "https://bugzilla.suse.com/1186420" }, { "category": "self", "summary": "SUSE Bug 1186442", "url": "https://bugzilla.suse.com/1186442" }, { "category": "self", "summary": "SUSE Bug 1186792", "url": "https://bugzilla.suse.com/1186792" }, { "category": "self", "summary": "SUSE Bug 1187194", "url": "https://bugzilla.suse.com/1187194" }, { "category": "self", "summary": "SUSE Bug 1187508", "url": "https://bugzilla.suse.com/1187508" }, { "category": "self", "summary": "SUSE Bug 1187983", "url": "https://bugzilla.suse.com/1187983" }, { "category": "self", "summary": "SUSE Bug 1189394", "url": "https://bugzilla.suse.com/1189394" }, { "category": "self", "summary": "SUSE Bug 1189483", "url": "https://bugzilla.suse.com/1189483" }, { "category": "self", "summary": "SUSE Bug 1189889", "url": "https://bugzilla.suse.com/1189889" }, { "category": "self", "summary": "SUSE Bug 1190260", "url": "https://bugzilla.suse.com/1190260" }, { "category": "self", "summary": "SUSE Bug 1190460", "url": "https://bugzilla.suse.com/1190460" }, { "category": "self", "summary": "SUSE Bug 1191005", "url": "https://bugzilla.suse.com/1191005" }, { "category": "self", "summary": "SUSE Bug 1191199", "url": "https://bugzilla.suse.com/1191199" }, { "category": "self", "summary": "SUSE Bug 1193878", "url": "https://bugzilla.suse.com/1193878" }, { "category": "self", "summary": "SUSE Bug 1196730", "url": "https://bugzilla.suse.com/1196730" }, { "category": "self", "summary": "SUSE Bug 1196873", "url": "https://bugzilla.suse.com/1196873" }, { "category": "self", "summary": "SUSE CVE CVE-2020-0543 page", "url": "https://www.suse.com/security/cve/CVE-2020-0543/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-0548 page", "url": "https://www.suse.com/security/cve/CVE-2020-0548/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-0549 page", "url": "https://www.suse.com/security/cve/CVE-2020-0549/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12351 page", "url": "https://www.suse.com/security/cve/CVE-2020-12351/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12352 page", "url": "https://www.suse.com/security/cve/CVE-2020-12352/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-1472 page", "url": "https://www.suse.com/security/cve/CVE-2020-1472/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-24490 page", "url": "https://www.suse.com/security/cve/CVE-2020-24490/" } ], "title": "Feature update for SCA patterns", "tracking": { "current_release_date": "2022-12-15T09:43:54Z", "generator": { "date": "2022-12-15T09:43:54Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-FU-2022:4496-1", "initial_release_date": "2022-12-15T09:43:54Z", "revision_history": [ { "date": "2022-12-15T09:43:54Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "sca-patterns-base-1.5.0-150300.10.3.1.noarch", "product": { "name": "sca-patterns-base-1.5.0-150300.10.3.1.noarch", "product_id": "sca-patterns-base-1.5.0-150300.10.3.1.noarch" } }, { "category": "product_version", "name": "sca-patterns-hae-1.5.1-150300.10.3.1.noarch", "product": { "name": "sca-patterns-hae-1.5.1-150300.10.3.1.noarch", "product_id": "sca-patterns-hae-1.5.1-150300.10.3.1.noarch" } }, { "category": "product_version", "name": "sca-patterns-sle11-1.5.1-150300.18.3.1.noarch", "product": { "name": "sca-patterns-sle11-1.5.1-150300.18.3.1.noarch", "product_id": "sca-patterns-sle11-1.5.1-150300.18.3.1.noarch" } }, { "category": "product_version", "name": "sca-patterns-sle12-1.5.1-150300.3.3.1.noarch", "product": { "name": "sca-patterns-sle12-1.5.1-150300.3.3.1.noarch", "product_id": "sca-patterns-sle12-1.5.1-150300.3.3.1.noarch" } }, { "category": "product_version", "name": "sca-patterns-sle15-1.5.1-150300.14.3.1.noarch", "product": { "name": "sca-patterns-sle15-1.5.1-150300.14.3.1.noarch", "product_id": "sca-patterns-sle15-1.5.1-150300.14.3.1.noarch" } }, { "category": "product_version", "name": "sca-patterns-suma-1.5.0-150300.9.3.1.noarch", "product": { "name": "sca-patterns-suma-1.5.0-150300.9.3.1.noarch", "product_id": "sca-patterns-suma-1.5.0-150300.9.3.1.noarch" } }, { "category": "product_version", "name": "sca-server-report-1.5.1-150300.11.3.1.noarch", "product": { "name": "sca-server-report-1.5.1-150300.11.3.1.noarch", "product_id": "sca-server-report-1.5.1-150300.11.3.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Module for Server Applications 15 SP3", "product": { "name": "SUSE Linux Enterprise Module for Server Applications 15 SP3", "product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-server-applications:15:sp3" } } }, { "category": "product_name", "name": "openSUSE Leap 15.3", "product": { "name": "openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap:15.3" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "sca-patterns-base-1.5.0-150300.10.3.1.noarch as component of SUSE Linux Enterprise Module for Server Applications 15 SP3", "product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-base-1.5.0-150300.10.3.1.noarch" }, "product_reference": "sca-patterns-base-1.5.0-150300.10.3.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "sca-patterns-hae-1.5.1-150300.10.3.1.noarch as component of SUSE Linux Enterprise Module for Server Applications 15 SP3", "product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-hae-1.5.1-150300.10.3.1.noarch" }, "product_reference": "sca-patterns-hae-1.5.1-150300.10.3.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "sca-patterns-sle11-1.5.1-150300.18.3.1.noarch as component of SUSE Linux Enterprise Module for Server Applications 15 SP3", "product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle11-1.5.1-150300.18.3.1.noarch" }, "product_reference": "sca-patterns-sle11-1.5.1-150300.18.3.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "sca-patterns-sle12-1.5.1-150300.3.3.1.noarch as component of SUSE Linux Enterprise Module for Server Applications 15 SP3", "product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle12-1.5.1-150300.3.3.1.noarch" }, "product_reference": "sca-patterns-sle12-1.5.1-150300.3.3.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "sca-patterns-sle15-1.5.1-150300.14.3.1.noarch as component of SUSE Linux Enterprise Module for Server Applications 15 SP3", "product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle15-1.5.1-150300.14.3.1.noarch" }, "product_reference": "sca-patterns-sle15-1.5.1-150300.14.3.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "sca-patterns-suma-1.5.0-150300.9.3.1.noarch as component of SUSE Linux Enterprise Module for Server Applications 15 SP3", "product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-suma-1.5.0-150300.9.3.1.noarch" }, "product_reference": "sca-patterns-suma-1.5.0-150300.9.3.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "sca-server-report-1.5.1-150300.11.3.1.noarch as component of SUSE Linux Enterprise Module for Server Applications 15 SP3", "product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-server-report-1.5.1-150300.11.3.1.noarch" }, "product_reference": "sca-server-report-1.5.1-150300.11.3.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "sca-patterns-base-1.5.0-150300.10.3.1.noarch as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:sca-patterns-base-1.5.0-150300.10.3.1.noarch" }, "product_reference": "sca-patterns-base-1.5.0-150300.10.3.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "sca-patterns-hae-1.5.1-150300.10.3.1.noarch as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:sca-patterns-hae-1.5.1-150300.10.3.1.noarch" }, "product_reference": "sca-patterns-hae-1.5.1-150300.10.3.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "sca-patterns-sle11-1.5.1-150300.18.3.1.noarch as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:sca-patterns-sle11-1.5.1-150300.18.3.1.noarch" }, "product_reference": "sca-patterns-sle11-1.5.1-150300.18.3.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "sca-patterns-sle12-1.5.1-150300.3.3.1.noarch as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:sca-patterns-sle12-1.5.1-150300.3.3.1.noarch" }, "product_reference": "sca-patterns-sle12-1.5.1-150300.3.3.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "sca-patterns-sle15-1.5.1-150300.14.3.1.noarch as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:sca-patterns-sle15-1.5.1-150300.14.3.1.noarch" }, "product_reference": "sca-patterns-sle15-1.5.1-150300.14.3.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "sca-patterns-suma-1.5.0-150300.9.3.1.noarch as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:sca-patterns-suma-1.5.0-150300.9.3.1.noarch" }, "product_reference": "sca-patterns-suma-1.5.0-150300.9.3.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "sca-server-report-1.5.1-150300.11.3.1.noarch as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:sca-server-report-1.5.1-150300.11.3.1.noarch" }, "product_reference": "sca-server-report-1.5.1-150300.11.3.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.3" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-0543", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-0543" } ], "notes": [ { "category": "general", "text": "Incomplete cleanup from specific special register read operations in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-base-1.5.0-150300.10.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-hae-1.5.1-150300.10.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle11-1.5.1-150300.18.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle12-1.5.1-150300.3.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle15-1.5.1-150300.14.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-suma-1.5.0-150300.9.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-server-report-1.5.1-150300.11.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-base-1.5.0-150300.10.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-hae-1.5.1-150300.10.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-sle11-1.5.1-150300.18.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-sle12-1.5.1-150300.3.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-sle15-1.5.1-150300.14.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-suma-1.5.0-150300.9.3.1.noarch", "openSUSE Leap 15.3:sca-server-report-1.5.1-150300.11.3.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2020-0543", "url": "https://www.suse.com/security/cve/CVE-2020-0543" }, { "category": "external", "summary": "SUSE Bug 1154824 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1154824" }, { "category": "external", "summary": "SUSE Bug 1172205 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172205" }, { "category": "external", "summary": "SUSE Bug 1172206 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172206" }, { "category": "external", "summary": "SUSE Bug 1172207 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172207" }, { "category": "external", "summary": "SUSE Bug 1172770 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172770" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-base-1.5.0-150300.10.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-hae-1.5.1-150300.10.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle11-1.5.1-150300.18.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle12-1.5.1-150300.3.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle15-1.5.1-150300.14.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-suma-1.5.0-150300.9.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-server-report-1.5.1-150300.11.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-base-1.5.0-150300.10.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-hae-1.5.1-150300.10.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-sle11-1.5.1-150300.18.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-sle12-1.5.1-150300.3.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-sle15-1.5.1-150300.14.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-suma-1.5.0-150300.9.3.1.noarch", "openSUSE Leap 15.3:sca-server-report-1.5.1-150300.11.3.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-base-1.5.0-150300.10.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-hae-1.5.1-150300.10.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle11-1.5.1-150300.18.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle12-1.5.1-150300.3.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle15-1.5.1-150300.14.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-suma-1.5.0-150300.9.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-server-report-1.5.1-150300.11.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-base-1.5.0-150300.10.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-hae-1.5.1-150300.10.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-sle11-1.5.1-150300.18.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-sle12-1.5.1-150300.3.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-sle15-1.5.1-150300.14.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-suma-1.5.0-150300.9.3.1.noarch", "openSUSE Leap 15.3:sca-server-report-1.5.1-150300.11.3.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2022-12-15T09:43:54Z", "details": "moderate" } ], "title": "CVE-2020-0543" }, { "cve": "CVE-2020-0548", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-0548" } ], "notes": [ { "category": "general", "text": "Cleanup errors in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-base-1.5.0-150300.10.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-hae-1.5.1-150300.10.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle11-1.5.1-150300.18.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle12-1.5.1-150300.3.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle15-1.5.1-150300.14.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-suma-1.5.0-150300.9.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-server-report-1.5.1-150300.11.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-base-1.5.0-150300.10.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-hae-1.5.1-150300.10.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-sle11-1.5.1-150300.18.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-sle12-1.5.1-150300.3.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-sle15-1.5.1-150300.14.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-suma-1.5.0-150300.9.3.1.noarch", "openSUSE Leap 15.3:sca-server-report-1.5.1-150300.11.3.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2020-0548", "url": "https://www.suse.com/security/cve/CVE-2020-0548" }, { "category": "external", "summary": "SUSE Bug 1156353 for CVE-2020-0548", "url": "https://bugzilla.suse.com/1156353" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-base-1.5.0-150300.10.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-hae-1.5.1-150300.10.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle11-1.5.1-150300.18.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle12-1.5.1-150300.3.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle15-1.5.1-150300.14.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-suma-1.5.0-150300.9.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-server-report-1.5.1-150300.11.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-base-1.5.0-150300.10.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-hae-1.5.1-150300.10.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-sle11-1.5.1-150300.18.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-sle12-1.5.1-150300.3.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-sle15-1.5.1-150300.14.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-suma-1.5.0-150300.9.3.1.noarch", "openSUSE Leap 15.3:sca-server-report-1.5.1-150300.11.3.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.8, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-base-1.5.0-150300.10.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-hae-1.5.1-150300.10.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle11-1.5.1-150300.18.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle12-1.5.1-150300.3.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle15-1.5.1-150300.14.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-suma-1.5.0-150300.9.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-server-report-1.5.1-150300.11.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-base-1.5.0-150300.10.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-hae-1.5.1-150300.10.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-sle11-1.5.1-150300.18.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-sle12-1.5.1-150300.3.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-sle15-1.5.1-150300.14.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-suma-1.5.0-150300.9.3.1.noarch", "openSUSE Leap 15.3:sca-server-report-1.5.1-150300.11.3.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2022-12-15T09:43:54Z", "details": "moderate" } ], "title": "CVE-2020-0548" }, { "cve": "CVE-2020-0549", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-0549" } ], "notes": [ { "category": "general", "text": "Cleanup errors in some data cache evictions for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-base-1.5.0-150300.10.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-hae-1.5.1-150300.10.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle11-1.5.1-150300.18.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle12-1.5.1-150300.3.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle15-1.5.1-150300.14.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-suma-1.5.0-150300.9.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-server-report-1.5.1-150300.11.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-base-1.5.0-150300.10.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-hae-1.5.1-150300.10.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-sle11-1.5.1-150300.18.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-sle12-1.5.1-150300.3.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-sle15-1.5.1-150300.14.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-suma-1.5.0-150300.9.3.1.noarch", "openSUSE Leap 15.3:sca-server-report-1.5.1-150300.11.3.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2020-0549", "url": "https://www.suse.com/security/cve/CVE-2020-0549" }, { "category": "external", "summary": "SUSE Bug 1156353 for CVE-2020-0549", "url": "https://bugzilla.suse.com/1156353" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-base-1.5.0-150300.10.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-hae-1.5.1-150300.10.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle11-1.5.1-150300.18.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle12-1.5.1-150300.3.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle15-1.5.1-150300.14.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-suma-1.5.0-150300.9.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-server-report-1.5.1-150300.11.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-base-1.5.0-150300.10.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-hae-1.5.1-150300.10.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-sle11-1.5.1-150300.18.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-sle12-1.5.1-150300.3.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-sle15-1.5.1-150300.14.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-suma-1.5.0-150300.9.3.1.noarch", "openSUSE Leap 15.3:sca-server-report-1.5.1-150300.11.3.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-base-1.5.0-150300.10.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-hae-1.5.1-150300.10.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle11-1.5.1-150300.18.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle12-1.5.1-150300.3.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle15-1.5.1-150300.14.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-suma-1.5.0-150300.9.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-server-report-1.5.1-150300.11.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-base-1.5.0-150300.10.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-hae-1.5.1-150300.10.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-sle11-1.5.1-150300.18.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-sle12-1.5.1-150300.3.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-sle15-1.5.1-150300.14.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-suma-1.5.0-150300.9.3.1.noarch", "openSUSE Leap 15.3:sca-server-report-1.5.1-150300.11.3.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2022-12-15T09:43:54Z", "details": "moderate" } ], "title": "CVE-2020-0549" }, { "cve": "CVE-2020-12351", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12351" } ], "notes": [ { "category": "general", "text": "Improper input validation in BlueZ may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-base-1.5.0-150300.10.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-hae-1.5.1-150300.10.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle11-1.5.1-150300.18.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle12-1.5.1-150300.3.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle15-1.5.1-150300.14.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-suma-1.5.0-150300.9.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-server-report-1.5.1-150300.11.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-base-1.5.0-150300.10.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-hae-1.5.1-150300.10.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-sle11-1.5.1-150300.18.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-sle12-1.5.1-150300.3.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-sle15-1.5.1-150300.14.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-suma-1.5.0-150300.9.3.1.noarch", "openSUSE Leap 15.3:sca-server-report-1.5.1-150300.11.3.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12351", "url": "https://www.suse.com/security/cve/CVE-2020-12351" }, { "category": "external", "summary": "SUSE Bug 1177724 for CVE-2020-12351", "url": "https://bugzilla.suse.com/1177724" }, { "category": "external", "summary": "SUSE Bug 1177729 for CVE-2020-12351", "url": "https://bugzilla.suse.com/1177729" }, { "category": "external", "summary": "SUSE Bug 1178397 for CVE-2020-12351", "url": "https://bugzilla.suse.com/1178397" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-base-1.5.0-150300.10.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-hae-1.5.1-150300.10.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle11-1.5.1-150300.18.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle12-1.5.1-150300.3.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle15-1.5.1-150300.14.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-suma-1.5.0-150300.9.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-server-report-1.5.1-150300.11.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-base-1.5.0-150300.10.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-hae-1.5.1-150300.10.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-sle11-1.5.1-150300.18.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-sle12-1.5.1-150300.3.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-sle15-1.5.1-150300.14.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-suma-1.5.0-150300.9.3.1.noarch", "openSUSE Leap 15.3:sca-server-report-1.5.1-150300.11.3.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-base-1.5.0-150300.10.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-hae-1.5.1-150300.10.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle11-1.5.1-150300.18.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle12-1.5.1-150300.3.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle15-1.5.1-150300.14.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-suma-1.5.0-150300.9.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-server-report-1.5.1-150300.11.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-base-1.5.0-150300.10.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-hae-1.5.1-150300.10.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-sle11-1.5.1-150300.18.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-sle12-1.5.1-150300.3.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-sle15-1.5.1-150300.14.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-suma-1.5.0-150300.9.3.1.noarch", "openSUSE Leap 15.3:sca-server-report-1.5.1-150300.11.3.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2022-12-15T09:43:54Z", "details": "important" } ], "title": "CVE-2020-12351" }, { "cve": "CVE-2020-12352", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12352" } ], "notes": [ { "category": "general", "text": "Improper access control in BlueZ may allow an unauthenticated user to potentially enable information disclosure via adjacent access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-base-1.5.0-150300.10.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-hae-1.5.1-150300.10.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle11-1.5.1-150300.18.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle12-1.5.1-150300.3.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle15-1.5.1-150300.14.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-suma-1.5.0-150300.9.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-server-report-1.5.1-150300.11.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-base-1.5.0-150300.10.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-hae-1.5.1-150300.10.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-sle11-1.5.1-150300.18.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-sle12-1.5.1-150300.3.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-sle15-1.5.1-150300.14.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-suma-1.5.0-150300.9.3.1.noarch", "openSUSE Leap 15.3:sca-server-report-1.5.1-150300.11.3.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12352", "url": "https://www.suse.com/security/cve/CVE-2020-12352" }, { "category": "external", "summary": "SUSE Bug 1177725 for CVE-2020-12352", "url": "https://bugzilla.suse.com/1177725" }, { "category": "external", "summary": "SUSE Bug 1178398 for CVE-2020-12352", "url": "https://bugzilla.suse.com/1178398" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-base-1.5.0-150300.10.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-hae-1.5.1-150300.10.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle11-1.5.1-150300.18.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle12-1.5.1-150300.3.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle15-1.5.1-150300.14.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-suma-1.5.0-150300.9.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-server-report-1.5.1-150300.11.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-base-1.5.0-150300.10.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-hae-1.5.1-150300.10.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-sle11-1.5.1-150300.18.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-sle12-1.5.1-150300.3.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-sle15-1.5.1-150300.14.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-suma-1.5.0-150300.9.3.1.noarch", "openSUSE Leap 15.3:sca-server-report-1.5.1-150300.11.3.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-base-1.5.0-150300.10.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-hae-1.5.1-150300.10.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle11-1.5.1-150300.18.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle12-1.5.1-150300.3.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle15-1.5.1-150300.14.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-suma-1.5.0-150300.9.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-server-report-1.5.1-150300.11.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-base-1.5.0-150300.10.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-hae-1.5.1-150300.10.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-sle11-1.5.1-150300.18.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-sle12-1.5.1-150300.3.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-sle15-1.5.1-150300.14.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-suma-1.5.0-150300.9.3.1.noarch", "openSUSE Leap 15.3:sca-server-report-1.5.1-150300.11.3.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2022-12-15T09:43:54Z", "details": "moderate" } ], "title": "CVE-2020-12352" }, { "cve": "CVE-2020-1472", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-1472" } ], "notes": [ { "category": "general", "text": "unknown", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-base-1.5.0-150300.10.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-hae-1.5.1-150300.10.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle11-1.5.1-150300.18.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle12-1.5.1-150300.3.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle15-1.5.1-150300.14.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-suma-1.5.0-150300.9.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-server-report-1.5.1-150300.11.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-base-1.5.0-150300.10.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-hae-1.5.1-150300.10.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-sle11-1.5.1-150300.18.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-sle12-1.5.1-150300.3.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-sle15-1.5.1-150300.14.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-suma-1.5.0-150300.9.3.1.noarch", "openSUSE Leap 15.3:sca-server-report-1.5.1-150300.11.3.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2020-1472", "url": "https://www.suse.com/security/cve/CVE-2020-1472" }, { "category": "external", "summary": "SUSE Bug 1176579 for CVE-2020-1472", "url": "https://bugzilla.suse.com/1176579" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-base-1.5.0-150300.10.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-hae-1.5.1-150300.10.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle11-1.5.1-150300.18.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle12-1.5.1-150300.3.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle15-1.5.1-150300.14.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-suma-1.5.0-150300.9.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-server-report-1.5.1-150300.11.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-base-1.5.0-150300.10.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-hae-1.5.1-150300.10.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-sle11-1.5.1-150300.18.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-sle12-1.5.1-150300.3.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-sle15-1.5.1-150300.14.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-suma-1.5.0-150300.9.3.1.noarch", "openSUSE Leap 15.3:sca-server-report-1.5.1-150300.11.3.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-base-1.5.0-150300.10.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-hae-1.5.1-150300.10.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle11-1.5.1-150300.18.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle12-1.5.1-150300.3.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle15-1.5.1-150300.14.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-suma-1.5.0-150300.9.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-server-report-1.5.1-150300.11.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-base-1.5.0-150300.10.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-hae-1.5.1-150300.10.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-sle11-1.5.1-150300.18.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-sle12-1.5.1-150300.3.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-sle15-1.5.1-150300.14.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-suma-1.5.0-150300.9.3.1.noarch", "openSUSE Leap 15.3:sca-server-report-1.5.1-150300.11.3.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2022-12-15T09:43:54Z", "details": "critical" } ], "title": "CVE-2020-1472" }, { "cve": "CVE-2020-24490", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-24490" } ], "notes": [ { "category": "general", "text": "Improper buffer restrictions in BlueZ may allow an unauthenticated user to potentially enable denial of service via adjacent access. This affects all Linux kernel versions that support BlueZ.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-base-1.5.0-150300.10.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-hae-1.5.1-150300.10.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle11-1.5.1-150300.18.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle12-1.5.1-150300.3.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle15-1.5.1-150300.14.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-suma-1.5.0-150300.9.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-server-report-1.5.1-150300.11.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-base-1.5.0-150300.10.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-hae-1.5.1-150300.10.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-sle11-1.5.1-150300.18.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-sle12-1.5.1-150300.3.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-sle15-1.5.1-150300.14.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-suma-1.5.0-150300.9.3.1.noarch", "openSUSE Leap 15.3:sca-server-report-1.5.1-150300.11.3.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2020-24490", "url": "https://www.suse.com/security/cve/CVE-2020-24490" }, { "category": "external", "summary": "SUSE Bug 1177726 for CVE-2020-24490", "url": "https://bugzilla.suse.com/1177726" }, { "category": "external", "summary": "SUSE Bug 1177727 for CVE-2020-24490", "url": "https://bugzilla.suse.com/1177727" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-base-1.5.0-150300.10.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-hae-1.5.1-150300.10.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle11-1.5.1-150300.18.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle12-1.5.1-150300.3.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle15-1.5.1-150300.14.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-suma-1.5.0-150300.9.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-server-report-1.5.1-150300.11.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-base-1.5.0-150300.10.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-hae-1.5.1-150300.10.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-sle11-1.5.1-150300.18.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-sle12-1.5.1-150300.3.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-sle15-1.5.1-150300.14.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-suma-1.5.0-150300.9.3.1.noarch", "openSUSE Leap 15.3:sca-server-report-1.5.1-150300.11.3.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-base-1.5.0-150300.10.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-hae-1.5.1-150300.10.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle11-1.5.1-150300.18.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle12-1.5.1-150300.3.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle15-1.5.1-150300.14.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-suma-1.5.0-150300.9.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-server-report-1.5.1-150300.11.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-base-1.5.0-150300.10.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-hae-1.5.1-150300.10.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-sle11-1.5.1-150300.18.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-sle12-1.5.1-150300.3.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-sle15-1.5.1-150300.14.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-suma-1.5.0-150300.9.3.1.noarch", "openSUSE Leap 15.3:sca-server-report-1.5.1-150300.11.3.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2022-12-15T09:43:54Z", "details": "important" } ], "title": "CVE-2020-24490" } ] }
suse-su-2020:1630-1
Vulnerability from csaf_suse
Published
2020-06-16 15:01
Modified
2020-06-16 15:01
Summary
Security update for xen
Notes
Title of the patch
Security update for xen
Description of the patch
This update for xen fixes the following issues:
- CVE-2020-0543: Fixed a side channel attack against special registers which could have resulted in leaking of read values to cores other than the one which called it.
This attack is known as Special Register Buffer Data Sampling (SRBDS) or 'CrossTalk' (bsc#1172205).
- CVE-2020-11742: Bad continuation handling in GNTTABOP_copy (bsc#1169392).
- CVE-2020-11740, CVE-2020-11741: xen: XSA-313 multiple xenoprof issues (bsc#1168140).
- CVE-2020-11739: Missing memory barriers in read-write unlock paths (bsc#1168142).
- CVE-2019-19583: Fixed improper checks which could have allowed HVM/PVH guest userspace code to crash the guest, leading to a guest denial of service (bsc#1158004 XSA-308).
- CVE-2019-19581: Fixed a potential out of bounds on 32-bit Arm (bsc#1158003 XSA-307).
- CVE-2019-19580: Fixed a privilege escalation where a malicious PV guest administrator could have been able to escalate their privilege to that of the host (bsc#1158006 XSA-310).
- CVE-2019-19579: Fixed a privilege escalation where an untrusted domain with access to a physical device can DMA into host memory (bsc#1157888 XSA-306).
- CVE-2019-19578: Fixed an issue where a malicious or buggy PV guest could have caused hypervisor crash resulting in denial of service affecting the entire host (bsc#1158005 XSA-309).
- CVE-2019-19577: Fixed an issue where a malicious guest administrator could have caused Xen to access data structures while they are being modified leading to a crash (bsc#1158007 XSA-311).
- Xenstored Crashed during VM install (bsc#1167152)
Patchnames
HPE-Helion-OpenStack-8-2020-1630,SUSE-2020-1630,SUSE-OpenStack-Cloud-8-2020-1630,SUSE-OpenStack-Cloud-Crowbar-8-2020-1630,SUSE-SLE-SAP-12-SP3-2020-1630,SUSE-SLE-SERVER-12-SP3-2020-1630,SUSE-SLE-SERVER-12-SP3-BCL-2020-1630,SUSE-Storage-5-2020-1630
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for xen", "title": "Title of the patch" }, { "category": "description", "text": "This update for xen fixes the following issues:\n\n- CVE-2020-0543: Fixed a side channel attack against special registers which could have resulted in leaking of read values to cores other than the one which called it.\n This attack is known as Special Register Buffer Data Sampling (SRBDS) or \u0027CrossTalk\u0027 (bsc#1172205).\n- CVE-2020-11742: Bad continuation handling in GNTTABOP_copy (bsc#1169392).\n- CVE-2020-11740, CVE-2020-11741: xen: XSA-313 multiple xenoprof issues (bsc#1168140).\n- CVE-2020-11739: Missing memory barriers in read-write unlock paths (bsc#1168142).\n- CVE-2019-19583: Fixed improper checks which could have allowed HVM/PVH guest userspace code to crash the guest, leading to a guest denial of service (bsc#1158004 XSA-308).\n- CVE-2019-19581: Fixed a potential out of bounds on 32-bit Arm (bsc#1158003 XSA-307).\n- CVE-2019-19580: Fixed a privilege escalation where a malicious PV guest administrator could have been able to escalate their privilege to that of the host (bsc#1158006 XSA-310).\n- CVE-2019-19579: Fixed a privilege escalation where an untrusted domain with access to a physical device can DMA into host memory (bsc#1157888 XSA-306).\n- CVE-2019-19578: Fixed an issue where a malicious or buggy PV guest could have caused hypervisor crash resulting in denial of service affecting the entire host (bsc#1158005 XSA-309).\n- CVE-2019-19577: Fixed an issue where a malicious guest administrator could have caused Xen to access data structures while they are being modified leading to a crash (bsc#1158007 XSA-311). \n- Xenstored Crashed during VM install (bsc#1167152)\n", "title": "Description of the patch" }, { "category": "details", "text": "HPE-Helion-OpenStack-8-2020-1630,SUSE-2020-1630,SUSE-OpenStack-Cloud-8-2020-1630,SUSE-OpenStack-Cloud-Crowbar-8-2020-1630,SUSE-SLE-SAP-12-SP3-2020-1630,SUSE-SLE-SERVER-12-SP3-2020-1630,SUSE-SLE-SERVER-12-SP3-BCL-2020-1630,SUSE-Storage-5-2020-1630", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2020_1630-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2020:1630-1", "url": "https://www.suse.com/support/update/announcement/2020/suse-su-20201630-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2020:1630-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-June/006956.html" }, { "category": "self", "summary": "SUSE Bug 1157888", "url": "https://bugzilla.suse.com/1157888" }, { "category": "self", "summary": "SUSE Bug 1158003", "url": "https://bugzilla.suse.com/1158003" }, { "category": "self", "summary": "SUSE Bug 1158004", "url": "https://bugzilla.suse.com/1158004" }, { "category": "self", "summary": "SUSE Bug 1158005", "url": "https://bugzilla.suse.com/1158005" }, { "category": "self", "summary": "SUSE Bug 1158006", "url": "https://bugzilla.suse.com/1158006" }, { "category": "self", "summary": "SUSE Bug 1158007", "url": "https://bugzilla.suse.com/1158007" }, { "category": "self", "summary": "SUSE Bug 1161181", "url": "https://bugzilla.suse.com/1161181" }, { "category": "self", "summary": "SUSE Bug 1167152", "url": "https://bugzilla.suse.com/1167152" }, { "category": "self", "summary": "SUSE Bug 1168140", "url": "https://bugzilla.suse.com/1168140" }, { "category": "self", "summary": "SUSE Bug 1168142", "url": "https://bugzilla.suse.com/1168142" }, { "category": "self", "summary": "SUSE Bug 1169392", "url": "https://bugzilla.suse.com/1169392" }, { "category": "self", "summary": "SUSE Bug 1172205", "url": "https://bugzilla.suse.com/1172205" }, { "category": "self", "summary": "SUSE CVE CVE-2019-19577 page", "url": "https://www.suse.com/security/cve/CVE-2019-19577/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-19578 page", "url": "https://www.suse.com/security/cve/CVE-2019-19578/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-19579 page", "url": "https://www.suse.com/security/cve/CVE-2019-19579/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-19580 page", "url": "https://www.suse.com/security/cve/CVE-2019-19580/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-19581 page", "url": "https://www.suse.com/security/cve/CVE-2019-19581/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-19583 page", "url": "https://www.suse.com/security/cve/CVE-2019-19583/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-0543 page", "url": "https://www.suse.com/security/cve/CVE-2020-0543/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-11739 page", "url": "https://www.suse.com/security/cve/CVE-2020-11739/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-11740 page", "url": "https://www.suse.com/security/cve/CVE-2020-11740/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-11741 page", "url": "https://www.suse.com/security/cve/CVE-2020-11741/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-11742 page", "url": "https://www.suse.com/security/cve/CVE-2020-11742/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-7211 page", "url": "https://www.suse.com/security/cve/CVE-2020-7211/" } ], "title": "Security update for xen", "tracking": { "current_release_date": "2020-06-16T15:01:26Z", "generator": { "date": "2020-06-16T15:01:26Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2020:1630-1", "initial_release_date": "2020-06-16T15:01:26Z", "revision_history": [ { "date": "2020-06-16T15:01:26Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "xen-4.9.4_06-3.62.1.aarch64", "product": { "name": "xen-4.9.4_06-3.62.1.aarch64", "product_id": "xen-4.9.4_06-3.62.1.aarch64" } }, { "category": "product_version", "name": "xen-devel-4.9.4_06-3.62.1.aarch64", "product": { "name": "xen-devel-4.9.4_06-3.62.1.aarch64", "product_id": "xen-devel-4.9.4_06-3.62.1.aarch64" } }, { "category": "product_version", "name": "xen-doc-html-4.9.4_06-3.62.1.aarch64", "product": { "name": "xen-doc-html-4.9.4_06-3.62.1.aarch64", "product_id": "xen-doc-html-4.9.4_06-3.62.1.aarch64" } }, { "category": "product_version", "name": "xen-libs-4.9.4_06-3.62.1.aarch64", "product": { "name": "xen-libs-4.9.4_06-3.62.1.aarch64", "product_id": "xen-libs-4.9.4_06-3.62.1.aarch64" } }, { "category": "product_version", "name": "xen-tools-4.9.4_06-3.62.1.aarch64", "product": { "name": "xen-tools-4.9.4_06-3.62.1.aarch64", "product_id": "xen-tools-4.9.4_06-3.62.1.aarch64" } }, { "category": "product_version", "name": "xen-tools-domU-4.9.4_06-3.62.1.aarch64", "product": { "name": "xen-tools-domU-4.9.4_06-3.62.1.aarch64", "product_id": "xen-tools-domU-4.9.4_06-3.62.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "xen-libs-64bit-4.9.4_06-3.62.1.aarch64_ilp32", "product": { "name": "xen-libs-64bit-4.9.4_06-3.62.1.aarch64_ilp32", "product_id": "xen-libs-64bit-4.9.4_06-3.62.1.aarch64_ilp32" } } ], "category": "architecture", "name": "aarch64_ilp32" }, { "branches": [ { "category": "product_version", "name": "xen-devel-4.9.4_06-3.62.1.i586", "product": { "name": "xen-devel-4.9.4_06-3.62.1.i586", "product_id": "xen-devel-4.9.4_06-3.62.1.i586" } }, { "category": "product_version", "name": "xen-libs-4.9.4_06-3.62.1.i586", "product": { "name": "xen-libs-4.9.4_06-3.62.1.i586", "product_id": "xen-libs-4.9.4_06-3.62.1.i586" } }, { "category": "product_version", "name": "xen-tools-domU-4.9.4_06-3.62.1.i586", "product": { "name": "xen-tools-domU-4.9.4_06-3.62.1.i586", "product_id": "xen-tools-domU-4.9.4_06-3.62.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "xen-4.9.4_06-3.62.1.x86_64", "product": { "name": "xen-4.9.4_06-3.62.1.x86_64", "product_id": "xen-4.9.4_06-3.62.1.x86_64" } }, { "category": "product_version", "name": "xen-doc-html-4.9.4_06-3.62.1.x86_64", "product": { "name": "xen-doc-html-4.9.4_06-3.62.1.x86_64", "product_id": "xen-doc-html-4.9.4_06-3.62.1.x86_64" } }, { "category": "product_version", "name": "xen-libs-4.9.4_06-3.62.1.x86_64", "product": { "name": "xen-libs-4.9.4_06-3.62.1.x86_64", "product_id": "xen-libs-4.9.4_06-3.62.1.x86_64" } }, { "category": "product_version", "name": "xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "product": { "name": "xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "product_id": "xen-libs-32bit-4.9.4_06-3.62.1.x86_64" } }, { "category": "product_version", "name": "xen-tools-4.9.4_06-3.62.1.x86_64", "product": { "name": "xen-tools-4.9.4_06-3.62.1.x86_64", "product_id": "xen-tools-4.9.4_06-3.62.1.x86_64" } }, { "category": "product_version", "name": "xen-tools-domU-4.9.4_06-3.62.1.x86_64", "product": { "name": "xen-tools-domU-4.9.4_06-3.62.1.x86_64", "product_id": "xen-tools-domU-4.9.4_06-3.62.1.x86_64" } }, { "category": "product_version", "name": "xen-devel-4.9.4_06-3.62.1.x86_64", "product": { "name": "xen-devel-4.9.4_06-3.62.1.x86_64", "product_id": "xen-devel-4.9.4_06-3.62.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "HPE Helion OpenStack 8", "product": { "name": "HPE Helion OpenStack 8", "product_id": "HPE Helion OpenStack 8", "product_identification_helper": { "cpe": "cpe:/o:suse:hpe-helion-openstack:8" } } }, { "category": "product_name", "name": "SUSE OpenStack Cloud 8", "product": { "name": "SUSE OpenStack Cloud 8", "product_id": "SUSE OpenStack Cloud 8", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-openstack-cloud:8" } } }, { "category": "product_name", "name": "SUSE OpenStack Cloud Crowbar 8", "product": { "name": "SUSE OpenStack Cloud Crowbar 8", "product_id": "SUSE OpenStack Cloud Crowbar 8", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-openstack-cloud-crowbar:8" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP3-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP3-BCL", "product": { "name": "SUSE Linux Enterprise Server 12 SP3-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP3-BCL", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-bcl:12:sp3" } } }, { "category": "product_name", "name": "SUSE Enterprise Storage 5", "product": { "name": "SUSE Enterprise Storage 5", "product_id": "SUSE Enterprise Storage 5", "product_identification_helper": { "cpe": "cpe:/o:suse:ses:5" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "xen-4.9.4_06-3.62.1.x86_64 as component of HPE Helion OpenStack 8", "product_id": "HPE Helion OpenStack 8:xen-4.9.4_06-3.62.1.x86_64" }, "product_reference": "xen-4.9.4_06-3.62.1.x86_64", "relates_to_product_reference": "HPE Helion OpenStack 8" }, { "category": "default_component_of", "full_product_name": { "name": "xen-doc-html-4.9.4_06-3.62.1.x86_64 as component of HPE Helion OpenStack 8", "product_id": "HPE Helion OpenStack 8:xen-doc-html-4.9.4_06-3.62.1.x86_64" }, "product_reference": "xen-doc-html-4.9.4_06-3.62.1.x86_64", "relates_to_product_reference": "HPE Helion OpenStack 8" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.9.4_06-3.62.1.x86_64 as component of HPE Helion OpenStack 8", "product_id": "HPE Helion OpenStack 8:xen-libs-4.9.4_06-3.62.1.x86_64" }, "product_reference": "xen-libs-4.9.4_06-3.62.1.x86_64", "relates_to_product_reference": "HPE Helion OpenStack 8" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-32bit-4.9.4_06-3.62.1.x86_64 as component of HPE Helion OpenStack 8", "product_id": "HPE Helion OpenStack 8:xen-libs-32bit-4.9.4_06-3.62.1.x86_64" }, "product_reference": "xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "relates_to_product_reference": "HPE Helion OpenStack 8" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.9.4_06-3.62.1.x86_64 as component of HPE Helion OpenStack 8", "product_id": "HPE Helion OpenStack 8:xen-tools-4.9.4_06-3.62.1.x86_64" }, "product_reference": "xen-tools-4.9.4_06-3.62.1.x86_64", "relates_to_product_reference": "HPE Helion OpenStack 8" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.9.4_06-3.62.1.x86_64 as component of HPE Helion OpenStack 8", "product_id": "HPE Helion OpenStack 8:xen-tools-domU-4.9.4_06-3.62.1.x86_64" }, "product_reference": "xen-tools-domU-4.9.4_06-3.62.1.x86_64", "relates_to_product_reference": "HPE Helion OpenStack 8" }, { "category": "default_component_of", "full_product_name": { "name": "xen-4.9.4_06-3.62.1.x86_64 as component of SUSE OpenStack Cloud 8", "product_id": "SUSE OpenStack Cloud 8:xen-4.9.4_06-3.62.1.x86_64" }, "product_reference": "xen-4.9.4_06-3.62.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 8" }, { "category": "default_component_of", "full_product_name": { "name": "xen-doc-html-4.9.4_06-3.62.1.x86_64 as component of SUSE OpenStack Cloud 8", "product_id": "SUSE OpenStack Cloud 8:xen-doc-html-4.9.4_06-3.62.1.x86_64" }, "product_reference": "xen-doc-html-4.9.4_06-3.62.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 8" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.9.4_06-3.62.1.x86_64 as component of SUSE OpenStack Cloud 8", "product_id": "SUSE OpenStack Cloud 8:xen-libs-4.9.4_06-3.62.1.x86_64" }, "product_reference": "xen-libs-4.9.4_06-3.62.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 8" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-32bit-4.9.4_06-3.62.1.x86_64 as component of SUSE OpenStack Cloud 8", "product_id": "SUSE OpenStack Cloud 8:xen-libs-32bit-4.9.4_06-3.62.1.x86_64" }, "product_reference": "xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 8" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.9.4_06-3.62.1.x86_64 as component of SUSE OpenStack Cloud 8", "product_id": "SUSE OpenStack Cloud 8:xen-tools-4.9.4_06-3.62.1.x86_64" }, "product_reference": "xen-tools-4.9.4_06-3.62.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 8" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.9.4_06-3.62.1.x86_64 as component of SUSE OpenStack Cloud 8", "product_id": "SUSE OpenStack Cloud 8:xen-tools-domU-4.9.4_06-3.62.1.x86_64" }, "product_reference": "xen-tools-domU-4.9.4_06-3.62.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 8" }, { "category": "default_component_of", "full_product_name": { "name": "xen-4.9.4_06-3.62.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 8", "product_id": "SUSE OpenStack Cloud Crowbar 8:xen-4.9.4_06-3.62.1.x86_64" }, "product_reference": "xen-4.9.4_06-3.62.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8" }, { "category": "default_component_of", "full_product_name": { "name": "xen-doc-html-4.9.4_06-3.62.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 8", "product_id": "SUSE OpenStack Cloud Crowbar 8:xen-doc-html-4.9.4_06-3.62.1.x86_64" }, "product_reference": "xen-doc-html-4.9.4_06-3.62.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.9.4_06-3.62.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 8", "product_id": "SUSE OpenStack Cloud Crowbar 8:xen-libs-4.9.4_06-3.62.1.x86_64" }, "product_reference": "xen-libs-4.9.4_06-3.62.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-32bit-4.9.4_06-3.62.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 8", "product_id": "SUSE OpenStack Cloud Crowbar 8:xen-libs-32bit-4.9.4_06-3.62.1.x86_64" }, "product_reference": "xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.9.4_06-3.62.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 8", "product_id": "SUSE OpenStack Cloud Crowbar 8:xen-tools-4.9.4_06-3.62.1.x86_64" }, "product_reference": "xen-tools-4.9.4_06-3.62.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.9.4_06-3.62.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 8", "product_id": "SUSE OpenStack Cloud Crowbar 8:xen-tools-domU-4.9.4_06-3.62.1.x86_64" }, "product_reference": "xen-tools-domU-4.9.4_06-3.62.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8" }, { "category": "default_component_of", "full_product_name": { "name": "xen-4.9.4_06-3.62.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-4.9.4_06-3.62.1.x86_64" }, "product_reference": "xen-4.9.4_06-3.62.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-doc-html-4.9.4_06-3.62.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-doc-html-4.9.4_06-3.62.1.x86_64" }, "product_reference": "xen-doc-html-4.9.4_06-3.62.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.9.4_06-3.62.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-4.9.4_06-3.62.1.x86_64" }, "product_reference": "xen-libs-4.9.4_06-3.62.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-32bit-4.9.4_06-3.62.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-32bit-4.9.4_06-3.62.1.x86_64" }, "product_reference": "xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.9.4_06-3.62.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-4.9.4_06-3.62.1.x86_64" }, "product_reference": "xen-tools-4.9.4_06-3.62.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.9.4_06-3.62.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-domU-4.9.4_06-3.62.1.x86_64" }, "product_reference": "xen-tools-domU-4.9.4_06-3.62.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-4.9.4_06-3.62.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-4.9.4_06-3.62.1.x86_64" }, "product_reference": "xen-4.9.4_06-3.62.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-doc-html-4.9.4_06-3.62.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-doc-html-4.9.4_06-3.62.1.x86_64" }, "product_reference": "xen-doc-html-4.9.4_06-3.62.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.9.4_06-3.62.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-4.9.4_06-3.62.1.x86_64" }, "product_reference": "xen-libs-4.9.4_06-3.62.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-32bit-4.9.4_06-3.62.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-32bit-4.9.4_06-3.62.1.x86_64" }, "product_reference": "xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.9.4_06-3.62.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-4.9.4_06-3.62.1.x86_64" }, "product_reference": "xen-tools-4.9.4_06-3.62.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.9.4_06-3.62.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-domU-4.9.4_06-3.62.1.x86_64" }, "product_reference": "xen-tools-domU-4.9.4_06-3.62.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-4.9.4_06-3.62.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:xen-4.9.4_06-3.62.1.x86_64" }, "product_reference": "xen-4.9.4_06-3.62.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "xen-doc-html-4.9.4_06-3.62.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:xen-doc-html-4.9.4_06-3.62.1.x86_64" }, "product_reference": "xen-doc-html-4.9.4_06-3.62.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.9.4_06-3.62.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-4.9.4_06-3.62.1.x86_64" }, "product_reference": "xen-libs-4.9.4_06-3.62.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-32bit-4.9.4_06-3.62.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-32bit-4.9.4_06-3.62.1.x86_64" }, "product_reference": "xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.9.4_06-3.62.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-4.9.4_06-3.62.1.x86_64" }, "product_reference": "xen-tools-4.9.4_06-3.62.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.9.4_06-3.62.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-domU-4.9.4_06-3.62.1.x86_64" }, "product_reference": "xen-tools-domU-4.9.4_06-3.62.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "xen-4.9.4_06-3.62.1.x86_64 as component of SUSE Enterprise Storage 5", "product_id": "SUSE Enterprise Storage 5:xen-4.9.4_06-3.62.1.x86_64" }, "product_reference": "xen-4.9.4_06-3.62.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 5" }, { "category": "default_component_of", "full_product_name": { "name": "xen-doc-html-4.9.4_06-3.62.1.x86_64 as component of SUSE Enterprise Storage 5", "product_id": "SUSE Enterprise Storage 5:xen-doc-html-4.9.4_06-3.62.1.x86_64" }, "product_reference": "xen-doc-html-4.9.4_06-3.62.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 5" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.9.4_06-3.62.1.x86_64 as component of SUSE Enterprise Storage 5", "product_id": "SUSE Enterprise Storage 5:xen-libs-4.9.4_06-3.62.1.x86_64" }, "product_reference": "xen-libs-4.9.4_06-3.62.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 5" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-32bit-4.9.4_06-3.62.1.x86_64 as component of SUSE Enterprise Storage 5", "product_id": "SUSE Enterprise Storage 5:xen-libs-32bit-4.9.4_06-3.62.1.x86_64" }, "product_reference": "xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 5" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.9.4_06-3.62.1.x86_64 as component of SUSE Enterprise Storage 5", "product_id": "SUSE Enterprise Storage 5:xen-tools-4.9.4_06-3.62.1.x86_64" }, "product_reference": "xen-tools-4.9.4_06-3.62.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 5" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.9.4_06-3.62.1.x86_64 as component of SUSE Enterprise Storage 5", "product_id": "SUSE Enterprise Storage 5:xen-tools-domU-4.9.4_06-3.62.1.x86_64" }, "product_reference": "xen-tools-domU-4.9.4_06-3.62.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 5" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-19577", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-19577" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.12.x allowing x86 AMD HVM guest OS users to cause a denial of service or possibly gain privileges by triggering data-structure access during pagetable-height updates. When running on AMD systems with an IOMMU, Xen attempted to dynamically adapt the number of levels of pagetables (the pagetable height) in the IOMMU according to the guest\u0027s address space size. The code to select and update the height had several bugs. Notably, the update was done without taking a lock which is necessary for safe operation. A malicious guest administrator can cause Xen to access data structures while they are being modified, causing Xen to crash. Privilege escalation is thought to be very difficult but cannot be ruled out. Additionally, there is a potential memory leak of 4kb per guest boot, under memory pressure. Only Xen on AMD CPUs is vulnerable. Xen running on Intel CPUs is not vulnerable. ARM systems are not vulnerable. Only systems where guests are given direct access to physical devices are vulnerable. Systems which do not use PCI pass-through are not vulnerable. Only HVM guests can exploit the vulnerability. PV and PVH guests cannot. All versions of Xen with IOMMU support are vulnerable.", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:xen-4.9.4_06-3.62.1.x86_64", "HPE Helion OpenStack 8:xen-doc-html-4.9.4_06-3.62.1.x86_64", "HPE Helion OpenStack 8:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "HPE Helion OpenStack 8:xen-libs-4.9.4_06-3.62.1.x86_64", "HPE Helion OpenStack 8:xen-tools-4.9.4_06-3.62.1.x86_64", "HPE Helion OpenStack 8:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-tools-domU-4.9.4_06-3.62.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-19577", "url": "https://www.suse.com/security/cve/CVE-2019-19577" }, { "category": "external", "summary": "SUSE Bug 1158007 for CVE-2019-19577", "url": "https://bugzilla.suse.com/1158007" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:xen-4.9.4_06-3.62.1.x86_64", "HPE Helion OpenStack 8:xen-doc-html-4.9.4_06-3.62.1.x86_64", "HPE Helion OpenStack 8:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "HPE Helion OpenStack 8:xen-libs-4.9.4_06-3.62.1.x86_64", "HPE Helion OpenStack 8:xen-tools-4.9.4_06-3.62.1.x86_64", "HPE Helion OpenStack 8:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-tools-domU-4.9.4_06-3.62.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.2, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "HPE Helion OpenStack 8:xen-4.9.4_06-3.62.1.x86_64", "HPE Helion OpenStack 8:xen-doc-html-4.9.4_06-3.62.1.x86_64", "HPE Helion OpenStack 8:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "HPE Helion OpenStack 8:xen-libs-4.9.4_06-3.62.1.x86_64", "HPE Helion OpenStack 8:xen-tools-4.9.4_06-3.62.1.x86_64", "HPE Helion OpenStack 8:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-tools-domU-4.9.4_06-3.62.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-16T15:01:26Z", "details": "important" } ], "title": "CVE-2019-19577" }, { "cve": "CVE-2019-19578", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-19578" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.12.x allowing x86 PV guest OS users to cause a denial of service via degenerate chains of linear pagetables, because of an incorrect fix for CVE-2017-15595. \"Linear pagetables\" is a technique which involves either pointing a pagetable at itself, or to another pagetable of the same or higher level. Xen has limited support for linear pagetables: A page may either point to itself, or point to another pagetable of the same level (i.e., L2 to L2, L3 to L3, and so on). XSA-240 introduced an additional restriction that limited the \"depth\" of such chains by allowing pages to either *point to* other pages of the same level, or *be pointed to* by other pages of the same level, but not both. To implement this, we keep track of the number of outstanding times a page points to or is pointed to another page table, to prevent both from happening at the same time. Unfortunately, the original commit introducing this reset this count when resuming validation of a partially-validated pagetable, incorrectly dropping some \"linear_pt_entry\" counts. If an attacker could engineer such a situation to occur, they might be able to make loops or other arbitrary chains of linear pagetables, as described in XSA-240. A malicious or buggy PV guest may cause the hypervisor to crash, resulting in Denial of Service (DoS) affecting the entire host. Privilege escalation and information leaks cannot be excluded. All versions of Xen are vulnerable. Only x86 systems are affected. Arm systems are not affected. Only x86 PV guests can leverage the vulnerability. x86 HVM and PVH guests cannot leverage the vulnerability. Only systems which have enabled linear pagetables are vulnerable. Systems which have disabled linear pagetables, either by selecting CONFIG_PV_LINEAR_PT=n when building the hypervisor, or adding pv-linear-pt=false on the command-line, are not vulnerable.", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:xen-4.9.4_06-3.62.1.x86_64", "HPE Helion OpenStack 8:xen-doc-html-4.9.4_06-3.62.1.x86_64", "HPE Helion OpenStack 8:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "HPE Helion OpenStack 8:xen-libs-4.9.4_06-3.62.1.x86_64", "HPE Helion OpenStack 8:xen-tools-4.9.4_06-3.62.1.x86_64", "HPE Helion OpenStack 8:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-tools-domU-4.9.4_06-3.62.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-19578", "url": "https://www.suse.com/security/cve/CVE-2019-19578" }, { "category": "external", "summary": "SUSE Bug 1158005 for CVE-2019-19578", "url": "https://bugzilla.suse.com/1158005" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2019-19578", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:xen-4.9.4_06-3.62.1.x86_64", "HPE Helion OpenStack 8:xen-doc-html-4.9.4_06-3.62.1.x86_64", "HPE Helion OpenStack 8:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "HPE Helion OpenStack 8:xen-libs-4.9.4_06-3.62.1.x86_64", "HPE Helion OpenStack 8:xen-tools-4.9.4_06-3.62.1.x86_64", "HPE Helion OpenStack 8:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-tools-domU-4.9.4_06-3.62.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "HPE Helion OpenStack 8:xen-4.9.4_06-3.62.1.x86_64", "HPE Helion OpenStack 8:xen-doc-html-4.9.4_06-3.62.1.x86_64", "HPE Helion OpenStack 8:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "HPE Helion OpenStack 8:xen-libs-4.9.4_06-3.62.1.x86_64", "HPE Helion OpenStack 8:xen-tools-4.9.4_06-3.62.1.x86_64", "HPE Helion OpenStack 8:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-tools-domU-4.9.4_06-3.62.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-16T15:01:26Z", "details": "important" } ], "title": "CVE-2019-19578" }, { "cve": "CVE-2019-19579", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-19579" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.12.x allowing attackers to gain host OS privileges via DMA in a situation where an untrusted domain has access to a physical device (and assignable-add is not used), because of an incomplete fix for CVE-2019-18424. XSA-302 relies on the use of libxl\u0027s \"assignable-add\" feature to prepare devices to be assigned to untrusted guests. Unfortunately, this is not considered a strictly required step for device assignment. The PCI passthrough documentation on the wiki describes alternate ways of preparing devices for assignment, and libvirt uses its own ways as well. Hosts where these \"alternate\" methods are used will still leave the system in a vulnerable state after the device comes back from a guest. An untrusted domain with access to a physical device can DMA into host memory, leading to privilege escalation. Only systems where guests are given direct access to physical devices capable of DMA (PCI pass-through) are vulnerable. Systems which do not use PCI pass-through are not vulnerable.", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:xen-4.9.4_06-3.62.1.x86_64", "HPE Helion OpenStack 8:xen-doc-html-4.9.4_06-3.62.1.x86_64", "HPE Helion OpenStack 8:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "HPE Helion OpenStack 8:xen-libs-4.9.4_06-3.62.1.x86_64", "HPE Helion OpenStack 8:xen-tools-4.9.4_06-3.62.1.x86_64", "HPE Helion OpenStack 8:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-tools-domU-4.9.4_06-3.62.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-19579", "url": "https://www.suse.com/security/cve/CVE-2019-19579" }, { "category": "external", "summary": "SUSE Bug 1157888 for CVE-2019-19579", "url": "https://bugzilla.suse.com/1157888" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:xen-4.9.4_06-3.62.1.x86_64", "HPE Helion OpenStack 8:xen-doc-html-4.9.4_06-3.62.1.x86_64", "HPE Helion OpenStack 8:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "HPE Helion OpenStack 8:xen-libs-4.9.4_06-3.62.1.x86_64", "HPE Helion OpenStack 8:xen-tools-4.9.4_06-3.62.1.x86_64", "HPE Helion OpenStack 8:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-tools-domU-4.9.4_06-3.62.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "HPE Helion OpenStack 8:xen-4.9.4_06-3.62.1.x86_64", "HPE Helion OpenStack 8:xen-doc-html-4.9.4_06-3.62.1.x86_64", "HPE Helion OpenStack 8:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "HPE Helion OpenStack 8:xen-libs-4.9.4_06-3.62.1.x86_64", "HPE Helion OpenStack 8:xen-tools-4.9.4_06-3.62.1.x86_64", "HPE Helion OpenStack 8:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-tools-domU-4.9.4_06-3.62.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-16T15:01:26Z", "details": "moderate" } ], "title": "CVE-2019-19579" }, { "cve": "CVE-2019-19580", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-19580" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.12.x allowing x86 PV guest OS users to gain host OS privileges by leveraging race conditions in pagetable promotion and demotion operations, because of an incomplete fix for CVE-2019-18421. XSA-299 addressed several critical issues in restartable PV type change operations. Despite extensive testing and auditing, some corner cases were missed. A malicious PV guest administrator may be able to escalate their privilege to that of the host. All security-supported versions of Xen are vulnerable. Only x86 systems are affected. Arm systems are not affected. Only x86 PV guests can leverage the vulnerability. x86 HVM and PVH guests cannot leverage the vulnerability. Note that these attacks require very precise timing, which may be difficult to exploit in practice.", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:xen-4.9.4_06-3.62.1.x86_64", "HPE Helion OpenStack 8:xen-doc-html-4.9.4_06-3.62.1.x86_64", "HPE Helion OpenStack 8:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "HPE Helion OpenStack 8:xen-libs-4.9.4_06-3.62.1.x86_64", "HPE Helion OpenStack 8:xen-tools-4.9.4_06-3.62.1.x86_64", "HPE Helion OpenStack 8:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-tools-domU-4.9.4_06-3.62.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-19580", "url": "https://www.suse.com/security/cve/CVE-2019-19580" }, { "category": "external", "summary": "SUSE Bug 1158006 for CVE-2019-19580", "url": "https://bugzilla.suse.com/1158006" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2019-19580", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:xen-4.9.4_06-3.62.1.x86_64", "HPE Helion OpenStack 8:xen-doc-html-4.9.4_06-3.62.1.x86_64", "HPE Helion OpenStack 8:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "HPE Helion OpenStack 8:xen-libs-4.9.4_06-3.62.1.x86_64", "HPE Helion OpenStack 8:xen-tools-4.9.4_06-3.62.1.x86_64", "HPE Helion OpenStack 8:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-tools-domU-4.9.4_06-3.62.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "HPE Helion OpenStack 8:xen-4.9.4_06-3.62.1.x86_64", "HPE Helion OpenStack 8:xen-doc-html-4.9.4_06-3.62.1.x86_64", "HPE Helion OpenStack 8:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "HPE Helion OpenStack 8:xen-libs-4.9.4_06-3.62.1.x86_64", "HPE Helion OpenStack 8:xen-tools-4.9.4_06-3.62.1.x86_64", "HPE Helion OpenStack 8:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-tools-domU-4.9.4_06-3.62.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-16T15:01:26Z", "details": "moderate" } ], "title": "CVE-2019-19580" }, { "cve": "CVE-2019-19581", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-19581" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.12.x allowing 32-bit Arm guest OS users to cause a denial of service (out-of-bounds access) because certain bit iteration is mishandled. In a number of places bitmaps are being used by the hypervisor to track certain state. Iteration over all bits involves functions which may misbehave in certain corner cases: On 32-bit Arm accesses to bitmaps with bit a count which is a multiple of 32, an out of bounds access may occur. A malicious guest may cause a hypervisor crash or hang, resulting in a Denial of Service (DoS). All versions of Xen are vulnerable. 32-bit Arm systems are vulnerable. 64-bit Arm systems are not vulnerable.", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:xen-4.9.4_06-3.62.1.x86_64", "HPE Helion OpenStack 8:xen-doc-html-4.9.4_06-3.62.1.x86_64", "HPE Helion OpenStack 8:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "HPE Helion OpenStack 8:xen-libs-4.9.4_06-3.62.1.x86_64", "HPE Helion OpenStack 8:xen-tools-4.9.4_06-3.62.1.x86_64", "HPE Helion OpenStack 8:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-tools-domU-4.9.4_06-3.62.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-19581", "url": "https://www.suse.com/security/cve/CVE-2019-19581" }, { "category": "external", "summary": "SUSE Bug 1158003 for CVE-2019-19581", "url": "https://bugzilla.suse.com/1158003" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:xen-4.9.4_06-3.62.1.x86_64", "HPE Helion OpenStack 8:xen-doc-html-4.9.4_06-3.62.1.x86_64", "HPE Helion OpenStack 8:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "HPE Helion OpenStack 8:xen-libs-4.9.4_06-3.62.1.x86_64", "HPE Helion OpenStack 8:xen-tools-4.9.4_06-3.62.1.x86_64", "HPE Helion OpenStack 8:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-tools-domU-4.9.4_06-3.62.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "HPE Helion OpenStack 8:xen-4.9.4_06-3.62.1.x86_64", "HPE Helion OpenStack 8:xen-doc-html-4.9.4_06-3.62.1.x86_64", "HPE Helion OpenStack 8:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "HPE Helion OpenStack 8:xen-libs-4.9.4_06-3.62.1.x86_64", "HPE Helion OpenStack 8:xen-tools-4.9.4_06-3.62.1.x86_64", "HPE Helion OpenStack 8:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-tools-domU-4.9.4_06-3.62.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-16T15:01:26Z", "details": "moderate" } ], "title": "CVE-2019-19581" }, { "cve": "CVE-2019-19583", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-19583" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.12.x allowing x86 HVM/PVH guest OS users to cause a denial of service (guest OS crash) because VMX VMEntry checks mishandle a certain case. Please see XSA-260 for background on the MovSS shadow. Please see XSA-156 for background on the need for #DB interception. The VMX VMEntry checks do not like the exact combination of state which occurs when #DB in intercepted, Single Stepping is active, and blocked by STI/MovSS is active, despite this being a legitimate state to be in. The resulting VMEntry failure is fatal to the guest. HVM/PVH guest userspace code may be able to crash the guest, resulting in a guest Denial of Service. All versions of Xen are affected. Only systems supporting VMX hardware virtual extensions (Intel, Cyrix, or Zhaoxin CPUs) are affected. Arm and AMD systems are unaffected. Only HVM/PVH guests are affected. PV guests cannot leverage the vulnerability.", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:xen-4.9.4_06-3.62.1.x86_64", "HPE Helion OpenStack 8:xen-doc-html-4.9.4_06-3.62.1.x86_64", "HPE Helion OpenStack 8:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "HPE Helion OpenStack 8:xen-libs-4.9.4_06-3.62.1.x86_64", "HPE Helion OpenStack 8:xen-tools-4.9.4_06-3.62.1.x86_64", "HPE Helion OpenStack 8:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-tools-domU-4.9.4_06-3.62.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-19583", "url": "https://www.suse.com/security/cve/CVE-2019-19583" }, { "category": "external", "summary": "SUSE Bug 1158004 for CVE-2019-19583", "url": "https://bugzilla.suse.com/1158004" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2019-19583", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:xen-4.9.4_06-3.62.1.x86_64", "HPE Helion OpenStack 8:xen-doc-html-4.9.4_06-3.62.1.x86_64", "HPE Helion OpenStack 8:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "HPE Helion OpenStack 8:xen-libs-4.9.4_06-3.62.1.x86_64", "HPE Helion OpenStack 8:xen-tools-4.9.4_06-3.62.1.x86_64", "HPE Helion OpenStack 8:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-tools-domU-4.9.4_06-3.62.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "HPE Helion OpenStack 8:xen-4.9.4_06-3.62.1.x86_64", "HPE Helion OpenStack 8:xen-doc-html-4.9.4_06-3.62.1.x86_64", "HPE Helion OpenStack 8:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "HPE Helion OpenStack 8:xen-libs-4.9.4_06-3.62.1.x86_64", "HPE Helion OpenStack 8:xen-tools-4.9.4_06-3.62.1.x86_64", "HPE Helion OpenStack 8:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-tools-domU-4.9.4_06-3.62.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-16T15:01:26Z", "details": "important" } ], "title": "CVE-2019-19583" }, { "cve": "CVE-2020-0543", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-0543" } ], "notes": [ { "category": "general", "text": "Incomplete cleanup from specific special register read operations in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:xen-4.9.4_06-3.62.1.x86_64", "HPE Helion OpenStack 8:xen-doc-html-4.9.4_06-3.62.1.x86_64", "HPE Helion OpenStack 8:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "HPE Helion OpenStack 8:xen-libs-4.9.4_06-3.62.1.x86_64", "HPE Helion OpenStack 8:xen-tools-4.9.4_06-3.62.1.x86_64", "HPE Helion OpenStack 8:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-tools-domU-4.9.4_06-3.62.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-0543", "url": "https://www.suse.com/security/cve/CVE-2020-0543" }, { "category": "external", "summary": "SUSE Bug 1154824 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1154824" }, { "category": "external", "summary": "SUSE Bug 1172205 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172205" }, { "category": "external", "summary": "SUSE Bug 1172206 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172206" }, { "category": "external", "summary": "SUSE Bug 1172207 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172207" }, { "category": "external", "summary": "SUSE Bug 1172770 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172770" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:xen-4.9.4_06-3.62.1.x86_64", "HPE Helion OpenStack 8:xen-doc-html-4.9.4_06-3.62.1.x86_64", "HPE Helion OpenStack 8:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "HPE Helion OpenStack 8:xen-libs-4.9.4_06-3.62.1.x86_64", "HPE Helion OpenStack 8:xen-tools-4.9.4_06-3.62.1.x86_64", "HPE Helion OpenStack 8:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-tools-domU-4.9.4_06-3.62.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "HPE Helion OpenStack 8:xen-4.9.4_06-3.62.1.x86_64", "HPE Helion OpenStack 8:xen-doc-html-4.9.4_06-3.62.1.x86_64", "HPE Helion OpenStack 8:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "HPE Helion OpenStack 8:xen-libs-4.9.4_06-3.62.1.x86_64", "HPE Helion OpenStack 8:xen-tools-4.9.4_06-3.62.1.x86_64", "HPE Helion OpenStack 8:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-tools-domU-4.9.4_06-3.62.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-16T15:01:26Z", "details": "moderate" } ], "title": "CVE-2020-0543" }, { "cve": "CVE-2020-11739", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-11739" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.13.x, allowing guest OS users to cause a denial of service or possibly gain privileges because of missing memory barriers in read-write unlock paths. The read-write unlock paths don\u0027t contain a memory barrier. On Arm, this means a processor is allowed to re-order the memory access with the preceding ones. In other words, the unlock may be seen by another processor before all the memory accesses within the \"critical\" section. As a consequence, it may be possible to have a writer executing a critical section at the same time as readers or another writer. In other words, many of the assumptions (e.g., a variable cannot be modified after a check) in the critical sections are not safe anymore. The read-write locks are used in hypercalls (such as grant-table ones), so a malicious guest could exploit the race. For instance, there is a small window where Xen can leak memory if XENMAPSPACE_grant_table is used concurrently. A malicious guest may be able to leak memory, or cause a hypervisor crash resulting in a Denial of Service (DoS). Information leak and privilege escalation cannot be excluded.", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:xen-4.9.4_06-3.62.1.x86_64", "HPE Helion OpenStack 8:xen-doc-html-4.9.4_06-3.62.1.x86_64", "HPE Helion OpenStack 8:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "HPE Helion OpenStack 8:xen-libs-4.9.4_06-3.62.1.x86_64", "HPE Helion OpenStack 8:xen-tools-4.9.4_06-3.62.1.x86_64", "HPE Helion OpenStack 8:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-tools-domU-4.9.4_06-3.62.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-11739", "url": "https://www.suse.com/security/cve/CVE-2020-11739" }, { "category": "external", "summary": "SUSE Bug 1168142 for CVE-2020-11739", "url": "https://bugzilla.suse.com/1168142" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:xen-4.9.4_06-3.62.1.x86_64", "HPE Helion OpenStack 8:xen-doc-html-4.9.4_06-3.62.1.x86_64", "HPE Helion OpenStack 8:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "HPE Helion OpenStack 8:xen-libs-4.9.4_06-3.62.1.x86_64", "HPE Helion OpenStack 8:xen-tools-4.9.4_06-3.62.1.x86_64", "HPE Helion OpenStack 8:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-tools-domU-4.9.4_06-3.62.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "HPE Helion OpenStack 8:xen-4.9.4_06-3.62.1.x86_64", "HPE Helion OpenStack 8:xen-doc-html-4.9.4_06-3.62.1.x86_64", "HPE Helion OpenStack 8:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "HPE Helion OpenStack 8:xen-libs-4.9.4_06-3.62.1.x86_64", "HPE Helion OpenStack 8:xen-tools-4.9.4_06-3.62.1.x86_64", "HPE Helion OpenStack 8:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-tools-domU-4.9.4_06-3.62.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-16T15:01:26Z", "details": "important" } ], "title": "CVE-2020-11739" }, { "cve": "CVE-2020-11740", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-11740" } ], "notes": [ { "category": "general", "text": "An issue was discovered in xenoprof in Xen through 4.13.x, allowing guest OS users (without active profiling) to obtain sensitive information about other guests. Unprivileged guests can request to map xenoprof buffers, even if profiling has not been enabled for those guests. These buffers were not scrubbed.", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:xen-4.9.4_06-3.62.1.x86_64", "HPE Helion OpenStack 8:xen-doc-html-4.9.4_06-3.62.1.x86_64", "HPE Helion OpenStack 8:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "HPE Helion OpenStack 8:xen-libs-4.9.4_06-3.62.1.x86_64", "HPE Helion OpenStack 8:xen-tools-4.9.4_06-3.62.1.x86_64", "HPE Helion OpenStack 8:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-tools-domU-4.9.4_06-3.62.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-11740", "url": "https://www.suse.com/security/cve/CVE-2020-11740" }, { "category": "external", "summary": "SUSE Bug 1168140 for CVE-2020-11740", "url": "https://bugzilla.suse.com/1168140" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2020-11740", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:xen-4.9.4_06-3.62.1.x86_64", "HPE Helion OpenStack 8:xen-doc-html-4.9.4_06-3.62.1.x86_64", "HPE Helion OpenStack 8:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "HPE Helion OpenStack 8:xen-libs-4.9.4_06-3.62.1.x86_64", "HPE Helion OpenStack 8:xen-tools-4.9.4_06-3.62.1.x86_64", "HPE Helion OpenStack 8:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-tools-domU-4.9.4_06-3.62.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "HPE Helion OpenStack 8:xen-4.9.4_06-3.62.1.x86_64", "HPE Helion OpenStack 8:xen-doc-html-4.9.4_06-3.62.1.x86_64", "HPE Helion OpenStack 8:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "HPE Helion OpenStack 8:xen-libs-4.9.4_06-3.62.1.x86_64", "HPE Helion OpenStack 8:xen-tools-4.9.4_06-3.62.1.x86_64", "HPE Helion OpenStack 8:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-tools-domU-4.9.4_06-3.62.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-16T15:01:26Z", "details": "important" } ], "title": "CVE-2020-11740" }, { "cve": "CVE-2020-11741", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-11741" } ], "notes": [ { "category": "general", "text": "An issue was discovered in xenoprof in Xen through 4.13.x, allowing guest OS users (with active profiling) to obtain sensitive information about other guests, cause a denial of service, or possibly gain privileges. For guests for which \"active\" profiling was enabled by the administrator, the xenoprof code uses the standard Xen shared ring structure. Unfortunately, this code did not treat the guest as a potential adversary: it trusts the guest not to modify buffer size information or modify head / tail pointers in unexpected ways. This can crash the host (DoS). Privilege escalation cannot be ruled out.", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:xen-4.9.4_06-3.62.1.x86_64", "HPE Helion OpenStack 8:xen-doc-html-4.9.4_06-3.62.1.x86_64", "HPE Helion OpenStack 8:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "HPE Helion OpenStack 8:xen-libs-4.9.4_06-3.62.1.x86_64", "HPE Helion OpenStack 8:xen-tools-4.9.4_06-3.62.1.x86_64", "HPE Helion OpenStack 8:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-tools-domU-4.9.4_06-3.62.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-11741", "url": "https://www.suse.com/security/cve/CVE-2020-11741" }, { "category": "external", "summary": "SUSE Bug 1168140 for CVE-2020-11741", "url": "https://bugzilla.suse.com/1168140" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2020-11741", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:xen-4.9.4_06-3.62.1.x86_64", "HPE Helion OpenStack 8:xen-doc-html-4.9.4_06-3.62.1.x86_64", "HPE Helion OpenStack 8:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "HPE Helion OpenStack 8:xen-libs-4.9.4_06-3.62.1.x86_64", "HPE Helion OpenStack 8:xen-tools-4.9.4_06-3.62.1.x86_64", "HPE Helion OpenStack 8:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-tools-domU-4.9.4_06-3.62.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "HPE Helion OpenStack 8:xen-4.9.4_06-3.62.1.x86_64", "HPE Helion OpenStack 8:xen-doc-html-4.9.4_06-3.62.1.x86_64", "HPE Helion OpenStack 8:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "HPE Helion OpenStack 8:xen-libs-4.9.4_06-3.62.1.x86_64", "HPE Helion OpenStack 8:xen-tools-4.9.4_06-3.62.1.x86_64", "HPE Helion OpenStack 8:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-tools-domU-4.9.4_06-3.62.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-16T15:01:26Z", "details": "important" } ], "title": "CVE-2020-11741" }, { "cve": "CVE-2020-11742", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-11742" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.13.x, allowing guest OS users to cause a denial of service because of bad continuation handling in GNTTABOP_copy. Grant table operations are expected to return 0 for success, and a negative number for errors. The fix for CVE-2017-12135 introduced a path through grant copy handling where success may be returned to the caller without any action taken. In particular, the status fields of individual operations are left uninitialised, and may result in errant behaviour in the caller of GNTTABOP_copy. A buggy or malicious guest can construct its grant table in such a way that, when a backend domain tries to copy a grant, it hits the incorrect exit path. This returns success to the caller without doing anything, which may cause crashes or other incorrect behaviour.", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:xen-4.9.4_06-3.62.1.x86_64", "HPE Helion OpenStack 8:xen-doc-html-4.9.4_06-3.62.1.x86_64", "HPE Helion OpenStack 8:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "HPE Helion OpenStack 8:xen-libs-4.9.4_06-3.62.1.x86_64", "HPE Helion OpenStack 8:xen-tools-4.9.4_06-3.62.1.x86_64", "HPE Helion OpenStack 8:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-tools-domU-4.9.4_06-3.62.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-11742", "url": "https://www.suse.com/security/cve/CVE-2020-11742" }, { "category": "external", "summary": "SUSE Bug 1169392 for CVE-2020-11742", "url": "https://bugzilla.suse.com/1169392" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2020-11742", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:xen-4.9.4_06-3.62.1.x86_64", "HPE Helion OpenStack 8:xen-doc-html-4.9.4_06-3.62.1.x86_64", "HPE Helion OpenStack 8:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "HPE Helion OpenStack 8:xen-libs-4.9.4_06-3.62.1.x86_64", "HPE Helion OpenStack 8:xen-tools-4.9.4_06-3.62.1.x86_64", "HPE Helion OpenStack 8:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-tools-domU-4.9.4_06-3.62.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L", "version": "3.1" }, "products": [ "HPE Helion OpenStack 8:xen-4.9.4_06-3.62.1.x86_64", "HPE Helion OpenStack 8:xen-doc-html-4.9.4_06-3.62.1.x86_64", "HPE Helion OpenStack 8:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "HPE Helion OpenStack 8:xen-libs-4.9.4_06-3.62.1.x86_64", "HPE Helion OpenStack 8:xen-tools-4.9.4_06-3.62.1.x86_64", "HPE Helion OpenStack 8:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-tools-domU-4.9.4_06-3.62.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-16T15:01:26Z", "details": "moderate" } ], "title": "CVE-2020-11742" }, { "cve": "CVE-2020-7211", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-7211" } ], "notes": [ { "category": "general", "text": "tftp.c in libslirp 4.1.0, as used in QEMU 4.2.0, does not prevent ..\\ directory traversal on Windows.", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:xen-4.9.4_06-3.62.1.x86_64", "HPE Helion OpenStack 8:xen-doc-html-4.9.4_06-3.62.1.x86_64", "HPE Helion OpenStack 8:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "HPE Helion OpenStack 8:xen-libs-4.9.4_06-3.62.1.x86_64", "HPE Helion OpenStack 8:xen-tools-4.9.4_06-3.62.1.x86_64", "HPE Helion OpenStack 8:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-tools-domU-4.9.4_06-3.62.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-7211", "url": "https://www.suse.com/security/cve/CVE-2020-7211" }, { "category": "external", "summary": "SUSE Bug 1161180 for CVE-2020-7211", "url": "https://bugzilla.suse.com/1161180" }, { "category": "external", "summary": "SUSE Bug 1161181 for CVE-2020-7211", "url": "https://bugzilla.suse.com/1161181" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2020-7211", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:xen-4.9.4_06-3.62.1.x86_64", "HPE Helion OpenStack 8:xen-doc-html-4.9.4_06-3.62.1.x86_64", "HPE Helion OpenStack 8:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "HPE Helion OpenStack 8:xen-libs-4.9.4_06-3.62.1.x86_64", "HPE Helion OpenStack 8:xen-tools-4.9.4_06-3.62.1.x86_64", "HPE Helion OpenStack 8:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-tools-domU-4.9.4_06-3.62.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "HPE Helion OpenStack 8:xen-4.9.4_06-3.62.1.x86_64", "HPE Helion OpenStack 8:xen-doc-html-4.9.4_06-3.62.1.x86_64", "HPE Helion OpenStack 8:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "HPE Helion OpenStack 8:xen-libs-4.9.4_06-3.62.1.x86_64", "HPE Helion OpenStack 8:xen-tools-4.9.4_06-3.62.1.x86_64", "HPE Helion OpenStack 8:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE Enterprise Storage 5:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud 8:xen-tools-domU-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-doc-html-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-libs-32bit-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-libs-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-tools-4.9.4_06-3.62.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-tools-domU-4.9.4_06-3.62.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-16T15:01:26Z", "details": "moderate" } ], "title": "CVE-2020-7211" } ] }
suse-su-2020:2478-1
Vulnerability from csaf_suse
Published
2020-09-03 10:12
Modified
2020-09-03 10:12
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 12 SP5 RT kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2020-0543: Fixed a side channel attack against special registers which could have resulted in leaking of read values to cores other than the one which called it. This attack is known as Special Register Buffer Data Sampling (SRBDS) or 'CrossTalk' (bsc#1154824).
- CVE-2020-13143: Fixed an out-of-bounds read in gadget_dev_desc_UDC_store in drivers/usb/gadget/configfs.c (bsc#1171982).
- CVE-2020-12769: Fixed an issue which could have allowed attackers to cause a panic via concurrent calls to dw_spi_irq and dw_spi_transfer_one (bsc#1171983).
- CVE-2020-12659: Fixed an out-of-bounds write (by a user with the CAP_NET_ADMIN capability) due to improper headroom validation (bsc#1171214).
- CVE-2020-12657: An a use-after-free in block/bfq-iosched.c (bsc#1171205).
- CVE-2020-12656: Fixed an improper handling of certain domain_release calls leadingch could have led to a memory leak (bsc#1171219).
- CVE-2020-12655: Fixed an issue which could have allowed attackers to trigger a sync of excessive duration via an XFS v5 image with crafted metadata (bsc#1171217).
- CVE-2020-12654: Fixed an issue in he wifi driver which could have allowed a remote AP to trigger a heap-based buffer overflow (bsc#1171202).
- CVE-2020-12653: Fixed an issue in the wifi driver which could have allowed local users to gain privileges or cause a denial of service (bsc#1171195).
- CVE-2020-12652: Fixed an issue which could have allowed local users to hold an incorrect lock during the ioctl operation and trigger a race condition (bsc#1171218).
- CVE-2020-12464: Fixed a use-after-free due to a transfer without a reference (bsc#1170901).
- CVE-2020-12114: Fixed a pivot_root race condition which could have allowed local users to cause a denial of service (panic) by corrupting a mountpoint reference counter (bsc#1171098).
- CVE-2020-11669: Fixed an issue where arch/powerpc/kernel/idle_book3s.S did not have save/restore functionality for PNV_POWERSAVE_AMR, PNV_POWERSAVE_UAMOR, and PNV_POWERSAVE_AMOR (bnc#1169390).
- CVE-2020-10757: Fixed an issue where remaping hugepage DAX to anon mmap could have caused user PTE access (bsc#1172317).
- CVE-2020-10751: Fixed an improper implementation in SELinux LSM hook where it was assumed that an skb would only contain a single netlink message (bsc#1171189).
- CVE-2020-10732: Fixed kernel data leak in userspace coredumps due to uninitialized data (bsc#1171220).
- CVE-2020-10720: Fixed a use-after-free read in napi_gro_frags() (bsc#1170778).
- CVE-2020-10711: Fixed a null pointer dereference in SELinux subsystem which could have allowed a remote network user to crash the kernel resulting in a denial of service (bsc#1171191).
- CVE-2020-10690: Fixed the race between the release of ptp_clock and cdev (bsc#1170056).
- CVE-2019-20908: An issue was discovered in drivers/firmware/efi/efi.c where incorrect access permissions for the efivar_ssdt ACPI variable could be used by attackers to bypass lockdown or secure boot restrictions, aka CID-1957a85b0032 (bnc#1173567).
- CVE-2020-10781: zram sysfs resource consumption was fixed (bnc#1173074).
- CVE-2020-15780: An issue was discovered in drivers/acpi/acpi_configfs.c where injection of malicious ACPI tables via configfs could be used by attackers to bypass lockdown and secure boot restrictions, aka CID-75b0cea7bf30 (bnc#1173573).
- CVE-2020-15393: usbtest_disconnect in drivers/usb/misc/usbtest.c had a memory leak, aka CID-28ebeb8db770 (bnc#1173514).
- CVE-2020-12771: btree_gc_coalesce in drivers/md/bcache/btree.c had a deadlock if a coalescing operation fails (bnc#1171732).
- CVE-2020-12888: The VFIO PCI driver mishandled attempts to access disabled memory space (bnc#1171868).
- CVE-2020-10769: A buffer over-read flaw was found in crypto_authenc_extractkeys in crypto/authenc.c in the IPsec Cryptographic algorithm's module, authenc. When a payload longer than 4 bytes, and is not following 4-byte alignment boundary guidelines, it causes a buffer over-read threat, leading to a system crash. This flaw allowed a local attacker with user privileges to cause a denial of service (bnc#1173265).
- CVE-2020-10773: A kernel stack information leak on s390/s390x was fixed (bnc#1172999).
- CVE-2020-14416: A race condition in tty->disc_data handling in the slip and slcan line discipline could lead to a use-after-free, aka CID-0ace17d56824. This affects drivers/net/slip/slip.c and drivers/net/can/slcan.c (bnc#1162002).
- CVE-2020-10766: Fixed an issue which allowed an attacker with a local account to disable SSBD protection (bnc#1172781).
- CVE-2020-10767: Fixed an issue where Indirect Branch Prediction Barrier was disabled in certain circumstances, leaving the system open to a spectre v2 style attack (bnc#1172782).
- CVE-2020-10768: Fixed an issue with the prctl() function, where indirect branch speculation could be enabled even though it was diabled before (bnc#1172783).
- CVE-2020-13974: Fixed a integer overflow in drivers/tty/vt/keyboard.c, if k_ascii is called several times in a row (bnc#1172775).
- CVE-2019-20810: go7007_snd_init in drivers/media/usb/go7007/snd-go7007.c did not call snd_card_free for a failure path, which caused a memory leak, aka CID-9453264ef586 (bnc#1172458).
- CVE-2019-16746: An issue was discovered in net/wireless/nl80211.c, where the length of variable elements in a beacon head was not checked, leading to a buffer overflow (bnc#1152107 1173659).
- CVE-2019-9455: Fixed a pointer leak due to a WARN_ON statement in a video driver. This could lead to local information disclosure with System execution privileges needed (bsc#1170345).
- CVE-2019-20812: Fixed an issue in prb_calc_retire_blk_tmo() which could have resulted in a denial of service (bsc#1172453).
- CVE-2019-20806: Fixed a null pointer dereference which may had lead to denial of service (bsc#1172199).
- CVE-2019-19462: Fixed an issue which could have allowed local user to cause denial of service (bsc#1158265).
- CVE-2018-1000199: Fixed a potential local code execution via ptrace (bsc#1089895).
The following non-security bugs were fixed:
- ACPI: CPPC: Fix reference count leak in acpi_cppc_processor_probe() (bsc#1051510).
- ACPI: GED: add support for _Exx / _Lxx handler methods (bsc#1111666).
- ACPI: GED: use correct trigger type field in _Exx / _Lxx handling (bsc#1111666).
- ACPI: NFIT: Fix unlock on error in scrub_show() (bsc#1171753).
- ACPI: PM: Avoid using power resources if there are none for D0 (bsc#1051510).
- ACPI: sysfs: Fix pm_profile_attr type (bsc#1111666).
- ACPI: sysfs: Fix reference count leak in acpi_sysfs_add_hotplug_profile() (bsc#1051510).
- acpi/x86: ignore unspecified bit positions in the ACPI global lock field (bsc#1051510).
- Add br_netfilter to kernel-default-base (bsc#1169020)
- agp/intel: Reinforce the barrier after GTT updates (bsc#1051510).
- ahci: Add support for Amazon's Annapurna Labs SATA controller (bsc#1169013).
- ALSA: ctxfi: Remove unnecessary cast in kfree (bsc#1051510).
- ALSA: doc: Document PC Beep Hidden Register on Realtek ALC256 (bsc#1051510).
- ALSA: dummy: Fix PCM format loop in proc output (bsc#1111666).
- ALSA: es1688: Add the missed snd_card_free() (bsc#1051510).
- ALSA: hda: Add driver blacklist (bsc#1051510).
- ALSA: hda: Add ElkhartLake HDMI codec vid (bsc#1111666).
- ALSA: hda: add sienna_cichlid audio asic id for sienna_cichlid up (bsc#1111666).
- ALSA: hda: Always use jackpoll helper for jack update after resume (bsc#1051510).
- ALSA: hda: call runtime_allow() for all hda controllers (bsc#1051510).
- ALSA: hda: Do not release card at firmware loading error (bsc#1051510).
- ALSA: hda: Explicitly permit using autosuspend if runtime PM is supported (bsc#1051510).
- ALSA: hda: Fix potential access overflow in beep helper (bsc#1051510).
- ALSA: hda/hdmi - enable runtime pm for newer AMD display audio (bsc#1111666).
- ALSA: hda/hdmi: fix race in monitor detection during probe (bsc#1051510).
- ALSA: hda/hdmi: fix without unlocked before return (bsc#1051510).
- ALSA: hda: Honor PM disablement in PM freeze and thaw_noirq ops (bsc#1051510).
- ALSA: hda: Keep the controller initialization even if no codecs found (bsc#1051510).
- ALSA: hda: Match both PCI ID and SSID for driver blacklist (bsc#1111666).
- ALSA: hda/realtek - Add a model for Thinkpad T570 without DAC workaround (bsc#1172017).
- ALSA: hda/realtek - add a pintbl quirk for several Lenovo machines (bsc#1111666).
- ALSA: hda/realtek - Add COEF workaround for ASUS ZenBook UX431DA (git-fixes).
- ALSA: hda/realtek - Add HP new mute led supported for ALC236 (git-fixes).
- ALSA: hda/realtek - Add LED class support for micmute LED (bsc#1111666).
- ALSA: hda/realtek - Add more fixup entries for Clevo machines (git-fixes).
- ALSA: hda/realtek - Add new codec supported for ALC245 (bsc#1051510).
- ALSA: hda/realtek - Add new codec supported for ALC287 (git-fixes).
- ALSA: hda/realtek: Add quirk for Samsung Notebook (git-fixes).
- ALSA: hda/realtek - Add supported new mute Led for HP (git-fixes).
- ALSA: hda/realtek - Enable headset mic of ASUS GL503VM with ALC295 (git-fixes).
- ALSA: hda/realtek - Enable headset mic of ASUS UX550GE with ALC295 (git-fixes).
- ALSA: hda/realtek: Enable headset mic of ASUS UX581LV with ALC295 (git-fixes).
- ALSA: hda/realtek - Enable micmute LED on and HP system (bsc#1111666).
- ALSA: hda/realtek - Enable Speaker for ASUS UX533 and UX534 (bsc#1111666).
- ALSA: hda/realtek - Enable the headset mic on Asus FX505DT (bsc#1051510).
- ALSA: hda/realtek - Fix S3 pop noise on Dell Wyse (git-fixes).
- ALSA: hda/realtek - Fix silent output on Gigabyte X570 Aorus Xtreme (bsc#1111666).
- ALSA: hda/realtek - Fix unexpected init_amp override (bsc#1051510).
- ALSA: hda/realtek - Fix unused variable warning w/o CONFIG_LEDS_TRIGGER_AUDIO (bsc#1111666).
- ALSA: hda/realtek - Introduce polarity for micmute LED GPIO (bsc#1111666).
- ALSA: hda/realtek - Limit int mic boost for Thinkpad T530 (git-fixes bsc#1171293).
- ALSA: hda/realtek - Two front mics on a Lenovo ThinkCenter (bsc#1051510).
- ALSA: hda: Release resources at error in delayed probe (bsc#1051510).
- ALSA: hda: Remove ASUS ROG Zenith from the blacklist (bsc#1051510).
- ALSA: hda: Skip controller resume if not needed (bsc#1051510).
- ALSA: hwdep: fix a left shifting 1 by 31 UB bug (git-fixes).
- ALSA: ice1724: Fix invalid access for enumerated ctl items (bsc#1051510).
- ALSA: iec1712: Initialize STDSP24 properly when using the model=staudio option (git-fixes).
- ALSA: lx6464es - add support for LX6464ESe pci express variant (bsc#1111666).
- ALSA: opti9xx: shut up gcc-10 range warning (bsc#1051510).
- ALSA: pcm: disallow linking stream to itself (bsc#1111666).
- ALSA: pcm: fix incorrect hw_base increase (git-fixes).
- ALSA: pcm: oss: Fix regression by buffer overflow fix (bsc#1051510).
- ALSA: pcm: oss: Place the plugin buffer overflow checks correctly (bsc#1170522).
- ALSA: rawmidi: Fix racy buffer resize under concurrent accesses (git-fixes).
- ALSA: usb-audio: Add connector notifier delegation (bsc#1051510).
- ALSA: usb-audio: Add control message quirk delay for Kingston HyperX headset (git-fixes).
- ALSA: usb-audio: Add duplex sound support for USB devices using implicit feedback (bsc#1111666).
- ALSA: usb-audio: add mapping for ASRock TRX40 Creator (git-fixes).
- ALSA: usb-audio: Add mixer workaround for TRX40 and co (bsc#1051510).
- ALSA: usb-audio: Add Pioneer DJ DJM-900NXS2 support (bsc#1111666).
- ALSA: usb-audio: Add quirk for Focusrite Scarlett 2i2 (bsc#1051510).
- ALSA: usb-audio: Add static mapping table for ALC1220-VB-based mobos (bsc#1051510).
- ALSA: usb-audio: Add vendor, product and profile name for HP Thunderbolt Dock (bsc#1111666).
- ALSA: usb-audio: Apply async workaround for Scarlett 2i4 2nd gen (bsc#1051510).
- ALSA: usb-audio: Check mapping at creating connector controls, too (bsc#1051510).
- ALSA: usb-audio: Clean up quirk entries with macros (bsc#1111666).
- ALSA: usb-audio: Correct a typo of NuPrime DAC-10 USB ID (bsc#1051510).
- ALSA: usb-audio: Do not create jack controls for PCM terminals (bsc#1051510).
- ALSA: usb-audio: Do not override ignore_ctl_error value from the map (bsc#1051510).
- ALSA: usb-audio: Filter error from connector kctl ops, too (bsc#1051510).
- ALSA: usb-audio: Fix inconsistent card PM state after resume (bsc#1111666).
- ALSA: usb-audio: Fix packet size calculation (bsc#1111666).
- ALSA: usb-audio: Fix racy list management in output queue (bsc#1111666).
- ALSA: usb-audio: Fix usb audio refcnt leak when getting spdif (bsc#1051510).
- ALSA: usb-audio: Improve frames size computation (bsc#1111666).
- ALSA: usb-audio: Manage auto-pm of all bundled interfaces (bsc#1111666).
- ALSA: usb-audio: mixer: volume quirk for ESS Technology Asus USB DAC (git-fixes).
- ALSA: usb-audio: Quirks for Gigabyte TRX40 Aorus Master onboard audio (git-fixes).
- ALSA: usb-audio: Use the new macro for HP Dock rename quirks (bsc#1111666).
- ALSA: usx2y: Fix potential NULL dereference (bsc#1051510).
- amdgpu: a NULL ->mm does not mean a thread is a kthread (git-fixes).
- arm64: map FDT as RW for early_init_dt_scan() (jsc#SLE-12423).
- ASoC: codecs: hdac_hdmi: Fix incorrect use of list_for_each_entry (bsc#1051510).
- ASoC: dapm: connect virtual mux with default value (bsc#1051510).
- ASoC: dapm: fixup dapm kcontrol widget (bsc#1051510).
- ASoC: dpcm: allow start or stop during pause for backend (bsc#1051510).
- ASoC: fix regwmask (bsc#1051510).
- ASoC: Intel: atom: Take the drv->lock mutex before calling sst_send_slot_map() (bsc#1051510).
- ASoC: msm8916-wcd-digital: Reset RX interpolation path after use (bsc#1051510).
- ASoC: samsung: Prevent clk_get_rate() calls in atomic context (bsc#1111666).
- ASoC: topology: Check return value of pcm_new_ver (bsc#1051510).
- ASoC: topology: use name_prefix for new kcontrol (bsc#1051510).
- ath9k: Fix general protection fault in ath9k_hif_usb_rx_cb (bsc#1111666).
- ath9k: Fix use-after-free Read in ath9k_wmi_ctrl_rx (bsc#1111666).
- ath9k: Fix use-after-free Write in ath9k_htc_rx_msg (bsc#1111666).
- ath9x: Fix stack-out-of-bounds Write in ath9k_hif_usb_rx_cb (bsc#1111666).
- ax25: fix setsockopt(SO_BINDTODEVICE) (networking-stable-20_05_27).
- b43: Fix connection problem with WPA3 (bsc#1111666).
- b43legacy: Fix case where channel status is corrupted (bsc#1051510).
- b43_legacy: Fix connection problem with WPA3 (bsc#1111666).
- batman-adv: fix batadv_nc_random_weight_tq (git-fixes).
- batman-adv: Fix refcnt leak in batadv_show_throughput_override (git-fixes).
- batman-adv: Fix refcnt leak in batadv_store_throughput_override (git-fixes).
- batman-adv: Fix refcnt leak in batadv_v_ogm_process (git-fixes).
- bcache: avoid unnecessary btree nodes flushing in btree_flush_write() (git fixes (block drivers)).
- bcache: Fix an error code in bch_dump_read() (git fixes (block drivers)).
- bcache: fix incorrect data type usage in btree_flush_write() (git fixes (block drivers)).
- bcache: Revert 'bcache: shrink btree node cache after bch_btree_check()' (git fixes (block drivers)).
- be2net: fix link failure after ethtool offline test (git-fixes).
- blk-mq: honor IO scheduler for multiqueue devices (bsc#1165478).
- blk-mq: simplify blk_mq_make_request() (bsc#1165478).
- block, bfq: add requeue-request hook (bsc#1104967 bsc#1171673).
- block, bfq: fix use-after-free in bfq_idle_slice_timer_body (bsc#1168760).
- block, bfq: postpone rq preparation to insert or merge (bsc#1104967 bsc#1171673).
- block/drbd: delete invalid function drbd_md_mark_dirty_ (bsc#1171527).
- block: drbd: remove a stray unlock in __drbd_send_protocol() (bsc#1171599).
- block: fix busy device checking in blk_drop_partitions again (bsc#1171948).
- block: fix busy device checking in blk_drop_partitions (bsc#1171948).
- block: fix memleak of bio integrity data (git fixes (block drivers)).
- block: keep bdi->io_pages in sync with max_sectors_kb for stacked devices (bsc#1168762).
- block: nr_sects_write(): Disable preemption on seqcount write (bsc#1173818).
- block: remove QUEUE_FLAG_STACKABLE (git fixes (block drivers)).
- block: remove the bd_openers checks in blk_drop_partitions (bsc#1171948).
- block: sed-opal: fix sparse warning: convert __be64 data (git fixes (block drivers)).
- Bluetooth: Add SCO fallback for invalid LMP parameters error (bsc#1111666).
- Bluetooth: RFCOMM: fix ODEBUG bug in rfcomm_dev_ioctl (bsc#1051510).
- bnxt_en: Fix AER reset logic on 57500 chips (git-fixes).
- bnxt_en: Fix ethtool selftest crash under error conditions (git-fixes).
- bnxt_en: Fix handling FRAG_ERR when NVM_INSTALL_UPDATE cmd fails (git-fixes).
- bnxt_en: Fix ipv6 RFS filter matching logic (git-fixes).
- bnxt_en: fix memory leaks in bnxt_dcbnl_ieee_getets() (networking-stable-20_03_28).
- bnxt_en: fix NULL dereference in case SR-IOV configuration fails (git-fixes).
- bnxt_en: Fix VF anti-spoof filter setup (networking-stable-20_05_12).
- bnxt_en: Fix VLAN acceleration handling in bnxt_fix_features() (networking-stable-20_05_12).
- bnxt_en: Improve AER slot reset (networking-stable-20_05_12).
- bnxt_en: Reduce BNXT_MSIX_VEC_MAX value to supported CQs per PF (bsc#1104745).
- bnxt_en: reinitialize IRQs when MTU is modified (networking-stable-20_03_14).
- bnxt_en: Return error if bnxt_alloc_ctx_mem() fails (bsc#1104745 ).
- bnxt_en: Return error when allocating zero size context memory (bsc#1104745).
- bonding/alb: make sure arp header is pulled before accessing it (networking-stable-20_03_14).
- bpf: Fix sk_psock refcnt leak when receiving message (bsc#1083647).
- bpf: Forbid XADD on spilled pointers for unprivileged users (bsc#1083647).
- brcmfmac: abort and release host after error (bsc#1051510).
- brcmfmac: fix wrong location to get firmware feature (bsc#1111666).
- brcmfmac: Transform compatible string for FW loading (bsc#1169771).
- btrfs: always wait on ordered extents at fsync time (bsc#1171761).
- btrfs: clean up the left over logged_list usage (bsc#1171761).
- btrfs: do not zero f_bavail if we have available space (bsc#1168081).
- btrfs: do not zero f_bavail if we have available space (bsc#1168081).
- Btrfs: fix deadlock with memory reclaim during scrub (bsc#1172127).
- Btrfs: fix list_add corruption and soft lockups in fsync (bsc#1171761).
- btrfs: fix log context list corruption after rename whiteout error (bsc#1172342).
- Btrfs: fix missing data checksums after a ranged fsync (msync) (bsc#1171761).
- btrfs: fix missing file extent item for hole after ranged fsync (bsc#1171761).
- Btrfs: fix missing hole after hole punching and fsync when using NO_HOLES (bsc#1171761).
- btrfs: fix missing semaphore unlock in btrfs_sync_file (bsc#1171761).
- btrfs: fix partial loss of prealloc extent past i_size after fsync (bsc#1172343).
- Btrfs: fix rare chances for data loss when doing a fast fsync (bsc#1171761).
- btrfs: move the dio_sem higher up the callchain (bsc#1171761).
- btrfs: qgroup: Fix a bug that prevents qgroup to be re-enabled after disable (bsc#1172247).
- btrfs: relocation: add error injection points for cancelling balance (bsc#1171417).
- btrfs: relocation: Check cancel request after each data page read (bsc#1171417).
- btrfs: relocation: Check cancel request after each extent found (bsc#1171417).
- btrfs: relocation: Clear the DEAD_RELOC_TREE bit for orphan roots to prevent runaway balance (bsc#1171417).
- btrfs: relocation: Fix reloc root leakage and the NULL pointer reference caused by the leakage (bsc#1171417).
- btrfs: relocation: Work around dead relocation stage loop (bsc#1171417).
- btrfs: reloc: clear DEAD_RELOC_TREE bit for orphan roots to prevent runaway balance (bsc#1171417 bsc#1160947 bsc#1172366).
- btrfs: reloc: fix reloc root leak and NULL pointer dereference (bsc#1171417 bsc#1160947 bsc#1172366).
- btrfs: Remove extra parentheses from condition in copy_items() (bsc#1171761).
- Btrfs: remove no longer used io_err from btrfs_log_ctx (bsc#1171761).
- Btrfs: remove no longer used logged range variables when logging extents (bsc#1171761).
- Btrfs: remove no longer used 'sync' member from transaction handle (bsc#1171761).
- btrfs: remove remaing full_sync logic from btrfs_sync_file (bsc#1171761).
- btrfs: remove the logged extents infrastructure (bsc#1171761).
- btrfs: remove the wait ordered logic in the log_one_extent path (bsc#1171761).
- btrfs: setup a nofs context for memory allocation at btrfs_create_tree() (bsc#1172127).
- btrfs: setup a nofs context for memory allocation at __btrfs_set_acl (bsc#1172127).
- btrfs: use nofs context when initializing security xattrs to avoid deadlock (bsc#1172127).
- btrfs: volumes: Remove ENOSPC-prone btrfs_can_relocate() (bsc#1171124).
- bus: sunxi-rsb: Return correct data when mixing 16-bit and 8-bit reads (bsc#1111666).
- can: add missing attribute validation for termination (networking-stable-20_03_14).
- carl9170: remove P2P_GO support (bsc#1111666).
- cdc-acm: close race betrween suspend() and acm_softint (git-fixes).
- CDC-ACM: heed quirk also in error handling (git-fixes).
- cdc-acm: introduce a cool down (git-fixes).
- ceph: check if file lock exists before sending unlock request (bsc#1168789).
- ceph: convert mdsc->cap_dirty to a per-session list (bsc#1167104).
- ceph: demote quotarealm lookup warning to a debug message (bsc#1171692).
- ceph: fix double unlock in handle_cap_export() (bsc#1171694).
- ceph: fix double unlock in handle_cap_export() (bsc#1171694).
- ceph: fix endianness bug when handling MDS session feature bits (bsc#1171695).
- ceph: fix endianness bug when handling MDS session feature bits (bsc#1171695).
- ceph: request expedited service on session's last cap flush (bsc#1167104).
- cgroup, blkcg: Prepare some symbols for module and !CONFIG_CGROUP usages (bsc#1173857).
- cgroup, netclassid: periodically release file_lock on classid updating (networking-stable-20_03_14).
- char/random: Add a newline at the end of the file (jsc#SLE-12423).
- CIFS: Allocate crypto structures on the fly for calculating signatures of incoming packets (bsc#1144333).
- CIFS: Allocate encryption header through kmalloc (bsc#1144333).
- CIFS: allow unlock flock and OFD lock across fork (bsc#1144333).
- CIFS: check new file size when extending file by fallocate (bsc#1144333).
- CIFS: CIFSpdu.h: Replace zero-length array with flexible-array member (bsc#1144333).
- CIFS: clear PF_MEMALLOC before exiting demultiplex thread (bsc#1144333).
- CIFS: do not share tcons with DFS (bsc#1144333).
- CIFS: dump the session id and keys also for SMB2 sessions (bsc#1144333).
- CIFS: ensure correct super block for DFS reconnect (bsc#1144333).
- CIFS: Fix bug which the return value by asynchronous read is error (bsc#1144333).
- CIFS: fix uninitialised lease_key in open_shroot() (bsc#1144333).
- cifs: get rid of unused parameter in reconn_setup_dfs_targets() (bsc#1144333).
- cifs: handle hostnames that resolve to same ip in failover (bsc#1144333 bsc#1161016).
- CIFS: ignore cached share root handle closing errors (bsc#1166780).
- CIFS: improve read performance for page size 64KB & cache=strict & vers=2.1+ (bsc#1144333).
- CIFS: Increment num_remote_opens stats counter even in case of smb2_query_dir_first (bsc#1144333).
- CIFS: minor update to comments around the cifs_tcp_ses_lock mutex (bsc#1144333).
- CIFS: protect updating server->dstaddr with a spinlock (bsc#1144333).
- cifs: set up next DFS target before generic_ip_connect() (bsc#1144333 bsc#1161016).
- CIFS: smb2pdu.h: Replace zero-length array with flexible-array member (bsc#1144333).
- CIFS: smbd: Calculate the correct maximum packet size for segmented SMBDirect send/receive (bsc#1144333).
- CIFS: smbd: Check and extend sender credits in interrupt context (bsc#1144333).
- CIFS: smbd: Check send queue size before posting a send (bsc#1144333).
- CIFS: smbd: Do not schedule work to send immediate packet on every receive (bsc#1144333).
- CIFS: smbd: Merge code to track pending packets (bsc#1144333).
- CIFS: smbd: Properly process errors on ib_post_send (bsc#1144333).
- CIFS: smbd: Update receive credits before sending and deal with credits roll back on failure before sending (bsc#1144333).
- CIFS: Warn less noisily on default mount (bsc#1144333).
- clk: Add clk_hw_unregister_composite helper function definition (bsc#1051510).
- clk: bcm2835: Fix return type of bcm2835_register_gate (bsc#1051510).
- clk: clk-flexgen: fix clock-critical handling (bsc#1051510).
- clk: imx6ull: use OSC clock during AXI rate change (bsc#1051510).
- clk: imx: make mux parent strings const (bsc#1051510).
- clk: mediatek: correct the clocks for MT2701 HDMI PHY module (bsc#1051510).
- clk: qcom: rcg: Return failure for RCG update (bsc#1051510).
- clk: sunxi: Fix incorrect usage of round_down() (bsc#1051510).
- clk: sunxi-ng: a64: Fix gate bit of DSI DPHY (bsc#1051510).
- clocksource/drivers/hyper-v: Set TSC clocksource as default w/ InvariantTSC (bsc#1170620).
- clocksource/drivers/hyper-v: Set TSC clocksource as default w/ InvariantTSC (bsc#1170620, bsc#1170621).
- clocksource: dw_apb_timer: Make CPU-affiliation being optional (bsc#1111666).
- clocksource: dw_apb_timer_of: Fix missing clockevent timers (bsc#1051510).
- compat_ioctl: block: handle BLKREPORTZONE/BLKRESETZONE (git fixes (block drivers)).
- compat_ioctl: block: handle Persistent Reservations (git fixes (block drivers)).
- component: Silence bind error on -EPROBE_DEFER (bsc#1051510).
- copy_{to,from}_user(): consolidate object size checks (git fixes).
- coresight: do not use the BIT() macro in the UAPI header (git fixes (block drivers)).
- cpufreq: s3c64xx: Remove pointless NULL check in s3c64xx_cpufreq_driver_init (bsc#1051510).
- crypto: algboss - do not wait during notifier callback (bsc#1111666).
- crypto: algif_skcipher - Cap recv SG list at ctx->used (bsc#1111666).
- crypto: caam - update xts sector size for large input length (bsc#1111666).
- crypto: cavium/nitrox - Fix 'nitrox_get_first_device()' when ndevlist is fully iterated (bsc#1111666).
- crypto: cavium/nitrox - Fix 'nitrox_get_first_device()' when ndevlist is fully iterated (git-fixes).
- crypto: ccp - AES CFB mode is a stream cipher (git-fixes).
- crypto: ccp - Change a message to reflect status instead of failure (bsc#1172218).
- crypto: ccp - Clean up and exit correctly on allocation failure (git-fixes).
- crypto: ccp - Cleanup misc_dev on sev_exit() (bsc#1114279).
- crypto: ccp - Cleanup sp_dev_master in psp_dev_destroy() (bsc#1114279).
- Crypto/chcr: fix for ccm(aes) failed test (bsc#1111666).
- crypto: chelsio/chtls: properly set tp->lsndtime (bsc#1111666).
- cxgb4: fix MPS index overwrite when setting MAC address (bsc#1127355).
- cxgb4: fix Txq restart check during backpressure (bsc#1127354 bsc#1127371).
- debugfs: Add debugfs_create_xul() for hexadecimal unsigned long (git-fixes).
- debugfs: Check module state before warning in {full/open}_proxy_open() (bsc#1173746).
- debugfs_lookup(): switch to lookup_one_len_unlocked() (bsc#1171979).
- Deprecate NR_UNSTABLE_NFS, use NR_WRITEBACK (bsc#1163403).
- devlink: fix return value after hitting end in region read (bsc#1109837).
- devlink: validate length of param values (bsc#1109837).
- devlink: validate length of region addr/len (bsc#1109837).
- dmaengine: dmatest: Fix iteration non-stop logic (bsc#1051510).
- dmaengine: tegra210-adma: Fix an error handling path in 'tegra_adma_probe()' (bsc#1111666).
- dm btree: increase rebalance threshold in __rebalance2() (git fixes (block drivers)).
- dm cache: fix a crash due to incorrect work item cancelling (git fixes (block drivers)).
- dm crypt: fix benbi IV constructor crash if used in authenticated mode (git fixes (block drivers)).
- dm: fix potential for q->make_request_fn NULL pointer (git fixes (block drivers)).
- dm mpath: switch paths in dm_blk_ioctl() code path (bsc#1167574).
- dm-raid1: fix invalid return value from dm_mirror (bsc#1172378).
- dm space map common: fix to ensure new block isn't already in use (git fixes (block drivers)).
- dm: various cleanups to md->queue initialization code (git fixes).
- dm verity fec: fix hash block number in verity_fec_decode (git fixes (block drivers)).
- dm verity fec: fix memory leak in verity_fec_dtr (git fixes (block drivers)).
- dm writecache: fix data corruption when reloading the target (git fixes (block drivers)).
- dm writecache: fix incorrect flush sequence when doing SSD mode commit (git fixes (block drivers)).
- dm writecache: verify watermark during resume (git fixes (block drivers)).
- dm zoned: fix invalid memory access (git fixes (block drivers)).
- dm zoned: reduce overhead of backing device checks (git fixes (block drivers)).
- dm zoned: remove duplicate nr_rnd_zones increase in dmz_init_zone() (git fixes (block drivers)).
- dm zoned: support zone sizes smaller than 128MiB (git fixes (block drivers)).
- dp83640: reverse arguments to list_add_tail (git-fixes).
- dpaa_eth: fix usage as DSA master, try 3 (networking-stable-20_05_27).
- driver-core, libnvdimm: Let device subsystems add local lockdep coverage (bsc#1171753).
- Drivers: hv: Add a module description line to the hv_vmbus driver (bsc#1172249, bsc#1172251).
- Drivers: hv: Add a module description line to the hv_vmbus driver (bsc#1172253).
- Drivers: hv: Change flag to write log level in panic msg to false (bsc#1170617, bsc#1170618).
- Drivers: HV: Send one page worth of kmsg dump over Hyper-V during panic (bsc#1170618).
- Drivers: hv: vmbus: Fix the issue with freeing up hv_ctl_table_hdr (bsc#1170618).
- Drivers: hv: vmbus: Get rid of MSR access from vmbus_drv.c (bsc#1170618).
- Drivers: hv: vmus: Fix the check for return value from kmsg get dump buffer (bsc#1170618).
- Drivers/net/ibmvnic: Update VNIC protocol version reporting (bsc#1065729).
- drivers: soc: ti: knav_qmss_queue: Make knav_gp_range_ops static (bsc#1051510).
- Drivers: w1: add hwmon support structures (jsc#SLE-11048).
- Drivers: w1: add hwmon temp support for w1_therm (jsc#SLE-11048).
- Drivers: w1: refactor w1_slave_show to make the temp reading functionality separate (jsc#SLE-11048).
- drm: amd/acp: fix broken menu structure (bsc#1114279) * context changes
- drm: amd/display: fix Kconfig help text (bsc#1113956) * only fix DEBUG_KERNEL_DC
- drm/amdgpu: Correctly initialize thermal controller for GPUs with Powerplay table v0 (e.g Hawaii) (bsc#1111666).
- drm/amdgpu: Fix oops when pp_funcs is unset in ACPI event (bsc#1111666).
- drm/amd/powerplay: force the trim of the mclk dpm_levels if OD is (bsc#1113956)
- drm/atomic: Take the atomic toys away from X (bsc#1112178) * context changes
- drm/bochs: downgrade pci_request_region failure from error to warning (bsc#1051510).
- drm: bridge: adv7511: Extend list of audio sample rates (bsc#1111666).
- drm/crc: Actually allow to change the crc source (bsc#1114279) * offset changes
- drm/dp_mst: Fix clearing payload state on topology disable (bsc#1051510).
- drm/dp_mst: Increase ACT retry timeout to 3s (bsc#1113956) * context changes
- drm/dp_mst: Reformat drm_dp_check_act_status() a bit (bsc#1051510).
- drm_dp_mst_topology: fix broken drm_dp_sideband_parse_remote_dpcd_read() (bsc#1051510).
- drm/edid: Fix off-by-one in DispID DTD pixel clock (bsc#1114279)
- drm: encoder_slave: fix refcouting error for modules (bsc#1111666).
- drm: encoder_slave: fix refcouting error for modules (bsc#1114279)
- drm/etnaviv: fix perfmon domain interation (bsc#1113956)
- drm/etnaviv: rework perfmon query infrastructure (bsc#1112178)
- drm/i915: Apply Wa_1406680159:icl,ehl as an engine workaround (bsc#1112178) * rename gt/intel_workarounds.c to intel_workarounds.c * context changes
- drm/i915/gvt: Init DPLL/DDI vreg for virtual display instead of (bsc#1114279)
- drm/i915: HDCP: fix Ri prime check done during link check (bsc#1112178) * rename display/intel_hdmi.c to intel_hdmi.c * context changes
- drm/i915/icl+: Fix hotplug interrupt disabling after storm detection (bsc#1112178)
- drm/i915: properly sanity check batch_start_offset (bsc#1114279) * renamed display/intel_fbc.c -> intel_fb.c * renamed gt/intel_rc6.c -> intel_pm.c * context changes
- drm/i915: Whitelist context-local timestamp in the gen9 cmdparser (bsc#1111666).
- drm/mediatek: Check plane visibility in atomic_update (bsc#1113956) * context changes
- drm/meson: Delete an error message in meson_dw_hdmi_bind() (bsc#1051510).
- drm/msm/dpu: fix error return code in dpu_encoder_init (bsc#1111666).
- drm/msm: stop abusing dma_map/unmap for cache (bsc#1051510).
- drm/msm: Use the correct dma_sync calls harder (bsc#1051510).
- drm/msm: Use the correct dma_sync calls in msm_gem (bsc#1051510).
- drm: NULL pointer dereference [null-pointer-deref] (CWE 476) problem (bsc#1114279)
- drm: panel-orientation-quirks: Add quirk for Asus T101HA panel (bsc#1111666).
- drm: panel-orientation-quirks: Use generic orientation-data for Acer S1003 (bsc#1111666).
- drm/qxl: qxl_release leak in qxl_draw_dirty_fb() (bsc#1051510).
- drm/qxl: qxl_release leak in qxl_hw_surface_alloc() (bsc#1051510).
- drm/qxl: qxl_release use after free (bsc#1051510).
- drm/qxl: Use correct notify port address when creating cursor ring (bsc#1113956)
- drm/radeon: fix double free (bsc#1113956)
- drm/radeon: fix fb_div check in ni_init_smc_spll_table() (bsc#1113956)
- drm: Remove PageReserved manipulation from drm_pci_alloc (bsc#1114279) * offset changes
- drm/sun4i: dsi: Allow binding the host without a panel (bsc#1113956)
- drm/sun4i: dsi: Avoid hotplug race with DRM driver bind (bsc#1113956)
- drm/sun4i: dsi: Remove incorrect use of runtime PM (bsc#1113956) * context changes
- drm/sun4i: dsi: Remove unused drv from driver context (bsc#1113956) * context changes * keep include of sun4i_drv.h
- drm/sun4i: hdmi ddc clk: Fix size of m divider (bsc#1111666).
- drm/tegra: hub: Do not enable orphaned window group (bsc#1111666).
- drm/vkms: Hold gem object while still in-use (bsc#1113956) * context changes
- dump_stack: avoid the livelock of the dump_lock (git fixes (block drivers)).
- e1000: Distribute switch variables for initialization (bsc#1111666).
- e1000e: Disable TSO for buffer overrun workaround (bsc#1051510).
- e1000e: Do not wake up the system via WOL if device wakeup is disabled (bsc#1051510).
- e1000e: Relax condition to trigger reset for ME workaround (bsc#1111666).
- EDAC/amd64: Add family ops for Family 19h Models 00h-0Fh (jsc#SLE-11833).
- EDAC/amd64: Drop some family checks for newer systems (jsc#SLE-11833).
- EDAC/amd64: Read back the scrub rate PCI register on F15h (bsc#1114279).
- EDAC/mce_amd: Always load on SMCA systems (jsc#SLE-11833).
- EDAC/mce_amd: Make fam_ops static global (jsc#SLE-11833).
- EDAC, sb_edac: Add support for systems with segmented PCI buses (bsc#1169525).
- efi/random: Increase size of firmware supplied randomness (jsc#SLE-12423).
- efi/random: Treat EFI_RNG_PROTOCOL output as bootloader randomness (jsc#SLE-12423).
- efi: READ_ONCE rng seed size before munmap (jsc#SLE-12423).
- efi: Reorder pr_notice() with add_device_randomness() call (jsc#SLE-12423).
- evm: Check also if *tfm is an error pointer in init_desc() (bsc#1051510).
- evm: Fix a small race in init_desc() (bsc#1051510).
- ext4: add cond_resched() to __ext4_find_entry() (bsc#1166862).
- ext4: Check for non-zero journal inum in ext4_calculate_overhead (bsc#1167288).
- ext4: do not assume that mmp_nodename/bdevname have NUL (bsc#1166860).
- ext4: do not zeroout extents beyond i_disksize (bsc#1167851).
- ext4: fix a data race at inode->i_blocks (bsc#1171835).
- ext4: fix a data race in EXT4_I(inode)->i_disksize (bsc#1166861).
- ext4: fix extent_status fragmentation for plain files (bsc#1171949).
- ext4: fix incorrect group count in ext4_fill_super error message (bsc#1168765).
- ext4: fix incorrect inodes per group in error message (bsc#1168764).
- ext4: fix partial cluster initialization when splitting extent (bsc#1173839).
- ext4: fix potential race between online resizing and write operations (bsc#1166864).
- ext4: fix potential race between s_flex_groups online resizing and access (bsc#1166867).
- ext4: fix potential race between s_group_info online resizing and access (bsc#1166866).
- ext4: fix race between ext4_sync_parent() and rename() (bsc#1173838).
- ext4: fix race between writepages and enabling EXT4_EXTENTS_FL (bsc#1166870).
- ext4: fix support for inode sizes > 1024 bytes (bsc#1164284).
- ext4, jbd2: ensure panic by fix a race between jbd2 abort and ext4 error handlers (bsc#1173833).
- ext4: potential crash on allocation error in ext4_alloc_flex_bg_array() (bsc#1166940).
- ext4: rename s_journal_flag_rwsem to s_writepages_rwsem (bsc#1166868).
- ext4: use non-movable memory for superblock readahead (bsc#1171952).
- ext4: validate the debug_want_extra_isize mount option at parse time (bsc#1163897).
- extcon: adc-jack: Fix an error handling path in 'adc_jack_probe()' (bsc#1051510).
- fanotify: fix ignore mask logic for events on child and on dir (bsc#1172719).
- fanotify: fix merging marks masks with FAN_ONDIR (bsc#1171679).
- fbcon: fix null-ptr-deref in fbcon_switch (bsc#1114279) * rename drivers/video/fbdev/core to drivers/video/console * context changes
- fbdev: potential information leak in do_fb_ioctl() (bsc#1114279)
- fbmem: Adjust indentation in fb_prepare_logo and fb_blank (bsc#1114279)
- fdt: add support for rng-seed (jsc#SLE-12423).
- fdt: Update CRC check for rng-seed (jsc#SLE-12423).
- fib: add missing attribute validation for tun_id (networking-stable-20_03_14).
- firmware: imx: scu: Fix corruption of header (git-fixes).
- firmware: imx: scu: Fix possible memory leak in imx_scu_probe() (bsc#1111666).
- firmware: qcom: scm: fix compilation error when disabled (bsc#1051510).
- Fix a backport bug, where btrfs_put_root() -> btrfs_put_fs_root() modification is not needed due to missing dependency
- fix multiplication overflow in copy_fdtable() (bsc#1173825).
- fpga: dfl: afu: Corrected error handling levels (git-fixes).
- fq_codel: fix TCA_FQ_CODEL_DROP_BATCH_SIZE sanity checks (networking-stable-20_05_12).
- fs/cifs: fix gcc warning in sid_to_id (bsc#1144333).
- fs/seq_file.c: simplify seq_file iteration code and interface (bsc#1170125).
- gpiolib: Document that GPIO line names are not globally unique (bsc#1051510).
- gpio: tegra: mask GPIO IRQs during IRQ shutdown (bsc#1051510).
- gpu: host1x: Detach driver on unregister (bsc#1111666).
- gpu: ipu-v3: pre: do not trigger update if buffer address does not change (bsc#1111666).
- gre: fix uninit-value in __iptunnel_pull_header (networking-stable-20_03_14).
- HID: hid-input: clear unmapped usages (git-fixes).
- HID: hyperv: Add a module description line (bsc#1172249, bsc#1172251).
- HID: hyperv: Add a module description line (bsc#1172253).
- HID: i2c-hid: add Trekstor Primebook C11B to descriptor override (git-fixes).
- HID: i2c-hid: override HID descriptors for certain devices (git-fixes).
- HID: multitouch: add eGalaxTouch P80H84 support (bsc#1051510).
- HID: sony: Fix for broken buttons on DS3 USB dongles (bsc#1051510).
- HID: wacom: Read HID_DG_CONTACTMAX directly for non-generic devices (git-fixes).
- hrtimer: Annotate lockless access to timer->state (git fixes (block drivers)).
- hsr: add restart routine into hsr_get_node_list() (networking-stable-20_03_28).
- hsr: check protocol version in hsr_newlink() (networking-stable-20_04_17).
- hsr: fix general protection fault in hsr_addr_is_self() (networking-stable-20_03_28).
- hsr: set .netnsok flag (networking-stable-20_03_28).
- hsr: use rcu_read_lock() in hsr_get_node_{list/status}() (networking-stable-20_03_28).
- hwmon: (acpi_power_meter) Fix potential memory leak in acpi_power_meter_add() (bsc#1111666).
- hwmon: (emc2103) fix unable to change fan pwm1_enable attribute (bsc#1111666).
- hwmon: (max6697) Make sure the OVERT mask is set correctly (bsc#1111666).
- i2c: acpi: Force bus speed to 400KHz if a Silead touchscreen is present (git-fixes).
- i2c: acpi: put device when verifying client fails (git-fixes).
- i2c: algo-pca: Add 0x78 as SCL stuck low status for PCA9665 (bsc#1111666).
- i2c: brcmstb: remove unused struct member (git-fixes).
- i2c: core: Allow empty id_table in ACPI case as well (git-fixes).
- i2c: core: decrease reference count of device node in i2c_unregister_device (git-fixes).
- i2c: dev: Fix the race between the release of i2c_dev and cdev (bsc#1051510).
- i2c: fix missing pm_runtime_put_sync in i2c_device_probe (git-fixes).
- i2c-hid: properly terminate i2c_hid_dmi_desc_override_table array (git-fixes).
- i2c: i801: Do not add ICH_RES_IO_SMI for the iTCO_wdt device (git-fixes).
- i2c: iproc: Stop advertising support of SMBUS quick cmd (git-fixes).
- i2c: isch: Remove unnecessary acpi.h include (git-fixes).
- i2c: mlxcpld: check correct size of maximum RECV_LEN packet (bsc#1111666).
- i2c: mux: demux-pinctrl: Fix an error handling path in 'i2c_demux_pinctrl_probe()' (bsc#1051510).
- i2c: st: fix missing struct parameter description (bsc#1051510).
- i40e: reduce stack usage in i40e_set_fc (git-fixes).
- IB/ipoib: Add child to parent list only if device initialized (bsc#1168503).
- IB/ipoib: Consolidate checking of the proposed child interface (bsc#1168503).
- IB/ipoib: Do not remove child devices from within the ndo_uninit (bsc#1168503).
- IB/ipoib: Get rid of IPOIB_FLAG_GOING_DOWN (bsc#1168503).
- IB/ipoib: Get rid of the sysfs_mutex (bsc#1168503).
- IB/ipoib: Maintain the child_intfs list from ndo_init/uninit (bsc#1168503).
- IB/ipoib: Move all uninit code into ndo_uninit (bsc#1168503).
- IB/ipoib: Move init code to ndo_init (bsc#1168503).
- IB/ipoib: Replace printk with pr_warn (bsc#1168503).
- IB/ipoib: Use cancel_delayed_work_sync for neigh-clean task (bsc#1168503).
- IB/ipoib: Warn when one port fails to initialize (bsc#1168503).
- IB/mlx5: Fix missing congestion control debugfs on rep rdma device (bsc#1103991).
- ibmveth: Fix max MTU limit (bsc#1173428 ltc#186397).
- ibmvfc: do not send implicit logouts prior to NPIV login (bsc#1169625 ltc#184611).
- ibmvnic: continue to init in CRQ reset returns H_CLOSED (bsc#1173280 ltc#185369).
- ibmvnic: Flush existing work items before device removal (bsc#1065729).
- ibmvnic: Harden device login requests (bsc#1170011 ltc#183538).
- ibmvnic: Skip fatal error reset after passive init (bsc#1171078 ltc#184239).
- iio:ad7797: Use correct attribute_group (bsc#1051510).
- iio: adc: stm32-adc: fix device used to request dma (bsc#1051510).
- iio: adc: stm32-adc: fix sleep in atomic context (git-fixes).
- iio: adc: stm32-adc: Use dma_request_chan() instead dma_request_slave_channel() (bsc#1051510).
- iio: buffer: Do not allow buffers without any channels enabled to be activated (bsc#1051510).
- iio: dac: vf610: Fix an error handling path in 'vf610_dac_probe()' (bsc#1051510).
- iio:health:afe4404 Fix timestamp alignment and prevent data leak (bsc#1111666).
- iio:humidity:hdc100x Fix alignment and data leak issues (bsc#1111666).
- iio:magnetometer:ak8974: Fix alignment and data leak issues (bsc#1111666).
- iio: mma8452: Add missed iio_device_unregister() call in mma8452_probe() (bsc#1111666).
- iio: pressure: bmp280: Tolerate IRQ before registering (bsc#1051510).
- iio:pressure:ms5611 Fix buffer element alignment (bsc#1111666).
- iio: pressure: zpa2326: handle pm_runtime_get_sync failure (bsc#1111666).
- iio: sca3000: Remove an erroneous 'get_device()' (bsc#1051510).
- iio: xilinx-xadc: Fix ADC-B powerdown (bsc#1051510).
- iio: xilinx-xadc: Fix clearing interrupt when enabling trigger (bsc#1051510).
- iio: xilinx-xadc: Fix sequencer configuration for aux channels in simultaneous mode (bsc#1051510).
- ima: Directly assign the ima_default_policy pointer to ima_rules (bsc#1051510).
- ima: Fix ima digest hash table key calculation (bsc#1051510).
- ima: Fix return value of ima_write_policy() (git-fixes).
- include/asm-generic/topology.h: guard cpumask_of_node() macro argument (bsc#1148868).
- Input: evdev - call input_flush_device() on release(), not flush() (bsc#1051510).
- Input: hyperv-keyboard - add module description (bsc#1172249, bsc#1172251).
- Input: hyperv-keyboard - add module description (bsc#1172253).
- Input: i8042 - add Acer Aspire 5738z to nomux list (bsc#1051510).
- Input: i8042 - add ThinkPad S230u to i8042 reset list (bsc#1051510).
- Input: raydium_i2c_ts - use true and false for boolean values (bsc#1051510).
- Input: synaptics - add a second working PNP_ID for Lenovo T470s (bsc#1111666).
- Input: synaptics-rmi4 - fix error return code in rmi_driver_probe() (bsc#1051510).
- Input: synaptics-rmi4 - really fix attn_data use-after-free (git-fixes).
- Input: usbtouchscreen - add support for BonXeon TP (bsc#1051510).
- Input: xpad - add custom init packet for Xbox One S controllers (bsc#1051510).
- intel_idle: Graceful probe failure when MWAIT is disabled (bsc#1174115).
- intel_th: Fix a NULL dereference when hub driver is not loaded (bsc#1111666).
- iommu/amd: Call domain_flush_complete() in update_domain() (bsc#1172096).
- iommu/amd: Do not flush Device Table in iommu_map_page() (bsc#1172097).
- iommu/amd: Do not loop forever when trying to increase address space (bsc#1172098).
- iommu/amd: Fix legacy interrupt remapping for x2APIC-enabled system (bsc#1172099).
- iommu/amd: Fix over-read of ACPI UID from IVRS table (bsc#1172101).
- iommu/amd: Fix race in increase_address_space()/fetch_pte() (bsc#1172102).
- iommu/amd: Fix the configuration of GCR3 table root pointer (bsc#1169057).
- iommu/amd: Update Device Table in increase_address_space() (bsc#1172103).
- iommu: Fix reference count leak in iommu_group_alloc (bsc#1172397).
- iommu/vt-d: Enable PCI ACS for platform opt in hint (bsc#1174130).
- ip6_tunnel: Allow rcv/xmit even if remote address is a local address (bsc#1166978).
- ipmi: fix hung processes in __get_guid() (git-fixes).
- ipv4: fix a RCU-list lock in fib_triestat_seq_show (networking-stable-20_04_02).
- ipv6/addrconf: call ipv6_mc_up() for non-Ethernet interface (networking-stable-20_03_14).
- ipv6: do not auto-add link-local address to lag ports (networking-stable-20_04_09).
- ipv6: fix IPV6_ADDRFORM operation logic (bsc#1171662).
- ipv6: Fix nlmsg_flags when splitting a multipath route (networking-stable-20_03_01).
- ipv6: fix restrict IPV6_ADDRFORM operation (bsc#1171662).
- ipv6: Fix route replacement with dev-only route (networking-stable-20_03_01).
- ipvlan: add cond_resched_rcu() while processing muticast backlog (networking-stable-20_03_14).
- ipvlan: call dev_change_flags when ipvlan mode is reset (git-fixes).
- ipvlan: do not add hardware address of master to its unicast filter list (bsc#1137325).
- ipvlan: do not deref eth hdr before checking it's set (networking-stable-20_03_14).
- ipvlan: do not use cond_resched_rcu() in ipvlan_process_multicast() (networking-stable-20_03_14).
- iwlwifi: pcie: actually release queue memory in TVQM (bsc#1051510).
- ixgbe: do not check firmware errors (bsc#1170284).
- ixgbevf: Remove limit of 10 entries for unicast filter list (git-fixes).
- jbd2: avoid leaking transaction credits when unreserving handle (bsc#1173845).
- jbd2: Preserve kABI when adding j_abort_mutex (bsc#1173833).
- kabi fix for (bsc#1168202).
- kabi fix for early XHCI debug (git-fixes).
- kabi for for md: improve handling of bio with REQ_PREFLUSH in md_flush_request() (git-fixes).
- kabi: ppc64le: prevent struct dma_map_ops to become defined (jsc#SLE-12423).
- kabi, protect struct ib_device (bsc#1168503).
- kABI: protect struct mlx5_cmd_work_ent (kabi).
- kabi/severities: Do not track KVM internal symbols.
- kabi/severities: Ingnore get_dev_data() The function is internal to the AMD IOMMU driver and must not be called by any third party.
- kabi workaround for snd_rawmidi buffer_ref field addition (git-fixes).
- kernfs: fix barrier usage in __kernfs_new_node() (bsc#1111666).
- KEYS: reaching the keys quotas correctly (bsc#1051510).
- KVM: arm64: Change hyp_panic()s dependency on tpidr_el2 (bsc#1133021).
- KVM: arm64: Stop save/restoring host tpidr_el1 on VHE (bsc#1133021).
- KVM: Check validity of resolved slot when searching memslots (bsc#1172104).
- KVM: nVMX: Do not reread VMCS-agnostic state when switching VMCS (bsc#1114279).
- KVM: nVMX: Skip IBPB when switching between vmcs01 and vmcs02 (bsc#1114279).
- KVM: s390: vsie: Fix delivery of addressing exceptions (git-fixes).
- KVM: s390: vsie: Fix possible race when shadowing region 3 tables (git-fixes).
- KVM: s390: vsie: Fix region 1 ASCE sanity shadow address checks (git-fixes).
- KVM: SVM: Fix potential memory leak in svm_cpu_init() (bsc#1171736).
- KVM x86: Extend AMD specific guest behavior to Hygon virtual CPUs (bsc#1152489).
- KVM: x86: Fix APIC page invalidation race (bsc#1174122).
- kvm: x86: Fix L1TF mitigation for shadow MMU (bsc#1171904).
- KVM: x86/mmu: Set mmio_value to '0' if reserved #PF can't be generated (bsc#1171904).
- KVM: x86: only do L1TF workaround on affected processors (bsc#1171904).
- l2tp: Allow management of tunnels and session in user namespace (networking-stable-20_04_17).
- libata: Remove extra scsi_host_put() in ata_scsi_add_hosts() (bsc#1051510).
- libata: Return correct status in sata_pmp_eh_recover_pm() when ATA_DFLAG_DETACH is set (bsc#1051510).
- libceph: do not omit recovery_deletes in target_copy() (bsc#1173462).
- libceph: do not omit recovery_deletes in target_copy() (bsc#1174113).
- libceph: ignore pool overlay and cache logic on redirects (bsc#1173146).
- libfs: fix infoleak in simple_attr_read() (bsc#1168881).
- libnvdimm/bus: Fix wait_nvdimm_bus_probe_idle() ABBA deadlock (bsc#1171753).
- libnvdimm/bus: Prepare the nd_ioctl() path to be re-entrant (bsc#1171753).
- libnvdimm/bus: Stop holding nvdimm_bus_list_mutex over __nd_ioctl() (bsc#1171753).
- libnvdimm: cover up changes in struct nvdimm_bus (bsc#1171753).
- libnvdimm: cover up nd_pfn_sb changes (bsc#1171759).
- libnvdimm/dax: Pick the right alignment default when creating dax devices (bsc#1171759).
- libnvdimm/label: Remove the dpa align check (bsc#1171759).
- libnvdimm/of_pmem: Provide a unique name for bus provider (bsc#1171739).
- libnvdimm/pfn_dev: Add a build check to make sure we notice when struct page size change (bsc#1171743).
- libnvdimm/pfn_dev: Add page size and struct page size to pfn superblock (bsc#1171759).
- libnvdimm/pfn: Prevent raw mode fallback if pfn-infoblock valid (bsc#1171743).
- libnvdimm/pmem: Advance namespace seed for specific probe errors (bsc#1171743).
- libnvdimm/region: Initialize bad block for volatile namespaces (bnc#1151927 5.3.6).
- libnvdimm/region: Rewrite _probe_success() to _advance_seeds() (bsc#1171743).
- libnvdimm: Use PAGE_SIZE instead of SZ_4K for align check (bsc#1171759).
- lib: raid6: fix awk build warnings (git fixes (block drivers)).
- lib/raid6/test: fix build on distros whose /bin/sh is not bash (git fixes (block drivers)).
- lib/stackdepot.c: fix global out-of-bounds in stack_slabs (git fixes (block drivers)).
- livepatch: Apply vmlinux-specific KLP relocations early (bsc#1071995).
- livepatch: Disallow vmlinux.ko (bsc#1071995).
- livepatch: Make klp_apply_object_relocs static (bsc#1071995).
- livepatch: Prevent module-specific KLP rela sections from referencing vmlinux symbols (bsc#1071995).
- livepatch: Remove .klp.arch (bsc#1071995).
- locks: print unsigned ino in /proc/locks (bsc#1171951).
- loop: replace kill_bdev with invalidate_bdev (bsc#1173820).
- lpfc_debugfs: get rid of pointless access_ok() (bsc#1172687 bsc#1171530).
- lpfc: Synchronize NVME transport and lpfc driver devloss_tmo (bcs#1173060).
- mac80211: add ieee80211_is_any_nullfunc() (bsc#1051510).
- mac80211: add option for setting control flags (bsc#1111666).
- mac80211_hwsim: Use kstrndup() in place of kasprintf() (bsc#1051510).
- mac80211: mesh: fix discovery timer re-arming issue / crash (bsc#1051510).
- mac80211: set IEEE80211_TX_CTRL_PORT_CTRL_PROTO for nl80211 TX (bsc#1111666).
- macsec: avoid to set wrong mtu (bsc#1051510).
- macsec: restrict to ethernet devices (networking-stable-20_03_28).
- macvlan: add cond_resched() during multicast processing (networking-stable-20_03_14).
- macvlan: fix null dereference in macvlan_device_event() (bsc#1051510).
- mailbox: imx: Disable the clock on devm_mbox_controller_register() failure (git-fixes).
- make some Fujitsu systems run (bsc#1141558).
- md: Avoid namespace collision with bitmap API (git fixes (block drivers)).
- md: improve handling of bio with REQ_PREFLUSH in md_flush_request() (git-fixes).
- md/raid0: Fix an error message in raid0_make_request() (git fixes (block drivers)).
- md/raid10: prevent access of uninitialized resync_pages offset (git-fixes).
- mdraid: fix read/write bytes accounting (bsc#1172537).
- md: use memalloc scope APIs in mddev_suspend()/mddev_resume() (bsc#1166985)).
- md: use memalloc scope APIs in mddev_suspend()/mddev_resume() (git fixes (block drivers)).
- media: dvb: return -EREMOTEIO on i2c transfer failure (bsc#1051510).
- media: flexcop-usb: fix endpoint sanity check (git-fixes).
- media: platform: fcp: Set appropriate DMA parameters (bsc#1051510).
- media: si2157: Better check for running tuner in init (bsc#1111666).
- media: ti-vpe: cal: fix disable_irqs to only the intended target (git-fixes).
- mei: release me_cl object reference (bsc#1051510).
- mlxsw: core: Do not use WQ_MEM_RECLAIM for mlxsw ordered workqueue (git-fixes).
- mlxsw: core: Do not use WQ_MEM_RECLAIM for mlxsw workqueue (git-fixes).
- mlxsw: Fix some IS_ERR() vs NULL bugs (networking-stable-20_04_27).
- mlxsw: pci: Return error on PCI reset timeout (git-fixes).
- mlxsw: spectrum_acl_tcam: Position vchunk in a vregion list properly (networking-stable-20_05_12).
- mlxsw: spectrum: Disallow prio-tagged packets when PVID is removed (git-fixes).
- mlxsw: spectrum_dpipe: Add missing error path (git-fixes).
- mlxsw: spectrum_flower: Do not stop at FLOW_ACTION_VLAN_MANGLE (networking-stable-20_04_09).
- mlxsw: spectrum_mr: Fix list iteration in error path (bsc#1112374).
- mlxsw: spectrum: Prevent force of 56G (git-fixes).
- mlxsw: spectrum_router: Refresh nexthop neighbour when it becomes dead (git-fixes).
- mlxsw: spectrum_router: Remove inappropriate usage of WARN_ON() (git-fixes).
- mlxsw: spectrum_switchdev: Add MDB entries in prepare phase (git-fixes).
- mlxsw: spectrum_switchdev: Do not treat static FDB entries as sticky (git-fixes).
- mmc: atmel-mci: Fix debugfs on 64-bit platforms (git-fixes).
- mmc: block: Fix request completion in the CQE timeout path (bsc#1111666).
- mmc: block: Fix use-after-free issue for rpmb (bsc#1111666).
- mmc: core: Check request type before completing the request (git-fixes).
- mmc: core: Fix recursive locking issue in CQE recovery path (git-fixes).
- mmc: cqhci: Avoid false 'cqhci: CQE stuck on' by not open-coding timeout loop (git-fixes).
- mmc: dw_mmc: Fix debugfs on 64-bit platforms (git-fixes).
- mmc: fix compilation of user API (bsc#1051510).
- mmc: meson-gx: make sure the descriptor is stopped on errors (git-fixes).
- mmc: meson-gx: simplify interrupt handler (git-fixes).
- mmc: renesas_sdhi: limit block count to 16 bit for old revisions (git-fixes).
- mmc: sdhci-esdhc-imx: fix the mask for tuning start point (bsc#1051510).
- mmc: sdhci-msm: Clear tuning done flag while hs400 tuning (bsc#1051510).
- mmc: sdhci-msm: Set SDHCI_QUIRK_MULTIBLOCK_READ_ACMD12 quirk (bsc#1111666).
- mmc: sdhci-of-at91: fix memleak on clk_get failure (git-fixes).
- mmc: sdhci-pci: Fix eMMC driver strength for BYT-based controllers (bsc#1051510).
- mmc: sdhci-xenon: fix annoying 1.8V regulator warning (bsc#1051510).
- mmc: sdio: Fix potential NULL pointer error in mmc_sdio_init_card() (bsc#1051510).
- mmc: tmio: fix access width of Block Count Register (git-fixes).
- mm/filemap.c: do not initiate writeback if mapping has no dirty pages (bsc#1168884).
- mm: limit boost_watermark on small zones (git fixes (mm/pgalloc)).
- mm/memory_hotplug.c: only respect mem= parameter during boot stage (bsc#1065600).
- mm: replace PF_LESS_THROTTLE with PF_LOCAL_THROTTLE (bsc#1163403).
- mm: thp: handle page cache THP correctly in PageTransCompoundMap (git fixes (block drivers)).
- mtd: cfi: fix deadloop in cfi_cmdset_0002.c do_write_buffer (bsc#1051510).
- mtd: spi-nor: cadence-quadspi: add a delay in write sequence (git-fixes).
- mtd: spi-nor: enable 4B opcodes for mx66l51235l (git-fixes).
- mtd: spi-nor: fsl-quadspi: Do not let -EINVAL on the bus (git-fixes).
- mvpp2: remove misleading comment (git-fixes).
- mwifiex: avoid -Wstringop-overflow warning (bsc#1051510).
- mwifiex: Fix memory corruption in dump_station (bsc#1051510).
- net: bcmgenet: correct per TX/RX ring statistics (networking-stable-20_04_27).
- net/cxgb4: Check the return from t4_query_params properly (git-fixes).
- net: dsa: b53: Fix ARL register definitions (networking-stable-20_04_27).
- net: dsa: b53: Rework ARL bin logic (networking-stable-20_04_27).
- net: dsa: bcm_sf2: Do not register slave MDIO bus with OF (networking-stable-20_04_09).
- net: dsa: bcm_sf2: Ensure correct sub-node is parsed (networking-stable-20_04_09).
- net: dsa: bcm_sf2: Fix overflow checks (git-fixes).
- net: dsa: Fix duplicate frames flooded by learning (networking-stable-20_03_28).
- net: dsa: loop: Add module soft dependency (networking-stable-20_05_16).
- net: dsa: mt7530: fix roaming from DSA user ports (networking-stable-20_05_27).
- net: dsa: mv88e6xxx: fix lockup on warm boot (networking-stable-20_03_14).
- net: ena: add intr_moder_rx_interval to struct ena_com_dev and use it (git-fixes).
- net: ena: add missing ethtool TX timestamping indication (git-fixes).
- net: ena: avoid memory access violation by validating req_id properly (git-fixes).
- net: ena: do not wake up tx queue when down (git-fixes).
- net: ena: ena-com.c: prevent NULL pointer dereference (git-fixes).
- net: ena: ethtool: use correct value for crc32 hash (git-fixes).
- net: ena: fix continuous keep-alive resets (git-fixes).
- net: ena: fix corruption of dev_idx_to_host_tbl (git-fixes).
- net: ena: fix default tx interrupt moderation interval (git-fixes).
- net: ena: fix incorrect default RSS key (git-fixes).
- net: ena: fix incorrectly saving queue numbers when setting RSS indirection table (git-fixes).
- net: ena: fix issues in setting interrupt moderation params in ethtool (git-fixes).
- net: ena: fix potential crash when rxfh key is NULL (git-fixes).
- net: ena: fix retrieval of nonadaptive interrupt moderation intervals (git-fixes).
- net: ena: fix uses of round_jiffies() (git-fixes).
- net: ena: make ena rxfh support ETH_RSS_HASH_NO_CHANGE (git-fixes).
- net: ena: reimplement set/get_coalesce() (git-fixes).
- net: ena: rss: do not allocate key when not supported (git-fixes).
- net: ena: rss: fix failure to get indirection table (git-fixes).
- net: ena: rss: store hash function as values and not bits (git-fixes).
- net/ethernet: add Google GVE driver (jsc#SLE-10538)
- net: fec: add phy_reset_after_clk_enable() support (git-fixes).
- net: fec: validate the new settings in fec_enet_set_coalesce() (networking-stable-20_03_14).
- net: fib_rules: Correctly set table field when table number exceeds 8 bits (networking-stable-20_03_01).
- netfilter: connlabels: prefer static lock initialiser (git-fixes).
- netfilter: conntrack: sctp: use distinct states for new SCTP connections (bsc#1159199).
- netfilter: ctnetlink: netns exit must wait for callbacks (bsc#1169795).
- netfilter: not mark a spinlock as __read_mostly (git-fixes).
- net: fix a potential recursive NETDEV_FEAT_CHANGE (networking-stable-20_05_16).
- net: fix race condition in __inet_lookup_established() (bsc#1151794).
- net: fq: add missing attribute validation for orphan mask (networking-stable-20_03_14).
- net: hns3: fix 'tc qdisc del' failed issue (bsc#1109837).
- net: inet_csk: Fix so_reuseport bind-address cache in tb->fast* (networking-stable-20_05_27).
- net: ipip: fix wrong address family in init error path (networking-stable-20_05_27).
- net, ip_tunnel: fix interface lookup with no key (networking-stable-20_04_02).
- net: ipv4: devinet: Fix crash when add/del multicast IP with autojoin (networking-stable-20_04_17).
- net: ipv6: do not consider routes via gateways for anycast address check (networking-stable-20_04_17).
- net: ipvlan: Fix ipvlan device tso disabled while NETIF_F_IP_CSUM is set (git-fixes).
- netlink: Use netlink header as base to calculate bad attribute offset (networking-stable-20_03_14).
- net: macsec: preserve ingress frame ordering (networking-stable-20_05_12).
- net: macsec: update SCI upon MAC address change (networking-stable-20_03_14).
- net: memcg: fix lockdep splat in inet_csk_accept() (networking-stable-20_03_14).
- net: memcg: late association of sock to memcg (networking-stable-20_03_14).
- net/mlx4_core: drop useless LIST_HEAD (git-fixes).
- net/mlx4_core: fix a memory leak bug (git-fixes).
- net/mlx4_core: Fix use of ENOSPC around mlx4_counter_alloc() (networking-stable-20_05_12).
- net/mlx4_en: avoid indirect call in TX completion (networking-stable-20_04_27).
- net/mlx5: Add command entry handling completion (networking-stable-20_05_27).
- net/mlx5: Add new fields to Port Type and Speed register (bsc#1171118).
- net/mlx5: Add new fields to Port Type and Speed register (bsc#1171118).
- net/mlx5: Add RoCE RX ICRC encapsulated counter (bsc#1171118).
- net/mlx5: Avoid panic when setting vport rate (git-fixes).
- net/mlx5: Continue driver initialization despite debugfs failure (git-fixes).
- net/mlx5e: ethtool, Fix a typo in WOL function names (git-fixes).
- net/mlx5e: Fix ethtool self test: link speed (bsc#1171118).
- net/mlx5e: Fix traffic duplication in ethtool steering (git-fixes).
- net/mlx5e: Move port speed code from en_ethtool.c to en/port.c (bsc#1171118).
- net/mlx5e: Remove unnecessary clear_bit()s (git-fixes).
- net/mlx5e: Update netdev txq on completions during closure (networking-stable-20_05_27).
- net/mlx5: Expose link speed directly (bsc#1171118).
- net/mlx5: Expose link speed directly (bsc#1171118).
- net/mlx5: Expose port speed when possible (bsc#1171118).
- net/mlx5: Expose port speed when possible (bsc#1171118).
- net/mlx5: Fix command entry leak in Internal Error State (networking-stable-20_05_12).
- net/mlx5: Fix failing fw tracer allocation on s390 (bsc#1103990 ).
- net/mlx5: Fix forced completion access non initialized command entry (networking-stable-20_05_12).
- net: mvmdio: allow up to four clocks to be specified for orion-mdio (git-fixes).
- net: mvneta: Fix the case where the last poll did not process all rx (networking-stable-20_03_28).
- net: mvpp2: prs: Do not override the sign bit in SRAM parser shift (git-fixes).
- net: netrom: Fix potential nr_neigh refcnt leak in nr_add_node (networking-stable-20_04_27).
- net/packet: tpacket_rcv: do not increment ring index on drop (networking-stable-20_03_14).
- net: phy: fix aneg restart in phy_ethtool_set_eee (networking-stable-20_05_16).
- net: phy: micrel: kszphy_resume(): add delay after genphy_resume() before accessing PHY registers (bsc#1051510).
- net: phy: restore mdio regs in the iproc mdio driver (networking-stable-20_03_01).
- netprio_cgroup: Fix unlimited memory leak of v2 cgroups (networking-stable-20_05_16).
- net: qede: stop adding events on an already destroyed workqueue (git-fixes).
- net: qed: fix excessive QM ILT lines consumption (git-fixes).
- net: qed: fix NVMe login fails over VFs (git-fixes).
- net: qmi_wwan: add support for ASKEY WWHC050 (networking-stable-20_03_28).
- net: qrtr: Fix passing invalid reference to qrtr_local_enqueue() (networking-stable-20_05_27).
- net: revert default NAPI poll timeout to 2 jiffies (networking-stable-20_04_17).
- net: revert 'net: get rid of an signed integer overflow in ip_idents_reserve()' (networking-stable-20_05_27).
- net_sched: cls_route: remove the right filter from hashtable (networking-stable-20_03_28).
- net sched: fix reporting the first-time use timestamp (networking-stable-20_05_27).
- net_sched: sch_skbprio: add message validation to skbprio_change() (bsc#1109837).
- net/smc: add fallback check to connect() (git-fixes).
- net/smc: fix refcount non-blocking connect() -part 2 (git-fixes).
- net: stricter validation of untrusted gso packets (networking-stable-20_05_12).
- net/tls: Fix sk_psock refcnt leak in bpf_exec_tx_verdict() (networking-stable-20_05_12).
- net/tls: Fix sk_psock refcnt leak when in tls_data_ready() (networking-stable-20_05_12).
- net: usb: qmi_wwan: add support for DW5816e (networking-stable-20_05_12).
- net: vmxnet3: fix possible buffer overflow caused by bad DMA value in vmxnet3_get_rss() (bsc#1172484).
- net/x25: Fix x25_neigh refcnt leak when receiving frame (networking-stable-20_04_27).
- nfc: add missing attribute validation for SE API (networking-stable-20_03_14).
- nfc: add missing attribute validation for vendor subcommand (networking-stable-20_03_14).
- nfc: pn544: Fix occasional HW initialization failure (networking-stable-20_03_01).
- nfc: st21nfca: add missed kfree_skb() in an error path (bsc#1051510).
- nfp: abm: fix a memory leak bug (bsc#1109837).
- nfp: bpf: fix code-gen bug on BPF_ALU | BPF_XOR | BPF_K (git-fixes).
- nfsd4: fix up replay_matches_cache() (git-fixes).
- nfsd: Ensure CLONE persists data and metadata changes to the target file (git-fixes).
- nfsd: fix delay timer on 32-bit architectures (git-fixes).
- nfsd: fix jiffies/time_t mixup in LRU list (git-fixes).
- nfs: Directory page cache pages need to be locked when read (git-fixes).
- nfsd: memory corruption in nfsd4_lock() (git-fixes).
- nfs: Do not call generic_error_remove_page() while holding locks (bsc#1170457).
- NFS: Fix an RCU lock leak in nfs4_refresh_delegation_stateid() (bsc#1170592).
- nfs: Fix memory leaks and corruption in readdir (git-fixes).
- nfs: Fix O_DIRECT accounting of number of bytes read/written (git-fixes).
- nfs: Fix potential posix_acl refcnt leak in nfs3_set_acl (git-fixes).
- nfs: fix racey wait in nfs_set_open_stateid_locked (bsc#1170592).
- nfs/flexfiles: Use the correct TCP timeout for flexfiles I/O (git-fixes).
- nfs/pnfs: Fix pnfs_generic_prepare_to_resend_writes() (git-fixes).
- nfs: Revalidate the file size on a fatal write error (git-fixes).
- NFSv4.0: nfs4_do_fsinfo() should not do implicit lease renewals (git-fixes).
- NFSv4: Do not allow a cached open with a revoked delegation (git-fixes).
- NFSv4: Fix leak of clp->cl_acceptor string (git-fixes).
- NFSv4/pnfs: Return valid stateids in nfs_layout_find_inode_by_stateid() (git-fixes).
- NFSv4: Retry CLOSE and DELEGRETURN on NFS4ERR_OLD_STATEID (bsc#1170592).
- NFSv4: try lease recovery on NFS4ERR_EXPIRED (git-fixes).
- NFSv4.x: Drop the slot if nfs4_delegreturn_prepare waits for layoutreturn (git-fixes).
- nilfs2: fix null pointer dereference at nilfs_segctor_do_construct() (bsc#1173857).
- nl80211: fix NL80211_ATTR_CHANNEL_WIDTH attribute type (bsc#1111666).
- nl802154: add missing attribute validation for dev_type (networking-stable-20_03_14).
- nl802154: add missing attribute validation (networking-stable-20_03_14).
- nvdimm: Avoid race between probe and reading device attributes (bsc#1170442).
- nvme: check for NVME_CTRL_LIVE in nvme_report_ns_ids() (bcs#1171558 bsc#1159058).
- nvme: do not update multipath disk information if the controller is down (bcs#1171558 bsc#1159058).
- nvme: fail cancelled commands with NVME_SC_HOST_PATH_ERROR (bsc#1158983 bsc#1172538).
- nvme-fc: Fail transport errors with NVME_SC_HOST_PATH (bsc#1158983 bsc#1172538).
- nvme-fc: print proper nvme-fc devloss_tmo value (bsc#1172391).
- nvme-tcp: fail command with NVME_SC_HOST_PATH_ERROR send failed (bsc#1158983 bsc#1172538).
- objtool: Add is_static_jump() helper (bsc#1169514).
- objtool: Add relocation check for alternative sections (bsc#1169514).
- objtool: Clean instruction state before each function validation (bsc#1169514).
- objtool: Fix stack offset tracking for indirect CFAs (bsc#1169514).
- objtool: Fix switch table detection in .text.unlikely (bsc#1169514).
- objtool: Ignore empty alternatives (bsc#1169514).
- objtool: Make BP scratch register warning more robust (bsc#1169514).
- ocfs2: no need try to truncate file beyond i_size (bsc#1171841).
- OMAP: DSS2: remove non-zero check on variable r (bsc#1114279)
- overflow: Fix -Wtype-limits compilation warnings (git fixes).
- overflow.h: Add arithmetic shift helper (git fixes).
- p54usb: add AirVasT USB stick device-id (bsc#1051510).
- padata: ensure the reorder timer callback runs on the correct CPU (git-fixes).
- padata: Remove broken queue flushing (git-fixes).
- padata: reorder work kABI fixup (git-fixes).
- Partially revert 'kfifo: fix kfifo_alloc() and kfifo_init()' (git fixes (block drivers)).
- partitions/efi: Fix partition name parsing in GUID partition entry (bsc#1168763).
- PCI: Allow pci_resize_resource() for devices on root bus (bsc#1051510).
- PCI: Fix pci_register_host_bridge() device_register() error handling (bsc#1051510).
- PCI: Generalize multi-function power dependency device links (bsc#1111666).
- PCI: hv: Add support for protocol 1.3 and support PCI_BUS_RELATIONS2 (bsc#1172201, bsc#1172202).
- PCI: hv: Decouple the func definition in hv_dr_state from VSP message (bsc#1172201, bsc#1172202).
- PCI: pciehp: Fix indefinite wait on sysfs requests (git-fixes).
- PCI: pciehp: Fix MSI interrupt race (bsc#1159037).
- PCI: pciehp: Support interrupts sent from D3hot (git-fixes).
- PCI/PM: Call .bridge_d3() hook only if non-NULL (git-fixes).
- PCI: Program MPS for RCiEP devices (bsc#1051510).
- PCI/PTM: Inherit Switch Downstream Port PTM settings from Upstream Port (bsc#1051510).
- PCI: sanity test on PCI vendor to be sure we do not touch everything (bsc#1141558).
- pcm_native: result of put_user() needs to be checked (bsc#1111666).
- perf: Allocate context task_ctx_data for child event (git-fixes).
- perf: Allocate context task_ctx_data for child event (git-fixes).
- perf/cgroup: Fix perf cgroup hierarchy support (git-fixes).
- perf/cgroup: Fix perf cgroup hierarchy support (git-fixes).
- perf: Copy parent's address filter offsets on clone (git-fixes).
- perf: Copy parent's address filter offsets on clone (git-fixes).
- perf/core: Add sanity check to deal with pinned event failure (git-fixes).
- perf/core: Add sanity check to deal with pinned event failure (git-fixes).
- perf/core: Avoid freeing static PMU contexts when PMU is unregistered (git-fixes).
- perf/core: Avoid freeing static PMU contexts when PMU is unregistered (git-fixes).
- perf/core: Correct event creation with PERF_FORMAT_GROUP (git-fixes).
- perf/core: Correct event creation with PERF_FORMAT_GROUP (git-fixes).
- perf/core: Do not WARN() for impossible ring-buffer sizes (git-fixes).
- perf/core: Do not WARN() for impossible ring-buffer sizes (git-fixes).
- perf/core: Fix bad use of igrab() (git fixes (dependent patch)).
- perf/core: Fix crash when using HW tracing kernel filters (git-fixes).
- perf/core: Fix ctx_event_type in ctx_resched() (git-fixes).
- perf/core: Fix ctx_event_type in ctx_resched() (git-fixes).
- perf/core: Fix error handling in perf_event_alloc() (git-fixes).
- perf/core: Fix error handling in perf_event_alloc() (git-fixes).
- perf/core: Fix exclusive events' grouping (git-fixes).
- perf/core: Fix exclusive events' grouping (git-fixes).
- perf/core: Fix group scheduling with mixed hw and sw events (git-fixes).
- perf/core: Fix group scheduling with mixed hw and sw events (git-fixes).
- perf/core: Fix impossible ring-buffer sizes warning (git-fixes).
- perf/core: Fix impossible ring-buffer sizes warning (git-fixes).
- perf/core: Fix locking for children siblings group read (git-fixes).
- perf/core: Fix locking for children siblings group read (git-fixes).
- perf/core: Fix lock inversion between perf,trace,cpuhp (git-fixes (dependent patch for 18736eef1213)).
- perf/core: Fix perf_event_read_value() locking (git-fixes).
- perf/core: Fix perf_event_read_value() locking (git-fixes).
- perf/core: Fix perf_pmu_unregister() locking (git-fixes).
- perf/core: Fix perf_pmu_unregister() locking (git-fixes).
- perf/core: Fix __perf_read_group_add() locking (git-fixes (dependent patch)).
- perf/core: Fix perf_sample_regs_user() mm check (git-fixes).
- perf/core: Fix perf_sample_regs_user() mm check (git-fixes).
- perf/core: Fix possible Spectre-v1 indexing for ->aux_pages (git-fixes).
- perf/core: Fix possible Spectre-v1 indexing for ->aux_pages (git-fixes).
- perf/core: Fix race between close() and fork() (git-fixes).
- perf/core: Fix race between close() and fork() (git-fixes).
- perf/core: Fix the address filtering fix (git-fixes).
- perf/core: Fix the address filtering fix (git-fixes).
- perf/core: Fix use-after-free in uprobe_perf_close() (git-fixes).
- perf/core: Fix use-after-free in uprobe_perf_close() (git-fixes).
- perf/core: Force USER_DS when recording user stack data (git-fixes).
- perf/core: Force USER_DS when recording user stack data (git-fixes).
- perf/core: Restore mmap record type correctly (git-fixes).
- perf/core: Restore mmap record type correctly (git-fixes).
- perf: Fix header.size for namespace events (git-fixes).
- perf: Fix header.size for namespace events (git-fixes).
- perf/ioctl: Add check for the sample_period value (git-fixes).
- perf/ioctl: Add check for the sample_period value (git-fixes).
- perf, pt, coresight: Fix address filters for vmas with non-zero offset (git-fixes).
- perf, pt, coresight: Fix address filters for vmas with non-zero offset (git-fixes).
- perf: Return proper values for user stack errors (git-fixes).
- perf: Return proper values for user stack errors (git-fixes).
- perf/x86/amd: Add support for Large Increment per Cycle Events (jsc#SLE-11831).
- perf/x86/amd: Constrain Large Increment per Cycle events (git-fixes).
- perf/x86/amd: Constrain Large Increment per Cycle events (jsc#SLE-11831).
- perf/x86/amd/ibs: Fix reading of the IBS OpData register and thus precise RIP validity (git-fixes).
- perf/x86/amd/ibs: Fix sample bias for dispatched micro-ops (git-fixes).
- perf/x86/amd/ibs: Handle erratum #420 only on the affected CPU family (10h) (git-fixes).
- perf/x86/amd/iommu: Make the 'amd_iommu_attr_groups' symbol static (git-fixes).
- perf/x86/amd/uncore: Do not set 'ThreadMask' and 'SliceMask' for non-L3 PMCs (git-fixes stable).
- perf/x86/amd/uncore: Set the thread mask for F17h L3 PMCs (git-fixes).
- perf/x86/amd/uncore: Set ThreadMask and SliceMask for L3 Cache perf events (git-fixes stable).
- perf/x86: Enable free running PEBS for REGS_USER/INTR (git-fixes).
- perf/x86: Fix incorrect PEBS_REGS (git-fixes).
- perf/x86/intel: Add generic branch tracing check to intel_pmu_has_bts() (git-fixes).
- perf/x86/intel: Add proper condition to run sched_task callbacks (git-fixes).
- perf/x86/intel/bts: Fix the use of page_private() (git-fixes).
- perf/x86/intel: Fix PT PMI handling (git-fixes).
- perf/x86/intel: Move branch tracing setup to the Intel-specific source file (git-fixes).
- perf/x86/intel/uncore: Add Node ID mask (git-fixes).
- perf/x86/intel/uncore: Fix PCI BDF address of M3UPI on SKX (git-fixes).
- perf/x86/intel/uncore: Handle invalid event coding for free-running counter (git-fixes).
- perf/x86/pt, coresight: Clean up address filter structure (git fixes (dependent patch)).
- perf/x86/uncore: Fix event group support (git-fixes).
- pid: Improve the comment about waiting in zap_pid_ns_processes (git fixes)).
- pinctrl: baytrail: Enable pin configuration setting for GPIO chip (git-fixes).
- pinctrl: cherryview: Add missing spinlock usage in chv_gpio_irq_handler (git-fixes).
- pinctrl: freescale: imx: Fix an error handling path in 'imx_pinctrl_probe()' (bsc#1051510).
- pinctrl: imxl: Fix an error handling path in 'imx1_pinctrl_core_probe()' (bsc#1051510).
- pinctrl: samsung: Save/restore eint_mask over suspend for EINT_TYPE GPIOs (bsc#1051510).
- pinctrl: sunrisepoint: Fix PAD lock register offset for SPT-H (git-fixes).
- platform/x86: asus-nb-wmi: Do not load on Asus T100TA and T200TA (bsc#1051510).
- platform/x86: dell-laptop: do not register micmute LED if there is no token (bsc#1111666).
- platform/x86: hp-wmi: Convert simple_strtoul() to kstrtou32() (bsc#1111666).
- PM / Domains: Allow genpd users to specify default active wakeup behavior (git-fixes).
- pNFS: Ensure we do clear the return-on-close layout stateid on fatal errors (git-fixes).
- pnp: Use list_for_each_entry() instead of open coding (git fixes).
- powerpc/64s: Do not let DT CPU features set FSCR_DSCR (bsc#1065729).
- powerpc/64s: Save FSCR to init_task.thread.fscr after feature init (bsc#1065729).
- powerpc: Add attributes for setjmp/longjmp (bsc#1065729).
- powerpc/book3s64: Export has_transparent_hugepage() related functions (bsc#1171759).
- powerpc/book3s64/pkeys: Fix pkey_access_permitted() for execute disable pkey (bsc#1065729).
- powerpc/fadump: fix race between pstore write and fadump crash trigger (bsc#1168959 ltc#185010).
- powerpc/hash64/devmap: Use H_PAGE_THP_HUGE when setting up huge devmap PTE entries (bsc#1065729).
- powerpc/pci/of: Parse unassigned resources (bsc#1065729).
- powerpc/setup_64: Set cache-line-size based on cache-block-size (bsc#1065729).
- powerpc/sstep: Fix DS operand in ld encoding to appropriate value (bsc#1065729).
- powerpc/xive: Clear the page tables for the ESB IO mapping (bsc#1085030).
- powerpc/xmon: Reset RCU and soft lockup watchdogs (bsc#1065729).
- power: supply: bq24257_charger: Replace depends on REGMAP_I2C with select (bsc#1051510).
- power: supply: lp8788: Fix an error handling path in 'lp8788_charger_probe()' (bsc#1051510).
- power: supply: smb347-charger: IRQSTAT_D is volatile (bsc#1051510).
- power: vexpress: add suppress_bind_attrs to true (bsc#1111666).
- pppoe: only process PADT targeted at local interfaces (networking-stable-20_05_16).
- pwm: bcm2835: Dynamically allocate base (bsc#1051510).
- pwm: meson: Fix confusing indentation (bsc#1051510).
- pwm: pca9685: Fix PWM/GPIO inter-operation (bsc#1051510).
- pwm: rcar: Fix late Runtime PM enablement (bsc#1051510).
- pwm: renesas-tpu: Fix late Runtime PM enablement (bsc#1051510).
- qede: Fix race between rdma destroy workqueue and link change event (networking-stable-20_03_01).
- qed: reduce maximum stack frame size (git-fixes).
- qlcnic: fix missing release in qlcnic_83xx_interrupt_test (git-fixes).
- r8152: check disconnect status after long sleep (networking-stable-20_03_14).
- r8152: support additional Microsoft Surface Ethernet Adapter variant (networking-stable-20_05_27).
- raid5: remove gfp flags from scribble_alloc() (bsc#1166985).
- raid5: remove gfp flags from scribble_alloc() (git fixes (block drivers)).
- raid6/ppc: Fix build for clang (git fixes (block drivers)).
- random: always use batched entropy for get_random_u{32,64} (bsc#1164871).
- rcu: locking and unlocking need to always be at least barriers (git fixes (block drivers)).
- RDMA/efa: Fix setting of wrong bit in get/set_feature commands (bsc#1111666)
- RDMA/efa: Set maximum pkeys device attribute (bsc#1111666)
- RDMA/efa: Support remote read access in MR registration (bsc#1111666)
- RDMA/efa: Unified getters/setters for device structs bitmask access (bsc#1111666)
- RDMA/ipoib: Fix use of sizeof() (bsc#1168503).
- RDMA/netdev: Fix netlink support in IPoIB (bsc#1168503).
- RDMA/netdev: Hoist alloc_netdev_mqs out of the driver (bsc#1168503).
- RDMA/netdev: Use priv_destructor for netdev cleanup (bsc#1168503).
- regmap: debugfs: Do not sleep while atomic for fast_io regmaps (bsc#1111666).
- resolve KABI warning for perf-pt-coresight (git-fixes).
- rpm/kernel-docs.spec.in: Require python-packaging for build.
- rtlwifi: Fix a double free in _rtl_usb_tx_urb_setup() (bsc#1051510).
- s390/bpf: Maintain 8-byte stack alignment (bsc#1169194).
- s390/cio: avoid duplicated 'ADD' uevents (git-fixes).
- s390/cio: generate delayed uevent for vfio-ccw subchannels (git-fixes).
- s390/cpuinfo: fix wrong output when CPU0 is offline (git-fixes).
- s390/cpum_cf: Add new extended counters for IBM z15 (bsc#1169762 LTC#185291).
- s390/diag: fix display of diagnose call statistics (git-fixes).
- s390: fix syscall_get_error for compat processes (git-fixes).
- s390/ftrace: fix potential crashes when switching tracers (git-fixes).
- s390/gmap: return proper error code on ksm unsharing (git-fixes).
- s390/ism: fix error return code in ism_probe() (git-fixes).
- s390/ism: fix error return code in ism_probe() (git-fixes).
- s390/pci: do not set affinity for floating irqs (git-fixes).
- s390/pci: Fix possible deadlock in recover_store() (bsc#1165183 LTC#184103).
- s390/pci: Recover handle in clp_set_pci_fn() (bsc#1165183 LTC#184103).
- s390/qdio: consistently restore the IRQ handler (git-fixes).
- s390/qdio: lock device while installing IRQ handler (git-fixes).
- s390/qdio: put thinint indicator after early error (git-fixes).
- s390/qdio: tear down thinint indicator after early error (git-fixes).
- s390/qeth: cancel RX reclaim work earlier (git-fixes).
- s390/qeth: do not return -ENOTSUPP to userspace (git-fixes).
- s390/qeth: do not warn for napi with 0 budget (git-fixes).
- s390/qeth: fix error handling for isolation mode cmds (git-fixes).
- s390/qeth: fix off-by-one in RX copybreak check (git-fixes).
- s390/qeth: fix promiscuous mode after reset (git-fixes).
- s390/qeth: fix qdio teardown after early init error (git-fixes).
- s390/qeth: handle error due to unsupported transport mode (git-fixes).
- s390/qeth: handle error when backing RX buffer (git-fixes).
- s390/qeth: lock the card while changing its hsuid (git-fixes).
- s390/qeth: support net namespaces for L3 devices (git-fixes).
- s390/time: Fix clk type in get_tod_clock (git-fixes).
- sch_choke: avoid potential panic in choke_reset() (networking-stable-20_05_12).
- sch_sfq: validate silly quantum values (networking-stable-20_05_12).
- scripts/decodecode: fix trapping instruction formatting (bsc#1065729).
- scripts/dtc: Remove redundant YYLOC global declaration (bsc#1160388).
- scsi: aacraid: fix a signedness bug (bsc#1174296).
- scsi: bnx2i: fix potential use after free (bsc#1171600).
- scsi: core: avoid repetitive logging of device offline messages (bsc#1145929).
- scsi: core: Handle drivers which set sg_tablesize to zero (bsc#1171601) This commit also required: > scsi: core: avoid preallocating big SGL for data
- scsi: core: kABI fix offline_already (bsc#1145929).
- scsi: core: save/restore command resid for error handling (bsc#1171602).
- scsi: core: scsi_trace: Use get_unaligned_be*() (bsc#1171604).
- scsi: core: try to get module before removing device (bsc#1171605).
- scsi: csiostor: Adjust indentation in csio_device_reset (bsc#1171606).
- scsi: csiostor: Do not enable IRQs too early (bsc#1171607).
- scsi: esas2r: unlock on error in esas2r_nvram_read_direct() (bsc#1171608).
- scsi: fnic: fix invalid stack access (bsc#1171609).
- scsi: fnic: fix msix interrupt allocation (bsc#1171610).
- scsi: hisi_sas: fix calls to dma_set_mask_and_coherent() (bsc#1174296).
- scsi: ibmvscsi: Do not send host info in adapter info MAD after LPM (bsc#1172759 ltc#184814).
- scsi: ibmvscsi: Fix WARN_ON during event pool release (bsc#1170791 ltc#185128).
- scsi: iscsi: Avoid potential deadlock in iscsi_if_rx func (bsc#1171611).
- scsi: iscsi: Fix a potential deadlock in the timeout handler (bsc#1171612).
- scsi: iscsi: qla4xxx: fix double free in probe (bsc#1171613).
- scsi: lpfc: Add an internal trace log buffer (bsc#1172687 bsc#1171530).
- scsi: lpfc: Add blk_io_poll support for latency improvment (bsc#1172687 bsc#1171530).
- scsi: lpfc: Add support to display if adapter dumps are available (bsc#1172687 bsc#1171530).
- scsi: lpfc: Allow applications to issue Common Set Features mailbox command (bsc#1172687 bsc#1171530).
- scsi: lpfc: Avoid another null dereference in lpfc_sli4_hba_unset() (bsc#1172687 bsc#1171530).
- scsi: lpfc: Change default queue allocation for reduced memory consumption (bsc#1164780).
- scsi: lpfc: fix: Coverity: lpfc_cmpl_els_rsp(): Null pointer dereferences (bsc#1171614).
- scsi: lpfc: Fix crash in target side cable pulls hitting WAIT_FOR_UNREG (bsc#1171615).
- scsi: lpfc: Fix inconsistent indenting (bsc#1158983).
- scsi: lpfc: Fix interrupt assignments when multiple vectors are supported on same CPU (bsc#1158983).
- scsi: lpfc: Fix kdump hang on PPC (bsc#1172687 bsc#1171530).
- scsi: lpfc: Fix language in 0373 message to reflect non-error message (bsc#1172687 bsc#1171530).
- scsi: lpfc: Fix less-than-zero comparison of unsigned value (bsc#1158983).
- scsi: lpfc: Fix lpfc_nodelist leak when processing unsolicited event (bsc#1164780).
- scsi: lpfc: Fix MDS Diagnostic Enablement definition (bsc#1164780).
- scsi: lpfc: Fix missing MDS functionality (bsc#1172687 bsc#1171530).
- scsi: lpfc: Fix negation of else clause in lpfc_prep_node_fc4type (bsc#1164780).
- scsi: lpfc: Fix noderef and address space warnings (bsc#1164780).
- scsi: lpfc: Fix NVMe rport deregister and registration during ADISC (bsc#1172687 bsc#1171530).
- scsi: lpfc: Fix oops due to overrun when reading SLI3 data (bsc#1172687 bsc#1171530).
- scsi: lpfc: Fix shost refcount mismatch when deleting vport (bsc#1172687 bsc#1171530).
- scsi: lpfc: Fix stack trace seen while setting rrq active (bsc#1172687 bsc#1171530).
- scsi: lpfc: Fix unused assignment in lpfc_sli4_bsg_link_diag_test (bsc#1172687 bsc#1171530).
- scsi: lpfc: Maintain atomic consistency of queue_claimed flag (bsc#1164780).
- scsi: lpfc: remove duplicate unloading checks (bsc#1164780).
- scsi: lpfc: Remove re-binding of nvme rport during registration (bsc#1164780).
- scsi: lpfc: Remove redundant initialization to variable rc (bsc#1164780).
- scsi: lpfc: Remove unnecessary lockdep_assert_held calls (bsc#1164780).
- scsi: lpfc: Update lpfc version to 12.8.0.1 (bsc#1164780).
- scsi: lpfc: Update lpfc version to 12.8.0.2 (bsc#1158983).
- scsi: megaraid_sas: Do not initiate OCR if controller is not in ready state (bsc#1171616).
- scsi: megaraid_sas: Fix a compilation warning (bsc#1174296).
- scsi: mpt3sas: Fix double free in attach error handling (bsc#1174296).
- scsi: qedf: Add port_id getter (bsc#1150660).
- scsi: qla2xxx: add ring buffer for tracing debug logs (bsc#1157169).
- scsi: qla2xxx: check UNLOADING before posting async work (bsc#1157169).
- scsi: qla2xxx: Delete all sessions before unregister local nvme port (bsc#1157169).
- scsi: qla2xxx: Do not log message when reading port speed via sysfs (bsc#1157169).
- scsi: qla2xxx: Fix a condition in qla2x00_find_all_fabric_devs() (bsc#1174296).
- scsi: qla2xxx: Fix hang when issuing nvme disconnect-all in NPIV (bsc#1157169).
- scsi: qla2xxx: Fix regression warnings (bsc#1157169).
- scsi: qla2xxx: Remove non functional code (bsc#1157169).
- scsi: qla2xxx: Set NVMe status code for failed NVMe FCP request (bsc#1158983).
- scsi: qla2xxx: set UNLOADING before waiting for session deletion (bsc#1157169).
- scsi: qla4xxx: Adjust indentation in qla4xxx_mem_free (bsc#1171617).
- scsi: qla4xxx: fix double free bug (bsc#1171618).
- scsi: sd: Clear sdkp->protection_type if disk is reformatted without PI (bsc#1171619).
- scsi: sg: add sg_remove_request in sg_common_write (bsc#1171620).
- scsi: tracing: Fix handling of TRANSFER LENGTH == 0 for READ(6) and WRITE(6) (bsc#1171621).
- scsi: ufs: change msleep to usleep_range (bsc#1171622).
- scsi: ufs: Clean up ufshcd_scale_clks() and clock scaling error out path (bsc#1171623).
- scsi: ufs: Fix ufshcd_hold() caused scheduling while atomic (bsc#1171624).
- scsi: ufs: Fix ufshcd_probe_hba() reture value in case ufshcd_scsi_add_wlus() fails (bsc#1171625).
- scsi: ufs: Recheck bkops level if bkops is disabled (bsc#1171626).
- scsi: zfcp: fix missing erp_lock in port recovery trigger for point-to-point (git-fixes).
- sctp: Do not add the shutdown timer if its already been added (networking-stable-20_05_27).
- sctp: fix possibly using a bad saddr with a given dst (networking-stable-20_04_02).
- sctp: fix refcount bug in sctp_wfree (networking-stable-20_04_02).
- sctp: move the format error check out of __sctp_sf_do_9_1_abort (networking-stable-20_03_01).
- sctp: Start shutdown on association restart if in SHUTDOWN-SENT state and socket is closed (networking-stable-20_05_27).
- selftests/powerpc: Fix build errors in powerpc ptrace selftests (boo#1124278).
- Separate one more kABI fixup from the functional change:
- seq_file: fix problem when seeking mid-record (bsc#1170125).
- serial: uartps: Move the spinlock after the read of the tx empty (git-fixes).
- sfc: detach from cb_page in efx_copy_channel() (networking-stable-20_03_14).
- signal/pid_namespace: Fix reboot_pid_ns to use send_sig not force_sig (bsc#1172185).
- slcan: not call free_netdev before rtnl_unlock in slcan_open (networking-stable-20_03_28).
- slip: make slhc_compress() more robust against malicious packets (networking-stable-20_03_14).
- smb3: Add new compression flags (bsc#1144333).
- smb3: change noisy error message to FYI (bsc#1144333).
- smb3: enable swap on SMB3 mounts (bsc#1144333).
- smb3: Minor cleanup of protocol definitions (bsc#1144333).
- smb3: remove overly noisy debug line in signing errors (bsc#1144333).
- smb3: smbdirect support can be configured by default (bsc#1144333).
- smb3: use SMB2_SIGNATURE_SIZE define (bsc#1144333).
- snb3: Additional compression structures (bsc#1144333).
- spi: bcm2835: Fix 3-wire mode if DMA is enabled (git-fixes).
- spi: bcm63xx-hsspi: Really keep pll clk enabled (bsc#1051510).
- spi: bcm-qspi: when tx/rx buffer is NULL set to 0 (bsc#1051510).
- spi: dw: Add SPI Rx-done wait method to DMA-based transfer (bsc#1051510).
- spi: dw: Add SPI Tx-done wait method to DMA-based transfer (bsc#1051510).
- spi: dw: use 'smp_mb()' to avoid sending spi data error (bsc#1051510).
- spi: dw: Zero DMA Tx and Rx configurations on stack (bsc#1051510).
- spi: fsl: do not map irq during probe (git-fixes).
- spi: fsl: use platform_get_irq() instead of of_irq_to_resource() (git-fixes).
- spi: pxa2xx: Add CS control clock quirk (bsc#1051510).
- spi: pxa2xx: Apply CS clk quirk to BXT (bsc#1111666).
- spi: qup: call spi_qup_pm_resume_runtime before suspending (bsc#1051510).
- spi: spi-fsl-dspi: Replace interruptible wait queue with a simple completion (git-fixes).
- spi: spi-mem: Fix Dual/Quad modes on Octal-capable devices (bsc#1111666).
- spi: spi-s3c64xx: Fix system resume support (git-fixes).
- spi: spi-sun6i: sun6i_spi_transfer_one(): fix setting of clock rate (bsc#1111666).
- spi/zynqmp: remove entry that causes a cs glitch (bsc#1051510).
- staging: comedi: dt2815: fix writing hi byte of analog output (bsc#1051510).
- staging: comedi: Fix comedi_device refcnt leak in comedi_open (bsc#1051510).
- staging: comedi: verify array index is correct before using it (bsc#1111666).
- staging: iio: ad2s1210: Fix SPI reading (bsc#1051510).
- staging: rtl8712: Fix IEEE80211_ADDBA_PARAM_BUF_SIZE_MASK (bsc#1051510).
- staging: sm750fb: add missing case while setting FB_VISUAL (bsc#1051510).
- staging: vt6656: Do not set RCR_MULTICAST or RCR_BROADCAST by default (git-fixes).
- staging: vt6656: Fix drivers TBTT timing counter (git-fixes).
- staging: vt6656: Fix pairwise key entry save (git-fixes).
- SUNRPC: defer slow parts of rpc_free_client() to a workqueue (bsc#1168202).
- SUNRPC: expiry_time should be seconds not timeval (git-fixes).
- SUNRPC: Fix a potential buffer overflow in 'svc_print_xprts()' (git-fixes).
- SUNRPC: The TCP back channel mustn't disappear while requests are outstanding (bsc#1152624).
- supported.conf: Add br_netfilter to base (bsc#1169020).
- supported.conf: support w1 core and thermometer support
- svcrdma: Fix double svc_rdma_send_ctxt_put() in an error path (bsc#1103992).
- svcrdma: Fix leak of transport addresses (git-fixes).
- svcrdma: Fix trace point use-after-free race (bsc#1103992 ).
- taskstats: fix data-race (bsc#1172188).
- tcp: cache line align MAX_TCP_HEADER (networking-stable-20_04_27).
- tcp: repair: fix TCP_QUEUE_SEQ implementation (networking-stable-20_03_28).
- team: add missing attribute validation for array index (networking-stable-20_03_14).
- team: add missing attribute validation for port ifindex (networking-stable-20_03_14).
- team: fix hang in team_mode_get() (networking-stable-20_04_27).
- tg3: driver sleeps indefinitely when EEH errors exceed eeh_max_freezes (bsc#1173284).
- timers: Add a function to start/reduce a timer (networking-stable-20_05_27).
- tools lib traceevent: Remove unneeded qsort and uses memmove instead (git-fixes).
- tpm: ibmvtpm: retry on H_CLOSED in tpm_ibmvtpm_send() (bsc#1065729).
- tpm_tis: Remove the HID IFX0102 (bsc#1111666).
- tpm/tpm_tis: Free IRQ if probing fails (bsc#1082555).
- tpm/tpm_tis: Free IRQ if probing fails (git-fixes).
- tracing: Add a vmalloc_sync_mappings() for safe measure (git-fixes).
- tracing: Disable trace_printk() on post poned tests (git-fixes).
- tracing: Fix event trigger to accept redundant spaces (git-fixes).
- tracing: Fix the race between registering 'snapshot' event trigger and triggering 'snapshot' operation (git-fixes).
- tty: n_gsm: Fix bogus i++ in gsm_data_kick (bsc#1051510).
- tty: n_gsm: Fix SOF skipping (bsc#1051510).
- tty: n_gsm: Fix waking up upper tty layer when room available (bsc#1051510).
- tty: rocket, avoid OOB access (git-fixes).
- tun: Do not put_page() for all negative return values from XDP program (bsc#1109837).
- tunnel: Propagate ECT(1) when decapsulating as recommended by RFC6040 (networking-stable-20_05_12).
- UAS: fix deadlock in error handling and PM flushing work (git-fixes).
- UAS: no use logging any details in case of ENODEV (git-fixes).
- ubifs: remove broken lazytime support (bsc#1173826).
- Update config files: Build w1 bus on arm64 (jsc#SLE-11048)
- USB: Add USB_QUIRK_DELAY_CTRL_MSG and USB_QUIRK_DELAY_INIT for Corsair K70 RGB RAPIDFIRE (git-fixes).
- usb: add USB_QUIRK_DELAY_INIT for Logitech C922 (git-fixes).
- USB: c67x00: fix use after free in c67x00_giveback_urb (bsc#1111666).
- USB: cdc-acm: restore capability check order (git-fixes).
- usb: chipidea: core: add wakeup support for extcon (bsc#1111666).
- USB: core: Fix misleading driver bug report (bsc#1051510).
- usb: dwc2: Fix shutdown callback in platform (bsc#1111666).
- usb: dwc2: gadget: move gadget resume after the core is in L0 state (bsc#1051510).
- USB: dwc3: do not set gadget->is_otg flag (git-fixes).
- USB: dwc3: gadget: Do link recovery for SS and SSP (git-fixes).
- usb: dwc3: gadget: introduce cancelled_list (git-fixes).
- usb: dwc3: gadget: never call ->complete() from ->ep_queue() (git-fixes).
- usb: dwc3: gadget: Properly handle ClearFeature(halt) (git-fixes).
- usb: dwc3: gadget: Properly handle failed kick_transfer (git-fixes).
- USB: early: Handle AMD's spec-compliant identifiers, too (git-fixes).
- USB: ehci: reopen solution for Synopsys HC bug (git-fixes).
- USB: f_fs: Clear OS Extended descriptor counts to zero in ffs_data_reset() (git-fixes).
- USB: gadget: audio: Fix a missing error return value in audio_bind() (git-fixes).
- USB: gadget: composite: Inform controller driver of self-powered (git-fixes).
- usb: gadget: fix potential double-free in m66592_probe (bsc#1111666).
- USB: gadget: legacy: fix error return code in cdc_bind() (git-fixes).
- USB: gadget: legacy: fix error return code in gncm_bind() (git-fixes).
- USB: gadget: legacy: fix redundant initialization warnings (bsc#1051510).
- usb: gadget: lpc32xx_udc: do not dereference ep pointer before null check (bsc#1051510).
- USB: gadget: net2272: Fix a memory leak in an error handling path in 'net2272_plat_probe()' (git-fixes).
- usb: gadget: udc: atmel: fix uninitialized read in debug printk (bsc#1111666).
- USB: gadget: udc: atmel: Fix vbus disconnect handling (git-fixes).
- USB: gadget: udc: atmel: Make some symbols static (git-fixes).
- usb: gadget: udc: atmel: remove outdated comment in usba_ep_disable() (bsc#1111666).
- USB: gadget: udc: bdc: Remove unnecessary NULL checks in bdc_req_complete (git-fixes).
- usb: gadget: udc: Potential Oops in error handling code (bsc#1111666).
- USB: gadget: udc: s3c2410_udc: Remove pointless NULL check in s3c2410_udc_nuke (bsc#1051510).
- usb: host: ehci-exynos: Fix error check in exynos_ehci_probe() (bsc#1111666).
- USB: host: ehci-mxc: Add error handling in ehci_mxc_drv_probe() (bsc#1051510).
- USB: host: xhci-plat: keep runtime active when removing host (git-fixes).
- USB: hub: Fix handling of connect changes during sleep (git-fixes).
- usb: musb: Fix runtime PM imbalance on error (bsc#1051510).
- usb: musb: start session in resume for host port (bsc#1051510).
- usbnet: silence an unnecessary warning (bsc#1170770).
- usbnet: smsc95xx: Fix use-after-free after removal (bsc#1111666).
- USB: ohci-sm501: Add missed iounmap() in remove (bsc#1111666).
- USB: serial: garmin_gps: add sanity checking for data length (git-fixes).
- USB: serial: iuu_phoenix: fix memory corruption (bsc#1111666).
- USB: serial: option: add BroadMobi BM806U (git-fixes).
- USB: serial: option: add support for ASKEY WWHC050 (git-fixes).
- USB: serial: option: add Telit LE910C1-EUX compositions (bsc#1051510).
- USB: serial: option: add Wistron Neweb D19Q1 (git-fixes).
- USB: serial: qcserial: add DW5816e QDL support (bsc#1051510).
- USB: serial: qcserial: Add DW5816e support (git-fixes).
- USB: serial: usb_wwan: do not resubmit rx urb on fatal errors (bsc#1051510).
- USB: serial: usb_wwan: do not resubmit rx urb on fatal errors (git-fixes).
- USB: sisusbvga: Change port variable from signed to unsigned (git-fixes).
- usb-storage: Add unusual_devs entry for JMicron JMS566 (git-fixes).
- USB: uas: add quirk for LaCie 2Big Quadra (git-fixes).
- USB: xhci: Fix NULL pointer dereference when enqueuing trbs from urb sg list (git-fixes).
- vfio/pci: Fix SR-IOV VF handling with MMIO blocking (bsc#1174123).
- vfs: Fix EOVERFLOW testing in put_compat_statfs64 (bnc#1151927 5.3.6).
- video: fbdev: sis: Remove unnecessary parentheses and commented code (bsc#1114279)
- video: fbdev: w100fb: Fix a potential double free (bsc#1051510).
- virtio-blk: handle block_device_operations callbacks after hot unplug (git fixes (block drivers)).
- vmxnet3: add geneve and vxlan tunnel offload support (bsc#1172484).
- vmxnet3: add support to get/set rx flow hash (bsc#1172484).
- vmxnet3: allow rx flow hash ops only when rss is enabled (bsc#1172484).
- vmxnet3: avoid format strint overflow warning (bsc#1172484).
- vmxnet3: prepare for version 4 changes (bsc#1172484).
- vmxnet3: Remove always false conditional statement (bsc#1172484).
- vmxnet3: remove redundant initialization of pointer 'rq' (bsc#1172484).
- vmxnet3: remove unused flag 'rxcsum' from struct vmxnet3_adapter (bsc#1172484).
- vmxnet3: Replace msleep(1) with usleep_range() (bsc#1172484).
- vmxnet3: update to version 4 (bsc#1172484).
- vmxnet3: use correct hdr reference when packet is encapsulated (bsc#1172484).
- vrf: Check skb for XFRM_TRANSFORMED flag (networking-stable-20_04_27).
- vt: ioctl, switch VT_IS_IN_USE and VT_BUSY to inlines (git-fixes).
- vt: selection, introduce vc_is_sel (git-fixes).
- vt: vt_ioctl: fix race in VT_RESIZEX (git-fixes).
- vt: vt_ioctl: fix use-after-free in vt_in_use() (git-fixes).
- vt: vt_ioctl: fix VT_DISALLOCATE freeing in-use virtual console (git-fixes).
- vxlan: Avoid infinite loop when suppressing NS messages with invalid options (git-fixes).
- vxlan: check return value of gro_cells_init() (networking-stable-20_03_28).
- w1: Add subsystem kernel public interface (jsc#SLE-11048).
- w1: Fix slave count on 1-Wire bus (resend) (jsc#SLE-11048).
- w1: keep balance of mutex locks and refcnts (jsc#SLE-11048).
- w1: omap-hdq: cleanup to add missing newline for some dev_dbg (bsc#1051510).
- w1: use put_device() if device_register() fail (jsc#SLE-11048).
- watchdog: reset last_hw_keepalive time at start (git-fixes).
- watchdog: sp805: fix restart handler (bsc#1111666).
- wcn36xx: Fix error handling path in 'wcn36xx_probe()' (bsc#1051510).
- wil6210: add general initialization/size checks (bsc#1111666).
- wil6210: check rx_buff_mgmt before accessing it (bsc#1111666).
- wil6210: ignore HALP ICR if already handled (bsc#1111666).
- wil6210: make sure Rx ring sizes are correlated (git-fixes).
- wil6210: remove reset file from debugfs (git-fixes).
- wimax/i2400m: Fix potential urb refcnt leak (bsc#1051510).
- work around mvfs bug (bsc#1162063).
- workqueue: do not use wq_select_unbound_cpu() for bound works (bsc#1172130).
- x86/amd_nb: Add Family 19h PCI IDs (jsc#SLE-11834).
- x86/apic: Install an empty physflat_init_apic_ldr (bsc#1163309).
- x86/cpu/amd: Make erratum #1054 a legacy erratum (bsc#1114279).
- x86/entry/64: Fix unwind hints in kernel exit path (bsc#1058115).
- x86/entry/64: Fix unwind hints in register clearing code (bsc#1058115).
- x86/entry/64: Fix unwind hints in rewind_stack_do_exit() (bsc#1058115).
- x86/entry/64: Fix unwind hints in __switch_to_asm() (bsc#1058115).
- x86/events/intel/ds: Add PERF_SAMPLE_PERIOD into PEBS_FREERUNNING_FLAGS (git-fixes).
- x86/events/intel/ds: Add PERF_SAMPLE_PERIOD into PEBS_FREERUNNING_FLAGS (git-fixes).
- x86: Fix early boot crash on gcc-10, third try (bsc#1114279).
- x86/Hyper-V: Allow guests to enable InvariantTSC (bsc#1170620).
- x86/Hyper-V: Free hv_panic_page when fail to register kmsg dump (bsc#1170617, bsc#1170618).
- x86/Hyper-V: Free hv_panic_page when fail to register kmsg dump (bsc#1170618).
- x86/Hyper-V: Report crash data in die() when panic_on_oops is set (bsc#1170617, bsc#1170618).
- x86/Hyper-V: Report crash data in die() when panic_on_oops is set (bsc#1170618).
- x86/Hyper-V: Report crash register data or kmsg before running crash kernel (bsc#1170617, bsc#1170618).
- x86/Hyper-V: Report crash register data or kmsg before running crash kernel (bsc#1170618).
- x86/Hyper-V: Report crash register data when sysctl_record_panic_msg is not set (bsc#1170617, bsc#1170618).
- x86/Hyper-V: Report crash register data when sysctl_record_panic_msg is not set (bsc#1170618).
- x86/Hyper-V: report value of misc_features (git fixes).
- x86/Hyper-V: report value of misc_features (git-fixes).
- x86/Hyper-V: Trigger crash enlightenment only once during system crash (bsc#1170617, bsc#1170618).
- x86/Hyper-V: Trigger crash enlightenment only once during system crash (bsc#1170618).
- x86/Hyper-V: Unload vmbus channel in hv panic callback (bsc#1170617, bsc#1170618).
- x86/Hyper-V: Unload vmbus channel in hv panic callback (bsc#1170618).
- x86/Hyperv-V: Allow guests to enable InvariantTSC (bsc#1170621, bsc#1170620).
- x86/kprobes: Avoid kretprobe recursion bug (bsc#1114279).
- x86/MCE/AMD: Add a KABI workaround for enum smca_bank_types (jsc#SLE-11833).
- x86/MCE/AMD, EDAC/mce_amd: Add new Load Store unit McaType (jsc#SLE-11833).
- x86/{mce,mm}: Unmap the entire page if the whole page is affected and poisoned (bsc#1172257).
- x86/microcode/AMD: Increase microcode PATCH_MAX_SIZE (bsc#1169005).
- x86/reboot/quirks: Add MacBook6,1 reboot quirk (bsc#1114279).
- x86/resctrl: Fix invalid attempt at removing the default resource group (git-fixes).
- x86/resctrl: Preserve CDP enable over CPU hotplug (bsc#1114279).
- x86/unwind/orc: Do not skip the first frame for inactive tasks (bsc#1058115).
- x86/unwind/orc: Fix error handling in __unwind_start() (bsc#1058115).
- x86/unwind/orc: Fix error path for bad ORC entry type (bsc#1058115).
- x86/unwind/orc: Fix unwind_get_return_address_ptr() for inactive tasks (bsc#1058115).
- x86/unwind/orc: Prevent unwinding before ORC initialization (bsc#1058115).
- x86/unwind: Prevent false warnings for non-current tasks (bsc#1058115).
- x86/xen: fix booting 32-bit pv guest (bsc#1071995).
- x86/xen: Make the boot CPU idle task reliable (bsc#1071995).
- x86/xen: Make the secondary CPU idle tasks reliable (bsc#1071995).
- xen/blkfront: fix memory allocation flags in blkfront_setup_indirect() (bsc#1168486).
- xen/pci: reserve MCFG areas earlier (bsc#1170145).
- xfrm: Always set XFRM_TRANSFORMED in xfrm{4,6}_output_finish (networking-stable-20_04_27).
- xfrm: fix error in comment (git fixes).
- xfs: clear PF_MEMALLOC before exiting xfsaild thread (git-fixes).
- xfs: Correctly invert xfs_buftarg LRU isolation logic (git-fixes).
- xfs: do not ever return a stale pointer from __xfs_dir3_free_read (git-fixes).
- xhci: Fix incorrect EP_STATE_MASK (git-fixes).
- xprtrdma: Fix completion wait during device removal (git-fixes).
Patchnames
SUSE-2020-2478,SUSE-SLE-RT-12-SP5-2020-2478
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "The SUSE Linux Enterprise 12 SP5 RT kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2020-0543: Fixed a side channel attack against special registers which could have resulted in leaking of read values to cores other than the one which called it. This attack is known as Special Register Buffer Data Sampling (SRBDS) or \u0027CrossTalk\u0027 (bsc#1154824).\n- CVE-2020-13143: Fixed an out-of-bounds read in gadget_dev_desc_UDC_store in drivers/usb/gadget/configfs.c (bsc#1171982).\n- CVE-2020-12769: Fixed an issue which could have allowed attackers to cause a panic via concurrent calls to dw_spi_irq and dw_spi_transfer_one (bsc#1171983).\n- CVE-2020-12659: Fixed an out-of-bounds write (by a user with the CAP_NET_ADMIN capability) due to improper headroom validation (bsc#1171214).\n- CVE-2020-12657: An a use-after-free in block/bfq-iosched.c (bsc#1171205).\n- CVE-2020-12656: Fixed an improper handling of certain domain_release calls leadingch could have led to a memory leak (bsc#1171219).\n- CVE-2020-12655: Fixed an issue which could have allowed attackers to trigger a sync of excessive duration via an XFS v5 image with crafted metadata (bsc#1171217).\n- CVE-2020-12654: Fixed an issue in he wifi driver which could have allowed a remote AP to trigger a heap-based buffer overflow (bsc#1171202).\n- CVE-2020-12653: Fixed an issue in the wifi driver which could have allowed local users to gain privileges or cause a denial of service (bsc#1171195).\n- CVE-2020-12652: Fixed an issue which could have allowed local users to hold an incorrect lock during the ioctl operation and trigger a race condition (bsc#1171218).\n- CVE-2020-12464: Fixed a use-after-free due to a transfer without a reference (bsc#1170901).\n- CVE-2020-12114: Fixed a pivot_root race condition which could have allowed local users to cause a denial of service (panic) by corrupting a mountpoint reference counter (bsc#1171098).\n- CVE-2020-11669: Fixed an issue where arch/powerpc/kernel/idle_book3s.S did not have save/restore functionality for PNV_POWERSAVE_AMR, PNV_POWERSAVE_UAMOR, and PNV_POWERSAVE_AMOR (bnc#1169390).\n- CVE-2020-10757: Fixed an issue where remaping hugepage DAX to anon mmap could have caused user PTE access (bsc#1172317).\n- CVE-2020-10751: Fixed an improper implementation in SELinux LSM hook where it was assumed that an skb would only contain a single netlink message (bsc#1171189).\n- CVE-2020-10732: Fixed kernel data leak in userspace coredumps due to uninitialized data (bsc#1171220).\n- CVE-2020-10720: Fixed a use-after-free read in napi_gro_frags() (bsc#1170778).\n- CVE-2020-10711: Fixed a null pointer dereference in SELinux subsystem which could have allowed a remote network user to crash the kernel resulting in a denial of service (bsc#1171191).\n- CVE-2020-10690: Fixed the race between the release of ptp_clock and cdev (bsc#1170056).\n- CVE-2019-20908: An issue was discovered in drivers/firmware/efi/efi.c where incorrect access permissions for the efivar_ssdt ACPI variable could be used by attackers to bypass lockdown or secure boot restrictions, aka CID-1957a85b0032 (bnc#1173567).\n- CVE-2020-10781: zram sysfs resource consumption was fixed (bnc#1173074).\n- CVE-2020-15780: An issue was discovered in drivers/acpi/acpi_configfs.c where injection of malicious ACPI tables via configfs could be used by attackers to bypass lockdown and secure boot restrictions, aka CID-75b0cea7bf30 (bnc#1173573).\n- CVE-2020-15393: usbtest_disconnect in drivers/usb/misc/usbtest.c had a memory leak, aka CID-28ebeb8db770 (bnc#1173514).\n- CVE-2020-12771: btree_gc_coalesce in drivers/md/bcache/btree.c had a deadlock if a coalescing operation fails (bnc#1171732).\n- CVE-2020-12888: The VFIO PCI driver mishandled attempts to access disabled memory space (bnc#1171868).\n- CVE-2020-10769: A buffer over-read flaw was found in crypto_authenc_extractkeys in crypto/authenc.c in the IPsec Cryptographic algorithm\u0027s module, authenc. When a payload longer than 4 bytes, and is not following 4-byte alignment boundary guidelines, it causes a buffer over-read threat, leading to a system crash. This flaw allowed a local attacker with user privileges to cause a denial of service (bnc#1173265).\n- CVE-2020-10773: A kernel stack information leak on s390/s390x was fixed (bnc#1172999).\n- CVE-2020-14416: A race condition in tty-\u003edisc_data handling in the slip and slcan line discipline could lead to a use-after-free, aka CID-0ace17d56824. This affects drivers/net/slip/slip.c and drivers/net/can/slcan.c (bnc#1162002).\n- CVE-2020-10766: Fixed an issue which allowed an attacker with a local account to disable SSBD protection (bnc#1172781).\n- CVE-2020-10767: Fixed an issue where Indirect Branch Prediction Barrier was disabled in certain circumstances, leaving the system open to a spectre v2 style attack (bnc#1172782).\n- CVE-2020-10768: Fixed an issue with the prctl() function, where indirect branch speculation could be enabled even though it was diabled before (bnc#1172783).\n- CVE-2020-13974: Fixed a integer overflow in drivers/tty/vt/keyboard.c, if k_ascii is called several times in a row (bnc#1172775).\n- CVE-2019-20810: go7007_snd_init in drivers/media/usb/go7007/snd-go7007.c did not call snd_card_free for a failure path, which caused a memory leak, aka CID-9453264ef586 (bnc#1172458).\n- CVE-2019-16746: An issue was discovered in net/wireless/nl80211.c, where the length of variable elements in a beacon head was not checked, leading to a buffer overflow (bnc#1152107 1173659).\n- CVE-2019-9455: Fixed a pointer leak due to a WARN_ON statement in a video driver. This could lead to local information disclosure with System execution privileges needed (bsc#1170345).\n- CVE-2019-20812: Fixed an issue in prb_calc_retire_blk_tmo() which could have resulted in a denial of service (bsc#1172453).\n- CVE-2019-20806: Fixed a null pointer dereference which may had lead to denial of service (bsc#1172199).\n- CVE-2019-19462: Fixed an issue which could have allowed local user to cause denial of service (bsc#1158265).\n- CVE-2018-1000199: Fixed a potential local code execution via ptrace (bsc#1089895).\n\nThe following non-security bugs were fixed:\n\n- ACPI: CPPC: Fix reference count leak in acpi_cppc_processor_probe() (bsc#1051510).\n- ACPI: GED: add support for _Exx / _Lxx handler methods (bsc#1111666).\n- ACPI: GED: use correct trigger type field in _Exx / _Lxx handling (bsc#1111666).\n- ACPI: NFIT: Fix unlock on error in scrub_show() (bsc#1171753).\n- ACPI: PM: Avoid using power resources if there are none for D0 (bsc#1051510).\n- ACPI: sysfs: Fix pm_profile_attr type (bsc#1111666).\n- ACPI: sysfs: Fix reference count leak in acpi_sysfs_add_hotplug_profile() (bsc#1051510).\n- acpi/x86: ignore unspecified bit positions in the ACPI global lock field (bsc#1051510).\n- Add br_netfilter to kernel-default-base (bsc#1169020)\n- agp/intel: Reinforce the barrier after GTT updates (bsc#1051510).\n- ahci: Add support for Amazon\u0027s Annapurna Labs SATA controller (bsc#1169013).\n- ALSA: ctxfi: Remove unnecessary cast in kfree (bsc#1051510).\n- ALSA: doc: Document PC Beep Hidden Register on Realtek ALC256 (bsc#1051510).\n- ALSA: dummy: Fix PCM format loop in proc output (bsc#1111666).\n- ALSA: es1688: Add the missed snd_card_free() (bsc#1051510).\n- ALSA: hda: Add driver blacklist (bsc#1051510).\n- ALSA: hda: Add ElkhartLake HDMI codec vid (bsc#1111666).\n- ALSA: hda: add sienna_cichlid audio asic id for sienna_cichlid up (bsc#1111666).\n- ALSA: hda: Always use jackpoll helper for jack update after resume (bsc#1051510).\n- ALSA: hda: call runtime_allow() for all hda controllers (bsc#1051510).\n- ALSA: hda: Do not release card at firmware loading error (bsc#1051510).\n- ALSA: hda: Explicitly permit using autosuspend if runtime PM is supported (bsc#1051510).\n- ALSA: hda: Fix potential access overflow in beep helper (bsc#1051510).\n- ALSA: hda/hdmi - enable runtime pm for newer AMD display audio (bsc#1111666).\n- ALSA: hda/hdmi: fix race in monitor detection during probe (bsc#1051510).\n- ALSA: hda/hdmi: fix without unlocked before return (bsc#1051510).\n- ALSA: hda: Honor PM disablement in PM freeze and thaw_noirq ops (bsc#1051510).\n- ALSA: hda: Keep the controller initialization even if no codecs found (bsc#1051510).\n- ALSA: hda: Match both PCI ID and SSID for driver blacklist (bsc#1111666).\n- ALSA: hda/realtek - Add a model for Thinkpad T570 without DAC workaround (bsc#1172017).\n- ALSA: hda/realtek - add a pintbl quirk for several Lenovo machines (bsc#1111666).\n- ALSA: hda/realtek - Add COEF workaround for ASUS ZenBook UX431DA (git-fixes).\n- ALSA: hda/realtek - Add HP new mute led supported for ALC236 (git-fixes).\n- ALSA: hda/realtek - Add LED class support for micmute LED (bsc#1111666).\n- ALSA: hda/realtek - Add more fixup entries for Clevo machines (git-fixes).\n- ALSA: hda/realtek - Add new codec supported for ALC245 (bsc#1051510).\n- ALSA: hda/realtek - Add new codec supported for ALC287 (git-fixes).\n- ALSA: hda/realtek: Add quirk for Samsung Notebook (git-fixes).\n- ALSA: hda/realtek - Add supported new mute Led for HP (git-fixes).\n- ALSA: hda/realtek - Enable headset mic of ASUS GL503VM with ALC295 (git-fixes).\n- ALSA: hda/realtek - Enable headset mic of ASUS UX550GE with ALC295 (git-fixes).\n- ALSA: hda/realtek: Enable headset mic of ASUS UX581LV with ALC295 (git-fixes).\n- ALSA: hda/realtek - Enable micmute LED on and HP system (bsc#1111666).\n- ALSA: hda/realtek - Enable Speaker for ASUS UX533 and UX534 (bsc#1111666).\n- ALSA: hda/realtek - Enable the headset mic on Asus FX505DT (bsc#1051510).\n- ALSA: hda/realtek - Fix S3 pop noise on Dell Wyse (git-fixes).\n- ALSA: hda/realtek - Fix silent output on Gigabyte X570 Aorus Xtreme (bsc#1111666).\n- ALSA: hda/realtek - Fix unexpected init_amp override (bsc#1051510).\n- ALSA: hda/realtek - Fix unused variable warning w/o CONFIG_LEDS_TRIGGER_AUDIO (bsc#1111666).\n- ALSA: hda/realtek - Introduce polarity for micmute LED GPIO (bsc#1111666).\n- ALSA: hda/realtek - Limit int mic boost for Thinkpad T530 (git-fixes bsc#1171293).\n- ALSA: hda/realtek - Two front mics on a Lenovo ThinkCenter (bsc#1051510).\n- ALSA: hda: Release resources at error in delayed probe (bsc#1051510).\n- ALSA: hda: Remove ASUS ROG Zenith from the blacklist (bsc#1051510).\n- ALSA: hda: Skip controller resume if not needed (bsc#1051510).\n- ALSA: hwdep: fix a left shifting 1 by 31 UB bug (git-fixes).\n- ALSA: ice1724: Fix invalid access for enumerated ctl items (bsc#1051510).\n- ALSA: iec1712: Initialize STDSP24 properly when using the model=staudio option (git-fixes).\n- ALSA: lx6464es - add support for LX6464ESe pci express variant (bsc#1111666).\n- ALSA: opti9xx: shut up gcc-10 range warning (bsc#1051510).\n- ALSA: pcm: disallow linking stream to itself (bsc#1111666).\n- ALSA: pcm: fix incorrect hw_base increase (git-fixes).\n- ALSA: pcm: oss: Fix regression by buffer overflow fix (bsc#1051510).\n- ALSA: pcm: oss: Place the plugin buffer overflow checks correctly (bsc#1170522).\n- ALSA: rawmidi: Fix racy buffer resize under concurrent accesses (git-fixes).\n- ALSA: usb-audio: Add connector notifier delegation (bsc#1051510).\n- ALSA: usb-audio: Add control message quirk delay for Kingston HyperX headset (git-fixes).\n- ALSA: usb-audio: Add duplex sound support for USB devices using implicit feedback (bsc#1111666).\n- ALSA: usb-audio: add mapping for ASRock TRX40 Creator (git-fixes).\n- ALSA: usb-audio: Add mixer workaround for TRX40 and co (bsc#1051510).\n- ALSA: usb-audio: Add Pioneer DJ DJM-900NXS2 support (bsc#1111666).\n- ALSA: usb-audio: Add quirk for Focusrite Scarlett 2i2 (bsc#1051510).\n- ALSA: usb-audio: Add static mapping table for ALC1220-VB-based mobos (bsc#1051510).\n- ALSA: usb-audio: Add vendor, product and profile name for HP Thunderbolt Dock (bsc#1111666).\n- ALSA: usb-audio: Apply async workaround for Scarlett 2i4 2nd gen (bsc#1051510).\n- ALSA: usb-audio: Check mapping at creating connector controls, too (bsc#1051510).\n- ALSA: usb-audio: Clean up quirk entries with macros (bsc#1111666).\n- ALSA: usb-audio: Correct a typo of NuPrime DAC-10 USB ID (bsc#1051510).\n- ALSA: usb-audio: Do not create jack controls for PCM terminals (bsc#1051510).\n- ALSA: usb-audio: Do not override ignore_ctl_error value from the map (bsc#1051510).\n- ALSA: usb-audio: Filter error from connector kctl ops, too (bsc#1051510).\n- ALSA: usb-audio: Fix inconsistent card PM state after resume (bsc#1111666).\n- ALSA: usb-audio: Fix packet size calculation (bsc#1111666).\n- ALSA: usb-audio: Fix racy list management in output queue (bsc#1111666).\n- ALSA: usb-audio: Fix usb audio refcnt leak when getting spdif (bsc#1051510).\n- ALSA: usb-audio: Improve frames size computation (bsc#1111666).\n- ALSA: usb-audio: Manage auto-pm of all bundled interfaces (bsc#1111666).\n- ALSA: usb-audio: mixer: volume quirk for ESS Technology Asus USB DAC (git-fixes).\n- ALSA: usb-audio: Quirks for Gigabyte TRX40 Aorus Master onboard audio (git-fixes).\n- ALSA: usb-audio: Use the new macro for HP Dock rename quirks (bsc#1111666).\n- ALSA: usx2y: Fix potential NULL dereference (bsc#1051510).\n- amdgpu: a NULL -\u003emm does not mean a thread is a kthread (git-fixes).\n- arm64: map FDT as RW for early_init_dt_scan() (jsc#SLE-12423).\n- ASoC: codecs: hdac_hdmi: Fix incorrect use of list_for_each_entry (bsc#1051510).\n- ASoC: dapm: connect virtual mux with default value (bsc#1051510).\n- ASoC: dapm: fixup dapm kcontrol widget (bsc#1051510).\n- ASoC: dpcm: allow start or stop during pause for backend (bsc#1051510).\n- ASoC: fix regwmask (bsc#1051510).\n- ASoC: Intel: atom: Take the drv-\u003elock mutex before calling sst_send_slot_map() (bsc#1051510).\n- ASoC: msm8916-wcd-digital: Reset RX interpolation path after use (bsc#1051510).\n- ASoC: samsung: Prevent clk_get_rate() calls in atomic context (bsc#1111666).\n- ASoC: topology: Check return value of pcm_new_ver (bsc#1051510).\n- ASoC: topology: use name_prefix for new kcontrol (bsc#1051510).\n- ath9k: Fix general protection fault in ath9k_hif_usb_rx_cb (bsc#1111666).\n- ath9k: Fix use-after-free Read in ath9k_wmi_ctrl_rx (bsc#1111666).\n- ath9k: Fix use-after-free Write in ath9k_htc_rx_msg (bsc#1111666).\n- ath9x: Fix stack-out-of-bounds Write in ath9k_hif_usb_rx_cb (bsc#1111666).\n- ax25: fix setsockopt(SO_BINDTODEVICE) (networking-stable-20_05_27).\n- b43: Fix connection problem with WPA3 (bsc#1111666).\n- b43legacy: Fix case where channel status is corrupted (bsc#1051510).\n- b43_legacy: Fix connection problem with WPA3 (bsc#1111666).\n- batman-adv: fix batadv_nc_random_weight_tq (git-fixes).\n- batman-adv: Fix refcnt leak in batadv_show_throughput_override (git-fixes).\n- batman-adv: Fix refcnt leak in batadv_store_throughput_override (git-fixes).\n- batman-adv: Fix refcnt leak in batadv_v_ogm_process (git-fixes).\n- bcache: avoid unnecessary btree nodes flushing in btree_flush_write() (git fixes (block drivers)).\n- bcache: Fix an error code in bch_dump_read() (git fixes (block drivers)).\n- bcache: fix incorrect data type usage in btree_flush_write() (git fixes (block drivers)).\n- bcache: Revert \u0027bcache: shrink btree node cache after bch_btree_check()\u0027 (git fixes (block drivers)).\n- be2net: fix link failure after ethtool offline test (git-fixes).\n- blk-mq: honor IO scheduler for multiqueue devices (bsc#1165478).\n- blk-mq: simplify blk_mq_make_request() (bsc#1165478).\n- block, bfq: add requeue-request hook (bsc#1104967 bsc#1171673).\n- block, bfq: fix use-after-free in bfq_idle_slice_timer_body (bsc#1168760).\n- block, bfq: postpone rq preparation to insert or merge (bsc#1104967 bsc#1171673).\n- block/drbd: delete invalid function drbd_md_mark_dirty_ (bsc#1171527).\n- block: drbd: remove a stray unlock in __drbd_send_protocol() (bsc#1171599).\n- block: fix busy device checking in blk_drop_partitions again (bsc#1171948).\n- block: fix busy device checking in blk_drop_partitions (bsc#1171948).\n- block: fix memleak of bio integrity data (git fixes (block drivers)).\n- block: keep bdi-\u003eio_pages in sync with max_sectors_kb for stacked devices (bsc#1168762).\n- block: nr_sects_write(): Disable preemption on seqcount write (bsc#1173818).\n- block: remove QUEUE_FLAG_STACKABLE (git fixes (block drivers)).\n- block: remove the bd_openers checks in blk_drop_partitions (bsc#1171948).\n- block: sed-opal: fix sparse warning: convert __be64 data (git fixes (block drivers)).\n- Bluetooth: Add SCO fallback for invalid LMP parameters error (bsc#1111666).\n- Bluetooth: RFCOMM: fix ODEBUG bug in rfcomm_dev_ioctl (bsc#1051510).\n- bnxt_en: Fix AER reset logic on 57500 chips (git-fixes).\n- bnxt_en: Fix ethtool selftest crash under error conditions (git-fixes).\n- bnxt_en: Fix handling FRAG_ERR when NVM_INSTALL_UPDATE cmd fails (git-fixes).\n- bnxt_en: Fix ipv6 RFS filter matching logic (git-fixes).\n- bnxt_en: fix memory leaks in bnxt_dcbnl_ieee_getets() (networking-stable-20_03_28).\n- bnxt_en: fix NULL dereference in case SR-IOV configuration fails (git-fixes).\n- bnxt_en: Fix VF anti-spoof filter setup (networking-stable-20_05_12).\n- bnxt_en: Fix VLAN acceleration handling in bnxt_fix_features() (networking-stable-20_05_12).\n- bnxt_en: Improve AER slot reset (networking-stable-20_05_12).\n- bnxt_en: Reduce BNXT_MSIX_VEC_MAX value to supported CQs per PF (bsc#1104745).\n- bnxt_en: reinitialize IRQs when MTU is modified (networking-stable-20_03_14).\n- bnxt_en: Return error if bnxt_alloc_ctx_mem() fails (bsc#1104745 ).\n- bnxt_en: Return error when allocating zero size context memory (bsc#1104745).\n- bonding/alb: make sure arp header is pulled before accessing it (networking-stable-20_03_14).\n- bpf: Fix sk_psock refcnt leak when receiving message (bsc#1083647).\n- bpf: Forbid XADD on spilled pointers for unprivileged users (bsc#1083647).\n- brcmfmac: abort and release host after error (bsc#1051510).\n- brcmfmac: fix wrong location to get firmware feature (bsc#1111666).\n- brcmfmac: Transform compatible string for FW loading (bsc#1169771).\n- btrfs: always wait on ordered extents at fsync time (bsc#1171761).\n- btrfs: clean up the left over logged_list usage (bsc#1171761).\n- btrfs: do not zero f_bavail if we have available space (bsc#1168081).\n- btrfs: do not zero f_bavail if we have available space (bsc#1168081).\n- Btrfs: fix deadlock with memory reclaim during scrub (bsc#1172127).\n- Btrfs: fix list_add corruption and soft lockups in fsync (bsc#1171761).\n- btrfs: fix log context list corruption after rename whiteout error (bsc#1172342).\n- Btrfs: fix missing data checksums after a ranged fsync (msync) (bsc#1171761).\n- btrfs: fix missing file extent item for hole after ranged fsync (bsc#1171761).\n- Btrfs: fix missing hole after hole punching and fsync when using NO_HOLES (bsc#1171761).\n- btrfs: fix missing semaphore unlock in btrfs_sync_file (bsc#1171761).\n- btrfs: fix partial loss of prealloc extent past i_size after fsync (bsc#1172343).\n- Btrfs: fix rare chances for data loss when doing a fast fsync (bsc#1171761).\n- btrfs: move the dio_sem higher up the callchain (bsc#1171761).\n- btrfs: qgroup: Fix a bug that prevents qgroup to be re-enabled after disable (bsc#1172247).\n- btrfs: relocation: add error injection points for cancelling balance (bsc#1171417).\n- btrfs: relocation: Check cancel request after each data page read (bsc#1171417).\n- btrfs: relocation: Check cancel request after each extent found (bsc#1171417).\n- btrfs: relocation: Clear the DEAD_RELOC_TREE bit for orphan roots to prevent runaway balance (bsc#1171417).\n- btrfs: relocation: Fix reloc root leakage and the NULL pointer reference caused by the leakage (bsc#1171417).\n- btrfs: relocation: Work around dead relocation stage loop (bsc#1171417).\n- btrfs: reloc: clear DEAD_RELOC_TREE bit for orphan roots to prevent runaway balance (bsc#1171417 bsc#1160947 bsc#1172366).\n- btrfs: reloc: fix reloc root leak and NULL pointer dereference (bsc#1171417 bsc#1160947 bsc#1172366).\n- btrfs: Remove extra parentheses from condition in copy_items() (bsc#1171761).\n- Btrfs: remove no longer used io_err from btrfs_log_ctx (bsc#1171761).\n- Btrfs: remove no longer used logged range variables when logging extents (bsc#1171761).\n- Btrfs: remove no longer used \u0027sync\u0027 member from transaction handle (bsc#1171761).\n- btrfs: remove remaing full_sync logic from btrfs_sync_file (bsc#1171761).\n- btrfs: remove the logged extents infrastructure (bsc#1171761).\n- btrfs: remove the wait ordered logic in the log_one_extent path (bsc#1171761).\n- btrfs: setup a nofs context for memory allocation at btrfs_create_tree() (bsc#1172127).\n- btrfs: setup a nofs context for memory allocation at __btrfs_set_acl (bsc#1172127).\n- btrfs: use nofs context when initializing security xattrs to avoid deadlock (bsc#1172127).\n- btrfs: volumes: Remove ENOSPC-prone btrfs_can_relocate() (bsc#1171124).\n- bus: sunxi-rsb: Return correct data when mixing 16-bit and 8-bit reads (bsc#1111666).\n- can: add missing attribute validation for termination (networking-stable-20_03_14).\n- carl9170: remove P2P_GO support (bsc#1111666).\n- cdc-acm: close race betrween suspend() and acm_softint (git-fixes).\n- CDC-ACM: heed quirk also in error handling (git-fixes).\n- cdc-acm: introduce a cool down (git-fixes).\n- ceph: check if file lock exists before sending unlock request (bsc#1168789).\n- ceph: convert mdsc-\u003ecap_dirty to a per-session list (bsc#1167104).\n- ceph: demote quotarealm lookup warning to a debug message (bsc#1171692).\n- ceph: fix double unlock in handle_cap_export() (bsc#1171694).\n- ceph: fix double unlock in handle_cap_export() (bsc#1171694).\n- ceph: fix endianness bug when handling MDS session feature bits (bsc#1171695).\n- ceph: fix endianness bug when handling MDS session feature bits (bsc#1171695).\n- ceph: request expedited service on session\u0027s last cap flush (bsc#1167104).\n- cgroup, blkcg: Prepare some symbols for module and !CONFIG_CGROUP usages (bsc#1173857).\n- cgroup, netclassid: periodically release file_lock on classid updating (networking-stable-20_03_14).\n- char/random: Add a newline at the end of the file (jsc#SLE-12423).\n- CIFS: Allocate crypto structures on the fly for calculating signatures of incoming packets (bsc#1144333).\n- CIFS: Allocate encryption header through kmalloc (bsc#1144333).\n- CIFS: allow unlock flock and OFD lock across fork (bsc#1144333).\n- CIFS: check new file size when extending file by fallocate (bsc#1144333).\n- CIFS: CIFSpdu.h: Replace zero-length array with flexible-array member (bsc#1144333).\n- CIFS: clear PF_MEMALLOC before exiting demultiplex thread (bsc#1144333).\n- CIFS: do not share tcons with DFS (bsc#1144333).\n- CIFS: dump the session id and keys also for SMB2 sessions (bsc#1144333).\n- CIFS: ensure correct super block for DFS reconnect (bsc#1144333).\n- CIFS: Fix bug which the return value by asynchronous read is error (bsc#1144333).\n- CIFS: fix uninitialised lease_key in open_shroot() (bsc#1144333).\n- cifs: get rid of unused parameter in reconn_setup_dfs_targets() (bsc#1144333).\n- cifs: handle hostnames that resolve to same ip in failover (bsc#1144333 bsc#1161016).\n- CIFS: ignore cached share root handle closing errors (bsc#1166780).\n- CIFS: improve read performance for page size 64KB \u0026 cache=strict \u0026 vers=2.1+ (bsc#1144333).\n- CIFS: Increment num_remote_opens stats counter even in case of smb2_query_dir_first (bsc#1144333).\n- CIFS: minor update to comments around the cifs_tcp_ses_lock mutex (bsc#1144333).\n- CIFS: protect updating server-\u003edstaddr with a spinlock (bsc#1144333).\n- cifs: set up next DFS target before generic_ip_connect() (bsc#1144333 bsc#1161016).\n- CIFS: smb2pdu.h: Replace zero-length array with flexible-array member (bsc#1144333).\n- CIFS: smbd: Calculate the correct maximum packet size for segmented SMBDirect send/receive (bsc#1144333).\n- CIFS: smbd: Check and extend sender credits in interrupt context (bsc#1144333).\n- CIFS: smbd: Check send queue size before posting a send (bsc#1144333).\n- CIFS: smbd: Do not schedule work to send immediate packet on every receive (bsc#1144333).\n- CIFS: smbd: Merge code to track pending packets (bsc#1144333).\n- CIFS: smbd: Properly process errors on ib_post_send (bsc#1144333).\n- CIFS: smbd: Update receive credits before sending and deal with credits roll back on failure before sending (bsc#1144333).\n- CIFS: Warn less noisily on default mount (bsc#1144333).\n- clk: Add clk_hw_unregister_composite helper function definition (bsc#1051510).\n- clk: bcm2835: Fix return type of bcm2835_register_gate (bsc#1051510).\n- clk: clk-flexgen: fix clock-critical handling (bsc#1051510).\n- clk: imx6ull: use OSC clock during AXI rate change (bsc#1051510).\n- clk: imx: make mux parent strings const (bsc#1051510).\n- clk: mediatek: correct the clocks for MT2701 HDMI PHY module (bsc#1051510).\n- clk: qcom: rcg: Return failure for RCG update (bsc#1051510).\n- clk: sunxi: Fix incorrect usage of round_down() (bsc#1051510).\n- clk: sunxi-ng: a64: Fix gate bit of DSI DPHY (bsc#1051510).\n- clocksource/drivers/hyper-v: Set TSC clocksource as default w/ InvariantTSC (bsc#1170620).\n- clocksource/drivers/hyper-v: Set TSC clocksource as default w/ InvariantTSC (bsc#1170620, bsc#1170621).\n- clocksource: dw_apb_timer: Make CPU-affiliation being optional (bsc#1111666).\n- clocksource: dw_apb_timer_of: Fix missing clockevent timers (bsc#1051510).\n- compat_ioctl: block: handle BLKREPORTZONE/BLKRESETZONE (git fixes (block drivers)).\n- compat_ioctl: block: handle Persistent Reservations (git fixes (block drivers)).\n- component: Silence bind error on -EPROBE_DEFER (bsc#1051510).\n- copy_{to,from}_user(): consolidate object size checks (git fixes).\n- coresight: do not use the BIT() macro in the UAPI header (git fixes (block drivers)).\n- cpufreq: s3c64xx: Remove pointless NULL check in s3c64xx_cpufreq_driver_init (bsc#1051510).\n- crypto: algboss - do not wait during notifier callback (bsc#1111666).\n- crypto: algif_skcipher - Cap recv SG list at ctx-\u003eused (bsc#1111666).\n- crypto: caam - update xts sector size for large input length (bsc#1111666).\n- crypto: cavium/nitrox - Fix \u0027nitrox_get_first_device()\u0027 when ndevlist is fully iterated (bsc#1111666).\n- crypto: cavium/nitrox - Fix \u0027nitrox_get_first_device()\u0027 when ndevlist is fully iterated (git-fixes).\n- crypto: ccp - AES CFB mode is a stream cipher (git-fixes).\n- crypto: ccp - Change a message to reflect status instead of failure (bsc#1172218).\n- crypto: ccp - Clean up and exit correctly on allocation failure (git-fixes).\n- crypto: ccp - Cleanup misc_dev on sev_exit() (bsc#1114279).\n- crypto: ccp - Cleanup sp_dev_master in psp_dev_destroy() (bsc#1114279).\n- Crypto/chcr: fix for ccm(aes) failed test (bsc#1111666).\n- crypto: chelsio/chtls: properly set tp-\u003elsndtime (bsc#1111666).\n- cxgb4: fix MPS index overwrite when setting MAC address (bsc#1127355).\n- cxgb4: fix Txq restart check during backpressure (bsc#1127354 bsc#1127371).\n- debugfs: Add debugfs_create_xul() for hexadecimal unsigned long (git-fixes).\n- debugfs: Check module state before warning in {full/open}_proxy_open() (bsc#1173746).\n- debugfs_lookup(): switch to lookup_one_len_unlocked() (bsc#1171979).\n- Deprecate NR_UNSTABLE_NFS, use NR_WRITEBACK (bsc#1163403).\n- devlink: fix return value after hitting end in region read (bsc#1109837).\n- devlink: validate length of param values (bsc#1109837).\n- devlink: validate length of region addr/len (bsc#1109837).\n- dmaengine: dmatest: Fix iteration non-stop logic (bsc#1051510).\n- dmaengine: tegra210-adma: Fix an error handling path in \u0027tegra_adma_probe()\u0027 (bsc#1111666).\n- dm btree: increase rebalance threshold in __rebalance2() (git fixes (block drivers)).\n- dm cache: fix a crash due to incorrect work item cancelling (git fixes (block drivers)).\n- dm crypt: fix benbi IV constructor crash if used in authenticated mode (git fixes (block drivers)).\n- dm: fix potential for q-\u003emake_request_fn NULL pointer (git fixes (block drivers)).\n- dm mpath: switch paths in dm_blk_ioctl() code path (bsc#1167574).\n- dm-raid1: fix invalid return value from dm_mirror (bsc#1172378).\n- dm space map common: fix to ensure new block isn\u0027t already in use (git fixes (block drivers)).\n- dm: various cleanups to md-\u003equeue initialization code (git fixes).\n- dm verity fec: fix hash block number in verity_fec_decode (git fixes (block drivers)).\n- dm verity fec: fix memory leak in verity_fec_dtr (git fixes (block drivers)).\n- dm writecache: fix data corruption when reloading the target (git fixes (block drivers)).\n- dm writecache: fix incorrect flush sequence when doing SSD mode commit (git fixes (block drivers)).\n- dm writecache: verify watermark during resume (git fixes (block drivers)).\n- dm zoned: fix invalid memory access (git fixes (block drivers)).\n- dm zoned: reduce overhead of backing device checks (git fixes (block drivers)).\n- dm zoned: remove duplicate nr_rnd_zones increase in dmz_init_zone() (git fixes (block drivers)).\n- dm zoned: support zone sizes smaller than 128MiB (git fixes (block drivers)).\n- dp83640: reverse arguments to list_add_tail (git-fixes).\n- dpaa_eth: fix usage as DSA master, try 3 (networking-stable-20_05_27).\n- driver-core, libnvdimm: Let device subsystems add local lockdep coverage (bsc#1171753).\n- Drivers: hv: Add a module description line to the hv_vmbus driver (bsc#1172249, bsc#1172251).\n- Drivers: hv: Add a module description line to the hv_vmbus driver (bsc#1172253).\n- Drivers: hv: Change flag to write log level in panic msg to false (bsc#1170617, bsc#1170618).\n- Drivers: HV: Send one page worth of kmsg dump over Hyper-V during panic (bsc#1170618).\n- Drivers: hv: vmbus: Fix the issue with freeing up hv_ctl_table_hdr (bsc#1170618).\n- Drivers: hv: vmbus: Get rid of MSR access from vmbus_drv.c (bsc#1170618).\n- Drivers: hv: vmus: Fix the check for return value from kmsg get dump buffer (bsc#1170618).\n- Drivers/net/ibmvnic: Update VNIC protocol version reporting (bsc#1065729).\n- drivers: soc: ti: knav_qmss_queue: Make knav_gp_range_ops static (bsc#1051510).\n- Drivers: w1: add hwmon support structures (jsc#SLE-11048).\n- Drivers: w1: add hwmon temp support for w1_therm (jsc#SLE-11048).\n- Drivers: w1: refactor w1_slave_show to make the temp reading functionality separate (jsc#SLE-11048).\n- drm: amd/acp: fix broken menu structure (bsc#1114279) \t* context changes\n- drm: amd/display: fix Kconfig help text (bsc#1113956) \t* only fix DEBUG_KERNEL_DC\n- drm/amdgpu: Correctly initialize thermal controller for GPUs with Powerplay table v0 (e.g Hawaii) (bsc#1111666).\n- drm/amdgpu: Fix oops when pp_funcs is unset in ACPI event (bsc#1111666).\n- drm/amd/powerplay: force the trim of the mclk dpm_levels if OD is (bsc#1113956)\n- drm/atomic: Take the atomic toys away from X (bsc#1112178) \t* context changes\n- drm/bochs: downgrade pci_request_region failure from error to warning (bsc#1051510).\n- drm: bridge: adv7511: Extend list of audio sample rates (bsc#1111666).\n- drm/crc: Actually allow to change the crc source (bsc#1114279) \t* offset changes\n- drm/dp_mst: Fix clearing payload state on topology disable (bsc#1051510).\n- drm/dp_mst: Increase ACT retry timeout to 3s (bsc#1113956) * context changes\n- drm/dp_mst: Reformat drm_dp_check_act_status() a bit (bsc#1051510).\n- drm_dp_mst_topology: fix broken drm_dp_sideband_parse_remote_dpcd_read() (bsc#1051510).\n- drm/edid: Fix off-by-one in DispID DTD pixel clock (bsc#1114279)\n- drm: encoder_slave: fix refcouting error for modules (bsc#1111666).\n- drm: encoder_slave: fix refcouting error for modules (bsc#1114279)\n- drm/etnaviv: fix perfmon domain interation (bsc#1113956)\n- drm/etnaviv: rework perfmon query infrastructure (bsc#1112178)\n- drm/i915: Apply Wa_1406680159:icl,ehl as an engine workaround (bsc#1112178) \t* rename gt/intel_workarounds.c to intel_workarounds.c \t* context changes\n- drm/i915/gvt: Init DPLL/DDI vreg for virtual display instead of (bsc#1114279)\n- drm/i915: HDCP: fix Ri prime check done during link check (bsc#1112178) \t* rename display/intel_hdmi.c to intel_hdmi.c \t* context changes\n- drm/i915/icl+: Fix hotplug interrupt disabling after storm detection (bsc#1112178)\n- drm/i915: properly sanity check batch_start_offset (bsc#1114279) \t* renamed display/intel_fbc.c -\u003e intel_fb.c \t* renamed gt/intel_rc6.c -\u003e intel_pm.c \t* context changes\n- drm/i915: Whitelist context-local timestamp in the gen9 cmdparser (bsc#1111666).\n- drm/mediatek: Check plane visibility in atomic_update (bsc#1113956) * context changes\n- drm/meson: Delete an error message in meson_dw_hdmi_bind() (bsc#1051510).\n- drm/msm/dpu: fix error return code in dpu_encoder_init (bsc#1111666).\n- drm/msm: stop abusing dma_map/unmap for cache (bsc#1051510).\n- drm/msm: Use the correct dma_sync calls harder (bsc#1051510).\n- drm/msm: Use the correct dma_sync calls in msm_gem (bsc#1051510).\n- drm: NULL pointer dereference [null-pointer-deref] (CWE 476) problem (bsc#1114279)\n- drm: panel-orientation-quirks: Add quirk for Asus T101HA panel (bsc#1111666).\n- drm: panel-orientation-quirks: Use generic orientation-data for Acer S1003 (bsc#1111666).\n- drm/qxl: qxl_release leak in qxl_draw_dirty_fb() (bsc#1051510).\n- drm/qxl: qxl_release leak in qxl_hw_surface_alloc() (bsc#1051510).\n- drm/qxl: qxl_release use after free (bsc#1051510).\n- drm/qxl: Use correct notify port address when creating cursor ring (bsc#1113956)\n- drm/radeon: fix double free (bsc#1113956)\n- drm/radeon: fix fb_div check in ni_init_smc_spll_table() (bsc#1113956)\n- drm: Remove PageReserved manipulation from drm_pci_alloc (bsc#1114279) \t* offset changes\n- drm/sun4i: dsi: Allow binding the host without a panel (bsc#1113956)\n- drm/sun4i: dsi: Avoid hotplug race with DRM driver bind (bsc#1113956)\n- drm/sun4i: dsi: Remove incorrect use of runtime PM (bsc#1113956) \t* context changes\n- drm/sun4i: dsi: Remove unused drv from driver context (bsc#1113956) \t* context changes \t* keep include of sun4i_drv.h\n- drm/sun4i: hdmi ddc clk: Fix size of m divider (bsc#1111666).\n- drm/tegra: hub: Do not enable orphaned window group (bsc#1111666).\n- drm/vkms: Hold gem object while still in-use (bsc#1113956) * context changes\n- dump_stack: avoid the livelock of the dump_lock (git fixes (block drivers)).\n- e1000: Distribute switch variables for initialization (bsc#1111666).\n- e1000e: Disable TSO for buffer overrun workaround (bsc#1051510).\n- e1000e: Do not wake up the system via WOL if device wakeup is disabled (bsc#1051510).\n- e1000e: Relax condition to trigger reset for ME workaround (bsc#1111666).\n- EDAC/amd64: Add family ops for Family 19h Models 00h-0Fh (jsc#SLE-11833).\n- EDAC/amd64: Drop some family checks for newer systems (jsc#SLE-11833).\n- EDAC/amd64: Read back the scrub rate PCI register on F15h (bsc#1114279).\n- EDAC/mce_amd: Always load on SMCA systems (jsc#SLE-11833).\n- EDAC/mce_amd: Make fam_ops static global (jsc#SLE-11833).\n- EDAC, sb_edac: Add support for systems with segmented PCI buses (bsc#1169525).\n- efi/random: Increase size of firmware supplied randomness (jsc#SLE-12423).\n- efi/random: Treat EFI_RNG_PROTOCOL output as bootloader randomness (jsc#SLE-12423).\n- efi: READ_ONCE rng seed size before munmap (jsc#SLE-12423).\n- efi: Reorder pr_notice() with add_device_randomness() call (jsc#SLE-12423).\n- evm: Check also if *tfm is an error pointer in init_desc() (bsc#1051510).\n- evm: Fix a small race in init_desc() (bsc#1051510).\n- ext4: add cond_resched() to __ext4_find_entry() (bsc#1166862).\n- ext4: Check for non-zero journal inum in ext4_calculate_overhead (bsc#1167288).\n- ext4: do not assume that mmp_nodename/bdevname have NUL (bsc#1166860).\n- ext4: do not zeroout extents beyond i_disksize (bsc#1167851).\n- ext4: fix a data race at inode-\u003ei_blocks (bsc#1171835).\n- ext4: fix a data race in EXT4_I(inode)-\u003ei_disksize (bsc#1166861).\n- ext4: fix extent_status fragmentation for plain files (bsc#1171949).\n- ext4: fix incorrect group count in ext4_fill_super error message (bsc#1168765).\n- ext4: fix incorrect inodes per group in error message (bsc#1168764).\n- ext4: fix partial cluster initialization when splitting extent (bsc#1173839).\n- ext4: fix potential race between online resizing and write operations (bsc#1166864).\n- ext4: fix potential race between s_flex_groups online resizing and access (bsc#1166867).\n- ext4: fix potential race between s_group_info online resizing and access (bsc#1166866).\n- ext4: fix race between ext4_sync_parent() and rename() (bsc#1173838).\n- ext4: fix race between writepages and enabling EXT4_EXTENTS_FL (bsc#1166870).\n- ext4: fix support for inode sizes \u003e 1024 bytes (bsc#1164284).\n- ext4, jbd2: ensure panic by fix a race between jbd2 abort and ext4 error handlers (bsc#1173833).\n- ext4: potential crash on allocation error in ext4_alloc_flex_bg_array() (bsc#1166940).\n- ext4: rename s_journal_flag_rwsem to s_writepages_rwsem (bsc#1166868).\n- ext4: use non-movable memory for superblock readahead (bsc#1171952).\n- ext4: validate the debug_want_extra_isize mount option at parse time (bsc#1163897).\n- extcon: adc-jack: Fix an error handling path in \u0027adc_jack_probe()\u0027 (bsc#1051510).\n- fanotify: fix ignore mask logic for events on child and on dir (bsc#1172719).\n- fanotify: fix merging marks masks with FAN_ONDIR (bsc#1171679).\n- fbcon: fix null-ptr-deref in fbcon_switch (bsc#1114279) \t* rename drivers/video/fbdev/core to drivers/video/console \t* context changes\n- fbdev: potential information leak in do_fb_ioctl() (bsc#1114279)\n- fbmem: Adjust indentation in fb_prepare_logo and fb_blank (bsc#1114279)\n- fdt: add support for rng-seed (jsc#SLE-12423).\n- fdt: Update CRC check for rng-seed (jsc#SLE-12423).\n- fib: add missing attribute validation for tun_id (networking-stable-20_03_14).\n- firmware: imx: scu: Fix corruption of header (git-fixes).\n- firmware: imx: scu: Fix possible memory leak in imx_scu_probe() (bsc#1111666).\n- firmware: qcom: scm: fix compilation error when disabled (bsc#1051510).\n- Fix a backport bug, where btrfs_put_root() -\u003e btrfs_put_fs_root() modification is not needed due to missing dependency\n- fix multiplication overflow in copy_fdtable() (bsc#1173825).\n- fpga: dfl: afu: Corrected error handling levels (git-fixes).\n- fq_codel: fix TCA_FQ_CODEL_DROP_BATCH_SIZE sanity checks (networking-stable-20_05_12).\n- fs/cifs: fix gcc warning in sid_to_id (bsc#1144333).\n- fs/seq_file.c: simplify seq_file iteration code and interface (bsc#1170125).\n- gpiolib: Document that GPIO line names are not globally unique (bsc#1051510).\n- gpio: tegra: mask GPIO IRQs during IRQ shutdown (bsc#1051510).\n- gpu: host1x: Detach driver on unregister (bsc#1111666).\n- gpu: ipu-v3: pre: do not trigger update if buffer address does not change (bsc#1111666).\n- gre: fix uninit-value in __iptunnel_pull_header (networking-stable-20_03_14).\n- HID: hid-input: clear unmapped usages (git-fixes).\n- HID: hyperv: Add a module description line (bsc#1172249, bsc#1172251).\n- HID: hyperv: Add a module description line (bsc#1172253).\n- HID: i2c-hid: add Trekstor Primebook C11B to descriptor override (git-fixes).\n- HID: i2c-hid: override HID descriptors for certain devices (git-fixes).\n- HID: multitouch: add eGalaxTouch P80H84 support (bsc#1051510).\n- HID: sony: Fix for broken buttons on DS3 USB dongles (bsc#1051510).\n- HID: wacom: Read HID_DG_CONTACTMAX directly for non-generic devices (git-fixes).\n- hrtimer: Annotate lockless access to timer-\u003estate (git fixes (block drivers)).\n- hsr: add restart routine into hsr_get_node_list() (networking-stable-20_03_28).\n- hsr: check protocol version in hsr_newlink() (networking-stable-20_04_17).\n- hsr: fix general protection fault in hsr_addr_is_self() (networking-stable-20_03_28).\n- hsr: set .netnsok flag (networking-stable-20_03_28).\n- hsr: use rcu_read_lock() in hsr_get_node_{list/status}() (networking-stable-20_03_28).\n- hwmon: (acpi_power_meter) Fix potential memory leak in acpi_power_meter_add() (bsc#1111666).\n- hwmon: (emc2103) fix unable to change fan pwm1_enable attribute (bsc#1111666).\n- hwmon: (max6697) Make sure the OVERT mask is set correctly (bsc#1111666).\n- i2c: acpi: Force bus speed to 400KHz if a Silead touchscreen is present (git-fixes).\n- i2c: acpi: put device when verifying client fails (git-fixes).\n- i2c: algo-pca: Add 0x78 as SCL stuck low status for PCA9665 (bsc#1111666).\n- i2c: brcmstb: remove unused struct member (git-fixes).\n- i2c: core: Allow empty id_table in ACPI case as well (git-fixes).\n- i2c: core: decrease reference count of device node in i2c_unregister_device (git-fixes).\n- i2c: dev: Fix the race between the release of i2c_dev and cdev (bsc#1051510).\n- i2c: fix missing pm_runtime_put_sync in i2c_device_probe (git-fixes).\n- i2c-hid: properly terminate i2c_hid_dmi_desc_override_table array (git-fixes).\n- i2c: i801: Do not add ICH_RES_IO_SMI for the iTCO_wdt device (git-fixes).\n- i2c: iproc: Stop advertising support of SMBUS quick cmd (git-fixes).\n- i2c: isch: Remove unnecessary acpi.h include (git-fixes).\n- i2c: mlxcpld: check correct size of maximum RECV_LEN packet (bsc#1111666).\n- i2c: mux: demux-pinctrl: Fix an error handling path in \u0027i2c_demux_pinctrl_probe()\u0027 (bsc#1051510).\n- i2c: st: fix missing struct parameter description (bsc#1051510).\n- i40e: reduce stack usage in i40e_set_fc (git-fixes).\n- IB/ipoib: Add child to parent list only if device initialized (bsc#1168503).\n- IB/ipoib: Consolidate checking of the proposed child interface (bsc#1168503).\n- IB/ipoib: Do not remove child devices from within the ndo_uninit (bsc#1168503).\n- IB/ipoib: Get rid of IPOIB_FLAG_GOING_DOWN (bsc#1168503).\n- IB/ipoib: Get rid of the sysfs_mutex (bsc#1168503).\n- IB/ipoib: Maintain the child_intfs list from ndo_init/uninit (bsc#1168503).\n- IB/ipoib: Move all uninit code into ndo_uninit (bsc#1168503).\n- IB/ipoib: Move init code to ndo_init (bsc#1168503).\n- IB/ipoib: Replace printk with pr_warn (bsc#1168503).\n- IB/ipoib: Use cancel_delayed_work_sync for neigh-clean task (bsc#1168503).\n- IB/ipoib: Warn when one port fails to initialize (bsc#1168503).\n- IB/mlx5: Fix missing congestion control debugfs on rep rdma device (bsc#1103991).\n- ibmveth: Fix max MTU limit (bsc#1173428 ltc#186397).\n- ibmvfc: do not send implicit logouts prior to NPIV login (bsc#1169625 ltc#184611).\n- ibmvnic: continue to init in CRQ reset returns H_CLOSED (bsc#1173280 ltc#185369).\n- ibmvnic: Flush existing work items before device removal (bsc#1065729).\n- ibmvnic: Harden device login requests (bsc#1170011 ltc#183538).\n- ibmvnic: Skip fatal error reset after passive init (bsc#1171078 ltc#184239).\n- iio:ad7797: Use correct attribute_group (bsc#1051510).\n- iio: adc: stm32-adc: fix device used to request dma (bsc#1051510).\n- iio: adc: stm32-adc: fix sleep in atomic context (git-fixes).\n- iio: adc: stm32-adc: Use dma_request_chan() instead dma_request_slave_channel() (bsc#1051510).\n- iio: buffer: Do not allow buffers without any channels enabled to be activated (bsc#1051510).\n- iio: dac: vf610: Fix an error handling path in \u0027vf610_dac_probe()\u0027 (bsc#1051510).\n- iio:health:afe4404 Fix timestamp alignment and prevent data leak (bsc#1111666).\n- iio:humidity:hdc100x Fix alignment and data leak issues (bsc#1111666).\n- iio:magnetometer:ak8974: Fix alignment and data leak issues (bsc#1111666).\n- iio: mma8452: Add missed iio_device_unregister() call in mma8452_probe() (bsc#1111666).\n- iio: pressure: bmp280: Tolerate IRQ before registering (bsc#1051510).\n- iio:pressure:ms5611 Fix buffer element alignment (bsc#1111666).\n- iio: pressure: zpa2326: handle pm_runtime_get_sync failure (bsc#1111666).\n- iio: sca3000: Remove an erroneous \u0027get_device()\u0027 (bsc#1051510).\n- iio: xilinx-xadc: Fix ADC-B powerdown (bsc#1051510).\n- iio: xilinx-xadc: Fix clearing interrupt when enabling trigger (bsc#1051510).\n- iio: xilinx-xadc: Fix sequencer configuration for aux channels in simultaneous mode (bsc#1051510).\n- ima: Directly assign the ima_default_policy pointer to ima_rules (bsc#1051510).\n- ima: Fix ima digest hash table key calculation (bsc#1051510).\n- ima: Fix return value of ima_write_policy() (git-fixes).\n- include/asm-generic/topology.h: guard cpumask_of_node() macro argument (bsc#1148868).\n- Input: evdev - call input_flush_device() on release(), not flush() (bsc#1051510).\n- Input: hyperv-keyboard - add module description (bsc#1172249, bsc#1172251).\n- Input: hyperv-keyboard - add module description (bsc#1172253).\n- Input: i8042 - add Acer Aspire 5738z to nomux list (bsc#1051510).\n- Input: i8042 - add ThinkPad S230u to i8042 reset list (bsc#1051510).\n- Input: raydium_i2c_ts - use true and false for boolean values (bsc#1051510).\n- Input: synaptics - add a second working PNP_ID for Lenovo T470s (bsc#1111666).\n- Input: synaptics-rmi4 - fix error return code in rmi_driver_probe() (bsc#1051510).\n- Input: synaptics-rmi4 - really fix attn_data use-after-free (git-fixes).\n- Input: usbtouchscreen - add support for BonXeon TP (bsc#1051510).\n- Input: xpad - add custom init packet for Xbox One S controllers (bsc#1051510).\n- intel_idle: Graceful probe failure when MWAIT is disabled (bsc#1174115).\n- intel_th: Fix a NULL dereference when hub driver is not loaded (bsc#1111666).\n- iommu/amd: Call domain_flush_complete() in update_domain() (bsc#1172096).\n- iommu/amd: Do not flush Device Table in iommu_map_page() (bsc#1172097).\n- iommu/amd: Do not loop forever when trying to increase address space (bsc#1172098).\n- iommu/amd: Fix legacy interrupt remapping for x2APIC-enabled system (bsc#1172099).\n- iommu/amd: Fix over-read of ACPI UID from IVRS table (bsc#1172101).\n- iommu/amd: Fix race in increase_address_space()/fetch_pte() (bsc#1172102).\n- iommu/amd: Fix the configuration of GCR3 table root pointer (bsc#1169057).\n- iommu/amd: Update Device Table in increase_address_space() (bsc#1172103).\n- iommu: Fix reference count leak in iommu_group_alloc (bsc#1172397).\n- iommu/vt-d: Enable PCI ACS for platform opt in hint (bsc#1174130).\n- ip6_tunnel: Allow rcv/xmit even if remote address is a local address (bsc#1166978).\n- ipmi: fix hung processes in __get_guid() (git-fixes).\n- ipv4: fix a RCU-list lock in fib_triestat_seq_show (networking-stable-20_04_02).\n- ipv6/addrconf: call ipv6_mc_up() for non-Ethernet interface (networking-stable-20_03_14).\n- ipv6: do not auto-add link-local address to lag ports (networking-stable-20_04_09).\n- ipv6: fix IPV6_ADDRFORM operation logic (bsc#1171662).\n- ipv6: Fix nlmsg_flags when splitting a multipath route (networking-stable-20_03_01).\n- ipv6: fix restrict IPV6_ADDRFORM operation (bsc#1171662).\n- ipv6: Fix route replacement with dev-only route (networking-stable-20_03_01).\n- ipvlan: add cond_resched_rcu() while processing muticast backlog (networking-stable-20_03_14).\n- ipvlan: call dev_change_flags when ipvlan mode is reset (git-fixes).\n- ipvlan: do not add hardware address of master to its unicast filter list (bsc#1137325).\n- ipvlan: do not deref eth hdr before checking it\u0027s set (networking-stable-20_03_14).\n- ipvlan: do not use cond_resched_rcu() in ipvlan_process_multicast() (networking-stable-20_03_14).\n- iwlwifi: pcie: actually release queue memory in TVQM (bsc#1051510).\n- ixgbe: do not check firmware errors (bsc#1170284).\n- ixgbevf: Remove limit of 10 entries for unicast filter list (git-fixes).\n- jbd2: avoid leaking transaction credits when unreserving handle (bsc#1173845).\n- jbd2: Preserve kABI when adding j_abort_mutex (bsc#1173833).\n- kabi fix for (bsc#1168202).\n- kabi fix for early XHCI debug (git-fixes).\n- kabi for for md: improve handling of bio with REQ_PREFLUSH in md_flush_request() (git-fixes).\n- kabi: ppc64le: prevent struct dma_map_ops to become defined (jsc#SLE-12423).\n- kabi, protect struct ib_device (bsc#1168503).\n- kABI: protect struct mlx5_cmd_work_ent (kabi).\n- kabi/severities: Do not track KVM internal symbols.\n- kabi/severities: Ingnore get_dev_data() The function is internal to the AMD IOMMU driver and must not be called by any third party.\n- kabi workaround for snd_rawmidi buffer_ref field addition (git-fixes).\n- kernfs: fix barrier usage in __kernfs_new_node() (bsc#1111666).\n- KEYS: reaching the keys quotas correctly (bsc#1051510).\n- KVM: arm64: Change hyp_panic()s dependency on tpidr_el2 (bsc#1133021).\n- KVM: arm64: Stop save/restoring host tpidr_el1 on VHE (bsc#1133021).\n- KVM: Check validity of resolved slot when searching memslots (bsc#1172104).\n- KVM: nVMX: Do not reread VMCS-agnostic state when switching VMCS (bsc#1114279).\n- KVM: nVMX: Skip IBPB when switching between vmcs01 and vmcs02 (bsc#1114279).\n- KVM: s390: vsie: Fix delivery of addressing exceptions (git-fixes).\n- KVM: s390: vsie: Fix possible race when shadowing region 3 tables (git-fixes).\n- KVM: s390: vsie: Fix region 1 ASCE sanity shadow address checks (git-fixes).\n- KVM: SVM: Fix potential memory leak in svm_cpu_init() (bsc#1171736).\n- KVM x86: Extend AMD specific guest behavior to Hygon virtual CPUs (bsc#1152489).\n- KVM: x86: Fix APIC page invalidation race (bsc#1174122).\n- kvm: x86: Fix L1TF mitigation for shadow MMU (bsc#1171904).\n- KVM: x86/mmu: Set mmio_value to \u00270\u0027 if reserved #PF can\u0027t be generated (bsc#1171904).\n- KVM: x86: only do L1TF workaround on affected processors (bsc#1171904).\n- l2tp: Allow management of tunnels and session in user namespace (networking-stable-20_04_17).\n- libata: Remove extra scsi_host_put() in ata_scsi_add_hosts() (bsc#1051510).\n- libata: Return correct status in sata_pmp_eh_recover_pm() when ATA_DFLAG_DETACH is set (bsc#1051510).\n- libceph: do not omit recovery_deletes in target_copy() (bsc#1173462).\n- libceph: do not omit recovery_deletes in target_copy() (bsc#1174113).\n- libceph: ignore pool overlay and cache logic on redirects (bsc#1173146).\n- libfs: fix infoleak in simple_attr_read() (bsc#1168881).\n- libnvdimm/bus: Fix wait_nvdimm_bus_probe_idle() ABBA deadlock (bsc#1171753).\n- libnvdimm/bus: Prepare the nd_ioctl() path to be re-entrant (bsc#1171753).\n- libnvdimm/bus: Stop holding nvdimm_bus_list_mutex over __nd_ioctl() (bsc#1171753).\n- libnvdimm: cover up changes in struct nvdimm_bus (bsc#1171753).\n- libnvdimm: cover up nd_pfn_sb changes (bsc#1171759).\n- libnvdimm/dax: Pick the right alignment default when creating dax devices (bsc#1171759).\n- libnvdimm/label: Remove the dpa align check (bsc#1171759).\n- libnvdimm/of_pmem: Provide a unique name for bus provider (bsc#1171739).\n- libnvdimm/pfn_dev: Add a build check to make sure we notice when struct page size change (bsc#1171743).\n- libnvdimm/pfn_dev: Add page size and struct page size to pfn superblock (bsc#1171759).\n- libnvdimm/pfn: Prevent raw mode fallback if pfn-infoblock valid (bsc#1171743).\n- libnvdimm/pmem: Advance namespace seed for specific probe errors (bsc#1171743).\n- libnvdimm/region: Initialize bad block for volatile namespaces (bnc#1151927 5.3.6).\n- libnvdimm/region: Rewrite _probe_success() to _advance_seeds() (bsc#1171743).\n- libnvdimm: Use PAGE_SIZE instead of SZ_4K for align check (bsc#1171759).\n- lib: raid6: fix awk build warnings (git fixes (block drivers)).\n- lib/raid6/test: fix build on distros whose /bin/sh is not bash (git fixes (block drivers)).\n- lib/stackdepot.c: fix global out-of-bounds in stack_slabs (git fixes (block drivers)).\n- livepatch: Apply vmlinux-specific KLP relocations early (bsc#1071995).\n- livepatch: Disallow vmlinux.ko (bsc#1071995).\n- livepatch: Make klp_apply_object_relocs static (bsc#1071995).\n- livepatch: Prevent module-specific KLP rela sections from referencing vmlinux symbols (bsc#1071995).\n- livepatch: Remove .klp.arch (bsc#1071995).\n- locks: print unsigned ino in /proc/locks (bsc#1171951). \n- loop: replace kill_bdev with invalidate_bdev (bsc#1173820).\n- lpfc_debugfs: get rid of pointless access_ok() (bsc#1172687 bsc#1171530).\n- lpfc: Synchronize NVME transport and lpfc driver devloss_tmo (bcs#1173060).\n- mac80211: add ieee80211_is_any_nullfunc() (bsc#1051510).\n- mac80211: add option for setting control flags (bsc#1111666).\n- mac80211_hwsim: Use kstrndup() in place of kasprintf() (bsc#1051510).\n- mac80211: mesh: fix discovery timer re-arming issue / crash (bsc#1051510).\n- mac80211: set IEEE80211_TX_CTRL_PORT_CTRL_PROTO for nl80211 TX (bsc#1111666).\n- macsec: avoid to set wrong mtu (bsc#1051510).\n- macsec: restrict to ethernet devices (networking-stable-20_03_28).\n- macvlan: add cond_resched() during multicast processing (networking-stable-20_03_14).\n- macvlan: fix null dereference in macvlan_device_event() (bsc#1051510).\n- mailbox: imx: Disable the clock on devm_mbox_controller_register() failure (git-fixes).\n- make some Fujitsu systems run (bsc#1141558).\n- md: Avoid namespace collision with bitmap API (git fixes (block drivers)).\n- md: improve handling of bio with REQ_PREFLUSH in md_flush_request() (git-fixes).\n- md/raid0: Fix an error message in raid0_make_request() (git fixes (block drivers)).\n- md/raid10: prevent access of uninitialized resync_pages offset (git-fixes).\n- mdraid: fix read/write bytes accounting (bsc#1172537).\n- md: use memalloc scope APIs in mddev_suspend()/mddev_resume() (bsc#1166985)).\n- md: use memalloc scope APIs in mddev_suspend()/mddev_resume() (git fixes (block drivers)).\n- media: dvb: return -EREMOTEIO on i2c transfer failure (bsc#1051510).\n- media: flexcop-usb: fix endpoint sanity check (git-fixes).\n- media: platform: fcp: Set appropriate DMA parameters (bsc#1051510).\n- media: si2157: Better check for running tuner in init (bsc#1111666).\n- media: ti-vpe: cal: fix disable_irqs to only the intended target (git-fixes).\n- mei: release me_cl object reference (bsc#1051510).\n- mlxsw: core: Do not use WQ_MEM_RECLAIM for mlxsw ordered workqueue (git-fixes).\n- mlxsw: core: Do not use WQ_MEM_RECLAIM for mlxsw workqueue (git-fixes).\n- mlxsw: Fix some IS_ERR() vs NULL bugs (networking-stable-20_04_27).\n- mlxsw: pci: Return error on PCI reset timeout (git-fixes).\n- mlxsw: spectrum_acl_tcam: Position vchunk in a vregion list properly (networking-stable-20_05_12).\n- mlxsw: spectrum: Disallow prio-tagged packets when PVID is removed (git-fixes).\n- mlxsw: spectrum_dpipe: Add missing error path (git-fixes).\n- mlxsw: spectrum_flower: Do not stop at FLOW_ACTION_VLAN_MANGLE (networking-stable-20_04_09).\n- mlxsw: spectrum_mr: Fix list iteration in error path (bsc#1112374).\n- mlxsw: spectrum: Prevent force of 56G (git-fixes).\n- mlxsw: spectrum_router: Refresh nexthop neighbour when it becomes dead (git-fixes).\n- mlxsw: spectrum_router: Remove inappropriate usage of WARN_ON() (git-fixes).\n- mlxsw: spectrum_switchdev: Add MDB entries in prepare phase (git-fixes).\n- mlxsw: spectrum_switchdev: Do not treat static FDB entries as sticky (git-fixes).\n- mmc: atmel-mci: Fix debugfs on 64-bit platforms (git-fixes).\n- mmc: block: Fix request completion in the CQE timeout path (bsc#1111666).\n- mmc: block: Fix use-after-free issue for rpmb (bsc#1111666).\n- mmc: core: Check request type before completing the request (git-fixes).\n- mmc: core: Fix recursive locking issue in CQE recovery path (git-fixes).\n- mmc: cqhci: Avoid false \u0027cqhci: CQE stuck on\u0027 by not open-coding timeout loop (git-fixes).\n- mmc: dw_mmc: Fix debugfs on 64-bit platforms (git-fixes).\n- mmc: fix compilation of user API (bsc#1051510).\n- mmc: meson-gx: make sure the descriptor is stopped on errors (git-fixes).\n- mmc: meson-gx: simplify interrupt handler (git-fixes).\n- mmc: renesas_sdhi: limit block count to 16 bit for old revisions (git-fixes).\n- mmc: sdhci-esdhc-imx: fix the mask for tuning start point (bsc#1051510).\n- mmc: sdhci-msm: Clear tuning done flag while hs400 tuning (bsc#1051510).\n- mmc: sdhci-msm: Set SDHCI_QUIRK_MULTIBLOCK_READ_ACMD12 quirk (bsc#1111666).\n- mmc: sdhci-of-at91: fix memleak on clk_get failure (git-fixes).\n- mmc: sdhci-pci: Fix eMMC driver strength for BYT-based controllers (bsc#1051510).\n- mmc: sdhci-xenon: fix annoying 1.8V regulator warning (bsc#1051510).\n- mmc: sdio: Fix potential NULL pointer error in mmc_sdio_init_card() (bsc#1051510).\n- mmc: tmio: fix access width of Block Count Register (git-fixes).\n- mm/filemap.c: do not initiate writeback if mapping has no dirty pages (bsc#1168884).\n- mm: limit boost_watermark on small zones (git fixes (mm/pgalloc)).\n- mm/memory_hotplug.c: only respect mem= parameter during boot stage (bsc#1065600).\n- mm: replace PF_LESS_THROTTLE with PF_LOCAL_THROTTLE (bsc#1163403).\n- mm: thp: handle page cache THP correctly in PageTransCompoundMap (git fixes (block drivers)).\n- mtd: cfi: fix deadloop in cfi_cmdset_0002.c do_write_buffer (bsc#1051510).\n- mtd: spi-nor: cadence-quadspi: add a delay in write sequence (git-fixes).\n- mtd: spi-nor: enable 4B opcodes for mx66l51235l (git-fixes).\n- mtd: spi-nor: fsl-quadspi: Do not let -EINVAL on the bus (git-fixes).\n- mvpp2: remove misleading comment (git-fixes).\n- mwifiex: avoid -Wstringop-overflow warning (bsc#1051510).\n- mwifiex: Fix memory corruption in dump_station (bsc#1051510).\n- net: bcmgenet: correct per TX/RX ring statistics (networking-stable-20_04_27).\n- net/cxgb4: Check the return from t4_query_params properly (git-fixes).\n- net: dsa: b53: Fix ARL register definitions (networking-stable-20_04_27).\n- net: dsa: b53: Rework ARL bin logic (networking-stable-20_04_27).\n- net: dsa: bcm_sf2: Do not register slave MDIO bus with OF (networking-stable-20_04_09).\n- net: dsa: bcm_sf2: Ensure correct sub-node is parsed (networking-stable-20_04_09).\n- net: dsa: bcm_sf2: Fix overflow checks (git-fixes).\n- net: dsa: Fix duplicate frames flooded by learning (networking-stable-20_03_28).\n- net: dsa: loop: Add module soft dependency (networking-stable-20_05_16).\n- net: dsa: mt7530: fix roaming from DSA user ports (networking-stable-20_05_27).\n- net: dsa: mv88e6xxx: fix lockup on warm boot (networking-stable-20_03_14).\n- net: ena: add intr_moder_rx_interval to struct ena_com_dev and use it (git-fixes).\n- net: ena: add missing ethtool TX timestamping indication (git-fixes).\n- net: ena: avoid memory access violation by validating req_id properly (git-fixes).\n- net: ena: do not wake up tx queue when down (git-fixes).\n- net: ena: ena-com.c: prevent NULL pointer dereference (git-fixes).\n- net: ena: ethtool: use correct value for crc32 hash (git-fixes).\n- net: ena: fix continuous keep-alive resets (git-fixes).\n- net: ena: fix corruption of dev_idx_to_host_tbl (git-fixes).\n- net: ena: fix default tx interrupt moderation interval (git-fixes).\n- net: ena: fix incorrect default RSS key (git-fixes).\n- net: ena: fix incorrectly saving queue numbers when setting RSS indirection table (git-fixes).\n- net: ena: fix issues in setting interrupt moderation params in ethtool (git-fixes).\n- net: ena: fix potential crash when rxfh key is NULL (git-fixes).\n- net: ena: fix retrieval of nonadaptive interrupt moderation intervals (git-fixes).\n- net: ena: fix uses of round_jiffies() (git-fixes).\n- net: ena: make ena rxfh support ETH_RSS_HASH_NO_CHANGE (git-fixes).\n- net: ena: reimplement set/get_coalesce() (git-fixes).\n- net: ena: rss: do not allocate key when not supported (git-fixes).\n- net: ena: rss: fix failure to get indirection table (git-fixes).\n- net: ena: rss: store hash function as values and not bits (git-fixes).\n- net/ethernet: add Google GVE driver (jsc#SLE-10538)\n- net: fec: add phy_reset_after_clk_enable() support (git-fixes).\n- net: fec: validate the new settings in fec_enet_set_coalesce() (networking-stable-20_03_14).\n- net: fib_rules: Correctly set table field when table number exceeds 8 bits (networking-stable-20_03_01).\n- netfilter: connlabels: prefer static lock initialiser (git-fixes).\n- netfilter: conntrack: sctp: use distinct states for new SCTP connections (bsc#1159199).\n- netfilter: ctnetlink: netns exit must wait for callbacks (bsc#1169795).\n- netfilter: not mark a spinlock as __read_mostly (git-fixes).\n- net: fix a potential recursive NETDEV_FEAT_CHANGE (networking-stable-20_05_16).\n- net: fix race condition in __inet_lookup_established() (bsc#1151794).\n- net: fq: add missing attribute validation for orphan mask (networking-stable-20_03_14).\n- net: hns3: fix \u0027tc qdisc del\u0027 failed issue (bsc#1109837).\n- net: inet_csk: Fix so_reuseport bind-address cache in tb-\u003efast* (networking-stable-20_05_27).\n- net: ipip: fix wrong address family in init error path (networking-stable-20_05_27).\n- net, ip_tunnel: fix interface lookup with no key (networking-stable-20_04_02).\n- net: ipv4: devinet: Fix crash when add/del multicast IP with autojoin (networking-stable-20_04_17).\n- net: ipv6: do not consider routes via gateways for anycast address check (networking-stable-20_04_17).\n- net: ipvlan: Fix ipvlan device tso disabled while NETIF_F_IP_CSUM is set (git-fixes).\n- netlink: Use netlink header as base to calculate bad attribute offset (networking-stable-20_03_14).\n- net: macsec: preserve ingress frame ordering (networking-stable-20_05_12).\n- net: macsec: update SCI upon MAC address change (networking-stable-20_03_14).\n- net: memcg: fix lockdep splat in inet_csk_accept() (networking-stable-20_03_14).\n- net: memcg: late association of sock to memcg (networking-stable-20_03_14).\n- net/mlx4_core: drop useless LIST_HEAD (git-fixes).\n- net/mlx4_core: fix a memory leak bug (git-fixes).\n- net/mlx4_core: Fix use of ENOSPC around mlx4_counter_alloc() (networking-stable-20_05_12).\n- net/mlx4_en: avoid indirect call in TX completion (networking-stable-20_04_27).\n- net/mlx5: Add command entry handling completion (networking-stable-20_05_27).\n- net/mlx5: Add new fields to Port Type and Speed register (bsc#1171118).\n- net/mlx5: Add new fields to Port Type and Speed register (bsc#1171118).\n- net/mlx5: Add RoCE RX ICRC encapsulated counter (bsc#1171118).\n- net/mlx5: Avoid panic when setting vport rate (git-fixes).\n- net/mlx5: Continue driver initialization despite debugfs failure (git-fixes).\n- net/mlx5e: ethtool, Fix a typo in WOL function names (git-fixes).\n- net/mlx5e: Fix ethtool self test: link speed (bsc#1171118).\n- net/mlx5e: Fix traffic duplication in ethtool steering (git-fixes).\n- net/mlx5e: Move port speed code from en_ethtool.c to en/port.c (bsc#1171118).\n- net/mlx5e: Remove unnecessary clear_bit()s (git-fixes).\n- net/mlx5e: Update netdev txq on completions during closure (networking-stable-20_05_27).\n- net/mlx5: Expose link speed directly (bsc#1171118).\n- net/mlx5: Expose link speed directly (bsc#1171118).\n- net/mlx5: Expose port speed when possible (bsc#1171118).\n- net/mlx5: Expose port speed when possible (bsc#1171118).\n- net/mlx5: Fix command entry leak in Internal Error State (networking-stable-20_05_12).\n- net/mlx5: Fix failing fw tracer allocation on s390 (bsc#1103990 ).\n- net/mlx5: Fix forced completion access non initialized command entry (networking-stable-20_05_12).\n- net: mvmdio: allow up to four clocks to be specified for orion-mdio (git-fixes).\n- net: mvneta: Fix the case where the last poll did not process all rx (networking-stable-20_03_28).\n- net: mvpp2: prs: Do not override the sign bit in SRAM parser shift (git-fixes).\n- net: netrom: Fix potential nr_neigh refcnt leak in nr_add_node (networking-stable-20_04_27).\n- net/packet: tpacket_rcv: do not increment ring index on drop (networking-stable-20_03_14).\n- net: phy: fix aneg restart in phy_ethtool_set_eee (networking-stable-20_05_16).\n- net: phy: micrel: kszphy_resume(): add delay after genphy_resume() before accessing PHY registers (bsc#1051510).\n- net: phy: restore mdio regs in the iproc mdio driver (networking-stable-20_03_01).\n- netprio_cgroup: Fix unlimited memory leak of v2 cgroups (networking-stable-20_05_16).\n- net: qede: stop adding events on an already destroyed workqueue (git-fixes).\n- net: qed: fix excessive QM ILT lines consumption (git-fixes).\n- net: qed: fix NVMe login fails over VFs (git-fixes).\n- net: qmi_wwan: add support for ASKEY WWHC050 (networking-stable-20_03_28).\n- net: qrtr: Fix passing invalid reference to qrtr_local_enqueue() (networking-stable-20_05_27).\n- net: revert default NAPI poll timeout to 2 jiffies (networking-stable-20_04_17).\n- net: revert \u0027net: get rid of an signed integer overflow in ip_idents_reserve()\u0027 (networking-stable-20_05_27).\n- net_sched: cls_route: remove the right filter from hashtable (networking-stable-20_03_28).\n- net sched: fix reporting the first-time use timestamp (networking-stable-20_05_27).\n- net_sched: sch_skbprio: add message validation to skbprio_change() (bsc#1109837).\n- net/smc: add fallback check to connect() (git-fixes).\n- net/smc: fix refcount non-blocking connect() -part 2 (git-fixes).\n- net: stricter validation of untrusted gso packets (networking-stable-20_05_12).\n- net/tls: Fix sk_psock refcnt leak in bpf_exec_tx_verdict() (networking-stable-20_05_12).\n- net/tls: Fix sk_psock refcnt leak when in tls_data_ready() (networking-stable-20_05_12).\n- net: usb: qmi_wwan: add support for DW5816e (networking-stable-20_05_12).\n- net: vmxnet3: fix possible buffer overflow caused by bad DMA value in vmxnet3_get_rss() (bsc#1172484).\n- net/x25: Fix x25_neigh refcnt leak when receiving frame (networking-stable-20_04_27).\n- nfc: add missing attribute validation for SE API (networking-stable-20_03_14).\n- nfc: add missing attribute validation for vendor subcommand (networking-stable-20_03_14).\n- nfc: pn544: Fix occasional HW initialization failure (networking-stable-20_03_01).\n- nfc: st21nfca: add missed kfree_skb() in an error path (bsc#1051510).\n- nfp: abm: fix a memory leak bug (bsc#1109837).\n- nfp: bpf: fix code-gen bug on BPF_ALU | BPF_XOR | BPF_K (git-fixes).\n- nfsd4: fix up replay_matches_cache() (git-fixes).\n- nfsd: Ensure CLONE persists data and metadata changes to the target file (git-fixes).\n- nfsd: fix delay timer on 32-bit architectures (git-fixes).\n- nfsd: fix jiffies/time_t mixup in LRU list (git-fixes).\n- nfs: Directory page cache pages need to be locked when read (git-fixes).\n- nfsd: memory corruption in nfsd4_lock() (git-fixes).\n- nfs: Do not call generic_error_remove_page() while holding locks (bsc#1170457).\n- NFS: Fix an RCU lock leak in nfs4_refresh_delegation_stateid() (bsc#1170592).\n- nfs: Fix memory leaks and corruption in readdir (git-fixes).\n- nfs: Fix O_DIRECT accounting of number of bytes read/written (git-fixes).\n- nfs: Fix potential posix_acl refcnt leak in nfs3_set_acl (git-fixes).\n- nfs: fix racey wait in nfs_set_open_stateid_locked (bsc#1170592).\n- nfs/flexfiles: Use the correct TCP timeout for flexfiles I/O (git-fixes).\n- nfs/pnfs: Fix pnfs_generic_prepare_to_resend_writes() (git-fixes).\n- nfs: Revalidate the file size on a fatal write error (git-fixes).\n- NFSv4.0: nfs4_do_fsinfo() should not do implicit lease renewals (git-fixes).\n- NFSv4: Do not allow a cached open with a revoked delegation (git-fixes).\n- NFSv4: Fix leak of clp-\u003ecl_acceptor string (git-fixes).\n- NFSv4/pnfs: Return valid stateids in nfs_layout_find_inode_by_stateid() (git-fixes).\n- NFSv4: Retry CLOSE and DELEGRETURN on NFS4ERR_OLD_STATEID (bsc#1170592).\n- NFSv4: try lease recovery on NFS4ERR_EXPIRED (git-fixes).\n- NFSv4.x: Drop the slot if nfs4_delegreturn_prepare waits for layoutreturn (git-fixes).\n- nilfs2: fix null pointer dereference at nilfs_segctor_do_construct() (bsc#1173857).\n- nl80211: fix NL80211_ATTR_CHANNEL_WIDTH attribute type (bsc#1111666).\n- nl802154: add missing attribute validation for dev_type (networking-stable-20_03_14).\n- nl802154: add missing attribute validation (networking-stable-20_03_14).\n- nvdimm: Avoid race between probe and reading device attributes (bsc#1170442).\n- nvme: check for NVME_CTRL_LIVE in nvme_report_ns_ids() (bcs#1171558 bsc#1159058).\n- nvme: do not update multipath disk information if the controller is down (bcs#1171558 bsc#1159058).\n- nvme: fail cancelled commands with NVME_SC_HOST_PATH_ERROR (bsc#1158983 bsc#1172538).\n- nvme-fc: Fail transport errors with NVME_SC_HOST_PATH (bsc#1158983 bsc#1172538).\n- nvme-fc: print proper nvme-fc devloss_tmo value (bsc#1172391).\n- nvme-tcp: fail command with NVME_SC_HOST_PATH_ERROR send failed (bsc#1158983 bsc#1172538).\n- objtool: Add is_static_jump() helper (bsc#1169514).\n- objtool: Add relocation check for alternative sections (bsc#1169514).\n- objtool: Clean instruction state before each function validation (bsc#1169514).\n- objtool: Fix stack offset tracking for indirect CFAs (bsc#1169514).\n- objtool: Fix switch table detection in .text.unlikely (bsc#1169514).\n- objtool: Ignore empty alternatives (bsc#1169514).\n- objtool: Make BP scratch register warning more robust (bsc#1169514).\n- ocfs2: no need try to truncate file beyond i_size (bsc#1171841).\n- OMAP: DSS2: remove non-zero check on variable r (bsc#1114279)\n- overflow: Fix -Wtype-limits compilation warnings (git fixes).\n- overflow.h: Add arithmetic shift helper (git fixes).\n- p54usb: add AirVasT USB stick device-id (bsc#1051510).\n- padata: ensure the reorder timer callback runs on the correct CPU (git-fixes).\n- padata: Remove broken queue flushing (git-fixes).\n- padata: reorder work kABI fixup (git-fixes).\n- Partially revert \u0027kfifo: fix kfifo_alloc() and kfifo_init()\u0027 (git fixes (block drivers)).\n- partitions/efi: Fix partition name parsing in GUID partition entry (bsc#1168763).\n- PCI: Allow pci_resize_resource() for devices on root bus (bsc#1051510).\n- PCI: Fix pci_register_host_bridge() device_register() error handling (bsc#1051510).\n- PCI: Generalize multi-function power dependency device links (bsc#1111666).\n- PCI: hv: Add support for protocol 1.3 and support PCI_BUS_RELATIONS2 (bsc#1172201, bsc#1172202).\n- PCI: hv: Decouple the func definition in hv_dr_state from VSP message (bsc#1172201, bsc#1172202).\n- PCI: pciehp: Fix indefinite wait on sysfs requests (git-fixes).\n- PCI: pciehp: Fix MSI interrupt race (bsc#1159037).\n- PCI: pciehp: Support interrupts sent from D3hot (git-fixes).\n- PCI/PM: Call .bridge_d3() hook only if non-NULL (git-fixes).\n- PCI: Program MPS for RCiEP devices (bsc#1051510).\n- PCI/PTM: Inherit Switch Downstream Port PTM settings from Upstream Port (bsc#1051510).\n- PCI: sanity test on PCI vendor to be sure we do not touch everything (bsc#1141558).\n- pcm_native: result of put_user() needs to be checked (bsc#1111666).\n- perf: Allocate context task_ctx_data for child event (git-fixes).\n- perf: Allocate context task_ctx_data for child event (git-fixes).\n- perf/cgroup: Fix perf cgroup hierarchy support (git-fixes).\n- perf/cgroup: Fix perf cgroup hierarchy support (git-fixes).\n- perf: Copy parent\u0027s address filter offsets on clone (git-fixes).\n- perf: Copy parent\u0027s address filter offsets on clone (git-fixes).\n- perf/core: Add sanity check to deal with pinned event failure (git-fixes).\n- perf/core: Add sanity check to deal with pinned event failure (git-fixes).\n- perf/core: Avoid freeing static PMU contexts when PMU is unregistered (git-fixes).\n- perf/core: Avoid freeing static PMU contexts when PMU is unregistered (git-fixes).\n- perf/core: Correct event creation with PERF_FORMAT_GROUP (git-fixes).\n- perf/core: Correct event creation with PERF_FORMAT_GROUP (git-fixes).\n- perf/core: Do not WARN() for impossible ring-buffer sizes (git-fixes).\n- perf/core: Do not WARN() for impossible ring-buffer sizes (git-fixes).\n- perf/core: Fix bad use of igrab() (git fixes (dependent patch)).\n- perf/core: Fix crash when using HW tracing kernel filters (git-fixes).\n- perf/core: Fix ctx_event_type in ctx_resched() (git-fixes).\n- perf/core: Fix ctx_event_type in ctx_resched() (git-fixes).\n- perf/core: Fix error handling in perf_event_alloc() (git-fixes).\n- perf/core: Fix error handling in perf_event_alloc() (git-fixes).\n- perf/core: Fix exclusive events\u0027 grouping (git-fixes).\n- perf/core: Fix exclusive events\u0027 grouping (git-fixes).\n- perf/core: Fix group scheduling with mixed hw and sw events (git-fixes).\n- perf/core: Fix group scheduling with mixed hw and sw events (git-fixes).\n- perf/core: Fix impossible ring-buffer sizes warning (git-fixes).\n- perf/core: Fix impossible ring-buffer sizes warning (git-fixes).\n- perf/core: Fix locking for children siblings group read (git-fixes).\n- perf/core: Fix locking for children siblings group read (git-fixes).\n- perf/core: Fix lock inversion between perf,trace,cpuhp (git-fixes (dependent patch for 18736eef1213)).\n- perf/core: Fix perf_event_read_value() locking (git-fixes).\n- perf/core: Fix perf_event_read_value() locking (git-fixes).\n- perf/core: Fix perf_pmu_unregister() locking (git-fixes).\n- perf/core: Fix perf_pmu_unregister() locking (git-fixes).\n- perf/core: Fix __perf_read_group_add() locking (git-fixes (dependent patch)).\n- perf/core: Fix perf_sample_regs_user() mm check (git-fixes).\n- perf/core: Fix perf_sample_regs_user() mm check (git-fixes).\n- perf/core: Fix possible Spectre-v1 indexing for -\u003eaux_pages (git-fixes).\n- perf/core: Fix possible Spectre-v1 indexing for -\u003eaux_pages (git-fixes).\n- perf/core: Fix race between close() and fork() (git-fixes).\n- perf/core: Fix race between close() and fork() (git-fixes).\n- perf/core: Fix the address filtering fix (git-fixes).\n- perf/core: Fix the address filtering fix (git-fixes).\n- perf/core: Fix use-after-free in uprobe_perf_close() (git-fixes).\n- perf/core: Fix use-after-free in uprobe_perf_close() (git-fixes).\n- perf/core: Force USER_DS when recording user stack data (git-fixes).\n- perf/core: Force USER_DS when recording user stack data (git-fixes).\n- perf/core: Restore mmap record type correctly (git-fixes).\n- perf/core: Restore mmap record type correctly (git-fixes).\n- perf: Fix header.size for namespace events (git-fixes).\n- perf: Fix header.size for namespace events (git-fixes).\n- perf/ioctl: Add check for the sample_period value (git-fixes).\n- perf/ioctl: Add check for the sample_period value (git-fixes).\n- perf, pt, coresight: Fix address filters for vmas with non-zero offset (git-fixes).\n- perf, pt, coresight: Fix address filters for vmas with non-zero offset (git-fixes).\n- perf: Return proper values for user stack errors (git-fixes).\n- perf: Return proper values for user stack errors (git-fixes).\n- perf/x86/amd: Add support for Large Increment per Cycle Events (jsc#SLE-11831).\n- perf/x86/amd: Constrain Large Increment per Cycle events (git-fixes).\n- perf/x86/amd: Constrain Large Increment per Cycle events (jsc#SLE-11831).\n- perf/x86/amd/ibs: Fix reading of the IBS OpData register and thus precise RIP validity (git-fixes).\n- perf/x86/amd/ibs: Fix sample bias for dispatched micro-ops (git-fixes).\n- perf/x86/amd/ibs: Handle erratum #420 only on the affected CPU family (10h) (git-fixes).\n- perf/x86/amd/iommu: Make the \u0027amd_iommu_attr_groups\u0027 symbol static (git-fixes).\n- perf/x86/amd/uncore: Do not set \u0027ThreadMask\u0027 and \u0027SliceMask\u0027 for non-L3 PMCs (git-fixes stable).\n- perf/x86/amd/uncore: Set the thread mask for F17h L3 PMCs (git-fixes).\n- perf/x86/amd/uncore: Set ThreadMask and SliceMask for L3 Cache perf events (git-fixes stable).\n- perf/x86: Enable free running PEBS for REGS_USER/INTR (git-fixes).\n- perf/x86: Fix incorrect PEBS_REGS (git-fixes).\n- perf/x86/intel: Add generic branch tracing check to intel_pmu_has_bts() (git-fixes).\n- perf/x86/intel: Add proper condition to run sched_task callbacks (git-fixes).\n- perf/x86/intel/bts: Fix the use of page_private() (git-fixes).\n- perf/x86/intel: Fix PT PMI handling (git-fixes).\n- perf/x86/intel: Move branch tracing setup to the Intel-specific source file (git-fixes).\n- perf/x86/intel/uncore: Add Node ID mask (git-fixes).\n- perf/x86/intel/uncore: Fix PCI BDF address of M3UPI on SKX (git-fixes).\n- perf/x86/intel/uncore: Handle invalid event coding for free-running counter (git-fixes).\n- perf/x86/pt, coresight: Clean up address filter structure (git fixes (dependent patch)).\n- perf/x86/uncore: Fix event group support (git-fixes).\n- pid: Improve the comment about waiting in zap_pid_ns_processes (git fixes)).\n- pinctrl: baytrail: Enable pin configuration setting for GPIO chip (git-fixes).\n- pinctrl: cherryview: Add missing spinlock usage in chv_gpio_irq_handler (git-fixes).\n- pinctrl: freescale: imx: Fix an error handling path in \u0027imx_pinctrl_probe()\u0027 (bsc#1051510).\n- pinctrl: imxl: Fix an error handling path in \u0027imx1_pinctrl_core_probe()\u0027 (bsc#1051510).\n- pinctrl: samsung: Save/restore eint_mask over suspend for EINT_TYPE GPIOs (bsc#1051510).\n- pinctrl: sunrisepoint: Fix PAD lock register offset for SPT-H (git-fixes).\n- platform/x86: asus-nb-wmi: Do not load on Asus T100TA and T200TA (bsc#1051510).\n- platform/x86: dell-laptop: do not register micmute LED if there is no token (bsc#1111666).\n- platform/x86: hp-wmi: Convert simple_strtoul() to kstrtou32() (bsc#1111666).\n- PM / Domains: Allow genpd users to specify default active wakeup behavior (git-fixes).\n- pNFS: Ensure we do clear the return-on-close layout stateid on fatal errors (git-fixes).\n- pnp: Use list_for_each_entry() instead of open coding (git fixes).\n- powerpc/64s: Do not let DT CPU features set FSCR_DSCR (bsc#1065729).\n- powerpc/64s: Save FSCR to init_task.thread.fscr after feature init (bsc#1065729).\n- powerpc: Add attributes for setjmp/longjmp (bsc#1065729).\n- powerpc/book3s64: Export has_transparent_hugepage() related functions (bsc#1171759).\n- powerpc/book3s64/pkeys: Fix pkey_access_permitted() for execute disable pkey (bsc#1065729).\n- powerpc/fadump: fix race between pstore write and fadump crash trigger (bsc#1168959 ltc#185010).\n- powerpc/hash64/devmap: Use H_PAGE_THP_HUGE when setting up huge devmap PTE entries (bsc#1065729).\n- powerpc/pci/of: Parse unassigned resources (bsc#1065729).\n- powerpc/setup_64: Set cache-line-size based on cache-block-size (bsc#1065729).\n- powerpc/sstep: Fix DS operand in ld encoding to appropriate value (bsc#1065729).\n- powerpc/xive: Clear the page tables for the ESB IO mapping (bsc#1085030).\n- powerpc/xmon: Reset RCU and soft lockup watchdogs (bsc#1065729).\n- power: supply: bq24257_charger: Replace depends on REGMAP_I2C with select (bsc#1051510).\n- power: supply: lp8788: Fix an error handling path in \u0027lp8788_charger_probe()\u0027 (bsc#1051510).\n- power: supply: smb347-charger: IRQSTAT_D is volatile (bsc#1051510).\n- power: vexpress: add suppress_bind_attrs to true (bsc#1111666).\n- pppoe: only process PADT targeted at local interfaces (networking-stable-20_05_16).\n- pwm: bcm2835: Dynamically allocate base (bsc#1051510).\n- pwm: meson: Fix confusing indentation (bsc#1051510).\n- pwm: pca9685: Fix PWM/GPIO inter-operation (bsc#1051510).\n- pwm: rcar: Fix late Runtime PM enablement (bsc#1051510).\n- pwm: renesas-tpu: Fix late Runtime PM enablement (bsc#1051510).\n- qede: Fix race between rdma destroy workqueue and link change event (networking-stable-20_03_01).\n- qed: reduce maximum stack frame size (git-fixes).\n- qlcnic: fix missing release in qlcnic_83xx_interrupt_test (git-fixes).\n- r8152: check disconnect status after long sleep (networking-stable-20_03_14).\n- r8152: support additional Microsoft Surface Ethernet Adapter variant (networking-stable-20_05_27).\n- raid5: remove gfp flags from scribble_alloc() (bsc#1166985).\n- raid5: remove gfp flags from scribble_alloc() (git fixes (block drivers)).\n- raid6/ppc: Fix build for clang (git fixes (block drivers)).\n- random: always use batched entropy for get_random_u{32,64} (bsc#1164871).\n- rcu: locking and unlocking need to always be at least barriers (git fixes (block drivers)).\n- RDMA/efa: Fix setting of wrong bit in get/set_feature commands (bsc#1111666)\n- RDMA/efa: Set maximum pkeys device attribute (bsc#1111666)\n- RDMA/efa: Support remote read access in MR registration (bsc#1111666)\n- RDMA/efa: Unified getters/setters for device structs bitmask access (bsc#1111666)\n- RDMA/ipoib: Fix use of sizeof() (bsc#1168503).\n- RDMA/netdev: Fix netlink support in IPoIB (bsc#1168503).\n- RDMA/netdev: Hoist alloc_netdev_mqs out of the driver (bsc#1168503).\n- RDMA/netdev: Use priv_destructor for netdev cleanup (bsc#1168503).\n- regmap: debugfs: Do not sleep while atomic for fast_io regmaps (bsc#1111666).\n- resolve KABI warning for perf-pt-coresight (git-fixes).\n- rpm/kernel-docs.spec.in: Require python-packaging for build.\n- rtlwifi: Fix a double free in _rtl_usb_tx_urb_setup() (bsc#1051510).\n- s390/bpf: Maintain 8-byte stack alignment (bsc#1169194).\n- s390/cio: avoid duplicated \u0027ADD\u0027 uevents (git-fixes).\n- s390/cio: generate delayed uevent for vfio-ccw subchannels (git-fixes).\n- s390/cpuinfo: fix wrong output when CPU0 is offline (git-fixes).\n- s390/cpum_cf: Add new extended counters for IBM z15 (bsc#1169762 LTC#185291).\n- s390/diag: fix display of diagnose call statistics (git-fixes).\n- s390: fix syscall_get_error for compat processes (git-fixes).\n- s390/ftrace: fix potential crashes when switching tracers (git-fixes).\n- s390/gmap: return proper error code on ksm unsharing (git-fixes).\n- s390/ism: fix error return code in ism_probe() (git-fixes).\n- s390/ism: fix error return code in ism_probe() (git-fixes).\n- s390/pci: do not set affinity for floating irqs (git-fixes).\n- s390/pci: Fix possible deadlock in recover_store() (bsc#1165183 LTC#184103).\n- s390/pci: Recover handle in clp_set_pci_fn() (bsc#1165183 LTC#184103).\n- s390/qdio: consistently restore the IRQ handler (git-fixes).\n- s390/qdio: lock device while installing IRQ handler (git-fixes).\n- s390/qdio: put thinint indicator after early error (git-fixes).\n- s390/qdio: tear down thinint indicator after early error (git-fixes).\n- s390/qeth: cancel RX reclaim work earlier (git-fixes).\n- s390/qeth: do not return -ENOTSUPP to userspace (git-fixes).\n- s390/qeth: do not warn for napi with 0 budget (git-fixes).\n- s390/qeth: fix error handling for isolation mode cmds (git-fixes).\n- s390/qeth: fix off-by-one in RX copybreak check (git-fixes).\n- s390/qeth: fix promiscuous mode after reset (git-fixes).\n- s390/qeth: fix qdio teardown after early init error (git-fixes).\n- s390/qeth: handle error due to unsupported transport mode (git-fixes).\n- s390/qeth: handle error when backing RX buffer (git-fixes).\n- s390/qeth: lock the card while changing its hsuid (git-fixes).\n- s390/qeth: support net namespaces for L3 devices (git-fixes).\n- s390/time: Fix clk type in get_tod_clock (git-fixes).\n- sch_choke: avoid potential panic in choke_reset() (networking-stable-20_05_12).\n- sch_sfq: validate silly quantum values (networking-stable-20_05_12).\n- scripts/decodecode: fix trapping instruction formatting (bsc#1065729).\n- scripts/dtc: Remove redundant YYLOC global declaration (bsc#1160388).\n- scsi: aacraid: fix a signedness bug (bsc#1174296).\n- scsi: bnx2i: fix potential use after free (bsc#1171600).\n- scsi: core: avoid repetitive logging of device offline messages (bsc#1145929).\n- scsi: core: Handle drivers which set sg_tablesize to zero (bsc#1171601) This commit also required: \u003e scsi: core: avoid preallocating big SGL for data\n- scsi: core: kABI fix offline_already (bsc#1145929).\n- scsi: core: save/restore command resid for error handling (bsc#1171602).\n- scsi: core: scsi_trace: Use get_unaligned_be*() (bsc#1171604).\n- scsi: core: try to get module before removing device (bsc#1171605).\n- scsi: csiostor: Adjust indentation in csio_device_reset (bsc#1171606).\n- scsi: csiostor: Do not enable IRQs too early (bsc#1171607).\n- scsi: esas2r: unlock on error in esas2r_nvram_read_direct() (bsc#1171608).\n- scsi: fnic: fix invalid stack access (bsc#1171609).\n- scsi: fnic: fix msix interrupt allocation (bsc#1171610).\n- scsi: hisi_sas: fix calls to dma_set_mask_and_coherent() (bsc#1174296).\n- scsi: ibmvscsi: Do not send host info in adapter info MAD after LPM (bsc#1172759 ltc#184814).\n- scsi: ibmvscsi: Fix WARN_ON during event pool release (bsc#1170791 ltc#185128).\n- scsi: iscsi: Avoid potential deadlock in iscsi_if_rx func (bsc#1171611).\n- scsi: iscsi: Fix a potential deadlock in the timeout handler (bsc#1171612).\n- scsi: iscsi: qla4xxx: fix double free in probe (bsc#1171613).\n- scsi: lpfc: Add an internal trace log buffer (bsc#1172687 bsc#1171530).\n- scsi: lpfc: Add blk_io_poll support for latency improvment (bsc#1172687 bsc#1171530).\n- scsi: lpfc: Add support to display if adapter dumps are available (bsc#1172687 bsc#1171530).\n- scsi: lpfc: Allow applications to issue Common Set Features mailbox command (bsc#1172687 bsc#1171530).\n- scsi: lpfc: Avoid another null dereference in lpfc_sli4_hba_unset() (bsc#1172687 bsc#1171530).\n- scsi: lpfc: Change default queue allocation for reduced memory consumption (bsc#1164780).\n- scsi: lpfc: fix: Coverity: lpfc_cmpl_els_rsp(): Null pointer dereferences (bsc#1171614).\n- scsi: lpfc: Fix crash in target side cable pulls hitting WAIT_FOR_UNREG (bsc#1171615).\n- scsi: lpfc: Fix inconsistent indenting (bsc#1158983).\n- scsi: lpfc: Fix interrupt assignments when multiple vectors are supported on same CPU (bsc#1158983).\n- scsi: lpfc: Fix kdump hang on PPC (bsc#1172687 bsc#1171530).\n- scsi: lpfc: Fix language in 0373 message to reflect non-error message (bsc#1172687 bsc#1171530).\n- scsi: lpfc: Fix less-than-zero comparison of unsigned value (bsc#1158983).\n- scsi: lpfc: Fix lpfc_nodelist leak when processing unsolicited event (bsc#1164780).\n- scsi: lpfc: Fix MDS Diagnostic Enablement definition (bsc#1164780).\n- scsi: lpfc: Fix missing MDS functionality (bsc#1172687 bsc#1171530).\n- scsi: lpfc: Fix negation of else clause in lpfc_prep_node_fc4type (bsc#1164780).\n- scsi: lpfc: Fix noderef and address space warnings (bsc#1164780).\n- scsi: lpfc: Fix NVMe rport deregister and registration during ADISC (bsc#1172687 bsc#1171530).\n- scsi: lpfc: Fix oops due to overrun when reading SLI3 data (bsc#1172687 bsc#1171530).\n- scsi: lpfc: Fix shost refcount mismatch when deleting vport (bsc#1172687 bsc#1171530).\n- scsi: lpfc: Fix stack trace seen while setting rrq active (bsc#1172687 bsc#1171530).\n- scsi: lpfc: Fix unused assignment in lpfc_sli4_bsg_link_diag_test (bsc#1172687 bsc#1171530).\n- scsi: lpfc: Maintain atomic consistency of queue_claimed flag (bsc#1164780).\n- scsi: lpfc: remove duplicate unloading checks (bsc#1164780).\n- scsi: lpfc: Remove re-binding of nvme rport during registration (bsc#1164780).\n- scsi: lpfc: Remove redundant initialization to variable rc (bsc#1164780).\n- scsi: lpfc: Remove unnecessary lockdep_assert_held calls (bsc#1164780).\n- scsi: lpfc: Update lpfc version to 12.8.0.1 (bsc#1164780).\n- scsi: lpfc: Update lpfc version to 12.8.0.2 (bsc#1158983).\n- scsi: megaraid_sas: Do not initiate OCR if controller is not in ready state (bsc#1171616).\n- scsi: megaraid_sas: Fix a compilation warning (bsc#1174296).\n- scsi: mpt3sas: Fix double free in attach error handling (bsc#1174296).\n- scsi: qedf: Add port_id getter (bsc#1150660).\n- scsi: qla2xxx: add ring buffer for tracing debug logs (bsc#1157169).\n- scsi: qla2xxx: check UNLOADING before posting async work (bsc#1157169).\n- scsi: qla2xxx: Delete all sessions before unregister local nvme port (bsc#1157169).\n- scsi: qla2xxx: Do not log message when reading port speed via sysfs (bsc#1157169).\n- scsi: qla2xxx: Fix a condition in qla2x00_find_all_fabric_devs() (bsc#1174296).\n- scsi: qla2xxx: Fix hang when issuing nvme disconnect-all in NPIV (bsc#1157169).\n- scsi: qla2xxx: Fix regression warnings (bsc#1157169).\n- scsi: qla2xxx: Remove non functional code (bsc#1157169).\n- scsi: qla2xxx: Set NVMe status code for failed NVMe FCP request (bsc#1158983).\n- scsi: qla2xxx: set UNLOADING before waiting for session deletion (bsc#1157169).\n- scsi: qla4xxx: Adjust indentation in qla4xxx_mem_free (bsc#1171617).\n- scsi: qla4xxx: fix double free bug (bsc#1171618).\n- scsi: sd: Clear sdkp-\u003eprotection_type if disk is reformatted without PI (bsc#1171619).\n- scsi: sg: add sg_remove_request in sg_common_write (bsc#1171620).\n- scsi: tracing: Fix handling of TRANSFER LENGTH == 0 for READ(6) and WRITE(6) (bsc#1171621).\n- scsi: ufs: change msleep to usleep_range (bsc#1171622).\n- scsi: ufs: Clean up ufshcd_scale_clks() and clock scaling error out path (bsc#1171623).\n- scsi: ufs: Fix ufshcd_hold() caused scheduling while atomic (bsc#1171624).\n- scsi: ufs: Fix ufshcd_probe_hba() reture value in case ufshcd_scsi_add_wlus() fails (bsc#1171625).\n- scsi: ufs: Recheck bkops level if bkops is disabled (bsc#1171626).\n- scsi: zfcp: fix missing erp_lock in port recovery trigger for point-to-point (git-fixes).\n- sctp: Do not add the shutdown timer if its already been added (networking-stable-20_05_27).\n- sctp: fix possibly using a bad saddr with a given dst (networking-stable-20_04_02).\n- sctp: fix refcount bug in sctp_wfree (networking-stable-20_04_02).\n- sctp: move the format error check out of __sctp_sf_do_9_1_abort (networking-stable-20_03_01).\n- sctp: Start shutdown on association restart if in SHUTDOWN-SENT state and socket is closed (networking-stable-20_05_27).\n- selftests/powerpc: Fix build errors in powerpc ptrace selftests (boo#1124278).\n- Separate one more kABI fixup from the functional change:\n- seq_file: fix problem when seeking mid-record (bsc#1170125).\n- serial: uartps: Move the spinlock after the read of the tx empty (git-fixes).\n- sfc: detach from cb_page in efx_copy_channel() (networking-stable-20_03_14).\n- signal/pid_namespace: Fix reboot_pid_ns to use send_sig not force_sig (bsc#1172185).\n- slcan: not call free_netdev before rtnl_unlock in slcan_open (networking-stable-20_03_28).\n- slip: make slhc_compress() more robust against malicious packets (networking-stable-20_03_14).\n- smb3: Add new compression flags (bsc#1144333).\n- smb3: change noisy error message to FYI (bsc#1144333).\n- smb3: enable swap on SMB3 mounts (bsc#1144333).\n- smb3: Minor cleanup of protocol definitions (bsc#1144333).\n- smb3: remove overly noisy debug line in signing errors (bsc#1144333).\n- smb3: smbdirect support can be configured by default (bsc#1144333).\n- smb3: use SMB2_SIGNATURE_SIZE define (bsc#1144333).\n- snb3: Additional compression structures (bsc#1144333).\n- spi: bcm2835: Fix 3-wire mode if DMA is enabled (git-fixes).\n- spi: bcm63xx-hsspi: Really keep pll clk enabled (bsc#1051510).\n- spi: bcm-qspi: when tx/rx buffer is NULL set to 0 (bsc#1051510).\n- spi: dw: Add SPI Rx-done wait method to DMA-based transfer (bsc#1051510).\n- spi: dw: Add SPI Tx-done wait method to DMA-based transfer (bsc#1051510).\n- spi: dw: use \u0027smp_mb()\u0027 to avoid sending spi data error (bsc#1051510).\n- spi: dw: Zero DMA Tx and Rx configurations on stack (bsc#1051510).\n- spi: fsl: do not map irq during probe (git-fixes).\n- spi: fsl: use platform_get_irq() instead of of_irq_to_resource() (git-fixes).\n- spi: pxa2xx: Add CS control clock quirk (bsc#1051510).\n- spi: pxa2xx: Apply CS clk quirk to BXT (bsc#1111666).\n- spi: qup: call spi_qup_pm_resume_runtime before suspending (bsc#1051510).\n- spi: spi-fsl-dspi: Replace interruptible wait queue with a simple completion (git-fixes).\n- spi: spi-mem: Fix Dual/Quad modes on Octal-capable devices (bsc#1111666).\n- spi: spi-s3c64xx: Fix system resume support (git-fixes).\n- spi: spi-sun6i: sun6i_spi_transfer_one(): fix setting of clock rate (bsc#1111666).\n- spi/zynqmp: remove entry that causes a cs glitch (bsc#1051510).\n- staging: comedi: dt2815: fix writing hi byte of analog output (bsc#1051510).\n- staging: comedi: Fix comedi_device refcnt leak in comedi_open (bsc#1051510).\n- staging: comedi: verify array index is correct before using it (bsc#1111666).\n- staging: iio: ad2s1210: Fix SPI reading (bsc#1051510).\n- staging: rtl8712: Fix IEEE80211_ADDBA_PARAM_BUF_SIZE_MASK (bsc#1051510).\n- staging: sm750fb: add missing case while setting FB_VISUAL (bsc#1051510).\n- staging: vt6656: Do not set RCR_MULTICAST or RCR_BROADCAST by default (git-fixes).\n- staging: vt6656: Fix drivers TBTT timing counter (git-fixes).\n- staging: vt6656: Fix pairwise key entry save (git-fixes).\n- SUNRPC: defer slow parts of rpc_free_client() to a workqueue (bsc#1168202).\n- SUNRPC: expiry_time should be seconds not timeval (git-fixes).\n- SUNRPC: Fix a potential buffer overflow in \u0027svc_print_xprts()\u0027 (git-fixes).\n- SUNRPC: The TCP back channel mustn\u0027t disappear while requests are outstanding (bsc#1152624).\n- supported.conf: Add br_netfilter to base (bsc#1169020).\n- supported.conf: support w1 core and thermometer support\n- svcrdma: Fix double svc_rdma_send_ctxt_put() in an error path (bsc#1103992).\n- svcrdma: Fix leak of transport addresses (git-fixes).\n- svcrdma: Fix trace point use-after-free race (bsc#1103992 ).\n- taskstats: fix data-race (bsc#1172188).\n- tcp: cache line align MAX_TCP_HEADER (networking-stable-20_04_27).\n- tcp: repair: fix TCP_QUEUE_SEQ implementation (networking-stable-20_03_28).\n- team: add missing attribute validation for array index (networking-stable-20_03_14).\n- team: add missing attribute validation for port ifindex (networking-stable-20_03_14).\n- team: fix hang in team_mode_get() (networking-stable-20_04_27).\n- tg3: driver sleeps indefinitely when EEH errors exceed eeh_max_freezes (bsc#1173284).\n- timers: Add a function to start/reduce a timer (networking-stable-20_05_27).\n- tools lib traceevent: Remove unneeded qsort and uses memmove instead (git-fixes).\n- tpm: ibmvtpm: retry on H_CLOSED in tpm_ibmvtpm_send() (bsc#1065729).\n- tpm_tis: Remove the HID IFX0102 (bsc#1111666).\n- tpm/tpm_tis: Free IRQ if probing fails (bsc#1082555).\n- tpm/tpm_tis: Free IRQ if probing fails (git-fixes).\n- tracing: Add a vmalloc_sync_mappings() for safe measure (git-fixes).\n- tracing: Disable trace_printk() on post poned tests (git-fixes).\n- tracing: Fix event trigger to accept redundant spaces (git-fixes).\n- tracing: Fix the race between registering \u0027snapshot\u0027 event trigger and triggering \u0027snapshot\u0027 operation (git-fixes).\n- tty: n_gsm: Fix bogus i++ in gsm_data_kick (bsc#1051510).\n- tty: n_gsm: Fix SOF skipping (bsc#1051510).\n- tty: n_gsm: Fix waking up upper tty layer when room available (bsc#1051510).\n- tty: rocket, avoid OOB access (git-fixes).\n- tun: Do not put_page() for all negative return values from XDP program (bsc#1109837).\n- tunnel: Propagate ECT(1) when decapsulating as recommended by RFC6040 (networking-stable-20_05_12).\n- UAS: fix deadlock in error handling and PM flushing work (git-fixes).\n- UAS: no use logging any details in case of ENODEV (git-fixes).\n- ubifs: remove broken lazytime support (bsc#1173826).\n- Update config files: Build w1 bus on arm64 (jsc#SLE-11048)\n- USB: Add USB_QUIRK_DELAY_CTRL_MSG and USB_QUIRK_DELAY_INIT for Corsair K70 RGB RAPIDFIRE (git-fixes).\n- usb: add USB_QUIRK_DELAY_INIT for Logitech C922 (git-fixes).\n- USB: c67x00: fix use after free in c67x00_giveback_urb (bsc#1111666).\n- USB: cdc-acm: restore capability check order (git-fixes).\n- usb: chipidea: core: add wakeup support for extcon (bsc#1111666).\n- USB: core: Fix misleading driver bug report (bsc#1051510).\n- usb: dwc2: Fix shutdown callback in platform (bsc#1111666).\n- usb: dwc2: gadget: move gadget resume after the core is in L0 state (bsc#1051510).\n- USB: dwc3: do not set gadget-\u003eis_otg flag (git-fixes).\n- USB: dwc3: gadget: Do link recovery for SS and SSP (git-fixes).\n- usb: dwc3: gadget: introduce cancelled_list (git-fixes).\n- usb: dwc3: gadget: never call -\u003ecomplete() from -\u003eep_queue() (git-fixes).\n- usb: dwc3: gadget: Properly handle ClearFeature(halt) (git-fixes).\n- usb: dwc3: gadget: Properly handle failed kick_transfer (git-fixes).\n- USB: early: Handle AMD\u0027s spec-compliant identifiers, too (git-fixes).\n- USB: ehci: reopen solution for Synopsys HC bug (git-fixes).\n- USB: f_fs: Clear OS Extended descriptor counts to zero in ffs_data_reset() (git-fixes).\n- USB: gadget: audio: Fix a missing error return value in audio_bind() (git-fixes).\n- USB: gadget: composite: Inform controller driver of self-powered (git-fixes).\n- usb: gadget: fix potential double-free in m66592_probe (bsc#1111666).\n- USB: gadget: legacy: fix error return code in cdc_bind() (git-fixes).\n- USB: gadget: legacy: fix error return code in gncm_bind() (git-fixes).\n- USB: gadget: legacy: fix redundant initialization warnings (bsc#1051510).\n- usb: gadget: lpc32xx_udc: do not dereference ep pointer before null check (bsc#1051510).\n- USB: gadget: net2272: Fix a memory leak in an error handling path in \u0027net2272_plat_probe()\u0027 (git-fixes).\n- usb: gadget: udc: atmel: fix uninitialized read in debug printk (bsc#1111666).\n- USB: gadget: udc: atmel: Fix vbus disconnect handling (git-fixes).\n- USB: gadget: udc: atmel: Make some symbols static (git-fixes).\n- usb: gadget: udc: atmel: remove outdated comment in usba_ep_disable() (bsc#1111666).\n- USB: gadget: udc: bdc: Remove unnecessary NULL checks in bdc_req_complete (git-fixes).\n- usb: gadget: udc: Potential Oops in error handling code (bsc#1111666).\n- USB: gadget: udc: s3c2410_udc: Remove pointless NULL check in s3c2410_udc_nuke (bsc#1051510).\n- usb: host: ehci-exynos: Fix error check in exynos_ehci_probe() (bsc#1111666).\n- USB: host: ehci-mxc: Add error handling in ehci_mxc_drv_probe() (bsc#1051510).\n- USB: host: xhci-plat: keep runtime active when removing host (git-fixes).\n- USB: hub: Fix handling of connect changes during sleep (git-fixes).\n- usb: musb: Fix runtime PM imbalance on error (bsc#1051510).\n- usb: musb: start session in resume for host port (bsc#1051510).\n- usbnet: silence an unnecessary warning (bsc#1170770).\n- usbnet: smsc95xx: Fix use-after-free after removal (bsc#1111666).\n- USB: ohci-sm501: Add missed iounmap() in remove (bsc#1111666).\n- USB: serial: garmin_gps: add sanity checking for data length (git-fixes).\n- USB: serial: iuu_phoenix: fix memory corruption (bsc#1111666).\n- USB: serial: option: add BroadMobi BM806U (git-fixes).\n- USB: serial: option: add support for ASKEY WWHC050 (git-fixes).\n- USB: serial: option: add Telit LE910C1-EUX compositions (bsc#1051510).\n- USB: serial: option: add Wistron Neweb D19Q1 (git-fixes).\n- USB: serial: qcserial: add DW5816e QDL support (bsc#1051510).\n- USB: serial: qcserial: Add DW5816e support (git-fixes).\n- USB: serial: usb_wwan: do not resubmit rx urb on fatal errors (bsc#1051510).\n- USB: serial: usb_wwan: do not resubmit rx urb on fatal errors (git-fixes).\n- USB: sisusbvga: Change port variable from signed to unsigned (git-fixes).\n- usb-storage: Add unusual_devs entry for JMicron JMS566 (git-fixes).\n- USB: uas: add quirk for LaCie 2Big Quadra (git-fixes).\n- USB: xhci: Fix NULL pointer dereference when enqueuing trbs from urb sg list (git-fixes).\n- vfio/pci: Fix SR-IOV VF handling with MMIO blocking (bsc#1174123).\n- vfs: Fix EOVERFLOW testing in put_compat_statfs64 (bnc#1151927 5.3.6).\n- video: fbdev: sis: Remove unnecessary parentheses and commented code (bsc#1114279)\n- video: fbdev: w100fb: Fix a potential double free (bsc#1051510).\n- virtio-blk: handle block_device_operations callbacks after hot unplug (git fixes (block drivers)).\n- vmxnet3: add geneve and vxlan tunnel offload support (bsc#1172484).\n- vmxnet3: add support to get/set rx flow hash (bsc#1172484).\n- vmxnet3: allow rx flow hash ops only when rss is enabled (bsc#1172484).\n- vmxnet3: avoid format strint overflow warning (bsc#1172484).\n- vmxnet3: prepare for version 4 changes (bsc#1172484).\n- vmxnet3: Remove always false conditional statement (bsc#1172484).\n- vmxnet3: remove redundant initialization of pointer \u0027rq\u0027 (bsc#1172484).\n- vmxnet3: remove unused flag \u0027rxcsum\u0027 from struct vmxnet3_adapter (bsc#1172484).\n- vmxnet3: Replace msleep(1) with usleep_range() (bsc#1172484).\n- vmxnet3: update to version 4 (bsc#1172484).\n- vmxnet3: use correct hdr reference when packet is encapsulated (bsc#1172484).\n- vrf: Check skb for XFRM_TRANSFORMED flag (networking-stable-20_04_27).\n- vt: ioctl, switch VT_IS_IN_USE and VT_BUSY to inlines (git-fixes).\n- vt: selection, introduce vc_is_sel (git-fixes).\n- vt: vt_ioctl: fix race in VT_RESIZEX (git-fixes).\n- vt: vt_ioctl: fix use-after-free in vt_in_use() (git-fixes).\n- vt: vt_ioctl: fix VT_DISALLOCATE freeing in-use virtual console (git-fixes).\n- vxlan: Avoid infinite loop when suppressing NS messages with invalid options (git-fixes).\n- vxlan: check return value of gro_cells_init() (networking-stable-20_03_28).\n- w1: Add subsystem kernel public interface (jsc#SLE-11048).\n- w1: Fix slave count on 1-Wire bus (resend) (jsc#SLE-11048).\n- w1: keep balance of mutex locks and refcnts (jsc#SLE-11048).\n- w1: omap-hdq: cleanup to add missing newline for some dev_dbg (bsc#1051510).\n- w1: use put_device() if device_register() fail (jsc#SLE-11048).\n- watchdog: reset last_hw_keepalive time at start (git-fixes).\n- watchdog: sp805: fix restart handler (bsc#1111666).\n- wcn36xx: Fix error handling path in \u0027wcn36xx_probe()\u0027 (bsc#1051510).\n- wil6210: add general initialization/size checks (bsc#1111666).\n- wil6210: check rx_buff_mgmt before accessing it (bsc#1111666).\n- wil6210: ignore HALP ICR if already handled (bsc#1111666).\n- wil6210: make sure Rx ring sizes are correlated (git-fixes).\n- wil6210: remove reset file from debugfs (git-fixes).\n- wimax/i2400m: Fix potential urb refcnt leak (bsc#1051510).\n- work around mvfs bug (bsc#1162063).\n- workqueue: do not use wq_select_unbound_cpu() for bound works (bsc#1172130).\n- x86/amd_nb: Add Family 19h PCI IDs (jsc#SLE-11834).\n- x86/apic: Install an empty physflat_init_apic_ldr (bsc#1163309).\n- x86/cpu/amd: Make erratum #1054 a legacy erratum (bsc#1114279).\n- x86/entry/64: Fix unwind hints in kernel exit path (bsc#1058115).\n- x86/entry/64: Fix unwind hints in register clearing code (bsc#1058115).\n- x86/entry/64: Fix unwind hints in rewind_stack_do_exit() (bsc#1058115).\n- x86/entry/64: Fix unwind hints in __switch_to_asm() (bsc#1058115).\n- x86/events/intel/ds: Add PERF_SAMPLE_PERIOD into PEBS_FREERUNNING_FLAGS (git-fixes).\n- x86/events/intel/ds: Add PERF_SAMPLE_PERIOD into PEBS_FREERUNNING_FLAGS (git-fixes).\n- x86: Fix early boot crash on gcc-10, third try (bsc#1114279).\n- x86/Hyper-V: Allow guests to enable InvariantTSC (bsc#1170620).\n- x86/Hyper-V: Free hv_panic_page when fail to register kmsg dump (bsc#1170617, bsc#1170618).\n- x86/Hyper-V: Free hv_panic_page when fail to register kmsg dump (bsc#1170618).\n- x86/Hyper-V: Report crash data in die() when panic_on_oops is set (bsc#1170617, bsc#1170618).\n- x86/Hyper-V: Report crash data in die() when panic_on_oops is set (bsc#1170618).\n- x86/Hyper-V: Report crash register data or kmsg before running crash kernel (bsc#1170617, bsc#1170618).\n- x86/Hyper-V: Report crash register data or kmsg before running crash kernel (bsc#1170618).\n- x86/Hyper-V: Report crash register data when sysctl_record_panic_msg is not set (bsc#1170617, bsc#1170618).\n- x86/Hyper-V: Report crash register data when sysctl_record_panic_msg is not set (bsc#1170618).\n- x86/Hyper-V: report value of misc_features (git fixes).\n- x86/Hyper-V: report value of misc_features (git-fixes).\n- x86/Hyper-V: Trigger crash enlightenment only once during system crash (bsc#1170617, bsc#1170618).\n- x86/Hyper-V: Trigger crash enlightenment only once during system crash (bsc#1170618).\n- x86/Hyper-V: Unload vmbus channel in hv panic callback (bsc#1170617, bsc#1170618).\n- x86/Hyper-V: Unload vmbus channel in hv panic callback (bsc#1170618).\n- x86/Hyperv-V: Allow guests to enable InvariantTSC (bsc#1170621, bsc#1170620).\n- x86/kprobes: Avoid kretprobe recursion bug (bsc#1114279).\n- x86/MCE/AMD: Add a KABI workaround for enum smca_bank_types (jsc#SLE-11833).\n- x86/MCE/AMD, EDAC/mce_amd: Add new Load Store unit McaType (jsc#SLE-11833).\n- x86/{mce,mm}: Unmap the entire page if the whole page is affected and poisoned (bsc#1172257).\n- x86/microcode/AMD: Increase microcode PATCH_MAX_SIZE (bsc#1169005).\n- x86/reboot/quirks: Add MacBook6,1 reboot quirk (bsc#1114279).\n- x86/resctrl: Fix invalid attempt at removing the default resource group (git-fixes).\n- x86/resctrl: Preserve CDP enable over CPU hotplug (bsc#1114279).\n- x86/unwind/orc: Do not skip the first frame for inactive tasks (bsc#1058115).\n- x86/unwind/orc: Fix error handling in __unwind_start() (bsc#1058115).\n- x86/unwind/orc: Fix error path for bad ORC entry type (bsc#1058115).\n- x86/unwind/orc: Fix unwind_get_return_address_ptr() for inactive tasks (bsc#1058115).\n- x86/unwind/orc: Prevent unwinding before ORC initialization (bsc#1058115).\n- x86/unwind: Prevent false warnings for non-current tasks (bsc#1058115).\n- x86/xen: fix booting 32-bit pv guest (bsc#1071995).\n- x86/xen: Make the boot CPU idle task reliable (bsc#1071995).\n- x86/xen: Make the secondary CPU idle tasks reliable (bsc#1071995).\n- xen/blkfront: fix memory allocation flags in blkfront_setup_indirect() (bsc#1168486).\n- xen/pci: reserve MCFG areas earlier (bsc#1170145).\n- xfrm: Always set XFRM_TRANSFORMED in xfrm{4,6}_output_finish (networking-stable-20_04_27).\n- xfrm: fix error in comment (git fixes).\n- xfs: clear PF_MEMALLOC before exiting xfsaild thread (git-fixes).\n- xfs: Correctly invert xfs_buftarg LRU isolation logic (git-fixes).\n- xfs: do not ever return a stale pointer from __xfs_dir3_free_read (git-fixes).\n- xhci: Fix incorrect EP_STATE_MASK (git-fixes).\n- xprtrdma: Fix completion wait during device removal (git-fixes).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2020-2478,SUSE-SLE-RT-12-SP5-2020-2478", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2020_2478-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2020:2478-1", "url": "https://www.suse.com/support/update/announcement/2020/suse-su-20202478-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2020:2478-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-September/007345.html" }, { "category": "self", "summary": "SUSE Bug 1051510", "url": "https://bugzilla.suse.com/1051510" }, { "category": "self", "summary": "SUSE Bug 1058115", "url": "https://bugzilla.suse.com/1058115" }, { "category": "self", "summary": "SUSE Bug 1065600", "url": "https://bugzilla.suse.com/1065600" }, { "category": "self", "summary": "SUSE Bug 1065729", "url": "https://bugzilla.suse.com/1065729" }, { "category": "self", "summary": "SUSE Bug 1071995", "url": "https://bugzilla.suse.com/1071995" }, { "category": "self", "summary": "SUSE Bug 1082555", "url": "https://bugzilla.suse.com/1082555" }, { "category": "self", "summary": "SUSE Bug 1083647", "url": "https://bugzilla.suse.com/1083647" }, { "category": "self", "summary": "SUSE Bug 1085030", "url": "https://bugzilla.suse.com/1085030" }, { "category": "self", "summary": "SUSE Bug 1089895", "url": "https://bugzilla.suse.com/1089895" }, { "category": "self", "summary": "SUSE Bug 1103990", "url": "https://bugzilla.suse.com/1103990" }, { "category": "self", "summary": "SUSE Bug 1103991", "url": "https://bugzilla.suse.com/1103991" }, { "category": "self", "summary": "SUSE Bug 1103992", "url": "https://bugzilla.suse.com/1103992" }, { "category": "self", "summary": "SUSE Bug 1104745", "url": "https://bugzilla.suse.com/1104745" }, { "category": "self", "summary": "SUSE Bug 1104967", "url": "https://bugzilla.suse.com/1104967" }, { "category": "self", "summary": "SUSE Bug 1109837", "url": "https://bugzilla.suse.com/1109837" }, { "category": "self", "summary": "SUSE Bug 1111666", "url": "https://bugzilla.suse.com/1111666" }, { "category": "self", "summary": "SUSE Bug 1112178", "url": "https://bugzilla.suse.com/1112178" }, { "category": "self", "summary": "SUSE Bug 1112374", "url": "https://bugzilla.suse.com/1112374" }, { "category": "self", "summary": "SUSE Bug 1113956", "url": "https://bugzilla.suse.com/1113956" }, { "category": "self", "summary": "SUSE Bug 1114279", "url": "https://bugzilla.suse.com/1114279" }, { "category": "self", "summary": "SUSE Bug 1124278", "url": "https://bugzilla.suse.com/1124278" }, { "category": "self", "summary": "SUSE Bug 1127354", "url": "https://bugzilla.suse.com/1127354" }, { "category": "self", "summary": "SUSE Bug 1127355", "url": "https://bugzilla.suse.com/1127355" }, { "category": "self", "summary": "SUSE Bug 1127371", "url": "https://bugzilla.suse.com/1127371" }, { "category": "self", "summary": "SUSE Bug 1133021", "url": "https://bugzilla.suse.com/1133021" }, { "category": "self", "summary": "SUSE Bug 1137325", "url": "https://bugzilla.suse.com/1137325" }, { "category": "self", "summary": "SUSE Bug 1141558", "url": "https://bugzilla.suse.com/1141558" }, { "category": "self", "summary": "SUSE Bug 1142685", "url": "https://bugzilla.suse.com/1142685" }, { "category": "self", "summary": "SUSE Bug 1144333", "url": "https://bugzilla.suse.com/1144333" }, { "category": "self", "summary": "SUSE Bug 1145929", "url": "https://bugzilla.suse.com/1145929" }, { "category": "self", "summary": "SUSE Bug 1148868", "url": "https://bugzilla.suse.com/1148868" }, { "category": "self", "summary": "SUSE Bug 1150660", "url": "https://bugzilla.suse.com/1150660" }, { "category": "self", "summary": "SUSE Bug 1151794", "url": "https://bugzilla.suse.com/1151794" }, { "category": "self", "summary": "SUSE Bug 1151927", "url": "https://bugzilla.suse.com/1151927" }, { "category": "self", "summary": "SUSE Bug 1152107", "url": "https://bugzilla.suse.com/1152107" }, { "category": "self", "summary": "SUSE Bug 1152489", "url": "https://bugzilla.suse.com/1152489" }, { "category": "self", "summary": "SUSE Bug 1152624", "url": "https://bugzilla.suse.com/1152624" }, { "category": "self", "summary": "SUSE Bug 1154824", "url": "https://bugzilla.suse.com/1154824" }, { "category": "self", "summary": "SUSE Bug 1157169", "url": "https://bugzilla.suse.com/1157169" }, { "category": "self", "summary": "SUSE Bug 1158265", "url": "https://bugzilla.suse.com/1158265" }, { "category": "self", "summary": "SUSE Bug 1158983", "url": "https://bugzilla.suse.com/1158983" }, { "category": "self", "summary": "SUSE Bug 1159037", "url": "https://bugzilla.suse.com/1159037" }, { "category": "self", "summary": "SUSE Bug 1159058", "url": "https://bugzilla.suse.com/1159058" }, { "category": "self", "summary": "SUSE Bug 1159199", "url": "https://bugzilla.suse.com/1159199" }, { "category": "self", "summary": "SUSE Bug 1160388", "url": "https://bugzilla.suse.com/1160388" }, { "category": "self", "summary": "SUSE Bug 1160947", "url": "https://bugzilla.suse.com/1160947" }, { "category": "self", "summary": "SUSE Bug 1161016", "url": "https://bugzilla.suse.com/1161016" }, { "category": "self", "summary": "SUSE Bug 1162002", "url": "https://bugzilla.suse.com/1162002" }, { "category": "self", "summary": "SUSE Bug 1162063", "url": "https://bugzilla.suse.com/1162063" }, { "category": "self", "summary": "SUSE Bug 1163309", "url": "https://bugzilla.suse.com/1163309" }, { "category": "self", "summary": "SUSE Bug 1163403", "url": "https://bugzilla.suse.com/1163403" }, { "category": "self", "summary": "SUSE Bug 1163897", "url": "https://bugzilla.suse.com/1163897" }, { "category": "self", "summary": "SUSE Bug 1164284", "url": "https://bugzilla.suse.com/1164284" }, { "category": "self", "summary": "SUSE Bug 1164780", "url": "https://bugzilla.suse.com/1164780" }, { "category": "self", "summary": "SUSE Bug 1164871", "url": "https://bugzilla.suse.com/1164871" }, { "category": "self", "summary": "SUSE Bug 1165183", "url": "https://bugzilla.suse.com/1165183" }, { "category": "self", "summary": "SUSE Bug 1165478", "url": "https://bugzilla.suse.com/1165478" }, { "category": "self", "summary": "SUSE Bug 1165741", "url": "https://bugzilla.suse.com/1165741" }, { "category": "self", "summary": "SUSE Bug 1166780", "url": "https://bugzilla.suse.com/1166780" }, { "category": "self", "summary": "SUSE Bug 1166860", "url": "https://bugzilla.suse.com/1166860" }, { "category": "self", "summary": "SUSE Bug 1166861", "url": "https://bugzilla.suse.com/1166861" }, { "category": "self", "summary": "SUSE Bug 1166862", "url": "https://bugzilla.suse.com/1166862" }, { "category": "self", "summary": "SUSE Bug 1166864", "url": "https://bugzilla.suse.com/1166864" }, { "category": "self", "summary": "SUSE Bug 1166866", "url": "https://bugzilla.suse.com/1166866" }, { "category": "self", "summary": "SUSE Bug 1166867", "url": "https://bugzilla.suse.com/1166867" }, { "category": "self", "summary": "SUSE Bug 1166868", "url": "https://bugzilla.suse.com/1166868" }, { "category": "self", "summary": "SUSE Bug 1166870", "url": "https://bugzilla.suse.com/1166870" }, { "category": "self", "summary": "SUSE Bug 1166940", "url": "https://bugzilla.suse.com/1166940" }, { "category": "self", "summary": "SUSE Bug 1166969", "url": "https://bugzilla.suse.com/1166969" }, { "category": "self", "summary": "SUSE Bug 1166978", "url": "https://bugzilla.suse.com/1166978" }, { "category": "self", "summary": "SUSE Bug 1166985", "url": "https://bugzilla.suse.com/1166985" }, { "category": "self", "summary": "SUSE Bug 1167104", "url": "https://bugzilla.suse.com/1167104" }, { "category": "self", "summary": "SUSE Bug 1167288", "url": "https://bugzilla.suse.com/1167288" }, { "category": "self", "summary": "SUSE Bug 1167574", "url": "https://bugzilla.suse.com/1167574" }, { "category": "self", "summary": "SUSE Bug 1167851", "url": "https://bugzilla.suse.com/1167851" }, { "category": "self", "summary": "SUSE Bug 1167867", "url": "https://bugzilla.suse.com/1167867" }, { "category": "self", "summary": "SUSE Bug 1168081", "url": "https://bugzilla.suse.com/1168081" }, { "category": "self", "summary": "SUSE Bug 1168202", "url": "https://bugzilla.suse.com/1168202" }, { "category": "self", "summary": "SUSE Bug 1168332", "url": "https://bugzilla.suse.com/1168332" }, { "category": "self", "summary": "SUSE Bug 1168486", "url": "https://bugzilla.suse.com/1168486" }, { "category": "self", "summary": "SUSE Bug 1168503", "url": "https://bugzilla.suse.com/1168503" }, { "category": "self", "summary": "SUSE Bug 1168670", "url": "https://bugzilla.suse.com/1168670" }, { "category": "self", "summary": "SUSE Bug 1168760", "url": "https://bugzilla.suse.com/1168760" }, { "category": "self", "summary": "SUSE Bug 1168762", "url": "https://bugzilla.suse.com/1168762" }, { "category": "self", "summary": "SUSE Bug 1168763", "url": "https://bugzilla.suse.com/1168763" }, { "category": "self", "summary": "SUSE Bug 1168764", "url": "https://bugzilla.suse.com/1168764" }, { "category": "self", "summary": "SUSE Bug 1168765", "url": "https://bugzilla.suse.com/1168765" }, { "category": "self", "summary": "SUSE Bug 1168789", "url": "https://bugzilla.suse.com/1168789" }, { "category": "self", "summary": "SUSE Bug 1168881", "url": "https://bugzilla.suse.com/1168881" }, { "category": "self", "summary": "SUSE Bug 1168884", "url": "https://bugzilla.suse.com/1168884" }, { "category": "self", "summary": "SUSE Bug 1168952", "url": "https://bugzilla.suse.com/1168952" }, { "category": "self", "summary": "SUSE Bug 1168959", "url": "https://bugzilla.suse.com/1168959" }, { "category": "self", "summary": "SUSE Bug 1169005", "url": "https://bugzilla.suse.com/1169005" }, { "category": "self", "summary": "SUSE Bug 1169013", "url": "https://bugzilla.suse.com/1169013" }, { "category": "self", "summary": "SUSE Bug 1169020", "url": "https://bugzilla.suse.com/1169020" }, { "category": "self", "summary": "SUSE Bug 1169057", "url": "https://bugzilla.suse.com/1169057" }, { "category": "self", "summary": "SUSE Bug 1169194", "url": "https://bugzilla.suse.com/1169194" }, { "category": "self", "summary": "SUSE Bug 1169390", "url": "https://bugzilla.suse.com/1169390" }, { "category": "self", "summary": "SUSE Bug 1169514", "url": "https://bugzilla.suse.com/1169514" }, { "category": "self", "summary": "SUSE Bug 1169525", "url": "https://bugzilla.suse.com/1169525" }, { "category": "self", "summary": "SUSE Bug 1169625", "url": "https://bugzilla.suse.com/1169625" }, { "category": "self", "summary": "SUSE Bug 1169762", "url": "https://bugzilla.suse.com/1169762" }, { "category": "self", "summary": "SUSE Bug 1169771", "url": "https://bugzilla.suse.com/1169771" }, { "category": "self", "summary": "SUSE Bug 1169795", "url": "https://bugzilla.suse.com/1169795" }, { "category": "self", "summary": "SUSE Bug 1170011", "url": "https://bugzilla.suse.com/1170011" }, { "category": "self", "summary": "SUSE Bug 1170056", "url": "https://bugzilla.suse.com/1170056" }, { "category": "self", "summary": "SUSE Bug 1170125", "url": "https://bugzilla.suse.com/1170125" }, { "category": "self", "summary": "SUSE Bug 1170145", "url": "https://bugzilla.suse.com/1170145" }, { "category": "self", "summary": "SUSE Bug 1170284", "url": "https://bugzilla.suse.com/1170284" }, { "category": "self", "summary": "SUSE Bug 1170345", "url": "https://bugzilla.suse.com/1170345" }, { "category": "self", "summary": "SUSE Bug 1170442", "url": "https://bugzilla.suse.com/1170442" }, { "category": "self", "summary": "SUSE Bug 1170457", "url": "https://bugzilla.suse.com/1170457" }, { "category": "self", "summary": "SUSE Bug 1170522", "url": "https://bugzilla.suse.com/1170522" }, { "category": "self", "summary": "SUSE Bug 1170592", "url": "https://bugzilla.suse.com/1170592" }, { "category": "self", "summary": "SUSE Bug 1170617", "url": "https://bugzilla.suse.com/1170617" }, { "category": "self", "summary": "SUSE Bug 1170618", "url": "https://bugzilla.suse.com/1170618" }, { "category": "self", "summary": "SUSE Bug 1170620", "url": "https://bugzilla.suse.com/1170620" }, { "category": "self", "summary": "SUSE Bug 1170621", "url": "https://bugzilla.suse.com/1170621" }, { "category": "self", "summary": "SUSE Bug 1170770", "url": "https://bugzilla.suse.com/1170770" }, { "category": "self", "summary": "SUSE Bug 1170778", "url": "https://bugzilla.suse.com/1170778" }, { "category": "self", "summary": "SUSE Bug 1170791", "url": "https://bugzilla.suse.com/1170791" }, { "category": "self", "summary": "SUSE Bug 1170901", "url": "https://bugzilla.suse.com/1170901" }, { "category": "self", "summary": "SUSE Bug 1171078", "url": "https://bugzilla.suse.com/1171078" }, { "category": "self", "summary": "SUSE Bug 1171098", "url": "https://bugzilla.suse.com/1171098" }, { "category": "self", "summary": "SUSE Bug 1171118", "url": "https://bugzilla.suse.com/1171118" }, { "category": "self", "summary": "SUSE Bug 1171124", "url": "https://bugzilla.suse.com/1171124" }, { "category": "self", "summary": "SUSE Bug 1171189", "url": "https://bugzilla.suse.com/1171189" }, { "category": "self", "summary": "SUSE Bug 1171191", "url": "https://bugzilla.suse.com/1171191" }, { "category": "self", "summary": "SUSE Bug 1171195", "url": "https://bugzilla.suse.com/1171195" }, { "category": "self", "summary": "SUSE Bug 1171202", "url": "https://bugzilla.suse.com/1171202" }, { "category": "self", "summary": "SUSE Bug 1171205", "url": "https://bugzilla.suse.com/1171205" }, { "category": "self", "summary": "SUSE Bug 1171214", "url": "https://bugzilla.suse.com/1171214" }, { "category": "self", "summary": "SUSE Bug 1171217", "url": "https://bugzilla.suse.com/1171217" }, { "category": "self", "summary": "SUSE Bug 1171218", "url": "https://bugzilla.suse.com/1171218" }, { "category": "self", "summary": "SUSE Bug 1171219", "url": "https://bugzilla.suse.com/1171219" }, { "category": "self", "summary": "SUSE Bug 1171220", "url": "https://bugzilla.suse.com/1171220" }, { "category": "self", "summary": "SUSE Bug 1171244", "url": "https://bugzilla.suse.com/1171244" }, { "category": "self", "summary": "SUSE Bug 1171293", "url": "https://bugzilla.suse.com/1171293" }, { "category": "self", "summary": "SUSE Bug 1171417", "url": "https://bugzilla.suse.com/1171417" }, { "category": "self", "summary": "SUSE Bug 1171424", "url": "https://bugzilla.suse.com/1171424" }, { "category": "self", "summary": "SUSE Bug 1171527", "url": "https://bugzilla.suse.com/1171527" }, { "category": "self", "summary": "SUSE Bug 1171529", "url": "https://bugzilla.suse.com/1171529" }, { "category": "self", "summary": "SUSE Bug 1171530", "url": "https://bugzilla.suse.com/1171530" }, { "category": "self", "summary": "SUSE Bug 1171558", "url": "https://bugzilla.suse.com/1171558" }, { "category": "self", "summary": "SUSE Bug 1171599", "url": "https://bugzilla.suse.com/1171599" }, { "category": "self", "summary": "SUSE Bug 1171600", "url": "https://bugzilla.suse.com/1171600" }, { "category": "self", "summary": "SUSE Bug 1171601", "url": "https://bugzilla.suse.com/1171601" }, { "category": "self", "summary": "SUSE Bug 1171602", "url": "https://bugzilla.suse.com/1171602" }, { "category": "self", "summary": "SUSE Bug 1171604", "url": "https://bugzilla.suse.com/1171604" }, { "category": "self", "summary": "SUSE Bug 1171605", "url": "https://bugzilla.suse.com/1171605" }, { "category": "self", "summary": "SUSE Bug 1171606", "url": "https://bugzilla.suse.com/1171606" }, { "category": "self", "summary": "SUSE Bug 1171607", "url": "https://bugzilla.suse.com/1171607" }, { "category": "self", "summary": "SUSE Bug 1171608", "url": "https://bugzilla.suse.com/1171608" }, { "category": "self", "summary": "SUSE Bug 1171609", "url": "https://bugzilla.suse.com/1171609" }, { "category": "self", "summary": "SUSE Bug 1171610", "url": "https://bugzilla.suse.com/1171610" }, { "category": "self", "summary": "SUSE Bug 1171611", "url": "https://bugzilla.suse.com/1171611" }, { "category": "self", "summary": "SUSE Bug 1171612", "url": "https://bugzilla.suse.com/1171612" }, { "category": "self", "summary": "SUSE Bug 1171613", "url": "https://bugzilla.suse.com/1171613" }, { "category": "self", "summary": "SUSE Bug 1171614", "url": "https://bugzilla.suse.com/1171614" }, { "category": "self", "summary": "SUSE Bug 1171615", "url": "https://bugzilla.suse.com/1171615" }, { "category": "self", "summary": "SUSE Bug 1171616", "url": "https://bugzilla.suse.com/1171616" }, { "category": "self", "summary": "SUSE Bug 1171617", "url": "https://bugzilla.suse.com/1171617" }, { "category": "self", "summary": "SUSE Bug 1171618", "url": "https://bugzilla.suse.com/1171618" }, { "category": "self", "summary": "SUSE Bug 1171619", "url": "https://bugzilla.suse.com/1171619" }, { "category": "self", "summary": "SUSE Bug 1171620", "url": "https://bugzilla.suse.com/1171620" }, { "category": "self", "summary": "SUSE Bug 1171621", "url": "https://bugzilla.suse.com/1171621" }, { "category": "self", "summary": "SUSE Bug 1171622", "url": "https://bugzilla.suse.com/1171622" }, { "category": "self", "summary": "SUSE Bug 1171623", "url": "https://bugzilla.suse.com/1171623" }, { "category": "self", "summary": "SUSE Bug 1171624", "url": "https://bugzilla.suse.com/1171624" }, { "category": "self", "summary": "SUSE Bug 1171625", "url": "https://bugzilla.suse.com/1171625" }, { "category": "self", "summary": "SUSE Bug 1171626", "url": "https://bugzilla.suse.com/1171626" }, { "category": "self", "summary": "SUSE Bug 1171662", "url": "https://bugzilla.suse.com/1171662" }, { "category": "self", "summary": "SUSE Bug 1171673", "url": "https://bugzilla.suse.com/1171673" }, { "category": "self", "summary": "SUSE Bug 1171679", "url": "https://bugzilla.suse.com/1171679" }, { "category": "self", "summary": "SUSE Bug 1171691", "url": "https://bugzilla.suse.com/1171691" }, { "category": "self", "summary": "SUSE Bug 1171692", "url": "https://bugzilla.suse.com/1171692" }, { "category": "self", "summary": "SUSE Bug 1171694", "url": "https://bugzilla.suse.com/1171694" }, { "category": "self", "summary": "SUSE Bug 1171695", "url": "https://bugzilla.suse.com/1171695" }, { "category": "self", "summary": "SUSE Bug 1171732", "url": "https://bugzilla.suse.com/1171732" }, { "category": "self", "summary": "SUSE Bug 1171736", "url": "https://bugzilla.suse.com/1171736" }, { "category": "self", "summary": "SUSE Bug 1171739", "url": "https://bugzilla.suse.com/1171739" }, { "category": "self", "summary": "SUSE Bug 1171743", "url": "https://bugzilla.suse.com/1171743" }, { "category": "self", "summary": "SUSE Bug 1171753", "url": "https://bugzilla.suse.com/1171753" }, { "category": "self", "summary": "SUSE Bug 1171759", "url": "https://bugzilla.suse.com/1171759" }, { "category": "self", "summary": "SUSE Bug 1171761", "url": "https://bugzilla.suse.com/1171761" }, { "category": "self", "summary": "SUSE Bug 1171817", "url": "https://bugzilla.suse.com/1171817" }, { "category": "self", "summary": "SUSE Bug 1171835", "url": "https://bugzilla.suse.com/1171835" }, { "category": "self", "summary": "SUSE Bug 1171841", "url": "https://bugzilla.suse.com/1171841" }, { "category": "self", "summary": "SUSE Bug 1171868", "url": "https://bugzilla.suse.com/1171868" }, { "category": "self", "summary": "SUSE Bug 1171904", "url": "https://bugzilla.suse.com/1171904" }, { "category": "self", "summary": "SUSE Bug 1171948", "url": "https://bugzilla.suse.com/1171948" }, { "category": "self", "summary": "SUSE Bug 1171949", "url": "https://bugzilla.suse.com/1171949" }, { "category": "self", "summary": "SUSE Bug 1171951", "url": "https://bugzilla.suse.com/1171951" }, { "category": "self", "summary": "SUSE Bug 1171952", "url": "https://bugzilla.suse.com/1171952" }, { "category": "self", "summary": "SUSE Bug 1171979", "url": "https://bugzilla.suse.com/1171979" }, { "category": "self", "summary": "SUSE Bug 1171982", "url": "https://bugzilla.suse.com/1171982" }, { "category": "self", "summary": "SUSE Bug 1171983", "url": "https://bugzilla.suse.com/1171983" }, { "category": "self", "summary": "SUSE Bug 1172017", "url": "https://bugzilla.suse.com/1172017" }, { "category": "self", "summary": "SUSE Bug 1172096", "url": "https://bugzilla.suse.com/1172096" }, { "category": "self", "summary": "SUSE Bug 1172097", "url": "https://bugzilla.suse.com/1172097" }, { "category": "self", "summary": "SUSE Bug 1172098", "url": "https://bugzilla.suse.com/1172098" }, { "category": "self", "summary": "SUSE Bug 1172099", "url": "https://bugzilla.suse.com/1172099" }, { "category": "self", "summary": "SUSE Bug 1172101", "url": "https://bugzilla.suse.com/1172101" }, { "category": "self", "summary": "SUSE Bug 1172102", "url": "https://bugzilla.suse.com/1172102" }, { "category": "self", "summary": "SUSE Bug 1172103", "url": "https://bugzilla.suse.com/1172103" }, { "category": "self", "summary": "SUSE Bug 1172104", "url": "https://bugzilla.suse.com/1172104" }, { "category": "self", "summary": "SUSE Bug 1172127", "url": "https://bugzilla.suse.com/1172127" }, { "category": "self", "summary": "SUSE Bug 1172130", "url": "https://bugzilla.suse.com/1172130" }, { "category": "self", "summary": "SUSE Bug 1172185", "url": "https://bugzilla.suse.com/1172185" }, { "category": "self", "summary": "SUSE Bug 1172188", "url": "https://bugzilla.suse.com/1172188" }, { "category": "self", "summary": "SUSE Bug 1172199", "url": "https://bugzilla.suse.com/1172199" }, { "category": "self", "summary": "SUSE Bug 1172201", "url": "https://bugzilla.suse.com/1172201" }, { "category": "self", "summary": "SUSE Bug 1172202", "url": "https://bugzilla.suse.com/1172202" }, { "category": "self", "summary": "SUSE Bug 1172218", "url": "https://bugzilla.suse.com/1172218" }, { "category": "self", "summary": "SUSE Bug 1172221", "url": "https://bugzilla.suse.com/1172221" }, { "category": "self", "summary": "SUSE Bug 1172247", "url": "https://bugzilla.suse.com/1172247" }, { "category": "self", "summary": "SUSE Bug 1172249", "url": "https://bugzilla.suse.com/1172249" }, { "category": "self", "summary": "SUSE Bug 1172251", "url": "https://bugzilla.suse.com/1172251" }, { "category": "self", "summary": "SUSE Bug 1172253", "url": "https://bugzilla.suse.com/1172253" }, { "category": "self", "summary": "SUSE Bug 1172257", "url": "https://bugzilla.suse.com/1172257" }, { "category": "self", "summary": "SUSE Bug 1172317", "url": "https://bugzilla.suse.com/1172317" }, { "category": "self", "summary": "SUSE Bug 1172342", "url": "https://bugzilla.suse.com/1172342" }, { "category": "self", "summary": "SUSE Bug 1172343", "url": "https://bugzilla.suse.com/1172343" }, { "category": "self", "summary": "SUSE Bug 1172344", "url": "https://bugzilla.suse.com/1172344" }, { "category": "self", "summary": "SUSE Bug 1172366", "url": "https://bugzilla.suse.com/1172366" }, { "category": "self", "summary": "SUSE Bug 1172378", "url": "https://bugzilla.suse.com/1172378" }, { "category": "self", "summary": "SUSE Bug 1172391", "url": "https://bugzilla.suse.com/1172391" }, { "category": "self", "summary": "SUSE Bug 1172397", "url": "https://bugzilla.suse.com/1172397" }, { "category": "self", "summary": "SUSE Bug 1172453", "url": "https://bugzilla.suse.com/1172453" }, { "category": "self", "summary": "SUSE Bug 1172458", "url": "https://bugzilla.suse.com/1172458" }, { "category": "self", "summary": "SUSE Bug 1172472", "url": "https://bugzilla.suse.com/1172472" }, { "category": "self", "summary": "SUSE Bug 1172484", "url": "https://bugzilla.suse.com/1172484" }, { "category": "self", "summary": "SUSE Bug 1172537", "url": "https://bugzilla.suse.com/1172537" }, { "category": "self", "summary": "SUSE Bug 1172538", "url": "https://bugzilla.suse.com/1172538" }, { "category": "self", "summary": "SUSE Bug 1172687", "url": "https://bugzilla.suse.com/1172687" }, { "category": "self", "summary": "SUSE Bug 1172719", "url": "https://bugzilla.suse.com/1172719" }, { "category": "self", "summary": "SUSE Bug 1172759", "url": "https://bugzilla.suse.com/1172759" }, { "category": "self", "summary": "SUSE Bug 1172770", "url": "https://bugzilla.suse.com/1172770" }, { "category": "self", "summary": "SUSE Bug 1172775", "url": "https://bugzilla.suse.com/1172775" }, { "category": "self", "summary": "SUSE Bug 1172781", "url": "https://bugzilla.suse.com/1172781" }, { "category": "self", "summary": "SUSE Bug 1172782", "url": "https://bugzilla.suse.com/1172782" }, { "category": "self", "summary": "SUSE Bug 1172783", "url": "https://bugzilla.suse.com/1172783" }, { "category": "self", "summary": "SUSE Bug 1172999", "url": "https://bugzilla.suse.com/1172999" }, { "category": "self", "summary": "SUSE Bug 1173060", "url": "https://bugzilla.suse.com/1173060" }, { "category": "self", "summary": "SUSE Bug 1173074", "url": "https://bugzilla.suse.com/1173074" }, { "category": "self", "summary": "SUSE Bug 1173146", "url": "https://bugzilla.suse.com/1173146" }, { "category": "self", "summary": "SUSE Bug 1173265", "url": "https://bugzilla.suse.com/1173265" }, { "category": "self", "summary": "SUSE Bug 1173280", "url": "https://bugzilla.suse.com/1173280" }, { "category": "self", "summary": "SUSE Bug 1173284", "url": "https://bugzilla.suse.com/1173284" }, { "category": "self", "summary": "SUSE Bug 1173428", "url": "https://bugzilla.suse.com/1173428" }, { "category": "self", "summary": "SUSE Bug 1173462", "url": "https://bugzilla.suse.com/1173462" }, { "category": "self", "summary": "SUSE Bug 1173514", "url": "https://bugzilla.suse.com/1173514" }, { "category": "self", "summary": "SUSE Bug 1173567", "url": "https://bugzilla.suse.com/1173567" }, { "category": "self", "summary": "SUSE Bug 1173573", "url": "https://bugzilla.suse.com/1173573" }, { "category": "self", "summary": "SUSE Bug 1173659", "url": "https://bugzilla.suse.com/1173659" }, { "category": "self", "summary": "SUSE Bug 1173746", "url": "https://bugzilla.suse.com/1173746" }, { "category": "self", "summary": "SUSE Bug 1173818", "url": "https://bugzilla.suse.com/1173818" }, { "category": "self", "summary": "SUSE Bug 1173820", "url": "https://bugzilla.suse.com/1173820" }, { "category": "self", "summary": "SUSE Bug 1173825", "url": "https://bugzilla.suse.com/1173825" }, { "category": "self", "summary": "SUSE Bug 1173826", "url": "https://bugzilla.suse.com/1173826" }, { "category": "self", "summary": "SUSE Bug 1173833", "url": "https://bugzilla.suse.com/1173833" }, { "category": "self", "summary": "SUSE Bug 1173838", "url": "https://bugzilla.suse.com/1173838" }, { "category": "self", "summary": "SUSE Bug 1173839", "url": "https://bugzilla.suse.com/1173839" }, { "category": "self", "summary": "SUSE Bug 1173845", "url": "https://bugzilla.suse.com/1173845" }, { "category": "self", "summary": "SUSE Bug 1173857", "url": "https://bugzilla.suse.com/1173857" }, { "category": "self", "summary": "SUSE Bug 1174113", "url": "https://bugzilla.suse.com/1174113" }, { "category": "self", "summary": "SUSE Bug 1174115", "url": "https://bugzilla.suse.com/1174115" }, { "category": "self", "summary": "SUSE Bug 1174122", "url": "https://bugzilla.suse.com/1174122" }, { "category": "self", "summary": "SUSE Bug 1174123", "url": "https://bugzilla.suse.com/1174123" }, { "category": "self", "summary": "SUSE Bug 1174130", "url": "https://bugzilla.suse.com/1174130" }, { "category": "self", "summary": "SUSE Bug 1174186", "url": "https://bugzilla.suse.com/1174186" }, { "category": "self", "summary": "SUSE Bug 1174187", "url": "https://bugzilla.suse.com/1174187" }, { "category": "self", "summary": "SUSE Bug 1174296", "url": "https://bugzilla.suse.com/1174296" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1000199 page", "url": "https://www.suse.com/security/cve/CVE-2018-1000199/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-16746 page", "url": "https://www.suse.com/security/cve/CVE-2019-16746/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-19462 page", "url": "https://www.suse.com/security/cve/CVE-2019-19462/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-20806 page", "url": "https://www.suse.com/security/cve/CVE-2019-20806/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-20810 page", "url": "https://www.suse.com/security/cve/CVE-2019-20810/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-20812 page", "url": "https://www.suse.com/security/cve/CVE-2019-20812/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-20908 page", "url": "https://www.suse.com/security/cve/CVE-2019-20908/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9455 page", "url": "https://www.suse.com/security/cve/CVE-2019-9455/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-0543 page", "url": "https://www.suse.com/security/cve/CVE-2020-0543/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10690 page", "url": "https://www.suse.com/security/cve/CVE-2020-10690/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10711 page", "url": "https://www.suse.com/security/cve/CVE-2020-10711/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10720 page", "url": "https://www.suse.com/security/cve/CVE-2020-10720/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10732 page", "url": "https://www.suse.com/security/cve/CVE-2020-10732/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10751 page", "url": "https://www.suse.com/security/cve/CVE-2020-10751/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10757 page", "url": "https://www.suse.com/security/cve/CVE-2020-10757/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10766 page", "url": "https://www.suse.com/security/cve/CVE-2020-10766/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10767 page", "url": "https://www.suse.com/security/cve/CVE-2020-10767/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10768 page", "url": "https://www.suse.com/security/cve/CVE-2020-10768/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10769 page", "url": "https://www.suse.com/security/cve/CVE-2020-10769/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10773 page", "url": "https://www.suse.com/security/cve/CVE-2020-10773/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10781 page", "url": "https://www.suse.com/security/cve/CVE-2020-10781/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-11669 page", "url": "https://www.suse.com/security/cve/CVE-2020-11669/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12114 page", "url": "https://www.suse.com/security/cve/CVE-2020-12114/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12464 page", "url": "https://www.suse.com/security/cve/CVE-2020-12464/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12652 page", "url": "https://www.suse.com/security/cve/CVE-2020-12652/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12653 page", "url": "https://www.suse.com/security/cve/CVE-2020-12653/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12654 page", "url": "https://www.suse.com/security/cve/CVE-2020-12654/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12655 page", "url": "https://www.suse.com/security/cve/CVE-2020-12655/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12656 page", "url": "https://www.suse.com/security/cve/CVE-2020-12656/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12657 page", "url": "https://www.suse.com/security/cve/CVE-2020-12657/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12659 page", "url": "https://www.suse.com/security/cve/CVE-2020-12659/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12769 page", "url": "https://www.suse.com/security/cve/CVE-2020-12769/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12771 page", "url": "https://www.suse.com/security/cve/CVE-2020-12771/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12888 page", "url": "https://www.suse.com/security/cve/CVE-2020-12888/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-13143 page", "url": "https://www.suse.com/security/cve/CVE-2020-13143/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-13974 page", "url": "https://www.suse.com/security/cve/CVE-2020-13974/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14416 page", "url": "https://www.suse.com/security/cve/CVE-2020-14416/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-15393 page", "url": "https://www.suse.com/security/cve/CVE-2020-15393/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-15780 page", "url": "https://www.suse.com/security/cve/CVE-2020-15780/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2020-09-03T10:12:56Z", "generator": { "date": "2020-09-03T10:12:56Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2020:2478-1", "initial_release_date": "2020-09-03T10:12:56Z", "revision_history": [ { "date": "2020-09-03T10:12:56Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-devel-rt-4.12.14-10.13.1.noarch", "product": { "name": "kernel-devel-rt-4.12.14-10.13.1.noarch", "product_id": "kernel-devel-rt-4.12.14-10.13.1.noarch" } }, { "category": "product_version", "name": "kernel-source-rt-4.12.14-10.13.1.noarch", "product": { "name": "kernel-source-rt-4.12.14-10.13.1.noarch", "product_id": "kernel-source-rt-4.12.14-10.13.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "product": { "name": "cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "product_id": "cluster-md-kmp-rt-4.12.14-10.13.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-rt-4.12.14-10.13.1.x86_64", "product": { "name": "dlm-kmp-rt-4.12.14-10.13.1.x86_64", "product_id": "dlm-kmp-rt-4.12.14-10.13.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "product": { "name": "gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "product_id": "gfs2-kmp-rt-4.12.14-10.13.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-4.12.14-10.13.1.x86_64", "product": { "name": "kernel-rt-4.12.14-10.13.1.x86_64", "product_id": "kernel-rt-4.12.14-10.13.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-base-4.12.14-10.13.1.x86_64", "product": { "name": "kernel-rt-base-4.12.14-10.13.1.x86_64", "product_id": "kernel-rt-base-4.12.14-10.13.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-devel-4.12.14-10.13.1.x86_64", "product": { "name": "kernel-rt-devel-4.12.14-10.13.1.x86_64", "product_id": "kernel-rt-devel-4.12.14-10.13.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_debug-4.12.14-10.13.1.x86_64", "product": { "name": "kernel-rt_debug-4.12.14-10.13.1.x86_64", "product_id": "kernel-rt_debug-4.12.14-10.13.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "product": { "name": "kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "product_id": "kernel-rt_debug-devel-4.12.14-10.13.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-rt-4.12.14-10.13.1.x86_64", "product": { "name": "kernel-syms-rt-4.12.14-10.13.1.x86_64", "product_id": "kernel-syms-rt-4.12.14-10.13.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-rt-4.12.14-10.13.1.x86_64", "product": { "name": "ocfs2-kmp-rt-4.12.14-10.13.1.x86_64", "product_id": "ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Real Time 12 SP5", "product": { "name": "SUSE Linux Enterprise Real Time 12 SP5", "product_id": "SUSE Linux Enterprise Real Time 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-linux-enterprise-rt:12:sp5" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-rt-4.12.14-10.13.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5", "product_id": "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64" }, "product_reference": "cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-rt-4.12.14-10.13.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5", "product_id": "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64" }, "product_reference": "dlm-kmp-rt-4.12.14-10.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-rt-4.12.14-10.13.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5", "product_id": "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64" }, "product_reference": "gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-rt-4.12.14-10.13.1.noarch as component of SUSE Linux Enterprise Real Time 12 SP5", "product_id": "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch" }, "product_reference": "kernel-devel-rt-4.12.14-10.13.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-4.12.14-10.13.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5", "product_id": "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64" }, "product_reference": "kernel-rt-4.12.14-10.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-base-4.12.14-10.13.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5", "product_id": "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64" }, "product_reference": "kernel-rt-base-4.12.14-10.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-4.12.14-10.13.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5", "product_id": "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64" }, "product_reference": "kernel-rt-devel-4.12.14-10.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt_debug-4.12.14-10.13.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5", "product_id": "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64" }, "product_reference": "kernel-rt_debug-4.12.14-10.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt_debug-devel-4.12.14-10.13.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5", "product_id": "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64" }, "product_reference": "kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-rt-4.12.14-10.13.1.noarch as component of SUSE Linux Enterprise Real Time 12 SP5", "product_id": "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch" }, "product_reference": "kernel-source-rt-4.12.14-10.13.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-rt-4.12.14-10.13.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5", "product_id": "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64" }, "product_reference": "kernel-syms-rt-4.12.14-10.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-rt-4.12.14-10.13.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5", "product_id": "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" }, "product_reference": "ocfs2-kmp-rt-4.12.14-10.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-1000199", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1000199" } ], "notes": [ { "category": "general", "text": "The Linux Kernel version 3.18 contains a dangerous feature vulnerability in modify_user_hw_breakpoint() that can result in crash and possibly memory corruption. This attack appear to be exploitable via local code execution and the ability to use ptrace. This vulnerability appears to have been fixed in git commit f67b15037a7a50c57f72e69a6d59941ad90a0f0f.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1000199", "url": "https://www.suse.com/security/cve/CVE-2018-1000199" }, { "category": "external", "summary": "SUSE Bug 1089895 for CVE-2018-1000199", "url": "https://bugzilla.suse.com/1089895" }, { "category": "external", "summary": "SUSE Bug 1090036 for CVE-2018-1000199", "url": "https://bugzilla.suse.com/1090036" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-03T10:12:56Z", "details": "important" } ], "title": "CVE-2018-1000199" }, { "cve": "CVE-2019-16746", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-16746" } ], "notes": [ { "category": "general", "text": "An issue was discovered in net/wireless/nl80211.c in the Linux kernel through 5.2.17. It does not check the length of variable elements in a beacon head, leading to a buffer overflow.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-16746", "url": "https://www.suse.com/security/cve/CVE-2019-16746" }, { "category": "external", "summary": "SUSE Bug 1152107 for CVE-2019-16746", "url": "https://bugzilla.suse.com/1152107" }, { "category": "external", "summary": "SUSE Bug 1173659 for CVE-2019-16746", "url": "https://bugzilla.suse.com/1173659" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-03T10:12:56Z", "details": "moderate" } ], "title": "CVE-2019-16746" }, { "cve": "CVE-2019-19462", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-19462" } ], "notes": [ { "category": "general", "text": "relay_open in kernel/relay.c in the Linux kernel through 5.4.1 allows local users to cause a denial of service (such as relay blockage) by triggering a NULL alloc_percpu result.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-19462", "url": "https://www.suse.com/security/cve/CVE-2019-19462" }, { "category": "external", "summary": "SUSE Bug 1158265 for CVE-2019-19462", "url": "https://bugzilla.suse.com/1158265" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-03T10:12:56Z", "details": "low" } ], "title": "CVE-2019-19462" }, { "cve": "CVE-2019-20806", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-20806" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.2. There is a NULL pointer dereference in tw5864_handle_frame() in drivers/media/pci/tw5864/tw5864-video.c, which may cause denial of service, aka CID-2e7682ebfc75.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-20806", "url": "https://www.suse.com/security/cve/CVE-2019-20806" }, { "category": "external", "summary": "SUSE Bug 1172199 for CVE-2019-20806", "url": "https://bugzilla.suse.com/1172199" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.9, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-03T10:12:56Z", "details": "low" } ], "title": "CVE-2019-20806" }, { "cve": "CVE-2019-20810", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-20810" } ], "notes": [ { "category": "general", "text": "go7007_snd_init in drivers/media/usb/go7007/snd-go7007.c in the Linux kernel before 5.6 does not call snd_card_free for a failure path, which causes a memory leak, aka CID-9453264ef586.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-20810", "url": "https://www.suse.com/security/cve/CVE-2019-20810" }, { "category": "external", "summary": "SUSE Bug 1172458 for CVE-2019-20810", "url": "https://bugzilla.suse.com/1172458" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-03T10:12:56Z", "details": "low" } ], "title": "CVE-2019-20810" }, { "cve": "CVE-2019-20812", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-20812" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.4.7. The prb_calc_retire_blk_tmo() function in net/packet/af_packet.c can result in a denial of service (CPU consumption and soft lockup) in a certain failure case involving TPACKET_V3, aka CID-b43d1f9f7067.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-20812", "url": "https://www.suse.com/security/cve/CVE-2019-20812" }, { "category": "external", "summary": "SUSE Bug 1172453 for CVE-2019-20812", "url": "https://bugzilla.suse.com/1172453" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-03T10:12:56Z", "details": "moderate" } ], "title": "CVE-2019-20812" }, { "cve": "CVE-2019-20908", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-20908" } ], "notes": [ { "category": "general", "text": "An issue was discovered in drivers/firmware/efi/efi.c in the Linux kernel before 5.4. Incorrect access permissions for the efivar_ssdt ACPI variable could be used by attackers to bypass lockdown or secure boot restrictions, aka CID-1957a85b0032.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-20908", "url": "https://www.suse.com/security/cve/CVE-2019-20908" }, { "category": "external", "summary": "SUSE Bug 1173567 for CVE-2019-20908", "url": "https://bugzilla.suse.com/1173567" }, { "category": "external", "summary": "SUSE Bug 1174187 for CVE-2019-20908", "url": "https://bugzilla.suse.com/1174187" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-03T10:12:56Z", "details": "important" } ], "title": "CVE-2019-20908" }, { "cve": "CVE-2019-9455", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9455" } ], "notes": [ { "category": "general", "text": "In the Android kernel in the video driver there is a kernel pointer leak due to a WARN_ON statement. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9455", "url": "https://www.suse.com/security/cve/CVE-2019-9455" }, { "category": "external", "summary": "SUSE Bug 1170345 for CVE-2019-9455", "url": "https://bugzilla.suse.com/1170345" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-03T10:12:56Z", "details": "moderate" } ], "title": "CVE-2019-9455" }, { "cve": "CVE-2020-0543", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-0543" } ], "notes": [ { "category": "general", "text": "Incomplete cleanup from specific special register read operations in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-0543", "url": "https://www.suse.com/security/cve/CVE-2020-0543" }, { "category": "external", "summary": "SUSE Bug 1154824 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1154824" }, { "category": "external", "summary": "SUSE Bug 1172205 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172205" }, { "category": "external", "summary": "SUSE Bug 1172206 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172206" }, { "category": "external", "summary": "SUSE Bug 1172207 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172207" }, { "category": "external", "summary": "SUSE Bug 1172770 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172770" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-03T10:12:56Z", "details": "moderate" } ], "title": "CVE-2020-0543" }, { "cve": "CVE-2020-10690", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10690" } ], "notes": [ { "category": "general", "text": "There is a use-after-free in kernel versions before 5.5 due to a race condition between the release of ptp_clock and cdev while resource deallocation. When a (high privileged) process allocates a ptp device file (like /dev/ptpX) and voluntarily goes to sleep. During this time if the underlying device is removed, it can cause an exploitable condition as the process wakes up to terminate and clean all attached files. The system crashes due to the cdev structure being invalid (as already freed) which is pointed to by the inode.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10690", "url": "https://www.suse.com/security/cve/CVE-2020-10690" }, { "category": "external", "summary": "SUSE Bug 1170056 for CVE-2020-10690", "url": "https://bugzilla.suse.com/1170056" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-03T10:12:56Z", "details": "moderate" } ], "title": "CVE-2020-10690" }, { "cve": "CVE-2020-10711", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10711" } ], "notes": [ { "category": "general", "text": "A NULL pointer dereference flaw was found in the Linux kernel\u0027s SELinux subsystem in versions before 5.7. This flaw occurs while importing the Commercial IP Security Option (CIPSO) protocol\u0027s category bitmap into the SELinux extensible bitmap via the\u0027 ebitmap_netlbl_import\u0027 routine. While processing the CIPSO restricted bitmap tag in the \u0027cipso_v4_parsetag_rbm\u0027 routine, it sets the security attribute to indicate that the category bitmap is present, even if it has not been allocated. This issue leads to a NULL pointer dereference issue while importing the same category bitmap into SELinux. This flaw allows a remote network user to crash the system kernel, resulting in a denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10711", "url": "https://www.suse.com/security/cve/CVE-2020-10711" }, { "category": "external", "summary": "SUSE Bug 1171191 for CVE-2020-10711", "url": "https://bugzilla.suse.com/1171191" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-03T10:12:56Z", "details": "moderate" } ], "title": "CVE-2020-10711" }, { "cve": "CVE-2020-10720", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10720" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s implementation of GRO in versions before 5.2. This flaw allows an attacker with local access to crash the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10720", "url": "https://www.suse.com/security/cve/CVE-2020-10720" }, { "category": "external", "summary": "SUSE Bug 1170778 for CVE-2020-10720", "url": "https://bugzilla.suse.com/1170778" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-03T10:12:56Z", "details": "moderate" } ], "title": "CVE-2020-10720" }, { "cve": "CVE-2020-10732", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10732" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s implementation of Userspace core dumps. This flaw allows an attacker with a local account to crash a trivial program and exfiltrate private kernel data.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10732", "url": "https://www.suse.com/security/cve/CVE-2020-10732" }, { "category": "external", "summary": "SUSE Bug 1171220 for CVE-2020-10732", "url": "https://bugzilla.suse.com/1171220" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-03T10:12:56Z", "details": "low" } ], "title": "CVE-2020-10732" }, { "cve": "CVE-2020-10751", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10751" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernels SELinux LSM hook implementation before version 5.7, where it incorrectly assumed that an skb would only contain a single netlink message. The hook would incorrectly only validate the first netlink message in the skb and allow or deny the rest of the messages within the skb with the granted permission without further processing.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10751", "url": "https://www.suse.com/security/cve/CVE-2020-10751" }, { "category": "external", "summary": "SUSE Bug 1171189 for CVE-2020-10751", "url": "https://bugzilla.suse.com/1171189" }, { "category": "external", "summary": "SUSE Bug 1174963 for CVE-2020-10751", "url": "https://bugzilla.suse.com/1174963" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-03T10:12:56Z", "details": "moderate" } ], "title": "CVE-2020-10751" }, { "cve": "CVE-2020-10757", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10757" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux Kernel in versions after 4.5-rc1 in the way mremap handled DAX Huge Pages. This flaw allows a local attacker with access to a DAX enabled storage to escalate their privileges on the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10757", "url": "https://www.suse.com/security/cve/CVE-2020-10757" }, { "category": "external", "summary": "SUSE Bug 1159281 for CVE-2020-10757", "url": "https://bugzilla.suse.com/1159281" }, { "category": "external", "summary": "SUSE Bug 1172317 for CVE-2020-10757", "url": "https://bugzilla.suse.com/1172317" }, { "category": "external", "summary": "SUSE Bug 1172437 for CVE-2020-10757", "url": "https://bugzilla.suse.com/1172437" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-03T10:12:56Z", "details": "important" } ], "title": "CVE-2020-10757" }, { "cve": "CVE-2020-10766", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10766" } ], "notes": [ { "category": "general", "text": "A logic bug flaw was found in Linux kernel before 5.8-rc1 in the implementation of SSBD. A bug in the logic handling allows an attacker with a local account to disable SSBD protection during a context switch when additional speculative execution mitigations are in place. This issue was introduced when the per task/process conditional STIPB switching was added on top of the existing SSBD switching. The highest threat from this vulnerability is to confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10766", "url": "https://www.suse.com/security/cve/CVE-2020-10766" }, { "category": "external", "summary": "SUSE Bug 1159281 for CVE-2020-10766", "url": "https://bugzilla.suse.com/1159281" }, { "category": "external", "summary": "SUSE Bug 1172781 for CVE-2020-10766", "url": "https://bugzilla.suse.com/1172781" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-03T10:12:56Z", "details": "moderate" } ], "title": "CVE-2020-10766" }, { "cve": "CVE-2020-10767", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10767" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel before 5.8-rc1 in the implementation of the Enhanced IBPB (Indirect Branch Prediction Barrier). The IBPB mitigation will be disabled when STIBP is not available or when the Enhanced Indirect Branch Restricted Speculation (IBRS) is available. This flaw allows a local attacker to perform a Spectre V2 style attack when this configuration is active. The highest threat from this vulnerability is to confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10767", "url": "https://www.suse.com/security/cve/CVE-2020-10767" }, { "category": "external", "summary": "SUSE Bug 1159281 for CVE-2020-10767", "url": "https://bugzilla.suse.com/1159281" }, { "category": "external", "summary": "SUSE Bug 1172782 for CVE-2020-10767", "url": "https://bugzilla.suse.com/1172782" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-03T10:12:56Z", "details": "moderate" } ], "title": "CVE-2020-10767" }, { "cve": "CVE-2020-10768", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10768" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux Kernel before 5.8-rc1 in the prctl() function, where it can be used to enable indirect branch speculation after it has been disabled. This call incorrectly reports it as being \u0027force disabled\u0027 when it is not and opens the system to Spectre v2 attacks. The highest threat from this vulnerability is to confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10768", "url": "https://www.suse.com/security/cve/CVE-2020-10768" }, { "category": "external", "summary": "SUSE Bug 1159281 for CVE-2020-10768", "url": "https://bugzilla.suse.com/1159281" }, { "category": "external", "summary": "SUSE Bug 1172783 for CVE-2020-10768", "url": "https://bugzilla.suse.com/1172783" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-03T10:12:56Z", "details": "moderate" } ], "title": "CVE-2020-10768" }, { "cve": "CVE-2020-10769", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10769" } ], "notes": [ { "category": "general", "text": "A buffer over-read flaw was found in RH kernel versions before 5.0 in crypto_authenc_extractkeys in crypto/authenc.c in the IPsec Cryptographic algorithm\u0027s module, authenc. When a payload longer than 4 bytes, and is not following 4-byte alignment boundary guidelines, it causes a buffer over-read threat, leading to a system crash. This flaw allows a local attacker with user privileges to cause a denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10769", "url": "https://www.suse.com/security/cve/CVE-2020-10769" }, { "category": "external", "summary": "SUSE Bug 1173265 for CVE-2020-10769", "url": "https://bugzilla.suse.com/1173265" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-03T10:12:56Z", "details": "moderate" } ], "title": "CVE-2020-10769" }, { "cve": "CVE-2020-10773", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10773" } ], "notes": [ { "category": "general", "text": "A stack information leak flaw was found in s390/s390x in the Linux kernel\u0027s memory manager functionality, where it incorrectly writes to the /proc/sys/vm/cmm_timeout file. This flaw allows a local user to see the kernel data.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10773", "url": "https://www.suse.com/security/cve/CVE-2020-10773" }, { "category": "external", "summary": "SUSE Bug 1172999 for CVE-2020-10773", "url": "https://bugzilla.suse.com/1172999" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.5, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-03T10:12:56Z", "details": "low" } ], "title": "CVE-2020-10773" }, { "cve": "CVE-2020-10781", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10781" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux Kernel before 5.8-rc6 in the ZRAM kernel module, where a user with a local account and the ability to read the /sys/class/zram-control/hot_add file can create ZRAM device nodes in the /dev/ directory. This read allocates kernel memory and is not accounted for a user that triggers the creation of that ZRAM device. With this vulnerability, continually reading the device may consume a large amount of system memory and cause the Out-of-Memory (OOM) killer to activate and terminate random userspace processes, possibly making the system inoperable.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10781", "url": "https://www.suse.com/security/cve/CVE-2020-10781" }, { "category": "external", "summary": "SUSE Bug 1173074 for CVE-2020-10781", "url": "https://bugzilla.suse.com/1173074" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-03T10:12:56Z", "details": "moderate" } ], "title": "CVE-2020-10781" }, { "cve": "CVE-2020-11669", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-11669" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.2 on the powerpc platform. arch/powerpc/kernel/idle_book3s.S does not have save/restore functionality for PNV_POWERSAVE_AMR, PNV_POWERSAVE_UAMOR, and PNV_POWERSAVE_AMOR, aka CID-53a712bae5dd.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-11669", "url": "https://www.suse.com/security/cve/CVE-2020-11669" }, { "category": "external", "summary": "SUSE Bug 1169390 for CVE-2020-11669", "url": "https://bugzilla.suse.com/1169390" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-03T10:12:56Z", "details": "moderate" } ], "title": "CVE-2020-11669" }, { "cve": "CVE-2020-12114", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12114" } ], "notes": [ { "category": "general", "text": "A pivot_root race condition in fs/namespace.c in the Linux kernel 4.4.x before 4.4.221, 4.9.x before 4.9.221, 4.14.x before 4.14.178, 4.19.x before 4.19.119, and 5.x before 5.3 allows local users to cause a denial of service (panic) by corrupting a mountpoint reference counter.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12114", "url": "https://www.suse.com/security/cve/CVE-2020-12114" }, { "category": "external", "summary": "SUSE Bug 1171098 for CVE-2020-12114", "url": "https://bugzilla.suse.com/1171098" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-03T10:12:56Z", "details": "moderate" } ], "title": "CVE-2020-12114" }, { "cve": "CVE-2020-12464", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12464" } ], "notes": [ { "category": "general", "text": "usb_sg_cancel in drivers/usb/core/message.c in the Linux kernel before 5.6.8 has a use-after-free because a transfer occurs without a reference, aka CID-056ad39ee925.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12464", "url": "https://www.suse.com/security/cve/CVE-2020-12464" }, { "category": "external", "summary": "SUSE Bug 1170901 for CVE-2020-12464", "url": "https://bugzilla.suse.com/1170901" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 1.8, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-03T10:12:56Z", "details": "low" } ], "title": "CVE-2020-12464" }, { "cve": "CVE-2020-12652", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12652" } ], "notes": [ { "category": "general", "text": "The __mptctl_ioctl function in drivers/message/fusion/mptctl.c in the Linux kernel before 5.4.14 allows local users to hold an incorrect lock during the ioctl operation and trigger a race condition, i.e., a \"double fetch\" vulnerability, aka CID-28d76df18f0a. NOTE: the vendor states \"The security impact of this bug is not as bad as it could have been because these operations are all privileged and root already has enormous destructive power.\"", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12652", "url": "https://www.suse.com/security/cve/CVE-2020-12652" }, { "category": "external", "summary": "SUSE Bug 1171218 for CVE-2020-12652", "url": "https://bugzilla.suse.com/1171218" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-03T10:12:56Z", "details": "moderate" } ], "title": "CVE-2020-12652" }, { "cve": "CVE-2020-12653", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12653" } ], "notes": [ { "category": "general", "text": "An issue was found in Linux kernel before 5.5.4. The mwifiex_cmd_append_vsie_tlv() function in drivers/net/wireless/marvell/mwifiex/scan.c allows local users to gain privileges or cause a denial of service because of an incorrect memcpy and buffer overflow, aka CID-b70261a288ea.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12653", "url": "https://www.suse.com/security/cve/CVE-2020-12653" }, { "category": "external", "summary": "SUSE Bug 1159281 for CVE-2020-12653", "url": "https://bugzilla.suse.com/1159281" }, { "category": "external", "summary": "SUSE Bug 1171195 for CVE-2020-12653", "url": "https://bugzilla.suse.com/1171195" }, { "category": "external", "summary": "SUSE Bug 1171254 for CVE-2020-12653", "url": "https://bugzilla.suse.com/1171254" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-03T10:12:56Z", "details": "important" } ], "title": "CVE-2020-12653" }, { "cve": "CVE-2020-12654", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12654" } ], "notes": [ { "category": "general", "text": "An issue was found in Linux kernel before 5.5.4. mwifiex_ret_wmm_get_status() in drivers/net/wireless/marvell/mwifiex/wmm.c allows a remote AP to trigger a heap-based buffer overflow because of an incorrect memcpy, aka CID-3a9b153c5591.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12654", "url": "https://www.suse.com/security/cve/CVE-2020-12654" }, { "category": "external", "summary": "SUSE Bug 1159281 for CVE-2020-12654", "url": "https://bugzilla.suse.com/1159281" }, { "category": "external", "summary": "SUSE Bug 1171202 for CVE-2020-12654", "url": "https://bugzilla.suse.com/1171202" }, { "category": "external", "summary": "SUSE Bug 1171252 for CVE-2020-12654", "url": "https://bugzilla.suse.com/1171252" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-03T10:12:56Z", "details": "important" } ], "title": "CVE-2020-12654" }, { "cve": "CVE-2020-12655", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12655" } ], "notes": [ { "category": "general", "text": "An issue was discovered in xfs_agf_verify in fs/xfs/libxfs/xfs_alloc.c in the Linux kernel through 5.6.10. Attackers may trigger a sync of excessive duration via an XFS v5 image with crafted metadata, aka CID-d0c7feaf8767.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12655", "url": "https://www.suse.com/security/cve/CVE-2020-12655" }, { "category": "external", "summary": "SUSE Bug 1171217 for CVE-2020-12655", "url": "https://bugzilla.suse.com/1171217" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.8, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-03T10:12:56Z", "details": "moderate" } ], "title": "CVE-2020-12655" }, { "cve": "CVE-2020-12656", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12656" } ], "notes": [ { "category": "general", "text": "gss_mech_free in net/sunrpc/auth_gss/gss_mech_switch.c in the rpcsec_gss_krb5 implementation in the Linux kernel through 5.6.10 lacks certain domain_release calls, leading to a memory leak. Note: This was disputed with the assertion that the issue does not grant any access not already available. It is a problem that on unloading a specific kernel module some memory is leaked, but loading kernel modules is a privileged operation. A user could also write a kernel module to consume any amount of memory they like and load that replicating the effect of this bug", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12656", "url": "https://www.suse.com/security/cve/CVE-2020-12656" }, { "category": "external", "summary": "SUSE Bug 1171219 for CVE-2020-12656", "url": "https://bugzilla.suse.com/1171219" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.9, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-03T10:12:56Z", "details": "low" } ], "title": "CVE-2020-12656" }, { "cve": "CVE-2020-12657", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12657" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.6.5. There is a use-after-free in block/bfq-iosched.c related to bfq_idle_slice_timer_body.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12657", "url": "https://www.suse.com/security/cve/CVE-2020-12657" }, { "category": "external", "summary": "SUSE Bug 1171205 for CVE-2020-12657", "url": "https://bugzilla.suse.com/1171205" }, { "category": "external", "summary": "SUSE Bug 1201585 for CVE-2020-12657", "url": "https://bugzilla.suse.com/1201585" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-03T10:12:56Z", "details": "important" } ], "title": "CVE-2020-12657" }, { "cve": "CVE-2020-12659", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12659" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.6.7. xdp_umem_reg in net/xdp/xdp_umem.c has an out-of-bounds write (by a user with the CAP_NET_ADMIN capability) because of a lack of headroom validation.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12659", "url": "https://www.suse.com/security/cve/CVE-2020-12659" }, { "category": "external", "summary": "SUSE Bug 1171214 for CVE-2020-12659", "url": "https://bugzilla.suse.com/1171214" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-03T10:12:56Z", "details": "moderate" } ], "title": "CVE-2020-12659" }, { "cve": "CVE-2020-12769", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12769" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.4.17. drivers/spi/spi-dw.c allows attackers to cause a panic via concurrent calls to dw_spi_irq and dw_spi_transfer_one, aka CID-19b61392c5a8.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12769", "url": "https://www.suse.com/security/cve/CVE-2020-12769" }, { "category": "external", "summary": "SUSE Bug 1171983 for CVE-2020-12769", "url": "https://bugzilla.suse.com/1171983" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-03T10:12:56Z", "details": "moderate" } ], "title": "CVE-2020-12769" }, { "cve": "CVE-2020-12771", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12771" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel through 5.6.11. btree_gc_coalesce in drivers/md/bcache/btree.c has a deadlock if a coalescing operation fails.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12771", "url": "https://www.suse.com/security/cve/CVE-2020-12771" }, { "category": "external", "summary": "SUSE Bug 1171732 for CVE-2020-12771", "url": "https://bugzilla.suse.com/1171732" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-03T10:12:56Z", "details": "moderate" } ], "title": "CVE-2020-12771" }, { "cve": "CVE-2020-12888", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12888" } ], "notes": [ { "category": "general", "text": "The VFIO PCI driver in the Linux kernel through 5.6.13 mishandles attempts to access disabled memory space.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12888", "url": "https://www.suse.com/security/cve/CVE-2020-12888" }, { "category": "external", "summary": "SUSE Bug 1159281 for CVE-2020-12888", "url": "https://bugzilla.suse.com/1159281" }, { "category": "external", "summary": "SUSE Bug 1171868 for CVE-2020-12888", "url": "https://bugzilla.suse.com/1171868" }, { "category": "external", "summary": "SUSE Bug 1176979 for CVE-2020-12888", "url": "https://bugzilla.suse.com/1176979" }, { "category": "external", "summary": "SUSE Bug 1179612 for CVE-2020-12888", "url": "https://bugzilla.suse.com/1179612" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-03T10:12:56Z", "details": "moderate" } ], "title": "CVE-2020-12888" }, { "cve": "CVE-2020-13143", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-13143" } ], "notes": [ { "category": "general", "text": "gadget_dev_desc_UDC_store in drivers/usb/gadget/configfs.c in the Linux kernel 3.16 through 5.6.13 relies on kstrdup without considering the possibility of an internal \u0027\\0\u0027 value, which allows attackers to trigger an out-of-bounds read, aka CID-15753588bcd4.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-13143", "url": "https://www.suse.com/security/cve/CVE-2020-13143" }, { "category": "external", "summary": "SUSE Bug 1171982 for CVE-2020-13143", "url": "https://bugzilla.suse.com/1171982" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-03T10:12:56Z", "details": "moderate" } ], "title": "CVE-2020-13143" }, { "cve": "CVE-2020-13974", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-13974" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel 4.4 through 5.7.1. drivers/tty/vt/keyboard.c has an integer overflow if k_ascii is called several times in a row, aka CID-b86dab054059. NOTE: Members in the community argue that the integer overflow does not lead to a security issue in this case.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-13974", "url": "https://www.suse.com/security/cve/CVE-2020-13974" }, { "category": "external", "summary": "SUSE Bug 1172775 for CVE-2020-13974", "url": "https://bugzilla.suse.com/1172775" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-03T10:12:56Z", "details": "moderate" } ], "title": "CVE-2020-13974" }, { "cve": "CVE-2020-14416", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14416" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 5.4.16, a race condition in tty-\u003edisc_data handling in the slip and slcan line discipline could lead to a use-after-free, aka CID-0ace17d56824. This affects drivers/net/slip/slip.c and drivers/net/can/slcan.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14416", "url": "https://www.suse.com/security/cve/CVE-2020-14416" }, { "category": "external", "summary": "SUSE Bug 1162002 for CVE-2020-14416", "url": "https://bugzilla.suse.com/1162002" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-03T10:12:56Z", "details": "moderate" } ], "title": "CVE-2020-14416" }, { "cve": "CVE-2020-15393", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-15393" } ], "notes": [ { "category": "general", "text": "In the Linux kernel 4.4 through 5.7.6, usbtest_disconnect in drivers/usb/misc/usbtest.c has a memory leak, aka CID-28ebeb8db770.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-15393", "url": "https://www.suse.com/security/cve/CVE-2020-15393" }, { "category": "external", "summary": "SUSE Bug 1173514 for CVE-2020-15393", "url": "https://bugzilla.suse.com/1173514" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-03T10:12:56Z", "details": "moderate" } ], "title": "CVE-2020-15393" }, { "cve": "CVE-2020-15780", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-15780" } ], "notes": [ { "category": "general", "text": "An issue was discovered in drivers/acpi/acpi_configfs.c in the Linux kernel before 5.7.7. Injection of malicious ACPI tables via configfs could be used by attackers to bypass lockdown and secure boot restrictions, aka CID-75b0cea7bf30.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-15780", "url": "https://www.suse.com/security/cve/CVE-2020-15780" }, { "category": "external", "summary": "SUSE Bug 1173573 for CVE-2020-15780", "url": "https://bugzilla.suse.com/1173573" }, { "category": "external", "summary": "SUSE Bug 1174186 for CVE-2020-15780", "url": "https://bugzilla.suse.com/1174186" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-03T10:12:56Z", "details": "important" } ], "title": "CVE-2020-15780" } ] }
suse-su-2020:1589-1
Vulnerability from csaf_suse
Published
2020-06-10 06:29
Modified
2020-06-10 06:29
Summary
Security update for ucode-intel
Notes
Title of the patch
Security update for ucode-intel
Description of the patch
This update for ucode-intel fixes the following issues:
Updated Intel CPU Microcode to 20200602 (prerelease) (bsc#1172466)
This update contains security mitigations for:
- CVE-2020-0543: Fixed a side channel attack against special registers
which could have resulted in leaking of read values to cores other
than the one which called it. This attack is known as Special Register
Buffer Data Sampling (SRBDS) or 'CrossTalk' (bsc#1154824).
- CVE-2020-0548,CVE-2020-0549: Additional ucode updates were supplied to
mitigate the Vector Register and L1D Eviction Sampling aka 'CacheOutAttack'
attacks. (bsc#1156353)
Microcode Table:
Processor Identifier Version Products
Model Stepping F-MO-S/PI Old->New
---- new platforms ----------------------------------------
---- updated platforms ------------------------------------
HSW C0 6-3c-3/32 00000027->00000028 Core Gen4
BDW-U/Y E0/F0 6-3d-4/c0 0000002e->0000002f Core Gen5
HSW-U C0/D0 6-45-1/72 00000025->00000026 Core Gen4
HSW-H C0 6-46-1/32 0000001b->0000001c Core Gen4
BDW-H/E3 E0/G0 6-47-1/22 00000021->00000022 Core Gen5
SKL-U/Y D0 6-4e-3/c0 000000d6->000000dc Core Gen6 Mobile
SKL-U23e K1 6-4e-3/c0 000000d6->000000dc Core Gen6 Mobile
SKX-SP B1 6-55-3/97 01000151->01000157 Xeon Scalable
SKX-SP H0/M0/U0 6-55-4/b7 02000065->02006906 Xeon Scalable
SKX-D M1 6-55-4/b7 02000065->02006906 Xeon D-21xx
CLX-SP B0 6-55-6/bf 0400002c->04002f01 Xeon Scalable Gen2
CLX-SP B1 6-55-7/bf 0500002c->04002f01 Xeon Scalable Gen2
SKL-H/S R0/N0 6-5e-3/36 000000d6->000000dc Core Gen6; Xeon E3 v5
AML-Y22 H0 6-8e-9/10 000000ca->000000d6 Core Gen8 Mobile
KBL-U/Y H0 6-8e-9/c0 000000ca->000000d6 Core Gen7 Mobile
CFL-U43e D0 6-8e-a/c0 000000ca->000000d6 Core Gen8 Mobile
WHL-U W0 6-8e-b/d0 000000ca->000000d6 Core Gen8 Mobile
AML-Y42 V0 6-8e-c/94 000000ca->000000d6 Core Gen10 Mobile
CML-Y42 V0 6-8e-c/94 000000ca->000000d6 Core Gen10 Mobile
WHL-U V0 6-8e-c/94 000000ca->000000d6 Core Gen8 Mobile
KBL-G/H/S/E3 B0 6-9e-9/2a 000000ca->000000d6 Core Gen7; Xeon E3 v6
CFL-H/S/E3 U0 6-9e-a/22 000000ca->000000d6 Core Gen8 Desktop, Mobile, Xeon E
CFL-S B0 6-9e-b/02 000000ca->000000d6 Core Gen8
CFL-H/S P0 6-9e-c/22 000000ca->000000d6 Core Gen9
CFL-H R0 6-9e-d/22 000000ca->000000d6 Core Gen9 Mobile
Also contains the Intel CPU Microcode update to 20200520:
Processor Identifier Version Products
Model Stepping F-MO-S/PI Old->New
---- new platforms ----------------------------------------
---- updated platforms ------------------------------------
SNB-E/EN/EP C1/M0 6-2d-6/6d 0000061f->00000621 Xeon E3/E5, Core X
SNB-E/EN/EP C2/M1 6-2d-7/6d 00000718->0000071a Xeon E3/E5, Core X
Patchnames
SUSE-2020-1589,SUSE-SLE-Module-Basesystem-15-SP1-2020-1589
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for ucode-intel", "title": "Title of the patch" }, { "category": "description", "text": "This update for ucode-intel fixes the following issues:\n\nUpdated Intel CPU Microcode to 20200602 (prerelease) (bsc#1172466)\n \nThis update contains security mitigations for:\n\n- CVE-2020-0543: Fixed a side channel attack against special registers\n which could have resulted in leaking of read values to cores other\n than the one which called it. This attack is known as Special Register\n Buffer Data Sampling (SRBDS) or \u0027CrossTalk\u0027 (bsc#1154824).\n- CVE-2020-0548,CVE-2020-0549: Additional ucode updates were supplied to\n mitigate the Vector Register and L1D Eviction Sampling aka \u0027CacheOutAttack\u0027\n attacks. (bsc#1156353)\n\nMicrocode Table:\n\n Processor Identifier Version Products\n Model Stepping F-MO-S/PI Old-\u003eNew\n ---- new platforms ----------------------------------------\n ---- updated platforms ------------------------------------\n HSW C0 6-3c-3/32 00000027-\u003e00000028 Core Gen4\n BDW-U/Y E0/F0 6-3d-4/c0 0000002e-\u003e0000002f Core Gen5\n HSW-U C0/D0 6-45-1/72 00000025-\u003e00000026 Core Gen4\n HSW-H C0 6-46-1/32 0000001b-\u003e0000001c Core Gen4\n BDW-H/E3 E0/G0 6-47-1/22 00000021-\u003e00000022 Core Gen5\n SKL-U/Y D0 6-4e-3/c0 000000d6-\u003e000000dc Core Gen6 Mobile\n SKL-U23e K1 6-4e-3/c0 000000d6-\u003e000000dc Core Gen6 Mobile\n SKX-SP B1 6-55-3/97 01000151-\u003e01000157 Xeon Scalable\n SKX-SP H0/M0/U0 6-55-4/b7 02000065-\u003e02006906 Xeon Scalable\n SKX-D M1 6-55-4/b7 02000065-\u003e02006906 Xeon D-21xx\n CLX-SP B0 6-55-6/bf 0400002c-\u003e04002f01 Xeon Scalable Gen2\n CLX-SP B1 6-55-7/bf 0500002c-\u003e04002f01 Xeon Scalable Gen2\n SKL-H/S R0/N0 6-5e-3/36 000000d6-\u003e000000dc Core Gen6; Xeon E3 v5\n AML-Y22 H0 6-8e-9/10 000000ca-\u003e000000d6 Core Gen8 Mobile\n KBL-U/Y H0 6-8e-9/c0 000000ca-\u003e000000d6 Core Gen7 Mobile\n CFL-U43e D0 6-8e-a/c0 000000ca-\u003e000000d6 Core Gen8 Mobile\n WHL-U W0 6-8e-b/d0 000000ca-\u003e000000d6 Core Gen8 Mobile\n AML-Y42 V0 6-8e-c/94 000000ca-\u003e000000d6 Core Gen10 Mobile\n CML-Y42 V0 6-8e-c/94 000000ca-\u003e000000d6 Core Gen10 Mobile\n WHL-U V0 6-8e-c/94 000000ca-\u003e000000d6 Core Gen8 Mobile\n KBL-G/H/S/E3 B0 6-9e-9/2a 000000ca-\u003e000000d6 Core Gen7; Xeon E3 v6\n CFL-H/S/E3 U0 6-9e-a/22 000000ca-\u003e000000d6 Core Gen8 Desktop, Mobile, Xeon E\n CFL-S B0 6-9e-b/02 000000ca-\u003e000000d6 Core Gen8\n CFL-H/S P0 6-9e-c/22 000000ca-\u003e000000d6 Core Gen9\n CFL-H R0 6-9e-d/22 000000ca-\u003e000000d6 Core Gen9 Mobile\n\nAlso contains the Intel CPU Microcode update to 20200520:\n\n Processor Identifier Version Products\n Model Stepping F-MO-S/PI Old-\u003eNew\n ---- new platforms ----------------------------------------\n ---- updated platforms ------------------------------------\n SNB-E/EN/EP C1/M0 6-2d-6/6d 0000061f-\u003e00000621 Xeon E3/E5, Core X\n SNB-E/EN/EP C2/M1 6-2d-7/6d 00000718-\u003e0000071a Xeon E3/E5, Core X\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2020-1589,SUSE-SLE-Module-Basesystem-15-SP1-2020-1589", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2020_1589-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2020:1589-1", "url": "https://www.suse.com/support/update/announcement/2020/suse-su-20201589-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2020:1589-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-June/006917.html" }, { "category": "self", "summary": "SUSE Bug 1154824", "url": "https://bugzilla.suse.com/1154824" }, { "category": "self", "summary": "SUSE Bug 1156353", "url": "https://bugzilla.suse.com/1156353" }, { "category": "self", "summary": "SUSE Bug 1172466", "url": "https://bugzilla.suse.com/1172466" }, { "category": "self", "summary": "SUSE CVE CVE-2020-0543 page", "url": "https://www.suse.com/security/cve/CVE-2020-0543/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-0548 page", "url": "https://www.suse.com/security/cve/CVE-2020-0548/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-0549 page", "url": "https://www.suse.com/security/cve/CVE-2020-0549/" } ], "title": "Security update for ucode-intel", "tracking": { "current_release_date": "2020-06-10T06:29:39Z", "generator": { "date": "2020-06-10T06:29:39Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2020:1589-1", "initial_release_date": "2020-06-10T06:29:39Z", "revision_history": [ { "date": "2020-06-10T06:29:39Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "ucode-intel-20200602-3.25.1.i586", "product": { "name": "ucode-intel-20200602-3.25.1.i586", "product_id": "ucode-intel-20200602-3.25.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "ucode-intel-20200602-3.25.1.x86_64", "product": { "name": "ucode-intel-20200602-3.25.1.x86_64", "product_id": "ucode-intel-20200602-3.25.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Module for Basesystem 15 SP1", "product": { "name": "SUSE Linux Enterprise Module for Basesystem 15 SP1", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-basesystem:15:sp1" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "ucode-intel-20200602-3.25.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:ucode-intel-20200602-3.25.1.x86_64" }, "product_reference": "ucode-intel-20200602-3.25.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-0543", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-0543" } ], "notes": [ { "category": "general", "text": "Incomplete cleanup from specific special register read operations in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:ucode-intel-20200602-3.25.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-0543", "url": "https://www.suse.com/security/cve/CVE-2020-0543" }, { "category": "external", "summary": "SUSE Bug 1154824 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1154824" }, { "category": "external", "summary": "SUSE Bug 1172205 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172205" }, { "category": "external", "summary": "SUSE Bug 1172206 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172206" }, { "category": "external", "summary": "SUSE Bug 1172207 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172207" }, { "category": "external", "summary": "SUSE Bug 1172770 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172770" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:ucode-intel-20200602-3.25.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:ucode-intel-20200602-3.25.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-10T06:29:39Z", "details": "moderate" } ], "title": "CVE-2020-0543" }, { "cve": "CVE-2020-0548", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-0548" } ], "notes": [ { "category": "general", "text": "Cleanup errors in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:ucode-intel-20200602-3.25.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-0548", "url": "https://www.suse.com/security/cve/CVE-2020-0548" }, { "category": "external", "summary": "SUSE Bug 1156353 for CVE-2020-0548", "url": "https://bugzilla.suse.com/1156353" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:ucode-intel-20200602-3.25.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.8, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:ucode-intel-20200602-3.25.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-10T06:29:39Z", "details": "moderate" } ], "title": "CVE-2020-0548" }, { "cve": "CVE-2020-0549", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-0549" } ], "notes": [ { "category": "general", "text": "Cleanup errors in some data cache evictions for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:ucode-intel-20200602-3.25.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-0549", "url": "https://www.suse.com/security/cve/CVE-2020-0549" }, { "category": "external", "summary": "SUSE Bug 1156353 for CVE-2020-0549", "url": "https://bugzilla.suse.com/1156353" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:ucode-intel-20200602-3.25.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:ucode-intel-20200602-3.25.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-10T06:29:39Z", "details": "moderate" } ], "title": "CVE-2020-0549" } ] }
suse-su-2020:2822-1
Vulnerability from csaf_suse
Published
2020-10-01 10:33
Modified
2020-10-01 10:33
Summary
Security update for xen
Notes
Title of the patch
Security update for xen
Description of the patch
This update for xen fixes the following issues:
- CVE-2020-25604: Fixed a race condition when migrating timers between x86
HVM vCPU-s (bsc#1176343,XSA-336)
- CVE-2020-25595: Fixed an issue where PCI passthrough code was reading back hardware registers (bsc#1176344,XSA-337)
- CVE-2020-25597: Fixed an issue where a valid event channels may not turn invalid (bsc#1176346,XSA-338)
- CVE-2020-25596: Fixed a potential denial of service in x86 pv guest kernel via SYSENTER (bsc#1176345,XSA-339)
- CVE-2020-25603: Fixed an issue due to missing barriers when accessing/allocating an event channel (bsc#1176347,XSA-340)
- CVE-2020-25600: Fixed out of bounds event channels available to 32-bit x86 domains (bsc#1176348,XSA-342)
- CVE-2020-25599: Fixed race conditions with evtchn_reset() (bsc#1176349,XSA-343)
- CVE-2020-25601: Fixed an issue due to lack of preemption in evtchn_reset() / evtchn_destroy() (bsc#1176350,XSA-344)
- CVE-2020-14364: Fixed an out-of-bounds read/write access while processing usb packets (bsc#1175534).
- CVE-2020-0543: Fixed a leak of Special Register Buffer Data Sampling (SRBDS) aka 'CrossTalk' (bsc#1172205,XSA-320)
- CVE-2020-15565: Fixed an issue cache write (bsc#1173378,XSA-321).
- CVE-2020-15567: Fixed an issue with non-atomic modification of live EPT PTE (bsc#1173380,XSA-328)
Patchnames
SUSE-2020-2822,SUSE-OpenStack-Cloud-7-2020-2822,SUSE-SLE-SAP-12-SP2-2020-2822,SUSE-SLE-SERVER-12-SP2-2020-2822,SUSE-SLE-SERVER-12-SP2-BCL-2020-2822
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for xen", "title": "Title of the patch" }, { "category": "description", "text": "This update for xen fixes the following issues:\n\n- CVE-2020-25604: Fixed a race condition when migrating timers between x86 \n HVM vCPU-s (bsc#1176343,XSA-336)\n- CVE-2020-25595: Fixed an issue where PCI passthrough code was reading back hardware registers (bsc#1176344,XSA-337)\n- CVE-2020-25597: Fixed an issue where a valid event channels may not turn invalid (bsc#1176346,XSA-338)\n- CVE-2020-25596: Fixed a potential denial of service in x86 pv guest kernel via SYSENTER (bsc#1176345,XSA-339)\n- CVE-2020-25603: Fixed an issue due to missing barriers when accessing/allocating an event channel (bsc#1176347,XSA-340)\n- CVE-2020-25600: Fixed out of bounds event channels available to 32-bit x86 domains (bsc#1176348,XSA-342)\n- CVE-2020-25599: Fixed race conditions with evtchn_reset() (bsc#1176349,XSA-343)\n- CVE-2020-25601: Fixed an issue due to lack of preemption in evtchn_reset() / evtchn_destroy() (bsc#1176350,XSA-344)\t \n- CVE-2020-14364: Fixed an out-of-bounds read/write access while processing usb packets (bsc#1175534).\n- CVE-2020-0543: Fixed a leak of Special Register Buffer Data Sampling (SRBDS) aka \u0027CrossTalk\u0027 (bsc#1172205,XSA-320)\n- CVE-2020-15565: Fixed an issue cache write (bsc#1173378,XSA-321).\n- CVE-2020-15567: Fixed an issue with non-atomic modification of live EPT PTE (bsc#1173380,XSA-328)\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2020-2822,SUSE-OpenStack-Cloud-7-2020-2822,SUSE-SLE-SAP-12-SP2-2020-2822,SUSE-SLE-SERVER-12-SP2-2020-2822,SUSE-SLE-SERVER-12-SP2-BCL-2020-2822", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2020_2822-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2020:2822-1", "url": "https://www.suse.com/support/update/announcement/2020/suse-su-20202822-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2020:2822-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-October/007511.html" }, { "category": "self", "summary": "SUSE Bug 1172205", "url": "https://bugzilla.suse.com/1172205" }, { "category": "self", "summary": "SUSE Bug 1173378", "url": "https://bugzilla.suse.com/1173378" }, { "category": "self", "summary": "SUSE Bug 1173380", "url": "https://bugzilla.suse.com/1173380" }, { "category": "self", "summary": "SUSE Bug 1175534", "url": "https://bugzilla.suse.com/1175534" }, { "category": "self", "summary": "SUSE Bug 1176343", "url": "https://bugzilla.suse.com/1176343" }, { "category": "self", "summary": "SUSE Bug 1176344", "url": "https://bugzilla.suse.com/1176344" }, { "category": "self", "summary": "SUSE Bug 1176345", "url": "https://bugzilla.suse.com/1176345" }, { "category": "self", "summary": "SUSE Bug 1176346", "url": "https://bugzilla.suse.com/1176346" }, { "category": "self", "summary": "SUSE Bug 1176347", "url": "https://bugzilla.suse.com/1176347" }, { "category": "self", "summary": "SUSE Bug 1176348", "url": "https://bugzilla.suse.com/1176348" }, { "category": "self", "summary": "SUSE Bug 1176349", "url": "https://bugzilla.suse.com/1176349" }, { "category": "self", "summary": "SUSE Bug 1176350", "url": "https://bugzilla.suse.com/1176350" }, { "category": "self", "summary": "SUSE CVE CVE-2020-0543 page", "url": "https://www.suse.com/security/cve/CVE-2020-0543/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14364 page", "url": "https://www.suse.com/security/cve/CVE-2020-14364/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-15565 page", "url": "https://www.suse.com/security/cve/CVE-2020-15565/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-15567 page", "url": "https://www.suse.com/security/cve/CVE-2020-15567/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25595 page", "url": "https://www.suse.com/security/cve/CVE-2020-25595/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25596 page", "url": "https://www.suse.com/security/cve/CVE-2020-25596/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25597 page", "url": "https://www.suse.com/security/cve/CVE-2020-25597/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25599 page", "url": "https://www.suse.com/security/cve/CVE-2020-25599/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25600 page", "url": "https://www.suse.com/security/cve/CVE-2020-25600/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25601 page", "url": "https://www.suse.com/security/cve/CVE-2020-25601/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25603 page", "url": "https://www.suse.com/security/cve/CVE-2020-25603/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25604 page", "url": "https://www.suse.com/security/cve/CVE-2020-25604/" } ], "title": "Security update for xen", "tracking": { "current_release_date": "2020-10-01T10:33:59Z", "generator": { "date": "2020-10-01T10:33:59Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2020:2822-1", "initial_release_date": "2020-10-01T10:33:59Z", "revision_history": [ { "date": "2020-10-01T10:33:59Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "xen-devel-4.7.6_10-43.67.1.i586", "product": { "name": "xen-devel-4.7.6_10-43.67.1.i586", "product_id": "xen-devel-4.7.6_10-43.67.1.i586" } }, { "category": "product_version", "name": "xen-libs-4.7.6_10-43.67.1.i586", "product": { "name": "xen-libs-4.7.6_10-43.67.1.i586", "product_id": "xen-libs-4.7.6_10-43.67.1.i586" } }, { "category": "product_version", "name": "xen-tools-domU-4.7.6_10-43.67.1.i586", "product": { "name": "xen-tools-domU-4.7.6_10-43.67.1.i586", "product_id": "xen-tools-domU-4.7.6_10-43.67.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "xen-4.7.6_10-43.67.1.x86_64", "product": { "name": "xen-4.7.6_10-43.67.1.x86_64", "product_id": "xen-4.7.6_10-43.67.1.x86_64" } }, { "category": "product_version", "name": "xen-devel-4.7.6_10-43.67.1.x86_64", "product": { "name": "xen-devel-4.7.6_10-43.67.1.x86_64", "product_id": "xen-devel-4.7.6_10-43.67.1.x86_64" } }, { "category": "product_version", "name": "xen-doc-html-4.7.6_10-43.67.1.x86_64", "product": { "name": "xen-doc-html-4.7.6_10-43.67.1.x86_64", "product_id": "xen-doc-html-4.7.6_10-43.67.1.x86_64" } }, { "category": "product_version", "name": "xen-libs-4.7.6_10-43.67.1.x86_64", "product": { "name": "xen-libs-4.7.6_10-43.67.1.x86_64", "product_id": "xen-libs-4.7.6_10-43.67.1.x86_64" } }, { "category": "product_version", "name": "xen-libs-32bit-4.7.6_10-43.67.1.x86_64", "product": { "name": "xen-libs-32bit-4.7.6_10-43.67.1.x86_64", "product_id": "xen-libs-32bit-4.7.6_10-43.67.1.x86_64" } }, { "category": "product_version", "name": "xen-tools-4.7.6_10-43.67.1.x86_64", "product": { "name": "xen-tools-4.7.6_10-43.67.1.x86_64", "product_id": "xen-tools-4.7.6_10-43.67.1.x86_64" } }, { "category": "product_version", "name": "xen-tools-domU-4.7.6_10-43.67.1.x86_64", "product": { "name": "xen-tools-domU-4.7.6_10-43.67.1.x86_64", "product_id": "xen-tools-domU-4.7.6_10-43.67.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE OpenStack Cloud 7", "product": { "name": "SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-openstack-cloud:7" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP2-BCL", "product": { "name": "SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-bcl:12:sp2" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "xen-4.7.6_10-43.67.1.x86_64 as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:xen-4.7.6_10-43.67.1.x86_64" }, "product_reference": "xen-4.7.6_10-43.67.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "xen-doc-html-4.7.6_10-43.67.1.x86_64 as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:xen-doc-html-4.7.6_10-43.67.1.x86_64" }, "product_reference": "xen-doc-html-4.7.6_10-43.67.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.7.6_10-43.67.1.x86_64 as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:xen-libs-4.7.6_10-43.67.1.x86_64" }, "product_reference": "xen-libs-4.7.6_10-43.67.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-32bit-4.7.6_10-43.67.1.x86_64 as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:xen-libs-32bit-4.7.6_10-43.67.1.x86_64" }, "product_reference": "xen-libs-32bit-4.7.6_10-43.67.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.7.6_10-43.67.1.x86_64 as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:xen-tools-4.7.6_10-43.67.1.x86_64" }, "product_reference": "xen-tools-4.7.6_10-43.67.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.7.6_10-43.67.1.x86_64 as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:xen-tools-domU-4.7.6_10-43.67.1.x86_64" }, "product_reference": "xen-tools-domU-4.7.6_10-43.67.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "xen-4.7.6_10-43.67.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-4.7.6_10-43.67.1.x86_64" }, "product_reference": "xen-4.7.6_10-43.67.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "xen-doc-html-4.7.6_10-43.67.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-doc-html-4.7.6_10-43.67.1.x86_64" }, "product_reference": "xen-doc-html-4.7.6_10-43.67.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.7.6_10-43.67.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-4.7.6_10-43.67.1.x86_64" }, "product_reference": "xen-libs-4.7.6_10-43.67.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-32bit-4.7.6_10-43.67.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-32bit-4.7.6_10-43.67.1.x86_64" }, "product_reference": "xen-libs-32bit-4.7.6_10-43.67.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.7.6_10-43.67.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-4.7.6_10-43.67.1.x86_64" }, "product_reference": "xen-tools-4.7.6_10-43.67.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.7.6_10-43.67.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-domU-4.7.6_10-43.67.1.x86_64" }, "product_reference": "xen-tools-domU-4.7.6_10-43.67.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "xen-4.7.6_10-43.67.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-4.7.6_10-43.67.1.x86_64" }, "product_reference": "xen-4.7.6_10-43.67.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-doc-html-4.7.6_10-43.67.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-doc-html-4.7.6_10-43.67.1.x86_64" }, "product_reference": "xen-doc-html-4.7.6_10-43.67.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.7.6_10-43.67.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-libs-4.7.6_10-43.67.1.x86_64" }, "product_reference": "xen-libs-4.7.6_10-43.67.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-32bit-4.7.6_10-43.67.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-libs-32bit-4.7.6_10-43.67.1.x86_64" }, "product_reference": "xen-libs-32bit-4.7.6_10-43.67.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.7.6_10-43.67.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-tools-4.7.6_10-43.67.1.x86_64" }, "product_reference": "xen-tools-4.7.6_10-43.67.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.7.6_10-43.67.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-tools-domU-4.7.6_10-43.67.1.x86_64" }, "product_reference": "xen-tools-domU-4.7.6_10-43.67.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-4.7.6_10-43.67.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:xen-4.7.6_10-43.67.1.x86_64" }, "product_reference": "xen-4.7.6_10-43.67.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "xen-doc-html-4.7.6_10-43.67.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:xen-doc-html-4.7.6_10-43.67.1.x86_64" }, "product_reference": "xen-doc-html-4.7.6_10-43.67.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.7.6_10-43.67.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-4.7.6_10-43.67.1.x86_64" }, "product_reference": "xen-libs-4.7.6_10-43.67.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-32bit-4.7.6_10-43.67.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-32bit-4.7.6_10-43.67.1.x86_64" }, "product_reference": "xen-libs-32bit-4.7.6_10-43.67.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.7.6_10-43.67.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-4.7.6_10-43.67.1.x86_64" }, "product_reference": "xen-tools-4.7.6_10-43.67.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.7.6_10-43.67.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-domU-4.7.6_10-43.67.1.x86_64" }, "product_reference": "xen-tools-domU-4.7.6_10-43.67.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-0543", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-0543" } ], "notes": [ { "category": "general", "text": "Incomplete cleanup from specific special register read operations in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:xen-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-doc-html-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-32bit-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-domU-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-doc-html-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-libs-32bit-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-libs-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-tools-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-tools-domU-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-doc-html-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-32bit-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-domU-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-doc-html-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-libs-32bit-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-libs-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-tools-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-tools-domU-4.7.6_10-43.67.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-0543", "url": "https://www.suse.com/security/cve/CVE-2020-0543" }, { "category": "external", "summary": "SUSE Bug 1154824 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1154824" }, { "category": "external", "summary": "SUSE Bug 1172205 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172205" }, { "category": "external", "summary": "SUSE Bug 1172206 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172206" }, { "category": "external", "summary": "SUSE Bug 1172207 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172207" }, { "category": "external", "summary": "SUSE Bug 1172770 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172770" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:xen-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-doc-html-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-32bit-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-domU-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-doc-html-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-libs-32bit-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-libs-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-tools-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-tools-domU-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-doc-html-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-32bit-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-domU-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-doc-html-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-libs-32bit-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-libs-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-tools-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-tools-domU-4.7.6_10-43.67.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:xen-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-doc-html-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-32bit-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-domU-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-doc-html-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-libs-32bit-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-libs-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-tools-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-tools-domU-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-doc-html-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-32bit-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-domU-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-doc-html-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-libs-32bit-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-libs-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-tools-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-tools-domU-4.7.6_10-43.67.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-10-01T10:33:59Z", "details": "moderate" } ], "title": "CVE-2020-0543" }, { "cve": "CVE-2020-14364", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14364" } ], "notes": [ { "category": "general", "text": "An out-of-bounds read/write access flaw was found in the USB emulator of the QEMU in versions before 5.2.0. This issue occurs while processing USB packets from a guest when USBDevice \u0027setup_len\u0027 exceeds its \u0027data_buf[4096]\u0027 in the do_token_in, do_token_out routines. This flaw allows a guest user to crash the QEMU process, resulting in a denial of service, or the potential execution of arbitrary code with the privileges of the QEMU process on the host.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:xen-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-doc-html-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-32bit-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-domU-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-doc-html-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-libs-32bit-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-libs-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-tools-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-tools-domU-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-doc-html-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-32bit-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-domU-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-doc-html-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-libs-32bit-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-libs-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-tools-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-tools-domU-4.7.6_10-43.67.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14364", "url": "https://www.suse.com/security/cve/CVE-2020-14364" }, { "category": "external", "summary": "SUSE Bug 1175441 for CVE-2020-14364", "url": "https://bugzilla.suse.com/1175441" }, { "category": "external", "summary": "SUSE Bug 1175534 for CVE-2020-14364", "url": "https://bugzilla.suse.com/1175534" }, { "category": "external", "summary": "SUSE Bug 1176494 for CVE-2020-14364", "url": "https://bugzilla.suse.com/1176494" }, { "category": "external", "summary": "SUSE Bug 1177130 for CVE-2020-14364", "url": "https://bugzilla.suse.com/1177130" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:xen-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-doc-html-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-32bit-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-domU-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-doc-html-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-libs-32bit-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-libs-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-tools-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-tools-domU-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-doc-html-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-32bit-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-domU-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-doc-html-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-libs-32bit-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-libs-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-tools-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-tools-domU-4.7.6_10-43.67.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:xen-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-doc-html-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-32bit-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-domU-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-doc-html-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-libs-32bit-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-libs-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-tools-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-tools-domU-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-doc-html-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-32bit-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-domU-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-doc-html-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-libs-32bit-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-libs-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-tools-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-tools-domU-4.7.6_10-43.67.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-10-01T10:33:59Z", "details": "moderate" } ], "title": "CVE-2020-14364" }, { "cve": "CVE-2020-15565", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-15565" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.13.x, allowing x86 Intel HVM guest OS users to cause a host OS denial of service or possibly gain privileges because of insufficient cache write-back under VT-d. When page tables are shared between IOMMU and CPU, changes to them require flushing of both TLBs. Furthermore, IOMMUs may be non-coherent, and hence prior to flushing IOMMU TLBs, a CPU cache also needs writing back to memory after changes were made. Such writing back of cached data was missing in particular when splitting large page mappings into smaller granularity ones. A malicious guest may be able to retain read/write DMA access to frames returned to Xen\u0027s free pool, and later reused for another purpose. Host crashes (leading to a Denial of Service) and privilege escalation cannot be ruled out. Xen versions from at least 3.2 onwards are affected. Only x86 Intel systems are affected. x86 AMD as well as Arm systems are not affected. Only x86 HVM guests using hardware assisted paging (HAP), having a passed through PCI device assigned, and having page table sharing enabled can leverage the vulnerability. Note that page table sharing will be enabled (by default) only if Xen considers IOMMU and CPU large page size support compatible.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:xen-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-doc-html-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-32bit-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-domU-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-doc-html-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-libs-32bit-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-libs-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-tools-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-tools-domU-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-doc-html-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-32bit-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-domU-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-doc-html-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-libs-32bit-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-libs-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-tools-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-tools-domU-4.7.6_10-43.67.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-15565", "url": "https://www.suse.com/security/cve/CVE-2020-15565" }, { "category": "external", "summary": "SUSE Bug 1173378 for CVE-2020-15565", "url": "https://bugzilla.suse.com/1173378" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:xen-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-doc-html-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-32bit-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-domU-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-doc-html-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-libs-32bit-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-libs-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-tools-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-tools-domU-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-doc-html-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-32bit-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-domU-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-doc-html-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-libs-32bit-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-libs-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-tools-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-tools-domU-4.7.6_10-43.67.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.9, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:xen-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-doc-html-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-32bit-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-domU-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-doc-html-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-libs-32bit-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-libs-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-tools-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-tools-domU-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-doc-html-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-32bit-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-domU-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-doc-html-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-libs-32bit-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-libs-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-tools-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-tools-domU-4.7.6_10-43.67.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-10-01T10:33:59Z", "details": "important" } ], "title": "CVE-2020-15565" }, { "cve": "CVE-2020-15567", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-15567" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.13.x, allowing Intel guest OS users to gain privileges or cause a denial of service because of non-atomic modification of a live EPT PTE. When mapping guest EPT (nested paging) tables, Xen would in some circumstances use a series of non-atomic bitfield writes. Depending on the compiler version and optimisation flags, Xen might expose a dangerous partially written PTE to the hardware, which an attacker might be able to race to exploit. A guest administrator or perhaps even an unprivileged guest user might be able to cause denial of service, data corruption, or privilege escalation. Only systems using Intel CPUs are vulnerable. Systems using AMD CPUs, and Arm systems, are not vulnerable. Only systems using nested paging (hap, aka nested paging, aka in this case Intel EPT) are vulnerable. Only HVM and PVH guests can exploit the vulnerability. The presence and scope of the vulnerability depends on the precise optimisations performed by the compiler used to build Xen. If the compiler generates (a) a single 64-bit write, or (b) a series of read-modify-write operations in the same order as the source code, the hypervisor is not vulnerable. For example, in one test build using GCC 8.3 with normal settings, the compiler generated multiple (unlocked) read-modify-write operations in source-code order, which did not constitute a vulnerability. We have not been able to survey compilers; consequently we cannot say which compiler(s) might produce vulnerable code (with which code-generation options). The source code clearly violates the C rules, and thus should be considered vulnerable.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:xen-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-doc-html-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-32bit-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-domU-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-doc-html-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-libs-32bit-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-libs-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-tools-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-tools-domU-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-doc-html-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-32bit-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-domU-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-doc-html-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-libs-32bit-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-libs-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-tools-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-tools-domU-4.7.6_10-43.67.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-15567", "url": "https://www.suse.com/security/cve/CVE-2020-15567" }, { "category": "external", "summary": "SUSE Bug 1173380 for CVE-2020-15567", "url": "https://bugzilla.suse.com/1173380" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2020-15567", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:xen-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-doc-html-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-32bit-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-domU-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-doc-html-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-libs-32bit-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-libs-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-tools-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-tools-domU-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-doc-html-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-32bit-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-domU-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-doc-html-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-libs-32bit-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-libs-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-tools-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-tools-domU-4.7.6_10-43.67.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:xen-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-doc-html-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-32bit-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-domU-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-doc-html-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-libs-32bit-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-libs-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-tools-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-tools-domU-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-doc-html-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-32bit-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-domU-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-doc-html-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-libs-32bit-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-libs-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-tools-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-tools-domU-4.7.6_10-43.67.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-10-01T10:33:59Z", "details": "moderate" } ], "title": "CVE-2020-15567" }, { "cve": "CVE-2020-25595", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25595" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.14.x. The PCI passthrough code improperly uses register data. Code paths in Xen\u0027s MSI handling have been identified that act on unsanitized values read back from device hardware registers. While devices strictly compliant with PCI specifications shouldn\u0027t be able to affect these registers, experience shows that it\u0027s very common for devices to have out-of-spec \"backdoor\" operations that can affect the result of these reads. A not fully trusted guest may be able to crash Xen, leading to a Denial of Service (DoS) for the entire system. Privilege escalation and information leaks cannot be excluded. All versions of Xen supporting PCI passthrough are affected. Only x86 systems are vulnerable. Arm systems are not vulnerable. Only guests with passed through PCI devices may be able to leverage the vulnerability. Only systems passing through devices with out-of-spec (\"backdoor\") functionality can cause issues. Experience shows that such out-of-spec functionality is common; unless you have reason to believe that your device does not have such functionality, it\u0027s better to assume that it does.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:xen-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-doc-html-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-32bit-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-domU-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-doc-html-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-libs-32bit-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-libs-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-tools-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-tools-domU-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-doc-html-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-32bit-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-domU-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-doc-html-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-libs-32bit-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-libs-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-tools-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-tools-domU-4.7.6_10-43.67.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25595", "url": "https://www.suse.com/security/cve/CVE-2020-25595" }, { "category": "external", "summary": "SUSE Bug 1176344 for CVE-2020-25595", "url": "https://bugzilla.suse.com/1176344" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2020-25595", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:xen-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-doc-html-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-32bit-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-domU-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-doc-html-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-libs-32bit-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-libs-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-tools-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-tools-domU-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-doc-html-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-32bit-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-domU-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-doc-html-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-libs-32bit-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-libs-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-tools-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-tools-domU-4.7.6_10-43.67.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:xen-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-doc-html-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-32bit-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-domU-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-doc-html-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-libs-32bit-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-libs-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-tools-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-tools-domU-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-doc-html-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-32bit-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-domU-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-doc-html-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-libs-32bit-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-libs-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-tools-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-tools-domU-4.7.6_10-43.67.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-10-01T10:33:59Z", "details": "important" } ], "title": "CVE-2020-25595" }, { "cve": "CVE-2020-25596", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25596" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.14.x. x86 PV guest kernels can experience denial of service via SYSENTER. The SYSENTER instruction leaves various state sanitization activities to software. One of Xen\u0027s sanitization paths injects a #GP fault, and incorrectly delivers it twice to the guest. This causes the guest kernel to observe a kernel-privilege #GP fault (typically fatal) rather than a user-privilege #GP fault (usually converted into SIGSEGV/etc.). Malicious or buggy userspace can crash the guest kernel, resulting in a VM Denial of Service. All versions of Xen from 3.2 onwards are vulnerable. Only x86 systems are vulnerable. ARM platforms are not vulnerable. Only x86 systems that support the SYSENTER instruction in 64bit mode are vulnerable. This is believed to be Intel, Centaur, and Shanghai CPUs. AMD and Hygon CPUs are not believed to be vulnerable. Only x86 PV guests can exploit the vulnerability. x86 PVH / HVM guests cannot exploit the vulnerability.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:xen-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-doc-html-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-32bit-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-domU-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-doc-html-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-libs-32bit-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-libs-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-tools-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-tools-domU-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-doc-html-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-32bit-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-domU-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-doc-html-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-libs-32bit-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-libs-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-tools-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-tools-domU-4.7.6_10-43.67.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25596", "url": "https://www.suse.com/security/cve/CVE-2020-25596" }, { "category": "external", "summary": "SUSE Bug 1176345 for CVE-2020-25596", "url": "https://bugzilla.suse.com/1176345" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2020-25596", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:xen-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-doc-html-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-32bit-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-domU-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-doc-html-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-libs-32bit-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-libs-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-tools-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-tools-domU-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-doc-html-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-32bit-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-domU-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-doc-html-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-libs-32bit-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-libs-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-tools-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-tools-domU-4.7.6_10-43.67.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:xen-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-doc-html-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-32bit-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-domU-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-doc-html-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-libs-32bit-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-libs-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-tools-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-tools-domU-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-doc-html-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-32bit-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-domU-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-doc-html-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-libs-32bit-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-libs-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-tools-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-tools-domU-4.7.6_10-43.67.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-10-01T10:33:59Z", "details": "moderate" } ], "title": "CVE-2020-25596" }, { "cve": "CVE-2020-25597", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25597" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.14.x. There is mishandling of the constraint that once-valid event channels may not turn invalid. Logic in the handling of event channel operations in Xen assumes that an event channel, once valid, will not become invalid over the life time of a guest. However, operations like the resetting of all event channels may involve decreasing one of the bounds checked when determining validity. This may lead to bug checks triggering, crashing the host. An unprivileged guest may be able to crash Xen, leading to a Denial of Service (DoS) for the entire system. All Xen versions from 4.4 onwards are vulnerable. Xen versions 4.3 and earlier are not vulnerable. Only systems with untrusted guests permitted to create more than the default number of event channels are vulnerable. This number depends on the architecture and type of guest. For 32-bit x86 PV guests, this is 1023; for 64-bit x86 PV guests, and for all ARM guests, this number is 4095. Systems where untrusted guests are limited to fewer than this number are not vulnerable. Note that xl and libxl limit max_event_channels to 1023 by default, so systems using exclusively xl, libvirt+libxl, or their own toolstack based on libxl, and not explicitly setting max_event_channels, are not vulnerable.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:xen-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-doc-html-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-32bit-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-domU-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-doc-html-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-libs-32bit-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-libs-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-tools-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-tools-domU-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-doc-html-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-32bit-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-domU-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-doc-html-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-libs-32bit-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-libs-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-tools-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-tools-domU-4.7.6_10-43.67.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25597", "url": "https://www.suse.com/security/cve/CVE-2020-25597" }, { "category": "external", "summary": "SUSE Bug 1176346 for CVE-2020-25597", "url": "https://bugzilla.suse.com/1176346" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:xen-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-doc-html-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-32bit-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-domU-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-doc-html-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-libs-32bit-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-libs-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-tools-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-tools-domU-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-doc-html-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-32bit-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-domU-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-doc-html-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-libs-32bit-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-libs-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-tools-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-tools-domU-4.7.6_10-43.67.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:xen-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-doc-html-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-32bit-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-domU-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-doc-html-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-libs-32bit-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-libs-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-tools-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-tools-domU-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-doc-html-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-32bit-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-domU-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-doc-html-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-libs-32bit-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-libs-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-tools-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-tools-domU-4.7.6_10-43.67.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-10-01T10:33:59Z", "details": "moderate" } ], "title": "CVE-2020-25597" }, { "cve": "CVE-2020-25599", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25599" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.14.x. There are evtchn_reset() race conditions. Uses of EVTCHNOP_reset (potentially by a guest on itself) or XEN_DOMCTL_soft_reset (by itself covered by XSA-77) can lead to the violation of various internal assumptions. This may lead to out of bounds memory accesses or triggering of bug checks. In particular, x86 PV guests may be able to elevate their privilege to that of the host. Host and guest crashes are also possible, leading to a Denial of Service (DoS). Information leaks cannot be ruled out. All Xen versions from 4.5 onwards are vulnerable. Xen versions 4.4 and earlier are not vulnerable.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:xen-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-doc-html-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-32bit-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-domU-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-doc-html-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-libs-32bit-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-libs-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-tools-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-tools-domU-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-doc-html-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-32bit-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-domU-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-doc-html-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-libs-32bit-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-libs-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-tools-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-tools-domU-4.7.6_10-43.67.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25599", "url": "https://www.suse.com/security/cve/CVE-2020-25599" }, { "category": "external", "summary": "SUSE Bug 1176349 for CVE-2020-25599", "url": "https://bugzilla.suse.com/1176349" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:xen-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-doc-html-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-32bit-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-domU-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-doc-html-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-libs-32bit-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-libs-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-tools-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-tools-domU-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-doc-html-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-32bit-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-domU-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-doc-html-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-libs-32bit-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-libs-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-tools-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-tools-domU-4.7.6_10-43.67.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.2, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:xen-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-doc-html-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-32bit-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-domU-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-doc-html-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-libs-32bit-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-libs-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-tools-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-tools-domU-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-doc-html-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-32bit-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-domU-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-doc-html-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-libs-32bit-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-libs-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-tools-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-tools-domU-4.7.6_10-43.67.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-10-01T10:33:59Z", "details": "important" } ], "title": "CVE-2020-25599" }, { "cve": "CVE-2020-25600", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25600" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.14.x. Out of bounds event channels are available to 32-bit x86 domains. The so called 2-level event channel model imposes different limits on the number of usable event channels for 32-bit x86 domains vs 64-bit or Arm (either bitness) ones. 32-bit x86 domains can use only 1023 channels, due to limited space in their shared (between guest and Xen) information structure, whereas all other domains can use up to 4095 in this model. The recording of the respective limit during domain initialization, however, has occurred at a time where domains are still deemed to be 64-bit ones, prior to actually honoring respective domain properties. At the point domains get recognized as 32-bit ones, the limit didn\u0027t get updated accordingly. Due to this misbehavior in Xen, 32-bit domains (including Domain 0) servicing other domains may observe event channel allocations to succeed when they should really fail. Subsequent use of such event channels would then possibly lead to corruption of other parts of the shared info structure. An unprivileged guest may cause another domain, in particular Domain 0, to misbehave. This may lead to a Denial of Service (DoS) for the entire system. All Xen versions from 4.4 onwards are vulnerable. Xen versions 4.3 and earlier are not vulnerable. Only x86 32-bit domains servicing other domains are vulnerable. Arm systems, as well as x86 64-bit domains, are not vulnerable.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:xen-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-doc-html-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-32bit-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-domU-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-doc-html-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-libs-32bit-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-libs-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-tools-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-tools-domU-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-doc-html-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-32bit-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-domU-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-doc-html-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-libs-32bit-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-libs-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-tools-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-tools-domU-4.7.6_10-43.67.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25600", "url": "https://www.suse.com/security/cve/CVE-2020-25600" }, { "category": "external", "summary": "SUSE Bug 1176348 for CVE-2020-25600", "url": "https://bugzilla.suse.com/1176348" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:xen-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-doc-html-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-32bit-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-domU-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-doc-html-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-libs-32bit-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-libs-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-tools-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-tools-domU-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-doc-html-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-32bit-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-domU-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-doc-html-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-libs-32bit-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-libs-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-tools-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-tools-domU-4.7.6_10-43.67.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:xen-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-doc-html-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-32bit-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-domU-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-doc-html-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-libs-32bit-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-libs-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-tools-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-tools-domU-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-doc-html-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-32bit-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-domU-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-doc-html-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-libs-32bit-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-libs-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-tools-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-tools-domU-4.7.6_10-43.67.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-10-01T10:33:59Z", "details": "important" } ], "title": "CVE-2020-25600" }, { "cve": "CVE-2020-25601", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25601" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.14.x. There is a lack of preemption in evtchn_reset() / evtchn_destroy(). In particular, the FIFO event channel model allows guests to have a large number of event channels active at a time. Closing all of these (when resetting all event channels or when cleaning up after the guest) may take extended periods of time. So far, there was no arrangement for preemption at suitable intervals, allowing a CPU to spend an almost unbounded amount of time in the processing of these operations. Malicious or buggy guest kernels can mount a Denial of Service (DoS) attack affecting the entire system. All Xen versions are vulnerable in principle. Whether versions 4.3 and older are vulnerable depends on underlying hardware characteristics.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:xen-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-doc-html-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-32bit-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-domU-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-doc-html-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-libs-32bit-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-libs-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-tools-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-tools-domU-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-doc-html-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-32bit-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-domU-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-doc-html-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-libs-32bit-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-libs-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-tools-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-tools-domU-4.7.6_10-43.67.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25601", "url": "https://www.suse.com/security/cve/CVE-2020-25601" }, { "category": "external", "summary": "SUSE Bug 1176350 for CVE-2020-25601", "url": "https://bugzilla.suse.com/1176350" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:xen-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-doc-html-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-32bit-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-domU-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-doc-html-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-libs-32bit-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-libs-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-tools-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-tools-domU-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-doc-html-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-32bit-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-domU-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-doc-html-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-libs-32bit-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-libs-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-tools-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-tools-domU-4.7.6_10-43.67.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:xen-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-doc-html-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-32bit-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-domU-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-doc-html-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-libs-32bit-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-libs-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-tools-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-tools-domU-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-doc-html-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-32bit-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-domU-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-doc-html-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-libs-32bit-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-libs-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-tools-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-tools-domU-4.7.6_10-43.67.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-10-01T10:33:59Z", "details": "moderate" } ], "title": "CVE-2020-25601" }, { "cve": "CVE-2020-25603", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25603" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.14.x. There are missing memory barriers when accessing/allocating an event channel. Event channels control structures can be accessed lockless as long as the port is considered to be valid. Such a sequence is missing an appropriate memory barrier (e.g., smp_*mb()) to prevent both the compiler and CPU from re-ordering access. A malicious guest may be able to cause a hypervisor crash resulting in a Denial of Service (DoS). Information leak and privilege escalation cannot be excluded. Systems running all versions of Xen are affected. Whether a system is vulnerable will depend on the CPU and compiler used to build Xen. For all systems, the presence and the scope of the vulnerability depend on the precise re-ordering performed by the compiler used to build Xen. We have not been able to survey compilers; consequently we cannot say which compiler(s) might produce vulnerable code (with which code generation options). GCC documentation clearly suggests that re-ordering is possible. Arm systems will also be vulnerable if the CPU is able to re-order memory access. Please consult your CPU vendor. x86 systems are only vulnerable if a compiler performs re-ordering.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:xen-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-doc-html-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-32bit-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-domU-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-doc-html-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-libs-32bit-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-libs-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-tools-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-tools-domU-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-doc-html-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-32bit-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-domU-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-doc-html-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-libs-32bit-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-libs-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-tools-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-tools-domU-4.7.6_10-43.67.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25603", "url": "https://www.suse.com/security/cve/CVE-2020-25603" }, { "category": "external", "summary": "SUSE Bug 1176347 for CVE-2020-25603", "url": "https://bugzilla.suse.com/1176347" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2020-25603", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:xen-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-doc-html-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-32bit-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-domU-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-doc-html-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-libs-32bit-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-libs-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-tools-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-tools-domU-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-doc-html-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-32bit-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-domU-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-doc-html-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-libs-32bit-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-libs-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-tools-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-tools-domU-4.7.6_10-43.67.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:xen-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-doc-html-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-32bit-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-domU-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-doc-html-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-libs-32bit-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-libs-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-tools-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-tools-domU-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-doc-html-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-32bit-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-domU-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-doc-html-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-libs-32bit-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-libs-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-tools-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-tools-domU-4.7.6_10-43.67.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-10-01T10:33:59Z", "details": "important" } ], "title": "CVE-2020-25603" }, { "cve": "CVE-2020-25604", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25604" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.14.x. There is a race condition when migrating timers between x86 HVM vCPUs. When migrating timers of x86 HVM guests between its vCPUs, the locking model used allows for a second vCPU of the same guest (also operating on the timers) to release a lock that it didn\u0027t acquire. The most likely effect of the issue is a hang or crash of the hypervisor, i.e., a Denial of Service (DoS). All versions of Xen are affected. Only x86 systems are vulnerable. Arm systems are not vulnerable. Only x86 HVM guests can leverage the vulnerability. x86 PV and PVH cannot leverage the vulnerability. Only guests with more than one vCPU can exploit the vulnerability.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:xen-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-doc-html-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-32bit-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-domU-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-doc-html-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-libs-32bit-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-libs-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-tools-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-tools-domU-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-doc-html-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-32bit-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-domU-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-doc-html-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-libs-32bit-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-libs-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-tools-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-tools-domU-4.7.6_10-43.67.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25604", "url": "https://www.suse.com/security/cve/CVE-2020-25604" }, { "category": "external", "summary": "SUSE Bug 1176343 for CVE-2020-25604", "url": "https://bugzilla.suse.com/1176343" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2020-25604", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:xen-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-doc-html-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-32bit-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-domU-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-doc-html-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-libs-32bit-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-libs-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-tools-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-tools-domU-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-doc-html-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-32bit-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-domU-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-doc-html-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-libs-32bit-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-libs-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-tools-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-tools-domU-4.7.6_10-43.67.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:xen-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-doc-html-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-32bit-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-domU-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-doc-html-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-libs-32bit-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-libs-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-tools-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-tools-domU-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-doc-html-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-32bit-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-4.7.6_10-43.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-domU-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-doc-html-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-libs-32bit-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-libs-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-tools-4.7.6_10-43.67.1.x86_64", "SUSE OpenStack Cloud 7:xen-tools-domU-4.7.6_10-43.67.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-10-01T10:33:59Z", "details": "moderate" } ], "title": "CVE-2020-25604" } ] }
suse-su-2020:1902-1
Vulnerability from csaf_suse
Published
2020-07-14 13:19
Modified
2020-07-14 13:19
Summary
Security update for xen
Notes
Title of the patch
Security update for xen
Description of the patch
This update for xen fixes the following issues:
- CVE-2020-15563: Fixed inverted code paths in x86 dirty VRAM tracking (bsc#1173377).
- CVE-2020-15565: Fixed insufficient cache write-back under VT-d (bsc#1173378).
- CVE-2020-15566: Fixed incorrect error handling in event channel port allocation (bsc#1173376).
- CVE-2020-15567: Fixed non-atomic modification of live EPT PTE (bsc#1173380).
- CVE-2020-0543: Special Register Buffer Data Sampling (SRBDS) aka 'CrossTalk' (bsc#1172205).
Additional upstream bug fixes (bsc#1027519)
Patchnames
SUSE-2020-1902,SUSE-SLE-Module-Basesystem-15-SP2-2020-1902,SUSE-SLE-Module-Server-Applications-15-SP2-2020-1902
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for xen", "title": "Title of the patch" }, { "category": "description", "text": "This update for xen fixes the following issues:\n\n- CVE-2020-15563: Fixed inverted code paths in x86 dirty VRAM tracking (bsc#1173377).\n- CVE-2020-15565: Fixed insufficient cache write-back under VT-d (bsc#1173378).\n- CVE-2020-15566: Fixed incorrect error handling in event channel port allocation (bsc#1173376).\n- CVE-2020-15567: Fixed non-atomic modification of live EPT PTE (bsc#1173380).\n- CVE-2020-0543: Special Register Buffer Data Sampling (SRBDS) aka \u0027CrossTalk\u0027 (bsc#1172205).\n\nAdditional upstream bug fixes (bsc#1027519)\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2020-1902,SUSE-SLE-Module-Basesystem-15-SP2-2020-1902,SUSE-SLE-Module-Server-Applications-15-SP2-2020-1902", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2020_1902-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2020:1902-1", "url": "https://www.suse.com/support/update/announcement/2020/suse-su-20201902-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2020:1902-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-July/007126.html" }, { "category": "self", "summary": "SUSE Bug 1027519", "url": "https://bugzilla.suse.com/1027519" }, { "category": "self", "summary": "SUSE Bug 1172205", "url": "https://bugzilla.suse.com/1172205" }, { "category": "self", "summary": "SUSE Bug 1173376", "url": "https://bugzilla.suse.com/1173376" }, { "category": "self", "summary": "SUSE Bug 1173377", "url": "https://bugzilla.suse.com/1173377" }, { "category": "self", "summary": "SUSE Bug 1173378", "url": "https://bugzilla.suse.com/1173378" }, { "category": "self", "summary": "SUSE Bug 1173380", "url": "https://bugzilla.suse.com/1173380" }, { "category": "self", "summary": "SUSE CVE CVE-2020-0543 page", "url": "https://www.suse.com/security/cve/CVE-2020-0543/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-15563 page", "url": "https://www.suse.com/security/cve/CVE-2020-15563/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-15565 page", "url": "https://www.suse.com/security/cve/CVE-2020-15565/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-15566 page", "url": "https://www.suse.com/security/cve/CVE-2020-15566/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-15567 page", "url": "https://www.suse.com/security/cve/CVE-2020-15567/" } ], "title": "Security update for xen", "tracking": { "current_release_date": "2020-07-14T13:19:47Z", "generator": { "date": "2020-07-14T13:19:47Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2020:1902-1", "initial_release_date": "2020-07-14T13:19:47Z", "revision_history": [ { "date": "2020-07-14T13:19:47Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "xen-4.13.1_04-3.4.1.aarch64", "product": { "name": "xen-4.13.1_04-3.4.1.aarch64", "product_id": "xen-4.13.1_04-3.4.1.aarch64" } }, { "category": "product_version", "name": "xen-devel-4.13.1_04-3.4.1.aarch64", "product": { "name": "xen-devel-4.13.1_04-3.4.1.aarch64", "product_id": "xen-devel-4.13.1_04-3.4.1.aarch64" } }, { "category": "product_version", "name": "xen-doc-html-4.13.1_04-3.4.1.aarch64", "product": { "name": "xen-doc-html-4.13.1_04-3.4.1.aarch64", "product_id": "xen-doc-html-4.13.1_04-3.4.1.aarch64" } }, { "category": "product_version", "name": "xen-libs-4.13.1_04-3.4.1.aarch64", "product": { "name": "xen-libs-4.13.1_04-3.4.1.aarch64", "product_id": "xen-libs-4.13.1_04-3.4.1.aarch64" } }, { "category": "product_version", "name": "xen-tools-4.13.1_04-3.4.1.aarch64", "product": { "name": "xen-tools-4.13.1_04-3.4.1.aarch64", "product_id": "xen-tools-4.13.1_04-3.4.1.aarch64" } }, { "category": "product_version", "name": "xen-tools-domU-4.13.1_04-3.4.1.aarch64", "product": { "name": "xen-tools-domU-4.13.1_04-3.4.1.aarch64", "product_id": "xen-tools-domU-4.13.1_04-3.4.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "xen-libs-64bit-4.13.1_04-3.4.1.aarch64_ilp32", "product": { "name": "xen-libs-64bit-4.13.1_04-3.4.1.aarch64_ilp32", "product_id": "xen-libs-64bit-4.13.1_04-3.4.1.aarch64_ilp32" } } ], "category": "architecture", "name": "aarch64_ilp32" }, { "branches": [ { "category": "product_version", "name": "xen-devel-4.13.1_04-3.4.1.i586", "product": { "name": "xen-devel-4.13.1_04-3.4.1.i586", "product_id": "xen-devel-4.13.1_04-3.4.1.i586" } }, { "category": "product_version", "name": "xen-libs-4.13.1_04-3.4.1.i586", "product": { "name": "xen-libs-4.13.1_04-3.4.1.i586", "product_id": "xen-libs-4.13.1_04-3.4.1.i586" } }, { "category": "product_version", "name": "xen-tools-domU-4.13.1_04-3.4.1.i586", "product": { "name": "xen-tools-domU-4.13.1_04-3.4.1.i586", "product_id": "xen-tools-domU-4.13.1_04-3.4.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "xen-tools-xendomains-wait-disk-4.13.1_04-3.4.1.noarch", "product": { "name": "xen-tools-xendomains-wait-disk-4.13.1_04-3.4.1.noarch", "product_id": "xen-tools-xendomains-wait-disk-4.13.1_04-3.4.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "xen-4.13.1_04-3.4.1.x86_64", "product": { "name": "xen-4.13.1_04-3.4.1.x86_64", "product_id": "xen-4.13.1_04-3.4.1.x86_64" } }, { "category": "product_version", "name": "xen-devel-4.13.1_04-3.4.1.x86_64", "product": { "name": "xen-devel-4.13.1_04-3.4.1.x86_64", "product_id": "xen-devel-4.13.1_04-3.4.1.x86_64" } }, { "category": "product_version", "name": "xen-doc-html-4.13.1_04-3.4.1.x86_64", "product": { "name": "xen-doc-html-4.13.1_04-3.4.1.x86_64", "product_id": "xen-doc-html-4.13.1_04-3.4.1.x86_64" } }, { "category": "product_version", "name": "xen-libs-4.13.1_04-3.4.1.x86_64", "product": { "name": "xen-libs-4.13.1_04-3.4.1.x86_64", "product_id": "xen-libs-4.13.1_04-3.4.1.x86_64" } }, { "category": "product_version", "name": "xen-libs-32bit-4.13.1_04-3.4.1.x86_64", "product": { "name": "xen-libs-32bit-4.13.1_04-3.4.1.x86_64", "product_id": "xen-libs-32bit-4.13.1_04-3.4.1.x86_64" } }, { "category": "product_version", "name": "xen-tools-4.13.1_04-3.4.1.x86_64", "product": { "name": "xen-tools-4.13.1_04-3.4.1.x86_64", "product_id": "xen-tools-4.13.1_04-3.4.1.x86_64" } }, { "category": "product_version", "name": "xen-tools-domU-4.13.1_04-3.4.1.x86_64", "product": { "name": "xen-tools-domU-4.13.1_04-3.4.1.x86_64", "product_id": "xen-tools-domU-4.13.1_04-3.4.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Module for Basesystem 15 SP2", "product": { "name": "SUSE Linux Enterprise Module for Basesystem 15 SP2", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-basesystem:15:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Module for Server Applications 15 SP2", "product": { "name": "SUSE Linux Enterprise Module for Server Applications 15 SP2", "product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-server-applications:15:sp2" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.13.1_04-3.4.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:xen-libs-4.13.1_04-3.4.1.x86_64" }, "product_reference": "xen-libs-4.13.1_04-3.4.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.13.1_04-3.4.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:xen-tools-domU-4.13.1_04-3.4.1.x86_64" }, "product_reference": "xen-tools-domU-4.13.1_04-3.4.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "xen-4.13.1_04-3.4.1.x86_64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP2", "product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP2:xen-4.13.1_04-3.4.1.x86_64" }, "product_reference": "xen-4.13.1_04-3.4.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "xen-devel-4.13.1_04-3.4.1.x86_64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP2", "product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP2:xen-devel-4.13.1_04-3.4.1.x86_64" }, "product_reference": "xen-devel-4.13.1_04-3.4.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.13.1_04-3.4.1.x86_64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP2", "product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP2:xen-tools-4.13.1_04-3.4.1.x86_64" }, "product_reference": "xen-tools-4.13.1_04-3.4.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-xendomains-wait-disk-4.13.1_04-3.4.1.noarch as component of SUSE Linux Enterprise Module for Server Applications 15 SP2", "product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP2:xen-tools-xendomains-wait-disk-4.13.1_04-3.4.1.noarch" }, "product_reference": "xen-tools-xendomains-wait-disk-4.13.1_04-3.4.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP2" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-0543", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-0543" } ], "notes": [ { "category": "general", "text": "Incomplete cleanup from specific special register read operations in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Basesystem 15 SP2:xen-libs-4.13.1_04-3.4.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:xen-tools-domU-4.13.1_04-3.4.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP2:xen-4.13.1_04-3.4.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP2:xen-devel-4.13.1_04-3.4.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP2:xen-tools-4.13.1_04-3.4.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP2:xen-tools-xendomains-wait-disk-4.13.1_04-3.4.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2020-0543", "url": "https://www.suse.com/security/cve/CVE-2020-0543" }, { "category": "external", "summary": "SUSE Bug 1154824 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1154824" }, { "category": "external", "summary": "SUSE Bug 1172205 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172205" }, { "category": "external", "summary": "SUSE Bug 1172206 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172206" }, { "category": "external", "summary": "SUSE Bug 1172207 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172207" }, { "category": "external", "summary": "SUSE Bug 1172770 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172770" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Basesystem 15 SP2:xen-libs-4.13.1_04-3.4.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:xen-tools-domU-4.13.1_04-3.4.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP2:xen-4.13.1_04-3.4.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP2:xen-devel-4.13.1_04-3.4.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP2:xen-tools-4.13.1_04-3.4.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP2:xen-tools-xendomains-wait-disk-4.13.1_04-3.4.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Basesystem 15 SP2:xen-libs-4.13.1_04-3.4.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:xen-tools-domU-4.13.1_04-3.4.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP2:xen-4.13.1_04-3.4.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP2:xen-devel-4.13.1_04-3.4.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP2:xen-tools-4.13.1_04-3.4.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP2:xen-tools-xendomains-wait-disk-4.13.1_04-3.4.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2020-07-14T13:19:47Z", "details": "moderate" } ], "title": "CVE-2020-0543" }, { "cve": "CVE-2020-15563", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-15563" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.13.x, allowing x86 HVM guest OS users to cause a hypervisor crash. An inverted conditional in x86 HVM guests\u0027 dirty video RAM tracking code allows such guests to make Xen de-reference a pointer guaranteed to point at unmapped space. A malicious or buggy HVM guest may cause the hypervisor to crash, resulting in Denial of Service (DoS) affecting the entire host. Xen versions from 4.8 onwards are affected. Xen versions 4.7 and earlier are not affected. Only x86 systems are affected. Arm systems are not affected. Only x86 HVM guests using shadow paging can leverage the vulnerability. In addition, there needs to be an entity actively monitoring a guest\u0027s video frame buffer (typically for display purposes) in order for such a guest to be able to leverage the vulnerability. x86 PV guests, as well as x86 HVM guests using hardware assisted paging (HAP), cannot leverage the vulnerability.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Basesystem 15 SP2:xen-libs-4.13.1_04-3.4.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:xen-tools-domU-4.13.1_04-3.4.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP2:xen-4.13.1_04-3.4.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP2:xen-devel-4.13.1_04-3.4.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP2:xen-tools-4.13.1_04-3.4.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP2:xen-tools-xendomains-wait-disk-4.13.1_04-3.4.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2020-15563", "url": "https://www.suse.com/security/cve/CVE-2020-15563" }, { "category": "external", "summary": "SUSE Bug 1173377 for CVE-2020-15563", "url": "https://bugzilla.suse.com/1173377" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Basesystem 15 SP2:xen-libs-4.13.1_04-3.4.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:xen-tools-domU-4.13.1_04-3.4.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP2:xen-4.13.1_04-3.4.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP2:xen-devel-4.13.1_04-3.4.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP2:xen-tools-4.13.1_04-3.4.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP2:xen-tools-xendomains-wait-disk-4.13.1_04-3.4.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Basesystem 15 SP2:xen-libs-4.13.1_04-3.4.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:xen-tools-domU-4.13.1_04-3.4.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP2:xen-4.13.1_04-3.4.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP2:xen-devel-4.13.1_04-3.4.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP2:xen-tools-4.13.1_04-3.4.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP2:xen-tools-xendomains-wait-disk-4.13.1_04-3.4.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2020-07-14T13:19:47Z", "details": "moderate" } ], "title": "CVE-2020-15563" }, { "cve": "CVE-2020-15565", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-15565" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.13.x, allowing x86 Intel HVM guest OS users to cause a host OS denial of service or possibly gain privileges because of insufficient cache write-back under VT-d. When page tables are shared between IOMMU and CPU, changes to them require flushing of both TLBs. Furthermore, IOMMUs may be non-coherent, and hence prior to flushing IOMMU TLBs, a CPU cache also needs writing back to memory after changes were made. Such writing back of cached data was missing in particular when splitting large page mappings into smaller granularity ones. A malicious guest may be able to retain read/write DMA access to frames returned to Xen\u0027s free pool, and later reused for another purpose. Host crashes (leading to a Denial of Service) and privilege escalation cannot be ruled out. Xen versions from at least 3.2 onwards are affected. Only x86 Intel systems are affected. x86 AMD as well as Arm systems are not affected. Only x86 HVM guests using hardware assisted paging (HAP), having a passed through PCI device assigned, and having page table sharing enabled can leverage the vulnerability. Note that page table sharing will be enabled (by default) only if Xen considers IOMMU and CPU large page size support compatible.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Basesystem 15 SP2:xen-libs-4.13.1_04-3.4.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:xen-tools-domU-4.13.1_04-3.4.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP2:xen-4.13.1_04-3.4.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP2:xen-devel-4.13.1_04-3.4.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP2:xen-tools-4.13.1_04-3.4.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP2:xen-tools-xendomains-wait-disk-4.13.1_04-3.4.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2020-15565", "url": "https://www.suse.com/security/cve/CVE-2020-15565" }, { "category": "external", "summary": "SUSE Bug 1173378 for CVE-2020-15565", "url": "https://bugzilla.suse.com/1173378" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Basesystem 15 SP2:xen-libs-4.13.1_04-3.4.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:xen-tools-domU-4.13.1_04-3.4.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP2:xen-4.13.1_04-3.4.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP2:xen-devel-4.13.1_04-3.4.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP2:xen-tools-4.13.1_04-3.4.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP2:xen-tools-xendomains-wait-disk-4.13.1_04-3.4.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.9, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Basesystem 15 SP2:xen-libs-4.13.1_04-3.4.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:xen-tools-domU-4.13.1_04-3.4.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP2:xen-4.13.1_04-3.4.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP2:xen-devel-4.13.1_04-3.4.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP2:xen-tools-4.13.1_04-3.4.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP2:xen-tools-xendomains-wait-disk-4.13.1_04-3.4.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2020-07-14T13:19:47Z", "details": "important" } ], "title": "CVE-2020-15565" }, { "cve": "CVE-2020-15566", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-15566" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.13.x, allowing guest OS users to cause a host OS crash because of incorrect error handling in event-channel port allocation. The allocation of an event-channel port may fail for multiple reasons: (1) port is already in use, (2) the memory allocation failed, or (3) the port we try to allocate is higher than what is supported by the ABI (e.g., 2L or FIFO) used by the guest or the limit set by an administrator (max_event_channels in xl cfg). Due to the missing error checks, only (1) will be considered an error. All the other cases will provide a valid port and will result in a crash when trying to access the event channel. When the administrator configured a guest to allow more than 1023 event channels, that guest may be able to crash the host. When Xen is out-of-memory, allocation of new event channels will result in crashing the host rather than reporting an error. Xen versions 4.10 and later are affected. All architectures are affected. The default configuration, when guests are created with xl/libxl, is not vulnerable, because of the default event-channel limit.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Basesystem 15 SP2:xen-libs-4.13.1_04-3.4.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:xen-tools-domU-4.13.1_04-3.4.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP2:xen-4.13.1_04-3.4.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP2:xen-devel-4.13.1_04-3.4.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP2:xen-tools-4.13.1_04-3.4.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP2:xen-tools-xendomains-wait-disk-4.13.1_04-3.4.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2020-15566", "url": "https://www.suse.com/security/cve/CVE-2020-15566" }, { "category": "external", "summary": "SUSE Bug 1173376 for CVE-2020-15566", "url": "https://bugzilla.suse.com/1173376" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Basesystem 15 SP2:xen-libs-4.13.1_04-3.4.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:xen-tools-domU-4.13.1_04-3.4.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP2:xen-4.13.1_04-3.4.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP2:xen-devel-4.13.1_04-3.4.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP2:xen-tools-4.13.1_04-3.4.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP2:xen-tools-xendomains-wait-disk-4.13.1_04-3.4.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Basesystem 15 SP2:xen-libs-4.13.1_04-3.4.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:xen-tools-domU-4.13.1_04-3.4.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP2:xen-4.13.1_04-3.4.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP2:xen-devel-4.13.1_04-3.4.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP2:xen-tools-4.13.1_04-3.4.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP2:xen-tools-xendomains-wait-disk-4.13.1_04-3.4.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2020-07-14T13:19:47Z", "details": "moderate" } ], "title": "CVE-2020-15566" }, { "cve": "CVE-2020-15567", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-15567" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.13.x, allowing Intel guest OS users to gain privileges or cause a denial of service because of non-atomic modification of a live EPT PTE. When mapping guest EPT (nested paging) tables, Xen would in some circumstances use a series of non-atomic bitfield writes. Depending on the compiler version and optimisation flags, Xen might expose a dangerous partially written PTE to the hardware, which an attacker might be able to race to exploit. A guest administrator or perhaps even an unprivileged guest user might be able to cause denial of service, data corruption, or privilege escalation. Only systems using Intel CPUs are vulnerable. Systems using AMD CPUs, and Arm systems, are not vulnerable. Only systems using nested paging (hap, aka nested paging, aka in this case Intel EPT) are vulnerable. Only HVM and PVH guests can exploit the vulnerability. The presence and scope of the vulnerability depends on the precise optimisations performed by the compiler used to build Xen. If the compiler generates (a) a single 64-bit write, or (b) a series of read-modify-write operations in the same order as the source code, the hypervisor is not vulnerable. For example, in one test build using GCC 8.3 with normal settings, the compiler generated multiple (unlocked) read-modify-write operations in source-code order, which did not constitute a vulnerability. We have not been able to survey compilers; consequently we cannot say which compiler(s) might produce vulnerable code (with which code-generation options). The source code clearly violates the C rules, and thus should be considered vulnerable.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Basesystem 15 SP2:xen-libs-4.13.1_04-3.4.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:xen-tools-domU-4.13.1_04-3.4.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP2:xen-4.13.1_04-3.4.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP2:xen-devel-4.13.1_04-3.4.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP2:xen-tools-4.13.1_04-3.4.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP2:xen-tools-xendomains-wait-disk-4.13.1_04-3.4.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2020-15567", "url": "https://www.suse.com/security/cve/CVE-2020-15567" }, { "category": "external", "summary": "SUSE Bug 1173380 for CVE-2020-15567", "url": "https://bugzilla.suse.com/1173380" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2020-15567", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Basesystem 15 SP2:xen-libs-4.13.1_04-3.4.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:xen-tools-domU-4.13.1_04-3.4.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP2:xen-4.13.1_04-3.4.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP2:xen-devel-4.13.1_04-3.4.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP2:xen-tools-4.13.1_04-3.4.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP2:xen-tools-xendomains-wait-disk-4.13.1_04-3.4.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Basesystem 15 SP2:xen-libs-4.13.1_04-3.4.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:xen-tools-domU-4.13.1_04-3.4.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP2:xen-4.13.1_04-3.4.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP2:xen-devel-4.13.1_04-3.4.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP2:xen-tools-4.13.1_04-3.4.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP2:xen-tools-xendomains-wait-disk-4.13.1_04-3.4.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2020-07-14T13:19:47Z", "details": "moderate" } ], "title": "CVE-2020-15567" } ] }
suse-su-2020:1601-1
Vulnerability from csaf_suse
Published
2020-06-10 10:31
Modified
2020-06-10 10:31
Summary
Security update for ucode-intel
Notes
Title of the patch
Security update for ucode-intel
Description of the patch
This update for ucode-intel fixes the following issues:
Updated Intel CPU Microcode to 20200602 (prerelease) (bsc#1172466)
This update contains security mitigations for:
- CVE-2020-0543: Fixed a side channel attack against special registers
which could have resulted in leaking of read values to cores other
than the one which called it. This attack is known as Special Register
Buffer Data Sampling (SRBDS) or 'CrossTalk' (bsc#1154824).
- CVE-2020-0548,CVE-2020-0549: Additional ucode updates were supplied to
mitigate the Vector Register and L1D Eviction Sampling aka 'CacheOutAttack'
attacks. (bsc#1156353)
Microcode Table:
Processor Identifier Version Products
Model Stepping F-MO-S/PI Old->New
---- new platforms ----------------------------------------
---- updated platforms ------------------------------------
HSW C0 6-3c-3/32 00000027->00000028 Core Gen4
BDW-U/Y E0/F0 6-3d-4/c0 0000002e->0000002f Core Gen5
HSW-U C0/D0 6-45-1/72 00000025->00000026 Core Gen4
HSW-H C0 6-46-1/32 0000001b->0000001c Core Gen4
BDW-H/E3 E0/G0 6-47-1/22 00000021->00000022 Core Gen5
SKL-U/Y D0 6-4e-3/c0 000000d6->000000dc Core Gen6 Mobile
SKL-U23e K1 6-4e-3/c0 000000d6->000000dc Core Gen6 Mobile
SKX-SP B1 6-55-3/97 01000151->01000157 Xeon Scalable
SKX-SP H0/M0/U0 6-55-4/b7 02000065->02006906 Xeon Scalable
SKX-D M1 6-55-4/b7 02000065->02006906 Xeon D-21xx
CLX-SP B0 6-55-6/bf 0400002c->04002f01 Xeon Scalable Gen2
CLX-SP B1 6-55-7/bf 0500002c->04002f01 Xeon Scalable Gen2
SKL-H/S R0/N0 6-5e-3/36 000000d6->000000dc Core Gen6; Xeon E3 v5
AML-Y22 H0 6-8e-9/10 000000ca->000000d6 Core Gen8 Mobile
KBL-U/Y H0 6-8e-9/c0 000000ca->000000d6 Core Gen7 Mobile
CFL-U43e D0 6-8e-a/c0 000000ca->000000d6 Core Gen8 Mobile
WHL-U W0 6-8e-b/d0 000000ca->000000d6 Core Gen8 Mobile
AML-Y42 V0 6-8e-c/94 000000ca->000000d6 Core Gen10 Mobile
CML-Y42 V0 6-8e-c/94 000000ca->000000d6 Core Gen10 Mobile
WHL-U V0 6-8e-c/94 000000ca->000000d6 Core Gen8 Mobile
KBL-G/H/S/E3 B0 6-9e-9/2a 000000ca->000000d6 Core Gen7; Xeon E3 v6
CFL-H/S/E3 U0 6-9e-a/22 000000ca->000000d6 Core Gen8 Desktop, Mobile, Xeon E
CFL-S B0 6-9e-b/02 000000ca->000000d6 Core Gen8
CFL-H/S P0 6-9e-c/22 000000ca->000000d6 Core Gen9
CFL-H R0 6-9e-d/22 000000ca->000000d6 Core Gen9 Mobile
Also contains the Intel CPU Microcode update to 20200520:
Processor Identifier Version Products
Model Stepping F-MO-S/PI Old->New
---- new platforms ----------------------------------------
---- updated platforms ------------------------------------
SNB-E/EN/EP C1/M0 6-2d-6/6d 0000061f->00000621 Xeon E3/E5, Core X
SNB-E/EN/EP C2/M1 6-2d-7/6d 00000718->0000071a Xeon E3/E5, Core X
Patchnames
SUSE-2020-1601,SUSE-SLE-SERVER-12-SP5-2020-1601
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for ucode-intel", "title": "Title of the patch" }, { "category": "description", "text": "This update for ucode-intel fixes the following issues:\n\nUpdated Intel CPU Microcode to 20200602 (prerelease) (bsc#1172466)\n \nThis update contains security mitigations for:\n\n- CVE-2020-0543: Fixed a side channel attack against special registers\n which could have resulted in leaking of read values to cores other\n than the one which called it. This attack is known as Special Register\n Buffer Data Sampling (SRBDS) or \u0027CrossTalk\u0027 (bsc#1154824).\n- CVE-2020-0548,CVE-2020-0549: Additional ucode updates were supplied to\n mitigate the Vector Register and L1D Eviction Sampling aka \u0027CacheOutAttack\u0027\n attacks. (bsc#1156353)\n\nMicrocode Table:\n\n Processor Identifier Version Products\n Model Stepping F-MO-S/PI Old-\u003eNew\n ---- new platforms ----------------------------------------\n ---- updated platforms ------------------------------------\n HSW C0 6-3c-3/32 00000027-\u003e00000028 Core Gen4\n BDW-U/Y E0/F0 6-3d-4/c0 0000002e-\u003e0000002f Core Gen5\n HSW-U C0/D0 6-45-1/72 00000025-\u003e00000026 Core Gen4\n HSW-H C0 6-46-1/32 0000001b-\u003e0000001c Core Gen4\n BDW-H/E3 E0/G0 6-47-1/22 00000021-\u003e00000022 Core Gen5\n SKL-U/Y D0 6-4e-3/c0 000000d6-\u003e000000dc Core Gen6 Mobile\n SKL-U23e K1 6-4e-3/c0 000000d6-\u003e000000dc Core Gen6 Mobile\n SKX-SP B1 6-55-3/97 01000151-\u003e01000157 Xeon Scalable\n SKX-SP H0/M0/U0 6-55-4/b7 02000065-\u003e02006906 Xeon Scalable\n SKX-D M1 6-55-4/b7 02000065-\u003e02006906 Xeon D-21xx\n CLX-SP B0 6-55-6/bf 0400002c-\u003e04002f01 Xeon Scalable Gen2\n CLX-SP B1 6-55-7/bf 0500002c-\u003e04002f01 Xeon Scalable Gen2\n SKL-H/S R0/N0 6-5e-3/36 000000d6-\u003e000000dc Core Gen6; Xeon E3 v5\n AML-Y22 H0 6-8e-9/10 000000ca-\u003e000000d6 Core Gen8 Mobile\n KBL-U/Y H0 6-8e-9/c0 000000ca-\u003e000000d6 Core Gen7 Mobile\n CFL-U43e D0 6-8e-a/c0 000000ca-\u003e000000d6 Core Gen8 Mobile\n WHL-U W0 6-8e-b/d0 000000ca-\u003e000000d6 Core Gen8 Mobile\n AML-Y42 V0 6-8e-c/94 000000ca-\u003e000000d6 Core Gen10 Mobile\n CML-Y42 V0 6-8e-c/94 000000ca-\u003e000000d6 Core Gen10 Mobile\n WHL-U V0 6-8e-c/94 000000ca-\u003e000000d6 Core Gen8 Mobile\n KBL-G/H/S/E3 B0 6-9e-9/2a 000000ca-\u003e000000d6 Core Gen7; Xeon E3 v6\n CFL-H/S/E3 U0 6-9e-a/22 000000ca-\u003e000000d6 Core Gen8 Desktop, Mobile, Xeon E\n CFL-S B0 6-9e-b/02 000000ca-\u003e000000d6 Core Gen8\n CFL-H/S P0 6-9e-c/22 000000ca-\u003e000000d6 Core Gen9\n CFL-H R0 6-9e-d/22 000000ca-\u003e000000d6 Core Gen9 Mobile\n\nAlso contains the Intel CPU Microcode update to 20200520:\n\n Processor Identifier Version Products\n Model Stepping F-MO-S/PI Old-\u003eNew\n ---- new platforms ----------------------------------------\n ---- updated platforms ------------------------------------\n SNB-E/EN/EP C1/M0 6-2d-6/6d 0000061f-\u003e00000621 Xeon E3/E5, Core X\n SNB-E/EN/EP C2/M1 6-2d-7/6d 00000718-\u003e0000071a Xeon E3/E5, Core X\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2020-1601,SUSE-SLE-SERVER-12-SP5-2020-1601", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2020_1601-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2020:1601-1", "url": "https://www.suse.com/support/update/announcement/2020/suse-su-20201601-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2020:1601-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-June/006925.html" }, { "category": "self", "summary": "SUSE Bug 1154824", "url": "https://bugzilla.suse.com/1154824" }, { "category": "self", "summary": "SUSE Bug 1156353", "url": "https://bugzilla.suse.com/1156353" }, { "category": "self", "summary": "SUSE Bug 1172466", "url": "https://bugzilla.suse.com/1172466" }, { "category": "self", "summary": "SUSE CVE CVE-2020-0543 page", "url": "https://www.suse.com/security/cve/CVE-2020-0543/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-0548 page", "url": "https://www.suse.com/security/cve/CVE-2020-0548/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-0549 page", "url": "https://www.suse.com/security/cve/CVE-2020-0549/" } ], "title": "Security update for ucode-intel", "tracking": { "current_release_date": "2020-06-10T10:31:46Z", "generator": { "date": "2020-06-10T10:31:46Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2020:1601-1", "initial_release_date": "2020-06-10T10:31:46Z", "revision_history": [ { "date": "2020-06-10T10:31:46Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "ucode-intel-20200602-3.12.1.i586", "product": { "name": "ucode-intel-20200602-3.12.1.i586", "product_id": "ucode-intel-20200602-3.12.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "ucode-intel-20200602-3.12.1.x86_64", "product": { "name": "ucode-intel-20200602-3.12.1.x86_64", "product_id": "ucode-intel-20200602-3.12.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP5", "product": { "name": "SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sles:12:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp5" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "ucode-intel-20200602-3.12.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:ucode-intel-20200602-3.12.1.x86_64" }, "product_reference": "ucode-intel-20200602-3.12.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "ucode-intel-20200602-3.12.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:ucode-intel-20200602-3.12.1.x86_64" }, "product_reference": "ucode-intel-20200602-3.12.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-0543", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-0543" } ], "notes": [ { "category": "general", "text": "Incomplete cleanup from specific special register read operations in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP5:ucode-intel-20200602-3.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:ucode-intel-20200602-3.12.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-0543", "url": "https://www.suse.com/security/cve/CVE-2020-0543" }, { "category": "external", "summary": "SUSE Bug 1154824 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1154824" }, { "category": "external", "summary": "SUSE Bug 1172205 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172205" }, { "category": "external", "summary": "SUSE Bug 1172206 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172206" }, { "category": "external", "summary": "SUSE Bug 1172207 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172207" }, { "category": "external", "summary": "SUSE Bug 1172770 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172770" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP5:ucode-intel-20200602-3.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:ucode-intel-20200602-3.12.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP5:ucode-intel-20200602-3.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:ucode-intel-20200602-3.12.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-10T10:31:46Z", "details": "moderate" } ], "title": "CVE-2020-0543" }, { "cve": "CVE-2020-0548", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-0548" } ], "notes": [ { "category": "general", "text": "Cleanup errors in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP5:ucode-intel-20200602-3.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:ucode-intel-20200602-3.12.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-0548", "url": "https://www.suse.com/security/cve/CVE-2020-0548" }, { "category": "external", "summary": "SUSE Bug 1156353 for CVE-2020-0548", "url": "https://bugzilla.suse.com/1156353" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP5:ucode-intel-20200602-3.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:ucode-intel-20200602-3.12.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.8, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP5:ucode-intel-20200602-3.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:ucode-intel-20200602-3.12.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-10T10:31:46Z", "details": "moderate" } ], "title": "CVE-2020-0548" }, { "cve": "CVE-2020-0549", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-0549" } ], "notes": [ { "category": "general", "text": "Cleanup errors in some data cache evictions for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP5:ucode-intel-20200602-3.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:ucode-intel-20200602-3.12.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-0549", "url": "https://www.suse.com/security/cve/CVE-2020-0549" }, { "category": "external", "summary": "SUSE Bug 1156353 for CVE-2020-0549", "url": "https://bugzilla.suse.com/1156353" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP5:ucode-intel-20200602-3.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:ucode-intel-20200602-3.12.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP5:ucode-intel-20200602-3.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:ucode-intel-20200602-3.12.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-10T10:31:46Z", "details": "moderate" } ], "title": "CVE-2020-0549" } ] }
suse-su-2020:1633-1
Vulnerability from csaf_suse
Published
2020-06-17 08:35
Modified
2020-06-17 08:35
Summary
Security update for xen
Notes
Title of the patch
Security update for xen
Description of the patch
This update for xen fixes the following issues:
- CVE-2020-0543: Fixed a side channel attack against special registers which could have resulted in leaking of read values to cores other than the one which called it.
This attack is known as Special Register Buffer Data Sampling (SRBDS) or 'CrossTalk' (bsc#1172205).
- Fixed an issue with efi boot when nvidia optimus or newer graphic cards are used (bsc#1168178).d
Patchnames
SUSE-2020-1633,SUSE-SLE-SDK-12-SP5-2020-1633,SUSE-SLE-SERVER-12-SP5-2020-1633
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for xen", "title": "Title of the patch" }, { "category": "description", "text": "This update for xen fixes the following issues:\n\n- CVE-2020-0543: Fixed a side channel attack against special registers which could have resulted in leaking of read values to cores other than the one which called it.\n This attack is known as Special Register Buffer Data Sampling (SRBDS) or \u0027CrossTalk\u0027 (bsc#1172205).\t \n- Fixed an issue with efi boot when nvidia optimus or newer graphic cards are used (bsc#1168178).d\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2020-1633,SUSE-SLE-SDK-12-SP5-2020-1633,SUSE-SLE-SERVER-12-SP5-2020-1633", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2020_1633-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2020:1633-1", "url": "https://www.suse.com/support/update/announcement/2020/suse-su-20201633-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2020:1633-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-June/006958.html" }, { "category": "self", "summary": "SUSE Bug 1027519", "url": "https://bugzilla.suse.com/1027519" }, { "category": "self", "summary": "SUSE Bug 1168178", "url": "https://bugzilla.suse.com/1168178" }, { "category": "self", "summary": "SUSE Bug 1172205", "url": "https://bugzilla.suse.com/1172205" }, { "category": "self", "summary": "SUSE CVE CVE-2020-0543 page", "url": "https://www.suse.com/security/cve/CVE-2020-0543/" } ], "title": "Security update for xen", "tracking": { "current_release_date": "2020-06-17T08:35:24Z", "generator": { "date": "2020-06-17T08:35:24Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2020:1633-1", "initial_release_date": "2020-06-17T08:35:24Z", "revision_history": [ { "date": "2020-06-17T08:35:24Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "xen-4.12.3_02-3.14.1.aarch64", "product": { "name": "xen-4.12.3_02-3.14.1.aarch64", "product_id": "xen-4.12.3_02-3.14.1.aarch64" } }, { "category": "product_version", "name": "xen-devel-4.12.3_02-3.14.1.aarch64", "product": { "name": "xen-devel-4.12.3_02-3.14.1.aarch64", "product_id": "xen-devel-4.12.3_02-3.14.1.aarch64" } }, { "category": "product_version", "name": "xen-doc-html-4.12.3_02-3.14.1.aarch64", "product": { "name": "xen-doc-html-4.12.3_02-3.14.1.aarch64", "product_id": "xen-doc-html-4.12.3_02-3.14.1.aarch64" } }, { "category": "product_version", "name": "xen-libs-4.12.3_02-3.14.1.aarch64", "product": { "name": "xen-libs-4.12.3_02-3.14.1.aarch64", "product_id": "xen-libs-4.12.3_02-3.14.1.aarch64" } }, { "category": "product_version", "name": "xen-tools-4.12.3_02-3.14.1.aarch64", "product": { "name": "xen-tools-4.12.3_02-3.14.1.aarch64", "product_id": "xen-tools-4.12.3_02-3.14.1.aarch64" } }, { "category": "product_version", "name": "xen-tools-domU-4.12.3_02-3.14.1.aarch64", "product": { "name": "xen-tools-domU-4.12.3_02-3.14.1.aarch64", "product_id": "xen-tools-domU-4.12.3_02-3.14.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "xen-libs-64bit-4.12.3_02-3.14.1.aarch64_ilp32", "product": { "name": "xen-libs-64bit-4.12.3_02-3.14.1.aarch64_ilp32", "product_id": "xen-libs-64bit-4.12.3_02-3.14.1.aarch64_ilp32" } } ], "category": "architecture", "name": "aarch64_ilp32" }, { "branches": [ { "category": "product_version", "name": "xen-devel-4.12.3_02-3.14.1.i586", "product": { "name": "xen-devel-4.12.3_02-3.14.1.i586", "product_id": "xen-devel-4.12.3_02-3.14.1.i586" } }, { "category": "product_version", "name": "xen-libs-4.12.3_02-3.14.1.i586", "product": { "name": "xen-libs-4.12.3_02-3.14.1.i586", "product_id": "xen-libs-4.12.3_02-3.14.1.i586" } }, { "category": "product_version", "name": "xen-tools-domU-4.12.3_02-3.14.1.i586", "product": { "name": "xen-tools-domU-4.12.3_02-3.14.1.i586", "product_id": "xen-tools-domU-4.12.3_02-3.14.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "xen-4.12.3_02-3.14.1.x86_64", "product": { "name": "xen-4.12.3_02-3.14.1.x86_64", "product_id": "xen-4.12.3_02-3.14.1.x86_64" } }, { "category": "product_version", "name": "xen-devel-4.12.3_02-3.14.1.x86_64", "product": { "name": "xen-devel-4.12.3_02-3.14.1.x86_64", "product_id": "xen-devel-4.12.3_02-3.14.1.x86_64" } }, { "category": "product_version", "name": "xen-doc-html-4.12.3_02-3.14.1.x86_64", "product": { "name": "xen-doc-html-4.12.3_02-3.14.1.x86_64", "product_id": "xen-doc-html-4.12.3_02-3.14.1.x86_64" } }, { "category": "product_version", "name": "xen-libs-4.12.3_02-3.14.1.x86_64", "product": { "name": "xen-libs-4.12.3_02-3.14.1.x86_64", "product_id": "xen-libs-4.12.3_02-3.14.1.x86_64" } }, { "category": "product_version", "name": "xen-libs-32bit-4.12.3_02-3.14.1.x86_64", "product": { "name": "xen-libs-32bit-4.12.3_02-3.14.1.x86_64", "product_id": "xen-libs-32bit-4.12.3_02-3.14.1.x86_64" } }, { "category": "product_version", "name": "xen-tools-4.12.3_02-3.14.1.x86_64", "product": { "name": "xen-tools-4.12.3_02-3.14.1.x86_64", "product_id": "xen-tools-4.12.3_02-3.14.1.x86_64" } }, { "category": "product_version", "name": "xen-tools-domU-4.12.3_02-3.14.1.x86_64", "product": { "name": "xen-tools-domU-4.12.3_02-3.14.1.x86_64", "product_id": "xen-tools-domU-4.12.3_02-3.14.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Software Development Kit 12 SP5", "product": { "name": "SUSE Linux Enterprise Software Development Kit 12 SP5", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-sdk:12:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP5", "product": { "name": "SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sles:12:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp5" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "xen-devel-4.12.3_02-3.14.1.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:xen-devel-4.12.3_02-3.14.1.aarch64" }, "product_reference": "xen-devel-4.12.3_02-3.14.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "xen-devel-4.12.3_02-3.14.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:xen-devel-4.12.3_02-3.14.1.x86_64" }, "product_reference": "xen-devel-4.12.3_02-3.14.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "xen-4.12.3_02-3.14.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:xen-4.12.3_02-3.14.1.x86_64" }, "product_reference": "xen-4.12.3_02-3.14.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "xen-doc-html-4.12.3_02-3.14.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:xen-doc-html-4.12.3_02-3.14.1.x86_64" }, "product_reference": "xen-doc-html-4.12.3_02-3.14.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.12.3_02-3.14.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:xen-libs-4.12.3_02-3.14.1.x86_64" }, "product_reference": "xen-libs-4.12.3_02-3.14.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-32bit-4.12.3_02-3.14.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:xen-libs-32bit-4.12.3_02-3.14.1.x86_64" }, "product_reference": "xen-libs-32bit-4.12.3_02-3.14.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.12.3_02-3.14.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:xen-tools-4.12.3_02-3.14.1.x86_64" }, "product_reference": "xen-tools-4.12.3_02-3.14.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.12.3_02-3.14.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:xen-tools-domU-4.12.3_02-3.14.1.x86_64" }, "product_reference": "xen-tools-domU-4.12.3_02-3.14.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "xen-4.12.3_02-3.14.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-4.12.3_02-3.14.1.x86_64" }, "product_reference": "xen-4.12.3_02-3.14.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "xen-doc-html-4.12.3_02-3.14.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-doc-html-4.12.3_02-3.14.1.x86_64" }, "product_reference": "xen-doc-html-4.12.3_02-3.14.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.12.3_02-3.14.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-libs-4.12.3_02-3.14.1.x86_64" }, "product_reference": "xen-libs-4.12.3_02-3.14.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-32bit-4.12.3_02-3.14.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-libs-32bit-4.12.3_02-3.14.1.x86_64" }, "product_reference": "xen-libs-32bit-4.12.3_02-3.14.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.12.3_02-3.14.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-tools-4.12.3_02-3.14.1.x86_64" }, "product_reference": "xen-tools-4.12.3_02-3.14.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.12.3_02-3.14.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-tools-domU-4.12.3_02-3.14.1.x86_64" }, "product_reference": "xen-tools-domU-4.12.3_02-3.14.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-0543", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-0543" } ], "notes": [ { "category": "general", "text": "Incomplete cleanup from specific special register read operations in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP5:xen-4.12.3_02-3.14.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-doc-html-4.12.3_02-3.14.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-libs-32bit-4.12.3_02-3.14.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-libs-4.12.3_02-3.14.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-tools-4.12.3_02-3.14.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-tools-domU-4.12.3_02-3.14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-4.12.3_02-3.14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-doc-html-4.12.3_02-3.14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-libs-32bit-4.12.3_02-3.14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-libs-4.12.3_02-3.14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-tools-4.12.3_02-3.14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-tools-domU-4.12.3_02-3.14.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:xen-devel-4.12.3_02-3.14.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:xen-devel-4.12.3_02-3.14.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-0543", "url": "https://www.suse.com/security/cve/CVE-2020-0543" }, { "category": "external", "summary": "SUSE Bug 1154824 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1154824" }, { "category": "external", "summary": "SUSE Bug 1172205 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172205" }, { "category": "external", "summary": "SUSE Bug 1172206 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172206" }, { "category": "external", "summary": "SUSE Bug 1172207 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172207" }, { "category": "external", "summary": "SUSE Bug 1172770 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172770" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP5:xen-4.12.3_02-3.14.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-doc-html-4.12.3_02-3.14.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-libs-32bit-4.12.3_02-3.14.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-libs-4.12.3_02-3.14.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-tools-4.12.3_02-3.14.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-tools-domU-4.12.3_02-3.14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-4.12.3_02-3.14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-doc-html-4.12.3_02-3.14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-libs-32bit-4.12.3_02-3.14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-libs-4.12.3_02-3.14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-tools-4.12.3_02-3.14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-tools-domU-4.12.3_02-3.14.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:xen-devel-4.12.3_02-3.14.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:xen-devel-4.12.3_02-3.14.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP5:xen-4.12.3_02-3.14.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-doc-html-4.12.3_02-3.14.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-libs-32bit-4.12.3_02-3.14.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-libs-4.12.3_02-3.14.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-tools-4.12.3_02-3.14.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-tools-domU-4.12.3_02-3.14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-4.12.3_02-3.14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-doc-html-4.12.3_02-3.14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-libs-32bit-4.12.3_02-3.14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-libs-4.12.3_02-3.14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-tools-4.12.3_02-3.14.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-tools-domU-4.12.3_02-3.14.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:xen-devel-4.12.3_02-3.14.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:xen-devel-4.12.3_02-3.14.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-17T08:35:24Z", "details": "moderate" } ], "title": "CVE-2020-0543" } ] }
suse-su-2020:1603-1
Vulnerability from csaf_suse
Published
2020-06-10 13:28
Modified
2020-06-10 13:28
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 12 SP4 Azure kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2020-0543: Fixed a side channel attack against special registers which could have resulted in leaking of read values to cores other than the one which called it.
This attack is known as Special Register Buffer Data Sampling (SRBDS) or 'CrossTalk' (bsc#1154824).
- CVE-2020-13143: Fixed an out-of-bounds read in gadget_dev_desc_UDC_store in drivers/usb/gadget/configfs.c (bsc#1171982).
- CVE-2020-12769: Fixed an issue which could have allowed attackers to cause a panic via concurrent calls to dw_spi_irq and dw_spi_transfer_one (bsc#1171983).
- CVE-2020-12768: Fixed a memory leak in svm_cpu_uninit in arch/x86/kvm/svm.c (bsc#1171736).
- CVE-2020-12657: An a use-after-free in block/bfq-iosched.c (bsc#1171205).
- CVE-2020-12656: Fixed an improper handling of certain domain_release calls leadingch could have led to a memory leak (bsc#1171219).
- CVE-2020-12655: Fixed an issue which could have allowed attackers to trigger a sync of excessive duration via an XFS v5 image with crafted metadata (bsc#1171217).
- CVE-2020-12654: Fixed an issue in he wifi driver which could have allowed a remote AP to trigger a heap-based buffer overflow (bsc#1171202).
- CVE-2020-12653: Fixed an issue in the wifi driver which could have allowed local users to gain privileges or cause a denial of service (bsc#1171195).
- CVE-2020-12652: Fixed an issue which could have allowed local users to hold an incorrect lock during the ioctl operation and trigger a race condition (bsc#1171218).
- CVE-2020-12464: Fixed a use-after-free due to a transfer without a reference (bsc#1170901).
- CVE-2020-12114: Fixed a pivot_root race condition which could have allowed local users to cause a denial of service (panic) by corrupting a mountpoint reference counter (bsc#1171098).
- CVE-2020-10757: Fixed an issue where remaping hugepage DAX to anon mmap could have caused user PTE access (bsc#1172317).
- CVE-2020-10751: Fixed an improper implementation in SELinux LSM hook where it was assumed that an skb would only contain a single netlink message (bsc#1171189).
- CVE-2020-10732: Fixed kernel data leak in userspace coredumps due to uninitialized data (bsc#1171220).
- CVE-2020-10720: Fixed a use-after-free read in napi_gro_frags() (bsc#1170778).
- CVE-2020-10711: Fixed a null pointer dereference in SELinux subsystem which could have allowed a remote network user to crash the kernel resulting in a denial of service (bsc#1171191).
- CVE-2020-10690: Fixed the race between the release of ptp_clock and cdev (bsc#1170056).
- CVE-2019-9455: Fixed a pointer leak due to a WARN_ON statement in a video driver. This could lead to local information disclosure with System execution privileges needed (bsc#1170345).
- CVE-2019-20812: Fixed an issue in prb_calc_retire_blk_tmo() which could have resulted in a denial of service (bsc#1172453).
- CVE-2019-20806: Fixed a null pointer dereference which may had lead to denial of service (bsc#1172199).
- CVE-2019-19462: Fixed an issue which could have allowed local user to cause denial of service (bsc#1158265).
- CVE-2018-1000199: Fixed a potential local code execution via ptrace (bsc#1089895).
The following non-security bugs were fixed:
- ACPI: CPPC: Fix reference count leak in acpi_cppc_processor_probe() (bsc#1051510).
- ACPI: sysfs: Fix reference count leak in acpi_sysfs_add_hotplug_profile() (bsc#1051510).
- acpi/x86: ignore unspecified bit positions in the ACPI global lock field (bsc#1051510).
- Add commit for git-fix that's not a fix This commit cleans up debug code but does not fix anything, and it relies on a new kernel function that isn't yet in this version of SLE.
- agp/intel: Reinforce the barrier after GTT updates (bsc#1051510).
- ALSA: ctxfi: Remove unnecessary cast in kfree (bsc#1051510).
- ALSA: hda: Do not release card at firmware loading error (bsc#1051510).
- ALSA: hda/hdmi: fix race in monitor detection during probe (bsc#1051510).
- ALSA: hda/hdmi: fix without unlocked before return (bsc#1051510).
- ALSA: hda: Keep the controller initialization even if no codecs found (bsc#1051510).
- ALSA: hda/realtek - Add more fixup entries for Clevo machines (git-fixes).
- ALSA: hda/realtek - Add new codec supported for ALC245 (bsc#1051510).
- ALSA: hda/realtek - Add new codec supported for ALC287 (git-fixes).
- ALSA: hda/realtek - Fix S3 pop noise on Dell Wyse (git-fixes).
- ALSA: hda/realtek - Fix unexpected init_amp override (bsc#1051510).
- ALSA: hda/realtek - Limit int mic boost for Thinkpad T530 (git-fixes bsc#1171293).
- ALSA: hda/realtek - Two front mics on a Lenovo ThinkCenter (bsc#1051510).
- ALSA: hwdep: fix a left shifting 1 by 31 UB bug (git-fixes).
- ALSA: iec1712: Initialize STDSP24 properly when using the model=staudio option (git-fixes).
- ALSA: opti9xx: shut up gcc-10 range warning (bsc#1051510).
- ALSA: pcm: fix incorrect hw_base increase (git-fixes).
- ALSA: pcm: oss: Place the plugin buffer overflow checks correctly (bsc#1170522).
- ALSA: rawmidi: Fix racy buffer resize under concurrent accesses (git-fixes).
- ALSA: usb-audio: Add control message quirk delay for Kingston HyperX headset (git-fixes).
- ALSA: usb-audio: Correct a typo of NuPrime DAC-10 USB ID (bsc#1051510).
- ALSA: usb-audio: Do not override ignore_ctl_error value from the map (bsc#1051510).
- ALSA: usb-audio: Fix usb audio refcnt leak when getting spdif (bsc#1051510).
- ALSA: usb-audio: mixer: volume quirk for ESS Technology Asus USB DAC (git-fixes).
- ALSA: usx2y: Fix potential NULL dereference (bsc#1051510).
- ASoC: codecs: hdac_hdmi: Fix incorrect use of list_for_each_entry (bsc#1051510).
- ASoC: dapm: connect virtual mux with default value (bsc#1051510).
- ASoC: dapm: fixup dapm kcontrol widget (bsc#1051510).
- ASoC: dpcm: allow start or stop during pause for backend (bsc#1051510).
- ASoC: fix regwmask (bsc#1051510).
- ASoC: msm8916-wcd-digital: Reset RX interpolation path after use (bsc#1051510).
- ASoC: topology: Check return value of pcm_new_ver (bsc#1051510).
- ASoC: topology: use name_prefix for new kcontrol (bsc#1051510).
- b43legacy: Fix case where channel status is corrupted (bsc#1051510).
- batman-adv: fix batadv_nc_random_weight_tq (git-fixes).
- batman-adv: Fix refcnt leak in batadv_show_throughput_override (git-fixes).
- batman-adv: Fix refcnt leak in batadv_store_throughput_override (git-fixes).
- batman-adv: Fix refcnt leak in batadv_v_ogm_process (git-fixes).
- bcache: avoid unnecessary btree nodes flushing in btree_flush_write() (git fixes (block drivers)).
- bcache: fix incorrect data type usage in btree_flush_write() (git fixes (block drivers)).
- bcache: Revert 'bcache: shrink btree node cache after bch_btree_check()' (git fixes (block drivers)).
- block/drbd: delete invalid function drbd_md_mark_dirty_ (bsc#1171527).
- block: drbd: remove a stray unlock in __drbd_send_protocol() (bsc#1171599).
- block: fix busy device checking in blk_drop_partitions again (bsc#1171948).
- block: fix busy device checking in blk_drop_partitions (bsc#1171948).
- block: fix memleak of bio integrity data (git fixes (block drivers)).
- block: remove the bd_openers checks in blk_drop_partitions (bsc#1171948).
- bnxt_en: fix memory leaks in bnxt_dcbnl_ieee_getets() (networking-stable-20_03_28).
- bnxt_en: reinitialize IRQs when MTU is modified (networking-stable-20_03_14).
- bonding/alb: make sure arp header is pulled before accessing it (networking-stable-20_03_14).
- brcmfmac: abort and release host after error (bsc#1051510).
- btrfs: fix deadlock with memory reclaim during scrub (bsc#1172127).
- btrfs: fix log context list corruption after rename whiteout error (bsc#1172342).
- btrfs: fix partial loss of prealloc extent past i_size after fsync (bsc#1172343).
- btrfs: move the dio_sem higher up the callchain (bsc#1171761).
- btrfs: reloc: clear DEAD_RELOC_TREE bit for orphan roots to prevent runaway balance (bsc#1171417 bsc#1160947 bsc#1172366).
- btrfs: reloc: fix reloc root leak and NULL pointer dereference (bsc#1171417 bsc#1160947 bsc#1172366).
- btrfs: setup a nofs context for memory allocation at btrfs_create_tree() (bsc#1172127).
- btrfs: setup a nofs context for memory allocation at __btrfs_set_acl (bsc#1172127).
- btrfs: use nofs context when initializing security xattrs to avoid deadlock (bsc#1172127).
- can: add missing attribute validation for termination (networking-stable-20_03_14).
- cdc-acm: close race betrween suspend() and acm_softint (git-fixes).
- cdc-acm: introduce a cool down (git-fixes).
- ceph: fix double unlock in handle_cap_export() (bsc#1171694).
- ceph: fix endianness bug when handling MDS session feature bits (bsc#1171695).
- cgroup, netclassid: periodically release file_lock on classid updating (networking-stable-20_03_14).
- CIFS: Allocate crypto structures on the fly for calculating signatures of incoming packets (bsc#1144333).
- CIFS: Allocate encryption header through kmalloc (bsc#1144333).
- CIFS: allow unlock flock and OFD lock across fork (bsc#1144333).
- CIFS: check new file size when extending file by fallocate (bsc#1144333).
- CIFS: cifspdu.h: Replace zero-length array with flexible-array member (bsc#1144333).
- CIFS: clear PF_MEMALLOC before exiting demultiplex thread (bsc#1144333).
- CIFS: do not share tcons with DFS (bsc#1144333).
- CIFS: dump the session id and keys also for SMB2 sessions (bsc#1144333).
- CIFS: ensure correct super block for DFS reconnect (bsc#1144333).
- CIFS: Fix bug which the return value by asynchronous read is error (bsc#1144333).
- CIFS: fix uninitialised lease_key in open_shroot() (bsc#1144333).
- CIFS: improve read performance for page size 64KB & cache=strict & vers=2.1+ (bsc#1144333).
- CIFS: Increment num_remote_opens stats counter even in case of smb2_query_dir_first (bsc#1144333).
- CIFS: minor update to comments around the cifs_tcp_ses_lock mutex (bsc#1144333).
- CIFS: protect updating server->dstaddr with a spinlock (bsc#1144333).
- CIFS: smb2pdu.h: Replace zero-length array with flexible-array member (bsc#1144333).
- CIFS: smbd: Calculate the correct maximum packet size for segmented SMBDirect send/receive (bsc#1144333).
- CIFS: smbd: Check and extend sender credits in interrupt context (bsc#1144333).
- CIFS: smbd: Check send queue size before posting a send (bsc#1144333).
- CIFS: smbd: Do not schedule work to send immediate packet on every receive (bsc#1144333).
- CIFS: smbd: Merge code to track pending packets (bsc#1144333).
- CIFS: smbd: Properly process errors on ib_post_send (bsc#1144333).
- CIFS: smbd: Update receive credits before sending and deal with credits roll back on failure before sending (bsc#1144333).
- CIFS: Warn less noisily on default mount (bsc#1144333).
- clk: Add clk_hw_unregister_composite helper function definition (bsc#1051510).
- clk: imx6ull: use OSC clock during AXI rate change (bsc#1051510).
- clk: imx: make mux parent strings const (bsc#1051510).
- clk: mediatek: correct the clocks for MT2701 HDMI PHY module (bsc#1051510).
- clk: sunxi-ng: a64: Fix gate bit of DSI DPHY (bsc#1051510).
- clocksource/drivers/hyper-v: Set TSC clocksource as default w/ InvariantTSC (bsc#1170620).
- clocksource: dw_apb_timer_of: Fix missing clockevent timers (bsc#1051510).
- component: Silence bind error on -EPROBE_DEFER (bsc#1051510).
- coresight: do not use the BIT() macro in the UAPI header (git fixes (block drivers)).
- cpufreq: s3c64xx: Remove pointless NULL check in s3c64xx_cpufreq_driver_init (bsc#1051510).
- crypto: ccp - AES CFB mode is a stream cipher (git-fixes).
- crypto: ccp - Clean up and exit correctly on allocation failure (git-fixes).
- crypto: ccp - Cleanup misc_dev on sev_exit() (bsc#1114279).
- crypto: ccp - Cleanup sp_dev_master in psp_dev_destroy() (bsc#1114279).
- debugfs: Add debugfs_create_xul() for hexadecimal unsigned long (git-fixes).
- dmaengine: dmatest: Fix iteration non-stop logic (bsc#1051510).
- dm mpath: switch paths in dm_blk_ioctl() code path (bsc#1167574).
- dm writecache: fix data corruption when reloading the target (git fixes (block drivers)).
- dm writecache: fix incorrect flush sequence when doing SSD mode commit (git fixes (block drivers)).
- dm writecache: verify watermark during resume (git fixes (block drivers)).
- dm zoned: fix invalid memory access (git fixes (block drivers)).
- dm zoned: reduce overhead of backing device checks (git fixes (block drivers)).
- dm zoned: remove duplicate nr_rnd_zones increase in dmz_init_zone() (git fixes (block drivers)).
- dm zoned: support zone sizes smaller than 128MiB (git fixes (block drivers)).
- dp83640: reverse arguments to list_add_tail (git-fixes).
- Drivers: hv: Add a module description line to the hv_vmbus driver (bsc#1172253).
- Drivers: HV: Send one page worth of kmsg dump over Hyper-V during panic (bsc#1170618).
- Drivers: hv: vmbus: Fix the issue with freeing up hv_ctl_table_hdr (bsc#1170618).
- Drivers: hv: vmbus: Get rid of MSR access from vmbus_drv.c (bsc#1170618).
- Drivers: hv: vmus: Fix the check for return value from kmsg get dump buffer (bsc#1170618).
- drivers/net/ibmvnic: Update VNIC protocol version reporting (bsc#1065729).
- drm: amd/acp: fix broken menu structure (bsc#1114279) * context changes
- drm/crc: Actually allow to change the crc source (bsc#1114279) * offset changes
- drm/dp_mst: Fix clearing payload state on topology disable (bsc#1051510).
- drm/dp_mst: Reformat drm_dp_check_act_status() a bit (bsc#1051510).
- drm/edid: Fix off-by-one in DispID DTD pixel clock (bsc#1114279)
- drm/i915/gvt: Init DPLL/DDI vreg for virtual display instead of (bsc#1114279)
- drm/i915: properly sanity check batch_start_offset (bsc#1114279) * renamed display/intel_fbc.c -> intel_fb.c * renamed gt/intel_rc6.c -> intel_pm.c * context changes
- drm/meson: Delete an error message in meson_dw_hdmi_bind() (bsc#1051510).
- drm: NULL pointer dereference [null-pointer-deref] (CWE 476) problem (bsc#1114279)
- drm/qxl: qxl_release leak in qxl_draw_dirty_fb() (bsc#1051510).
- drm/qxl: qxl_release leak in qxl_hw_surface_alloc() (bsc#1051510).
- drm/qxl: qxl_release use after free (bsc#1051510).
- drm: Remove PageReserved manipulation from drm_pci_alloc (bsc#1114279) * offset changes
- dump_stack: avoid the livelock of the dump_lock (git fixes (block drivers)).
- EDAC, sb_edac: Add support for systems with segmented PCI buses (bsc#1169525).
- ext4: do not zeroout extents beyond i_disksize (bsc#1167851).
- ext4: fix extent_status fragmentation for plain files (bsc#1171949).
- ext4: use non-movable memory for superblock readahead (bsc#1171952).
- fanotify: fix merging marks masks with FAN_ONDIR (bsc#1171679).
- fbcon: fix null-ptr-deref in fbcon_switch (bsc#1114279) * rename drivers/video/fbdev/core to drivers/video/console * context changes
- fib: add missing attribute validation for tun_id (networking-stable-20_03_14).
- firmware: qcom: scm: fix compilation error when disabled (bsc#1051510).
- fs/cifs: fix gcc warning in sid_to_id (bsc#1144333).
- fs/seq_file.c: simplify seq_file iteration code and interface (bsc#1170125).
- gpio: tegra: mask GPIO IRQs during IRQ shutdown (bsc#1051510).
- gre: fix uninit-value in __iptunnel_pull_header (networking-stable-20_03_14).
- HID: hid-input: clear unmapped usages (git-fixes).
- HID: hyperv: Add a module description line (bsc#1172253).
- HID: i2c-hid: add Trekstor Primebook C11B to descriptor override (git-fixes).
- HID: i2c-hid: override HID descriptors for certain devices (git-fixes).
- HID: multitouch: add eGalaxTouch P80H84 support (bsc#1051510).
- HID: wacom: Read HID_DG_CONTACTMAX directly for non-generic devices (git-fixes).
- hrtimer: Annotate lockless access to timer->state (git fixes (block drivers)).
- hsr: add restart routine into hsr_get_node_list() (networking-stable-20_03_28).
- hsr: check protocol version in hsr_newlink() (networking-stable-20_04_17).
- hsr: fix general protection fault in hsr_addr_is_self() (networking-stable-20_03_28).
- hsr: set .netnsok flag (networking-stable-20_03_28).
- hsr: use rcu_read_lock() in hsr_get_node_{list/status}() (networking-stable-20_03_28).
- i2c: acpi: Force bus speed to 400KHz if a Silead touchscreen is present (git-fixes).
- i2c: acpi: put device when verifying client fails (git-fixes).
- i2c: brcmstb: remove unused struct member (git-fixes).
- i2c: core: Allow empty id_table in ACPI case as well (git-fixes).
- i2c: core: decrease reference count of device node in i2c_unregister_device (git-fixes).
- i2c: dev: Fix the race between the release of i2c_dev and cdev (bsc#1051510).
- i2c: fix missing pm_runtime_put_sync in i2c_device_probe (git-fixes).
- i2c-hid: properly terminate i2c_hid_dmi_desc_override_table array (git-fixes).
- i2c: i801: Do not add ICH_RES_IO_SMI for the iTCO_wdt device (git-fixes).
- i2c: iproc: Stop advertising support of SMBUS quick cmd (git-fixes).
- i2c: isch: Remove unnecessary acpi.h include (git-fixes).
- i2c: mux: demux-pinctrl: Fix an error handling path in 'i2c_demux_pinctrl_probe()' (bsc#1051510).
- i2c: st: fix missing struct parameter description (bsc#1051510).
- IB/ipoib: Add child to parent list only if device initialized (bsc#1168503).
- IB/ipoib: Consolidate checking of the proposed child interface (bsc#1168503).
- IB/ipoib: Do not remove child devices from within the ndo_uninit (bsc#1168503).
- IB/ipoib: Get rid of IPOIB_FLAG_GOING_DOWN (bsc#1168503).
- IB/ipoib: Get rid of the sysfs_mutex (bsc#1168503).
- IB/ipoib: Maintain the child_intfs list from ndo_init/uninit (bsc#1168503).
- IB/ipoib: Move all uninit code into ndo_uninit (bsc#1168503).
- IB/ipoib: Move init code to ndo_init (bsc#1168503).
- IB/ipoib: Replace printk with pr_warn (bsc#1168503).
- IB/ipoib: Use cancel_delayed_work_sync for neigh-clean task (bsc#1168503).
- IB/ipoib: Warn when one port fails to initialize (bsc#1168503).
- ibmvnic: Skip fatal error reset after passive init (bsc#1171078 ltc#184239).
- iio:ad7797: Use correct attribute_group (bsc#1051510).
- iio: adc: stm32-adc: fix device used to request dma (bsc#1051510).
- iio: adc: stm32-adc: fix sleep in atomic context (git-fixes).
- iio: adc: stm32-adc: Use dma_request_chan() instead dma_request_slave_channel() (bsc#1051510).
- iio: dac: vf610: Fix an error handling path in 'vf610_dac_probe()' (bsc#1051510).
- iio: sca3000: Remove an erroneous 'get_device()' (bsc#1051510).
- iio: xilinx-xadc: Fix ADC-B powerdown (bsc#1051510).
- iio: xilinx-xadc: Fix clearing interrupt when enabling trigger (bsc#1051510).
- iio: xilinx-xadc: Fix sequencer configuration for aux channels in simultaneous mode (bsc#1051510).
- ima: Fix return value of ima_write_policy() (git-fixes).
- Input: evdev - call input_flush_device() on release(), not flush() (bsc#1051510).
- Input: hyperv-keyboard - add module description (bsc#1172253).
- Input: i8042 - add Acer Aspire 5738z to nomux list (bsc#1051510).
- Input: i8042 - add ThinkPad S230u to i8042 reset list (bsc#1051510).
- Input: raydium_i2c_ts - use true and false for boolean values (bsc#1051510).
- Input: synaptics-rmi4 - fix error return code in rmi_driver_probe() (bsc#1051510).
- Input: synaptics-rmi4 - really fix attn_data use-after-free (git-fixes).
- Input: usbtouchscreen - add support for BonXeon TP (bsc#1051510).
- Input: xpad - add custom init packet for Xbox One S controllers (bsc#1051510).
- iommu/amd: Call domain_flush_complete() in update_domain() (bsc#1172096).
- iommu/amd: Do not flush Device Table in iommu_map_page() (bsc#1172097).
- iommu/amd: Do not loop forever when trying to increase address space (bsc#1172098).
- iommu/amd: Fix legacy interrupt remapping for x2APIC-enabled system (bsc#1172099).
- iommu/amd: Fix over-read of ACPI UID from IVRS table (bsc#1172101).
- iommu/amd: Fix race in increase_address_space()/fetch_pte() (bsc#1172102).
- iommu/amd: Update Device Table in increase_address_space() (bsc#1172103).
- iommu: Fix reference count leak in iommu_group_alloc (bsc#1172397).
- ipv4: fix a RCU-list lock in fib_triestat_seq_show (networking-stable-20_04_02).
- ipv6/addrconf: call ipv6_mc_up() for non-Ethernet interface (networking-stable-20_03_14).
- ipv6: do not auto-add link-local address to lag ports (networking-stable-20_04_09).
- ipvlan: add cond_resched_rcu() while processing muticast backlog (networking-stable-20_03_14).
- ipvlan: do not deref eth hdr before checking it's set (networking-stable-20_03_14).
- ipvlan: do not use cond_resched_rcu() in ipvlan_process_multicast() (networking-stable-20_03_14).
- iwlwifi: pcie: actually release queue memory in TVQM (bsc#1051510).
- kabi fix for early XHCI debug (git-fixes).
- kabi for for md: improve handling of bio with REQ_PREFLUSH in md_flush_request() (git-fixes).
- kabi, protect struct ib_device (bsc#1168503).
- kabi/severities: Do not track KVM internal symbols.
- kabi/severities: Ingnore get_dev_data() The function is internal to the AMD IOMMU driver and must not be called by any third party.
- kabi workaround for snd_rawmidi buffer_ref field addition (git-fixes).
- KEYS: reaching the keys quotas correctly (bsc#1051510).
- KVM: arm64: Change hyp_panic()s dependency on tpidr_el2 (bsc#1133021).
- KVM: arm64: Stop save/restoring host tpidr_el1 on VHE (bsc#1133021).
- KVM: Check validity of resolved slot when searching memslots (bsc#1172104).
- KVM: s390: vsie: Fix delivery of addressing exceptions (git-fixes).
- KVM: SVM: Fix potential memory leak in svm_cpu_init() (bsc#1171736).
- KVM x86: Extend AMD specific guest behavior to Hygon virtual CPUs (bsc#1152489).
- l2tp: Allow management of tunnels and session in user namespace (networking-stable-20_04_17).
- libata: Remove extra scsi_host_put() in ata_scsi_add_hosts() (bsc#1051510).
- libata: Return correct status in sata_pmp_eh_recover_pm() when ATA_DFLAG_DETACH is set (bsc#1051510).
- lib: raid6: fix awk build warnings (git fixes (block drivers)).
- lib/raid6/test: fix build on distros whose /bin/sh is not bash (git fixes (block drivers)).
- lib/stackdepot.c: fix global out-of-bounds in stack_slabs (git fixes (block drivers)).
- locks: print unsigned ino in /proc/locks (bsc#1171951).
- mac80211: add ieee80211_is_any_nullfunc() (bsc#1051510).
- mac80211_hwsim: Use kstrndup() in place of kasprintf() (bsc#1051510).
- mac80211: mesh: fix discovery timer re-arming issue / crash (bsc#1051510).
- macsec: avoid to set wrong mtu (bsc#1051510).
- macsec: restrict to ethernet devices (networking-stable-20_03_28).
- macvlan: add cond_resched() during multicast processing (networking-stable-20_03_14).
- macvlan: fix null dereference in macvlan_device_event() (bsc#1051510).
- md: improve handling of bio with REQ_PREFLUSH in md_flush_request() (git-fixes).
- md/raid0: Fix an error message in raid0_make_request() (git fixes (block drivers)).
- md/raid10: prevent access of uninitialized resync_pages offset (git-fixes).
- media: dvb: return -EREMOTEIO on i2c transfer failure (bsc#1051510).
- media: platform: fcp: Set appropriate DMA parameters (bsc#1051510).
- media: ti-vpe: cal: fix disable_irqs to only the intended target (git-fixes).
- mei: release me_cl object reference (bsc#1051510).
- mlxsw: Fix some IS_ERR() vs NULL bugs (networking-stable-20_04_27).
- mlxsw: spectrum_flower: Do not stop at FLOW_ACTION_VLAN_MANGLE (networking-stable-20_04_09).
- mmc: atmel-mci: Fix debugfs on 64-bit platforms (git-fixes).
- mmc: dw_mmc: Fix debugfs on 64-bit platforms (git-fixes).
- mmc: meson-gx: make sure the descriptor is stopped on errors (git-fixes).
- mmc: meson-gx: simplify interrupt handler (git-fixes).
- mmc: renesas_sdhi: limit block count to 16 bit for old revisions (git-fixes).
- mmc: sdhci-esdhc-imx: fix the mask for tuning start point (bsc#1051510).
- mmc: sdhci-msm: Clear tuning done flag while hs400 tuning (bsc#1051510).
- mmc: sdhci-of-at91: fix memleak on clk_get failure (git-fixes).
- mmc: sdhci-pci: Fix eMMC driver strength for BYT-based controllers (bsc#1051510).
- mmc: sdhci-xenon: fix annoying 1.8V regulator warning (bsc#1051510).
- mmc: sdio: Fix potential NULL pointer error in mmc_sdio_init_card() (bsc#1051510).
- mmc: tmio: fix access width of Block Count Register (git-fixes).
- mm: thp: handle page cache THP correctly in PageTransCompoundMap (git fixes (block drivers)).
- mtd: cfi: fix deadloop in cfi_cmdset_0002.c do_write_buffer (bsc#1051510).
- mtd: spi-nor: cadence-quadspi: add a delay in write sequence (git-fixes).
- mtd: spi-nor: enable 4B opcodes for mx66l51235l (git-fixes).
- mtd: spi-nor: fsl-quadspi: Do not let -EINVAL on the bus (git-fixes).
- mwifiex: avoid -Wstringop-overflow warning (bsc#1051510).
- mwifiex: Fix memory corruption in dump_station (bsc#1051510).
- net: bcmgenet: correct per TX/RX ring statistics (networking-stable-20_04_27).
- net: dsa: b53: Fix ARL register definitions (networking-stable-20_04_27).
- net: dsa: b53: Rework ARL bin logic (networking-stable-20_04_27).
- net: dsa: bcm_sf2: Do not register slave MDIO bus with OF (networking-stable-20_04_09).
- net: dsa: bcm_sf2: Ensure correct sub-node is parsed (networking-stable-20_04_09).
- net: dsa: Fix duplicate frames flooded by learning (networking-stable-20_03_28).
- net: dsa: mv88e6xxx: fix lockup on warm boot (networking-stable-20_03_14).
- net: fec: validate the new settings in fec_enet_set_coalesce() (networking-stable-20_03_14).
- net: fix race condition in __inet_lookup_established() (bsc#1151794).
- net: fq: add missing attribute validation for orphan mask (networking-stable-20_03_14).
- net, ip_tunnel: fix interface lookup with no key (networking-stable-20_04_02).
- net: ipv4: devinet: Fix crash when add/del multicast IP with autojoin (networking-stable-20_04_17).
- net: ipv6: do not consider routes via gateways for anycast address check (networking-stable-20_04_17).
- netlink: Use netlink header as base to calculate bad attribute offset (networking-stable-20_03_14).
- net: memcg: fix lockdep splat in inet_csk_accept() (networking-stable-20_03_14).
- net: memcg: late association of sock to memcg (networking-stable-20_03_14).
- net/mlx4_en: avoid indirect call in TX completion (networking-stable-20_04_27).
- net/mlx5: Add new fields to Port Type and Speed register (bsc#1171118).
- net/mlx5: Add RoCE RX ICRC encapsulated counter (bsc#1171118).
- net/mlx5e: Fix ethtool self test: link speed (bsc#1171118).
- net/mlx5e: Move port speed code from en_ethtool.c to en/port.c (bsc#1171118).
- net/mlx5: Expose link speed directly (bsc#1171118).
- net/mlx5: Expose port speed when possible (bsc#1171118).
- net: mvneta: Fix the case where the last poll did not process all rx (networking-stable-20_03_28).
- net: netrom: Fix potential nr_neigh refcnt leak in nr_add_node (networking-stable-20_04_27).
- net/packet: tpacket_rcv: do not increment ring index on drop (networking-stable-20_03_14).
- net: qmi_wwan: add support for ASKEY WWHC050 (networking-stable-20_03_28).
- net: revert default NAPI poll timeout to 2 jiffies (networking-stable-20_04_17).
- net_sched: cls_route: remove the right filter from hashtable (networking-stable-20_03_28).
- net/x25: Fix x25_neigh refcnt leak when receiving frame (networking-stable-20_04_27).
- nfc: add missing attribute validation for SE API (networking-stable-20_03_14).
- nfc: add missing attribute validation for vendor subcommand (networking-stable-20_03_14).
- nfc: st21nfca: add missed kfree_skb() in an error path (bsc#1051510).
- nfsd4: fix up replay_matches_cache() (git-fixes).
- nfsd: Ensure CLONE persists data and metadata changes to the target file (git-fixes).
- nfsd: fix delay timer on 32-bit architectures (git-fixes).
- nfsd: fix jiffies/time_t mixup in LRU list (git-fixes).
- NFS: Directory page cache pages need to be locked when read (git-fixes).
- nfsd: memory corruption in nfsd4_lock() (git-fixes).
- NFS: Do not call generic_error_remove_page() while holding locks (bsc#1170457).
- NFS: Fix memory leaks and corruption in readdir (git-fixes).
- NFS: Fix O_DIRECT accounting of number of bytes read/written (git-fixes).
- nfs: Fix potential posix_acl refcnt leak in nfs3_set_acl (git-fixes).
- NFS: fix racey wait in nfs_set_open_stateid_locked (bsc#1170592).
- NFS/flexfiles: Use the correct TCP timeout for flexfiles I/O (git-fixes).
- NFS/pnfs: Fix pnfs_generic_prepare_to_resend_writes() (git-fixes).
- NFS: Revalidate the file size on a fatal write error (git-fixes).
- NFSv4.0: nfs4_do_fsinfo() should not do implicit lease renewals (git-fixes).
- NFSv4: Do not allow a cached open with a revoked delegation (git-fixes).
- NFSv4: Fix leak of clp->cl_acceptor string (git-fixes).
- NFSv4/pnfs: Return valid stateids in nfs_layout_find_inode_by_stateid() (git-fixes).
- NFSv4: try lease recovery on NFS4ERR_EXPIRED (git-fixes).
- NFSv4.x: Drop the slot if nfs4_delegreturn_prepare waits for layoutreturn (git-fixes).
- nl802154: add missing attribute validation for dev_type (networking-stable-20_03_14).
- nl802154: add missing attribute validation (networking-stable-20_03_14).
- nvme-fc: print proper nvme-fc devloss_tmo value (bsc#1172391).
- objtool: Fix stack offset tracking for indirect CFAs (bsc#1169514).
- objtool: Fix switch table detection in .text.unlikely (bsc#1169514).
- objtool: Make BP scratch register warning more robust (bsc#1169514).
- padata: Remove broken queue flushing (git-fixes).
- Partially revert 'kfifo: fix kfifo_alloc() and kfifo_init()' (git fixes (block drivers)).
- pinctrl: baytrail: Enable pin configuration setting for GPIO chip (git-fixes).
- pinctrl: cherryview: Add missing spinlock usage in chv_gpio_irq_handler (git-fixes).
- platform/x86: asus-nb-wmi: Do not load on Asus T100TA and T200TA (bsc#1051510).
- pNFS: Ensure we do clear the return-on-close layout stateid on fatal errors (git-fixes).
- powerpc: Add attributes for setjmp/longjmp (bsc#1065729).
- powerpc/pci/of: Parse unassigned resources (bsc#1065729).
- powerpc/setup_64: Set cache-line-size based on cache-block-size (bsc#1065729).
- powerpc/sstep: Fix DS operand in ld encoding to appropriate value (bsc#1065729).
- r8152: check disconnect status after long sleep (networking-stable-20_03_14).
- raid6/ppc: Fix build for clang (git fixes (block drivers)).
- rcu: locking and unlocking need to always be at least barriers (git fixes (block drivers)).
- RDMA/ipoib: Fix use of sizeof() (bsc#1168503).
- RDMA/netdev: Fix netlink support in IPoIB (bsc#1168503).
- RDMA/netdev: Hoist alloc_netdev_mqs out of the driver (bsc#1168503).
- RDMA/netdev: Use priv_destructor for netdev cleanup (bsc#1168503).
- Remove 2 git-fixes that cause build issues. (bsc#1171691)
- Revert 'ALSA: hda/realtek: Fix pop noise on ALC225' (git-fixes).
- Revert 'drm/panel: simple: Add support for Sharp LQ150X1LG11 panels' (bsc#1114279)
- Revert 'ipc,sem: remove uneeded sem_undo_list lock usage in exit_sem()' (bsc#1172221).
- rtlwifi: Fix a double free in _rtl_usb_tx_urb_setup() (bsc#1051510).
- s390/ftrace: fix potential crashes when switching tracers (git-fixes).
- s390/ism: fix error return code in ism_probe() (git-fixes).
- s390/pci: Fix possible deadlock in recover_store() (bsc#1165183 LTC#184103).
- s390/pci: Recover handle in clp_set_pci_fn() (bsc#1165183 LTC#184103).
- scripts/decodecode: fix trapping instruction formatting (bsc#1065729).
- scripts/dtc: Remove redundant YYLOC global declaration (bsc#1160388).
- scsi: bnx2i: fix potential use after free (bsc#1171600).
- scsi: core: Handle drivers which set sg_tablesize to zero (bsc#1171601) This commit also required: > scsi: core: avoid preallocating big SGL for data
- scsi: core: save/restore command resid for error handling (bsc#1171602).
- scsi: core: scsi_trace: Use get_unaligned_be*() (bsc#1171604).
- scsi: core: try to get module before removing device (bsc#1171605).
- scsi: csiostor: Adjust indentation in csio_device_reset (bsc#1171606).
- scsi: csiostor: Do not enable IRQs too early (bsc#1171607).
- scsi: esas2r: unlock on error in esas2r_nvram_read_direct() (bsc#1171608).
- scsi: fnic: fix invalid stack access (bsc#1171609).
- scsi: fnic: fix msix interrupt allocation (bsc#1171610).
- scsi: ibmvscsi: Fix WARN_ON during event pool release (bsc#1170791 ltc#185128).
- scsi: iscsi: Avoid potential deadlock in iscsi_if_rx func (bsc#1171611).
- scsi: iscsi: Fix a potential deadlock in the timeout handler (bsc#1171612).
- scsi: iscsi: qla4xxx: fix double free in probe (bsc#1171613).
- scsi: lpfc: fix: Coverity: lpfc_cmpl_els_rsp(): Null pointer dereferences (bsc#1171614).
- scsi: lpfc: Fix crash in target side cable pulls hitting WAIT_FOR_UNREG (bsc#1171615).
- scsi: megaraid_sas: Do not initiate OCR if controller is not in ready state (bsc#1171616).
- scsi: qla2xxx: add ring buffer for tracing debug logs (bsc#1157169).
- scsi: qla2xxx: check UNLOADING before posting async work (bsc#1157169).
- scsi: qla2xxx: Delete all sessions before unregister local nvme port (bsc#1157169).
- scsi: qla2xxx: Do not log message when reading port speed via sysfs (bsc#1157169).
- scsi: qla2xxx: Fix hang when issuing nvme disconnect-all in NPIV (bsc#1157169).
- scsi: qla2xxx: Fix regression warnings (bsc#1157169).
- scsi: qla2xxx: Remove non functional code (bsc#1157169).
- scsi: qla2xxx: set UNLOADING before waiting for session deletion (bsc#1157169).
- scsi: qla4xxx: Adjust indentation in qla4xxx_mem_free (bsc#1171617).
- scsi: qla4xxx: fix double free bug (bsc#1171618).
- scsi: sd: Clear sdkp->protection_type if disk is reformatted without PI (bsc#1171619).
- scsi: sg: add sg_remove_request in sg_common_write (bsc#1171620).
- scsi: tracing: Fix handling of TRANSFER LENGTH == 0 for READ(6) and WRITE(6) (bsc#1171621).
- scsi: ufs: change msleep to usleep_range (bsc#1171622).
- scsi: ufs: Clean up ufshcd_scale_clks() and clock scaling error out path (bsc#1171623).
- scsi: ufs: Fix ufshcd_hold() caused scheduling while atomic (bsc#1171624).
- scsi: ufs: Fix ufshcd_probe_hba() reture value in case ufshcd_scsi_add_wlus() fails (bsc#1171625).
- scsi: ufs: Recheck bkops level if bkops is disabled (bsc#1171626).
- sctp: fix possibly using a bad saddr with a given dst (networking-stable-20_04_02).
- sctp: fix refcount bug in sctp_wfree (networking-stable-20_04_02).
- seq_file: fix problem when seeking mid-record (bsc#1170125).
- serial: uartps: Move the spinlock after the read of the tx empty (git-fixes).
- sfc: detach from cb_page in efx_copy_channel() (networking-stable-20_03_14).
- signal/pid_namespace: Fix reboot_pid_ns to use send_sig not force_sig (bsc#1172185).
- slcan: not call free_netdev before rtnl_unlock in slcan_open (networking-stable-20_03_28).
- slip: make slhc_compress() more robust against malicious packets (networking-stable-20_03_14).
- smb3: Additional compression structures (bsc#1144333).
- smb3: Add new compression flags (bsc#1144333).
- smb3: change noisy error message to FYI (bsc#1144333).
- smb3: enable swap on SMB3 mounts (bsc#1144333).
- smb3: Minor cleanup of protocol definitions (bsc#1144333).
- smb3: remove overly noisy debug line in signing errors (bsc#1144333).
- smb3: smbdirect support can be configured by default (bsc#1144333).
- smb3: use SMB2_SIGNATURE_SIZE define (bsc#1144333).
- spi: bcm2835: Fix 3-wire mode if DMA is enabled (git-fixes).
- spi: bcm63xx-hsspi: Really keep pll clk enabled (bsc#1051510).
- spi: bcm-qspi: when tx/rx buffer is NULL set to 0 (bsc#1051510).
- spi: dw: Add SPI Rx-done wait method to DMA-based transfer (bsc#1051510).
- spi: dw: Add SPI Tx-done wait method to DMA-based transfer (bsc#1051510).
- spi: dw: Zero DMA Tx and Rx configurations on stack (bsc#1051510).
- spi: fsl: do not map irq during probe (git-fixes).
- spi: fsl: use platform_get_irq() instead of of_irq_to_resource() (git-fixes).
- spi: pxa2xx: Add CS control clock quirk (bsc#1051510).
- spi: qup: call spi_qup_pm_resume_runtime before suspending (bsc#1051510).
- spi: spi-fsl-dspi: Replace interruptible wait queue with a simple completion (git-fixes).
- spi: spi-s3c64xx: Fix system resume support (git-fixes).
- spi/zynqmp: remove entry that causes a cs glitch (bsc#1051510).
- staging: comedi: dt2815: fix writing hi byte of analog output (bsc#1051510).
- staging: comedi: Fix comedi_device refcnt leak in comedi_open (bsc#1051510).
- staging: iio: ad2s1210: Fix SPI reading (bsc#1051510).
- staging: vt6656: Do not set RCR_MULTICAST or RCR_BROADCAST by default (git-fixes).
- staging: vt6656: Fix drivers TBTT timing counter (git-fixes).
- staging: vt6656: Fix pairwise key entry save (git-fixes).
- sunrpc: expiry_time should be seconds not timeval (git-fixes).
- SUNRPC: Fix a potential buffer overflow in 'svc_print_xprts()' (git-fixes).
- supported.conf: Add br_netfilter to base (bsc#1169020).
- svcrdma: Fix leak of transport addresses (git-fixes).
- taskstats: fix data-race (bsc#1172188).
- tcp: cache line align MAX_TCP_HEADER (networking-stable-20_04_27).
- tcp: repair: fix TCP_QUEUE_SEQ implementation (networking-stable-20_03_28).
- team: add missing attribute validation for array index (networking-stable-20_03_14).
- team: add missing attribute validation for port ifindex (networking-stable-20_03_14).
- team: fix hang in team_mode_get() (networking-stable-20_04_27).
- tools lib traceevent: Remove unneeded qsort and uses memmove instead (git-fixes).
- tpm: ibmvtpm: retry on H_CLOSED in tpm_ibmvtpm_send() (bsc#1065729).
- tpm/tpm_tis: Free IRQ if probing fails (bsc#1082555).
- tpm/tpm_tis: Free IRQ if probing fails (git-fixes).
- tracing: Add a vmalloc_sync_mappings() for safe measure (git-fixes).
- tracing: Disable trace_printk() on post poned tests (git-fixes).
- tracing: Fix the race between registering 'snapshot' event trigger and triggering 'snapshot' operation (git-fixes).
- tty: rocket, avoid OOB access (git-fixes).
- UAS: fix deadlock in error handling and PM flushing work (git-fixes).
- UAS: no use logging any details in case of ENODEV (git-fixes).
- USB: Add USB_QUIRK_DELAY_CTRL_MSG and USB_QUIRK_DELAY_INIT for Corsair K70 RGB RAPIDFIRE (git-fixes).
- USB: cdc-acm: restore capability check order (git-fixes).
- USB: core: Fix misleading driver bug report (bsc#1051510).
- USB: dwc3: do not set gadget->is_otg flag (git-fixes).
- USB: dwc3: gadget: Do link recovery for SS and SSP (git-fixes).
- USB: early: Handle AMD's spec-compliant identifiers, too (git-fixes).
- USB: f_fs: Clear OS Extended descriptor counts to zero in ffs_data_reset() (git-fixes).
- USB: gadget: audio: Fix a missing error return value in audio_bind() (git-fixes).
- USB: gadget: composite: Inform controller driver of self-powered (git-fixes).
- USB: gadget: legacy: fix error return code in cdc_bind() (git-fixes).
- USB: gadget: legacy: fix error return code in gncm_bind() (git-fixes).
- USB: gadget: legacy: fix redundant initialization warnings (bsc#1051510).
- USB: gadget: net2272: Fix a memory leak in an error handling path in 'net2272_plat_probe()' (git-fixes).
- USB: gadget: udc: atmel: Fix vbus disconnect handling (git-fixes).
- USB: gadget: udc: atmel: Make some symbols static (git-fixes).
- USB: gadget: udc: bdc: Remove unnecessary NULL checks in bdc_req_complete (git-fixes).
- USB: host: xhci-plat: keep runtime active when removing host (git-fixes).
- USB: hub: Fix handling of connect changes during sleep (git-fixes).
- usbnet: silence an unnecessary warning (bsc#1170770).
- USB: serial: garmin_gps: add sanity checking for data length (git-fixes).
- USB: serial: option: add BroadMobi BM806U (git-fixes).
- USB: serial: option: add support for ASKEY WWHC050 (git-fixes).
- USB: serial: option: add Wistron Neweb D19Q1 (git-fixes).
- USB: serial: qcserial: Add DW5816e support (git-fixes).
- USB: sisusbvga: Change port variable from signed to unsigned (git-fixes).
- usb-storage: Add unusual_devs entry for JMicron JMS566 (git-fixes).
- USB: uas: add quirk for LaCie 2Big Quadra (git-fixes).
- USB: xhci: Fix NULL pointer dereference when enqueuing trbs from urb sg list (git-fixes).
- video: fbdev: sis: Remove unnecessary parentheses and commented code (bsc#1114279)
- video: fbdev: w100fb: Fix a potential double free (bsc#1051510).
- vrf: Check skb for XFRM_TRANSFORMED flag (networking-stable-20_04_27).
- vt: ioctl, switch VT_IS_IN_USE and VT_BUSY to inlines (git-fixes).
- vt: selection, introduce vc_is_sel (git-fixes).
- vt: vt_ioctl: fix race in VT_RESIZEX (git-fixes).
- vt: vt_ioctl: fix use-after-free in vt_in_use() (git-fixes).
- vt: vt_ioctl: fix VT_DISALLOCATE freeing in-use virtual console (git-fixes).
- vxlan: check return value of gro_cells_init() (networking-stable-20_03_28).
- watchdog: reset last_hw_keepalive time at start (git-fixes).
- wcn36xx: Fix error handling path in 'wcn36xx_probe()' (bsc#1051510).
- wil6210: remove reset file from debugfs (git-fixes).
- wimax/i2400m: Fix potential urb refcnt leak (bsc#1051510).
- workqueue: do not use wq_select_unbound_cpu() for bound works (bsc#1172130).
- x86/entry/64: Fix unwind hints in kernel exit path (bsc#1058115).
- x86/entry/64: Fix unwind hints in register clearing code (bsc#1058115).
- x86/entry/64: Fix unwind hints in rewind_stack_do_exit() (bsc#1058115).
- x86/entry/64: Fix unwind hints in __switch_to_asm() (bsc#1058115).
- x86/Hyper-V: Allow guests to enable InvariantTSC (bsc#1170620).
- x86/Hyper-V: Free hv_panic_page when fail to register kmsg dump (bsc#1170618).
- x86/Hyper-V: Report crash data in die() when panic_on_oops is set (bsc#1170618).
- x86/Hyper-V: Report crash register data or kmsg before running crash kernel (bsc#1170618).
- x86/Hyper-V: Report crash register data when sysctl_record_panic_msg is not set (bsc#1170618).
- x86/Hyper-V: report value of misc_features (git-fixes).
- x86/Hyper-V: Trigger crash enlightenment only once during system crash (bsc#1170618).
- x86/Hyper-V: Unload vmbus channel in hv panic callback (bsc#1170618).
- x86/kprobes: Avoid kretprobe recursion bug (bsc#1114279).
- x86/resctrl: Fix invalid attempt at removing the default resource group (git-fixes).
- x86/resctrl: Preserve CDP enable over CPU hotplug (bsc#1114279).
- x86/unwind/orc: Do not skip the first frame for inactive tasks (bsc#1058115).
- x86/unwind/orc: Fix error handling in __unwind_start() (bsc#1058115).
- x86/unwind/orc: Fix error path for bad ORC entry type (bsc#1058115).
- x86/unwind/orc: Fix unwind_get_return_address_ptr() for inactive tasks (bsc#1058115).
- x86/unwind/orc: Prevent unwinding before ORC initialization (bsc#1058115).
- x86/unwind: Prevent false warnings for non-current tasks (bsc#1058115).
- xen/pci: reserve MCFG areas earlier (bsc#1170145).
- xfrm: Always set XFRM_TRANSFORMED in xfrm{4,6}_output_finish (networking-stable-20_04_27).
- xfs: Correctly invert xfs_buftarg LRU isolation logic (git-fixes).
- xfs: do not ever return a stale pointer from __xfs_dir3_free_read (git-fixes).
- xprtrdma: Fix completion wait during device removal (git-fixes).
Patchnames
SUSE-2020-1603,SUSE-SLE-SERVER-12-SP4-2020-1603
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "The SUSE Linux Enterprise 12 SP4 Azure kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2020-0543: Fixed a side channel attack against special registers which could have resulted in leaking of read values to cores other than the one which called it.\n This attack is known as Special Register Buffer Data Sampling (SRBDS) or \u0027CrossTalk\u0027 (bsc#1154824).\n- CVE-2020-13143: Fixed an out-of-bounds read in gadget_dev_desc_UDC_store in drivers/usb/gadget/configfs.c (bsc#1171982).\n- CVE-2020-12769: Fixed an issue which could have allowed attackers to cause a panic via concurrent calls to dw_spi_irq and dw_spi_transfer_one (bsc#1171983).\n- CVE-2020-12768: Fixed a memory leak in svm_cpu_uninit in arch/x86/kvm/svm.c (bsc#1171736).\n- CVE-2020-12657: An a use-after-free in block/bfq-iosched.c (bsc#1171205).\n- CVE-2020-12656: Fixed an improper handling of certain domain_release calls leadingch could have led to a memory leak (bsc#1171219).\n- CVE-2020-12655: Fixed an issue which could have allowed attackers to trigger a sync of excessive duration via an XFS v5 image with crafted metadata (bsc#1171217).\n- CVE-2020-12654: Fixed an issue in he wifi driver which could have allowed a remote AP to trigger a heap-based buffer overflow (bsc#1171202).\n- CVE-2020-12653: Fixed an issue in the wifi driver which could have allowed local users to gain privileges or cause a denial of service (bsc#1171195).\n- CVE-2020-12652: Fixed an issue which could have allowed local users to hold an incorrect lock during the ioctl operation and trigger a race condition (bsc#1171218).\n- CVE-2020-12464: Fixed a use-after-free due to a transfer without a reference (bsc#1170901).\n- CVE-2020-12114: Fixed a pivot_root race condition which could have allowed local users to cause a denial of service (panic) by corrupting a mountpoint reference counter (bsc#1171098).\n- CVE-2020-10757: Fixed an issue where remaping hugepage DAX to anon mmap could have caused user PTE access (bsc#1172317).\n- CVE-2020-10751: Fixed an improper implementation in SELinux LSM hook where it was assumed that an skb would only contain a single netlink message (bsc#1171189).\n- CVE-2020-10732: Fixed kernel data leak in userspace coredumps due to uninitialized data (bsc#1171220).\n- CVE-2020-10720: Fixed a use-after-free read in napi_gro_frags() (bsc#1170778).\n- CVE-2020-10711: Fixed a null pointer dereference in SELinux subsystem which could have allowed a remote network user to crash the kernel resulting in a denial of service (bsc#1171191).\n- CVE-2020-10690: Fixed the race between the release of ptp_clock and cdev (bsc#1170056).\n- CVE-2019-9455: Fixed a pointer leak due to a WARN_ON statement in a video driver. This could lead to local information disclosure with System execution privileges needed (bsc#1170345).\n- CVE-2019-20812: Fixed an issue in prb_calc_retire_blk_tmo() which could have resulted in a denial of service (bsc#1172453).\n- CVE-2019-20806: Fixed a null pointer dereference which may had lead to denial of service (bsc#1172199).\n- CVE-2019-19462: Fixed an issue which could have allowed local user to cause denial of service (bsc#1158265).\n- CVE-2018-1000199: Fixed a potential local code execution via ptrace (bsc#1089895).\n\nThe following non-security bugs were fixed:\n\n- ACPI: CPPC: Fix reference count leak in acpi_cppc_processor_probe() (bsc#1051510).\n- ACPI: sysfs: Fix reference count leak in acpi_sysfs_add_hotplug_profile() (bsc#1051510).\n- acpi/x86: ignore unspecified bit positions in the ACPI global lock field (bsc#1051510).\n- Add commit for git-fix that\u0027s not a fix This commit cleans up debug code but does not fix anything, and it relies on a new kernel function that isn\u0027t yet in this version of SLE.\n- agp/intel: Reinforce the barrier after GTT updates (bsc#1051510).\n- ALSA: ctxfi: Remove unnecessary cast in kfree (bsc#1051510).\n- ALSA: hda: Do not release card at firmware loading error (bsc#1051510).\n- ALSA: hda/hdmi: fix race in monitor detection during probe (bsc#1051510).\n- ALSA: hda/hdmi: fix without unlocked before return (bsc#1051510).\n- ALSA: hda: Keep the controller initialization even if no codecs found (bsc#1051510).\n- ALSA: hda/realtek - Add more fixup entries for Clevo machines (git-fixes).\n- ALSA: hda/realtek - Add new codec supported for ALC245 (bsc#1051510).\n- ALSA: hda/realtek - Add new codec supported for ALC287 (git-fixes).\n- ALSA: hda/realtek - Fix S3 pop noise on Dell Wyse (git-fixes).\n- ALSA: hda/realtek - Fix unexpected init_amp override (bsc#1051510).\n- ALSA: hda/realtek - Limit int mic boost for Thinkpad T530 (git-fixes bsc#1171293).\n- ALSA: hda/realtek - Two front mics on a Lenovo ThinkCenter (bsc#1051510).\n- ALSA: hwdep: fix a left shifting 1 by 31 UB bug (git-fixes).\n- ALSA: iec1712: Initialize STDSP24 properly when using the model=staudio option (git-fixes).\n- ALSA: opti9xx: shut up gcc-10 range warning (bsc#1051510).\n- ALSA: pcm: fix incorrect hw_base increase (git-fixes).\n- ALSA: pcm: oss: Place the plugin buffer overflow checks correctly (bsc#1170522).\n- ALSA: rawmidi: Fix racy buffer resize under concurrent accesses (git-fixes).\n- ALSA: usb-audio: Add control message quirk delay for Kingston HyperX headset (git-fixes).\n- ALSA: usb-audio: Correct a typo of NuPrime DAC-10 USB ID (bsc#1051510).\n- ALSA: usb-audio: Do not override ignore_ctl_error value from the map (bsc#1051510).\n- ALSA: usb-audio: Fix usb audio refcnt leak when getting spdif (bsc#1051510).\n- ALSA: usb-audio: mixer: volume quirk for ESS Technology Asus USB DAC (git-fixes).\n- ALSA: usx2y: Fix potential NULL dereference (bsc#1051510).\n- ASoC: codecs: hdac_hdmi: Fix incorrect use of list_for_each_entry (bsc#1051510).\n- ASoC: dapm: connect virtual mux with default value (bsc#1051510).\n- ASoC: dapm: fixup dapm kcontrol widget (bsc#1051510).\n- ASoC: dpcm: allow start or stop during pause for backend (bsc#1051510).\n- ASoC: fix regwmask (bsc#1051510).\n- ASoC: msm8916-wcd-digital: Reset RX interpolation path after use (bsc#1051510).\n- ASoC: topology: Check return value of pcm_new_ver (bsc#1051510).\n- ASoC: topology: use name_prefix for new kcontrol (bsc#1051510).\n- b43legacy: Fix case where channel status is corrupted (bsc#1051510).\n- batman-adv: fix batadv_nc_random_weight_tq (git-fixes).\n- batman-adv: Fix refcnt leak in batadv_show_throughput_override (git-fixes).\n- batman-adv: Fix refcnt leak in batadv_store_throughput_override (git-fixes).\n- batman-adv: Fix refcnt leak in batadv_v_ogm_process (git-fixes).\n- bcache: avoid unnecessary btree nodes flushing in btree_flush_write() (git fixes (block drivers)).\n- bcache: fix incorrect data type usage in btree_flush_write() (git fixes (block drivers)).\n- bcache: Revert \u0027bcache: shrink btree node cache after bch_btree_check()\u0027 (git fixes (block drivers)).\n- block/drbd: delete invalid function drbd_md_mark_dirty_ (bsc#1171527).\n- block: drbd: remove a stray unlock in __drbd_send_protocol() (bsc#1171599).\n- block: fix busy device checking in blk_drop_partitions again (bsc#1171948).\n- block: fix busy device checking in blk_drop_partitions (bsc#1171948).\n- block: fix memleak of bio integrity data (git fixes (block drivers)).\n- block: remove the bd_openers checks in blk_drop_partitions (bsc#1171948).\n- bnxt_en: fix memory leaks in bnxt_dcbnl_ieee_getets() (networking-stable-20_03_28).\n- bnxt_en: reinitialize IRQs when MTU is modified (networking-stable-20_03_14).\n- bonding/alb: make sure arp header is pulled before accessing it (networking-stable-20_03_14).\n- brcmfmac: abort and release host after error (bsc#1051510).\n- btrfs: fix deadlock with memory reclaim during scrub (bsc#1172127).\n- btrfs: fix log context list corruption after rename whiteout error (bsc#1172342).\n- btrfs: fix partial loss of prealloc extent past i_size after fsync (bsc#1172343).\n- btrfs: move the dio_sem higher up the callchain (bsc#1171761).\n- btrfs: reloc: clear DEAD_RELOC_TREE bit for orphan roots to prevent runaway balance (bsc#1171417 bsc#1160947 bsc#1172366).\n- btrfs: reloc: fix reloc root leak and NULL pointer dereference (bsc#1171417 bsc#1160947 bsc#1172366).\n- btrfs: setup a nofs context for memory allocation at btrfs_create_tree() (bsc#1172127).\n- btrfs: setup a nofs context for memory allocation at __btrfs_set_acl (bsc#1172127).\n- btrfs: use nofs context when initializing security xattrs to avoid deadlock (bsc#1172127).\n- can: add missing attribute validation for termination (networking-stable-20_03_14).\n- cdc-acm: close race betrween suspend() and acm_softint (git-fixes).\n- cdc-acm: introduce a cool down (git-fixes).\n- ceph: fix double unlock in handle_cap_export() (bsc#1171694).\n- ceph: fix endianness bug when handling MDS session feature bits (bsc#1171695).\n- cgroup, netclassid: periodically release file_lock on classid updating (networking-stable-20_03_14).\n- CIFS: Allocate crypto structures on the fly for calculating signatures of incoming packets (bsc#1144333).\n- CIFS: Allocate encryption header through kmalloc (bsc#1144333).\n- CIFS: allow unlock flock and OFD lock across fork (bsc#1144333).\n- CIFS: check new file size when extending file by fallocate (bsc#1144333).\n- CIFS: cifspdu.h: Replace zero-length array with flexible-array member (bsc#1144333).\n- CIFS: clear PF_MEMALLOC before exiting demultiplex thread (bsc#1144333).\n- CIFS: do not share tcons with DFS (bsc#1144333).\n- CIFS: dump the session id and keys also for SMB2 sessions (bsc#1144333).\n- CIFS: ensure correct super block for DFS reconnect (bsc#1144333).\n- CIFS: Fix bug which the return value by asynchronous read is error (bsc#1144333).\n- CIFS: fix uninitialised lease_key in open_shroot() (bsc#1144333).\n- CIFS: improve read performance for page size 64KB \u0026 cache=strict \u0026 vers=2.1+ (bsc#1144333).\n- CIFS: Increment num_remote_opens stats counter even in case of smb2_query_dir_first (bsc#1144333).\n- CIFS: minor update to comments around the cifs_tcp_ses_lock mutex (bsc#1144333).\n- CIFS: protect updating server-\u003edstaddr with a spinlock (bsc#1144333).\n- CIFS: smb2pdu.h: Replace zero-length array with flexible-array member (bsc#1144333).\n- CIFS: smbd: Calculate the correct maximum packet size for segmented SMBDirect send/receive (bsc#1144333).\n- CIFS: smbd: Check and extend sender credits in interrupt context (bsc#1144333).\n- CIFS: smbd: Check send queue size before posting a send (bsc#1144333).\n- CIFS: smbd: Do not schedule work to send immediate packet on every receive (bsc#1144333).\n- CIFS: smbd: Merge code to track pending packets (bsc#1144333).\n- CIFS: smbd: Properly process errors on ib_post_send (bsc#1144333).\n- CIFS: smbd: Update receive credits before sending and deal with credits roll back on failure before sending (bsc#1144333).\n- CIFS: Warn less noisily on default mount (bsc#1144333).\n- clk: Add clk_hw_unregister_composite helper function definition (bsc#1051510).\n- clk: imx6ull: use OSC clock during AXI rate change (bsc#1051510).\n- clk: imx: make mux parent strings const (bsc#1051510).\n- clk: mediatek: correct the clocks for MT2701 HDMI PHY module (bsc#1051510).\n- clk: sunxi-ng: a64: Fix gate bit of DSI DPHY (bsc#1051510).\n- clocksource/drivers/hyper-v: Set TSC clocksource as default w/ InvariantTSC (bsc#1170620).\n- clocksource: dw_apb_timer_of: Fix missing clockevent timers (bsc#1051510).\n- component: Silence bind error on -EPROBE_DEFER (bsc#1051510).\n- coresight: do not use the BIT() macro in the UAPI header (git fixes (block drivers)).\n- cpufreq: s3c64xx: Remove pointless NULL check in s3c64xx_cpufreq_driver_init (bsc#1051510).\n- crypto: ccp - AES CFB mode is a stream cipher (git-fixes).\n- crypto: ccp - Clean up and exit correctly on allocation failure (git-fixes).\n- crypto: ccp - Cleanup misc_dev on sev_exit() (bsc#1114279).\n- crypto: ccp - Cleanup sp_dev_master in psp_dev_destroy() (bsc#1114279).\n- debugfs: Add debugfs_create_xul() for hexadecimal unsigned long (git-fixes).\n- dmaengine: dmatest: Fix iteration non-stop logic (bsc#1051510).\n- dm mpath: switch paths in dm_blk_ioctl() code path (bsc#1167574).\n- dm writecache: fix data corruption when reloading the target (git fixes (block drivers)).\n- dm writecache: fix incorrect flush sequence when doing SSD mode commit (git fixes (block drivers)).\n- dm writecache: verify watermark during resume (git fixes (block drivers)).\n- dm zoned: fix invalid memory access (git fixes (block drivers)).\n- dm zoned: reduce overhead of backing device checks (git fixes (block drivers)).\n- dm zoned: remove duplicate nr_rnd_zones increase in dmz_init_zone() (git fixes (block drivers)).\n- dm zoned: support zone sizes smaller than 128MiB (git fixes (block drivers)).\n- dp83640: reverse arguments to list_add_tail (git-fixes).\n- Drivers: hv: Add a module description line to the hv_vmbus driver (bsc#1172253).\n- Drivers: HV: Send one page worth of kmsg dump over Hyper-V during panic (bsc#1170618).\n- Drivers: hv: vmbus: Fix the issue with freeing up hv_ctl_table_hdr (bsc#1170618).\n- Drivers: hv: vmbus: Get rid of MSR access from vmbus_drv.c (bsc#1170618).\n- Drivers: hv: vmus: Fix the check for return value from kmsg get dump buffer (bsc#1170618).\n- drivers/net/ibmvnic: Update VNIC protocol version reporting (bsc#1065729).\n- drm: amd/acp: fix broken menu structure (bsc#1114279) \t* context changes\n- drm/crc: Actually allow to change the crc source (bsc#1114279) \t* offset changes\n- drm/dp_mst: Fix clearing payload state on topology disable (bsc#1051510).\n- drm/dp_mst: Reformat drm_dp_check_act_status() a bit (bsc#1051510).\n- drm/edid: Fix off-by-one in DispID DTD pixel clock (bsc#1114279)\n- drm/i915/gvt: Init DPLL/DDI vreg for virtual display instead of (bsc#1114279)\n- drm/i915: properly sanity check batch_start_offset (bsc#1114279) \t* renamed display/intel_fbc.c -\u003e intel_fb.c \t* renamed gt/intel_rc6.c -\u003e intel_pm.c \t* context changes\n- drm/meson: Delete an error message in meson_dw_hdmi_bind() (bsc#1051510).\n- drm: NULL pointer dereference [null-pointer-deref] (CWE 476) problem (bsc#1114279)\n- drm/qxl: qxl_release leak in qxl_draw_dirty_fb() (bsc#1051510).\n- drm/qxl: qxl_release leak in qxl_hw_surface_alloc() (bsc#1051510).\n- drm/qxl: qxl_release use after free (bsc#1051510).\n- drm: Remove PageReserved manipulation from drm_pci_alloc (bsc#1114279) \t* offset changes\n- dump_stack: avoid the livelock of the dump_lock (git fixes (block drivers)).\n- EDAC, sb_edac: Add support for systems with segmented PCI buses (bsc#1169525).\n- ext4: do not zeroout extents beyond i_disksize (bsc#1167851).\n- ext4: fix extent_status fragmentation for plain files (bsc#1171949).\n- ext4: use non-movable memory for superblock readahead (bsc#1171952).\n- fanotify: fix merging marks masks with FAN_ONDIR (bsc#1171679).\n- fbcon: fix null-ptr-deref in fbcon_switch (bsc#1114279) \t* rename drivers/video/fbdev/core to drivers/video/console \t* context changes\n- fib: add missing attribute validation for tun_id (networking-stable-20_03_14).\n- firmware: qcom: scm: fix compilation error when disabled (bsc#1051510).\n- fs/cifs: fix gcc warning in sid_to_id (bsc#1144333).\n- fs/seq_file.c: simplify seq_file iteration code and interface (bsc#1170125).\n- gpio: tegra: mask GPIO IRQs during IRQ shutdown (bsc#1051510).\n- gre: fix uninit-value in __iptunnel_pull_header (networking-stable-20_03_14).\n- HID: hid-input: clear unmapped usages (git-fixes).\n- HID: hyperv: Add a module description line (bsc#1172253).\n- HID: i2c-hid: add Trekstor Primebook C11B to descriptor override (git-fixes).\n- HID: i2c-hid: override HID descriptors for certain devices (git-fixes).\n- HID: multitouch: add eGalaxTouch P80H84 support (bsc#1051510).\n- HID: wacom: Read HID_DG_CONTACTMAX directly for non-generic devices (git-fixes).\n- hrtimer: Annotate lockless access to timer-\u003estate (git fixes (block drivers)).\n- hsr: add restart routine into hsr_get_node_list() (networking-stable-20_03_28).\n- hsr: check protocol version in hsr_newlink() (networking-stable-20_04_17).\n- hsr: fix general protection fault in hsr_addr_is_self() (networking-stable-20_03_28).\n- hsr: set .netnsok flag (networking-stable-20_03_28).\n- hsr: use rcu_read_lock() in hsr_get_node_{list/status}() (networking-stable-20_03_28).\n- i2c: acpi: Force bus speed to 400KHz if a Silead touchscreen is present (git-fixes).\n- i2c: acpi: put device when verifying client fails (git-fixes).\n- i2c: brcmstb: remove unused struct member (git-fixes).\n- i2c: core: Allow empty id_table in ACPI case as well (git-fixes).\n- i2c: core: decrease reference count of device node in i2c_unregister_device (git-fixes).\n- i2c: dev: Fix the race between the release of i2c_dev and cdev (bsc#1051510).\n- i2c: fix missing pm_runtime_put_sync in i2c_device_probe (git-fixes).\n- i2c-hid: properly terminate i2c_hid_dmi_desc_override_table array (git-fixes).\n- i2c: i801: Do not add ICH_RES_IO_SMI for the iTCO_wdt device (git-fixes).\n- i2c: iproc: Stop advertising support of SMBUS quick cmd (git-fixes).\n- i2c: isch: Remove unnecessary acpi.h include (git-fixes).\n- i2c: mux: demux-pinctrl: Fix an error handling path in \u0027i2c_demux_pinctrl_probe()\u0027 (bsc#1051510).\n- i2c: st: fix missing struct parameter description (bsc#1051510).\n- IB/ipoib: Add child to parent list only if device initialized (bsc#1168503).\n- IB/ipoib: Consolidate checking of the proposed child interface (bsc#1168503).\n- IB/ipoib: Do not remove child devices from within the ndo_uninit (bsc#1168503).\n- IB/ipoib: Get rid of IPOIB_FLAG_GOING_DOWN (bsc#1168503).\n- IB/ipoib: Get rid of the sysfs_mutex (bsc#1168503).\n- IB/ipoib: Maintain the child_intfs list from ndo_init/uninit (bsc#1168503).\n- IB/ipoib: Move all uninit code into ndo_uninit (bsc#1168503).\n- IB/ipoib: Move init code to ndo_init (bsc#1168503).\n- IB/ipoib: Replace printk with pr_warn (bsc#1168503).\n- IB/ipoib: Use cancel_delayed_work_sync for neigh-clean task (bsc#1168503).\n- IB/ipoib: Warn when one port fails to initialize (bsc#1168503).\n- ibmvnic: Skip fatal error reset after passive init (bsc#1171078 ltc#184239).\n- iio:ad7797: Use correct attribute_group (bsc#1051510).\n- iio: adc: stm32-adc: fix device used to request dma (bsc#1051510).\n- iio: adc: stm32-adc: fix sleep in atomic context (git-fixes).\n- iio: adc: stm32-adc: Use dma_request_chan() instead dma_request_slave_channel() (bsc#1051510).\n- iio: dac: vf610: Fix an error handling path in \u0027vf610_dac_probe()\u0027 (bsc#1051510).\n- iio: sca3000: Remove an erroneous \u0027get_device()\u0027 (bsc#1051510).\n- iio: xilinx-xadc: Fix ADC-B powerdown (bsc#1051510).\n- iio: xilinx-xadc: Fix clearing interrupt when enabling trigger (bsc#1051510).\n- iio: xilinx-xadc: Fix sequencer configuration for aux channels in simultaneous mode (bsc#1051510).\n- ima: Fix return value of ima_write_policy() (git-fixes).\n- Input: evdev - call input_flush_device() on release(), not flush() (bsc#1051510).\n- Input: hyperv-keyboard - add module description (bsc#1172253).\n- Input: i8042 - add Acer Aspire 5738z to nomux list (bsc#1051510).\n- Input: i8042 - add ThinkPad S230u to i8042 reset list (bsc#1051510).\n- Input: raydium_i2c_ts - use true and false for boolean values (bsc#1051510).\n- Input: synaptics-rmi4 - fix error return code in rmi_driver_probe() (bsc#1051510).\n- Input: synaptics-rmi4 - really fix attn_data use-after-free (git-fixes).\n- Input: usbtouchscreen - add support for BonXeon TP (bsc#1051510).\n- Input: xpad - add custom init packet for Xbox One S controllers (bsc#1051510).\n- iommu/amd: Call domain_flush_complete() in update_domain() (bsc#1172096).\n- iommu/amd: Do not flush Device Table in iommu_map_page() (bsc#1172097).\n- iommu/amd: Do not loop forever when trying to increase address space (bsc#1172098).\n- iommu/amd: Fix legacy interrupt remapping for x2APIC-enabled system (bsc#1172099).\n- iommu/amd: Fix over-read of ACPI UID from IVRS table (bsc#1172101).\n- iommu/amd: Fix race in increase_address_space()/fetch_pte() (bsc#1172102).\n- iommu/amd: Update Device Table in increase_address_space() (bsc#1172103).\n- iommu: Fix reference count leak in iommu_group_alloc (bsc#1172397).\n- ipv4: fix a RCU-list lock in fib_triestat_seq_show (networking-stable-20_04_02).\n- ipv6/addrconf: call ipv6_mc_up() for non-Ethernet interface (networking-stable-20_03_14).\n- ipv6: do not auto-add link-local address to lag ports (networking-stable-20_04_09).\n- ipvlan: add cond_resched_rcu() while processing muticast backlog (networking-stable-20_03_14).\n- ipvlan: do not deref eth hdr before checking it\u0027s set (networking-stable-20_03_14).\n- ipvlan: do not use cond_resched_rcu() in ipvlan_process_multicast() (networking-stable-20_03_14).\n- iwlwifi: pcie: actually release queue memory in TVQM (bsc#1051510).\n- kabi fix for early XHCI debug (git-fixes).\n- kabi for for md: improve handling of bio with REQ_PREFLUSH in md_flush_request() (git-fixes).\n- kabi, protect struct ib_device (bsc#1168503).\n- kabi/severities: Do not track KVM internal symbols.\n- kabi/severities: Ingnore get_dev_data() The function is internal to the AMD IOMMU driver and must not be called by any third party.\n- kabi workaround for snd_rawmidi buffer_ref field addition (git-fixes).\n- KEYS: reaching the keys quotas correctly (bsc#1051510).\n- KVM: arm64: Change hyp_panic()s dependency on tpidr_el2 (bsc#1133021).\n- KVM: arm64: Stop save/restoring host tpidr_el1 on VHE (bsc#1133021).\n- KVM: Check validity of resolved slot when searching memslots (bsc#1172104).\n- KVM: s390: vsie: Fix delivery of addressing exceptions (git-fixes).\n- KVM: SVM: Fix potential memory leak in svm_cpu_init() (bsc#1171736).\n- KVM x86: Extend AMD specific guest behavior to Hygon virtual CPUs (bsc#1152489).\n- l2tp: Allow management of tunnels and session in user namespace (networking-stable-20_04_17).\n- libata: Remove extra scsi_host_put() in ata_scsi_add_hosts() (bsc#1051510).\n- libata: Return correct status in sata_pmp_eh_recover_pm() when ATA_DFLAG_DETACH is set (bsc#1051510).\n- lib: raid6: fix awk build warnings (git fixes (block drivers)).\n- lib/raid6/test: fix build on distros whose /bin/sh is not bash (git fixes (block drivers)).\n- lib/stackdepot.c: fix global out-of-bounds in stack_slabs (git fixes (block drivers)).\n- locks: print unsigned ino in /proc/locks (bsc#1171951). \n- mac80211: add ieee80211_is_any_nullfunc() (bsc#1051510).\n- mac80211_hwsim: Use kstrndup() in place of kasprintf() (bsc#1051510).\n- mac80211: mesh: fix discovery timer re-arming issue / crash (bsc#1051510).\n- macsec: avoid to set wrong mtu (bsc#1051510).\n- macsec: restrict to ethernet devices (networking-stable-20_03_28).\n- macvlan: add cond_resched() during multicast processing (networking-stable-20_03_14).\n- macvlan: fix null dereference in macvlan_device_event() (bsc#1051510).\n- md: improve handling of bio with REQ_PREFLUSH in md_flush_request() (git-fixes).\n- md/raid0: Fix an error message in raid0_make_request() (git fixes (block drivers)).\n- md/raid10: prevent access of uninitialized resync_pages offset (git-fixes).\n- media: dvb: return -EREMOTEIO on i2c transfer failure (bsc#1051510).\n- media: platform: fcp: Set appropriate DMA parameters (bsc#1051510).\n- media: ti-vpe: cal: fix disable_irqs to only the intended target (git-fixes).\n- mei: release me_cl object reference (bsc#1051510).\n- mlxsw: Fix some IS_ERR() vs NULL bugs (networking-stable-20_04_27).\n- mlxsw: spectrum_flower: Do not stop at FLOW_ACTION_VLAN_MANGLE (networking-stable-20_04_09).\n- mmc: atmel-mci: Fix debugfs on 64-bit platforms (git-fixes).\n- mmc: dw_mmc: Fix debugfs on 64-bit platforms (git-fixes).\n- mmc: meson-gx: make sure the descriptor is stopped on errors (git-fixes).\n- mmc: meson-gx: simplify interrupt handler (git-fixes).\n- mmc: renesas_sdhi: limit block count to 16 bit for old revisions (git-fixes).\n- mmc: sdhci-esdhc-imx: fix the mask for tuning start point (bsc#1051510).\n- mmc: sdhci-msm: Clear tuning done flag while hs400 tuning (bsc#1051510).\n- mmc: sdhci-of-at91: fix memleak on clk_get failure (git-fixes).\n- mmc: sdhci-pci: Fix eMMC driver strength for BYT-based controllers (bsc#1051510).\n- mmc: sdhci-xenon: fix annoying 1.8V regulator warning (bsc#1051510).\n- mmc: sdio: Fix potential NULL pointer error in mmc_sdio_init_card() (bsc#1051510).\n- mmc: tmio: fix access width of Block Count Register (git-fixes).\n- mm: thp: handle page cache THP correctly in PageTransCompoundMap (git fixes (block drivers)).\n- mtd: cfi: fix deadloop in cfi_cmdset_0002.c do_write_buffer (bsc#1051510).\n- mtd: spi-nor: cadence-quadspi: add a delay in write sequence (git-fixes).\n- mtd: spi-nor: enable 4B opcodes for mx66l51235l (git-fixes).\n- mtd: spi-nor: fsl-quadspi: Do not let -EINVAL on the bus (git-fixes).\n- mwifiex: avoid -Wstringop-overflow warning (bsc#1051510).\n- mwifiex: Fix memory corruption in dump_station (bsc#1051510).\n- net: bcmgenet: correct per TX/RX ring statistics (networking-stable-20_04_27).\n- net: dsa: b53: Fix ARL register definitions (networking-stable-20_04_27).\n- net: dsa: b53: Rework ARL bin logic (networking-stable-20_04_27).\n- net: dsa: bcm_sf2: Do not register slave MDIO bus with OF (networking-stable-20_04_09).\n- net: dsa: bcm_sf2: Ensure correct sub-node is parsed (networking-stable-20_04_09).\n- net: dsa: Fix duplicate frames flooded by learning (networking-stable-20_03_28).\n- net: dsa: mv88e6xxx: fix lockup on warm boot (networking-stable-20_03_14).\n- net: fec: validate the new settings in fec_enet_set_coalesce() (networking-stable-20_03_14).\n- net: fix race condition in __inet_lookup_established() (bsc#1151794).\n- net: fq: add missing attribute validation for orphan mask (networking-stable-20_03_14).\n- net, ip_tunnel: fix interface lookup with no key (networking-stable-20_04_02).\n- net: ipv4: devinet: Fix crash when add/del multicast IP with autojoin (networking-stable-20_04_17).\n- net: ipv6: do not consider routes via gateways for anycast address check (networking-stable-20_04_17).\n- netlink: Use netlink header as base to calculate bad attribute offset (networking-stable-20_03_14).\n- net: memcg: fix lockdep splat in inet_csk_accept() (networking-stable-20_03_14).\n- net: memcg: late association of sock to memcg (networking-stable-20_03_14).\n- net/mlx4_en: avoid indirect call in TX completion (networking-stable-20_04_27).\n- net/mlx5: Add new fields to Port Type and Speed register (bsc#1171118).\n- net/mlx5: Add RoCE RX ICRC encapsulated counter (bsc#1171118).\n- net/mlx5e: Fix ethtool self test: link speed (bsc#1171118).\n- net/mlx5e: Move port speed code from en_ethtool.c to en/port.c (bsc#1171118).\n- net/mlx5: Expose link speed directly (bsc#1171118).\n- net/mlx5: Expose port speed when possible (bsc#1171118).\n- net: mvneta: Fix the case where the last poll did not process all rx (networking-stable-20_03_28).\n- net: netrom: Fix potential nr_neigh refcnt leak in nr_add_node (networking-stable-20_04_27).\n- net/packet: tpacket_rcv: do not increment ring index on drop (networking-stable-20_03_14).\n- net: qmi_wwan: add support for ASKEY WWHC050 (networking-stable-20_03_28).\n- net: revert default NAPI poll timeout to 2 jiffies (networking-stable-20_04_17).\n- net_sched: cls_route: remove the right filter from hashtable (networking-stable-20_03_28).\n- net/x25: Fix x25_neigh refcnt leak when receiving frame (networking-stable-20_04_27).\n- nfc: add missing attribute validation for SE API (networking-stable-20_03_14).\n- nfc: add missing attribute validation for vendor subcommand (networking-stable-20_03_14).\n- nfc: st21nfca: add missed kfree_skb() in an error path (bsc#1051510).\n- nfsd4: fix up replay_matches_cache() (git-fixes).\n- nfsd: Ensure CLONE persists data and metadata changes to the target file (git-fixes).\n- nfsd: fix delay timer on 32-bit architectures (git-fixes).\n- nfsd: fix jiffies/time_t mixup in LRU list (git-fixes).\n- NFS: Directory page cache pages need to be locked when read (git-fixes).\n- nfsd: memory corruption in nfsd4_lock() (git-fixes).\n- NFS: Do not call generic_error_remove_page() while holding locks (bsc#1170457).\n- NFS: Fix memory leaks and corruption in readdir (git-fixes).\n- NFS: Fix O_DIRECT accounting of number of bytes read/written (git-fixes).\n- nfs: Fix potential posix_acl refcnt leak in nfs3_set_acl (git-fixes).\n- NFS: fix racey wait in nfs_set_open_stateid_locked (bsc#1170592).\n- NFS/flexfiles: Use the correct TCP timeout for flexfiles I/O (git-fixes).\n- NFS/pnfs: Fix pnfs_generic_prepare_to_resend_writes() (git-fixes).\n- NFS: Revalidate the file size on a fatal write error (git-fixes).\n- NFSv4.0: nfs4_do_fsinfo() should not do implicit lease renewals (git-fixes).\n- NFSv4: Do not allow a cached open with a revoked delegation (git-fixes).\n- NFSv4: Fix leak of clp-\u003ecl_acceptor string (git-fixes).\n- NFSv4/pnfs: Return valid stateids in nfs_layout_find_inode_by_stateid() (git-fixes).\n- NFSv4: try lease recovery on NFS4ERR_EXPIRED (git-fixes).\n- NFSv4.x: Drop the slot if nfs4_delegreturn_prepare waits for layoutreturn (git-fixes).\n- nl802154: add missing attribute validation for dev_type (networking-stable-20_03_14).\n- nl802154: add missing attribute validation (networking-stable-20_03_14).\n- nvme-fc: print proper nvme-fc devloss_tmo value (bsc#1172391).\n- objtool: Fix stack offset tracking for indirect CFAs (bsc#1169514).\n- objtool: Fix switch table detection in .text.unlikely (bsc#1169514).\n- objtool: Make BP scratch register warning more robust (bsc#1169514).\n- padata: Remove broken queue flushing (git-fixes).\n- Partially revert \u0027kfifo: fix kfifo_alloc() and kfifo_init()\u0027 (git fixes (block drivers)).\n- pinctrl: baytrail: Enable pin configuration setting for GPIO chip (git-fixes).\n- pinctrl: cherryview: Add missing spinlock usage in chv_gpio_irq_handler (git-fixes).\n- platform/x86: asus-nb-wmi: Do not load on Asus T100TA and T200TA (bsc#1051510).\n- pNFS: Ensure we do clear the return-on-close layout stateid on fatal errors (git-fixes).\n- powerpc: Add attributes for setjmp/longjmp (bsc#1065729).\n- powerpc/pci/of: Parse unassigned resources (bsc#1065729).\n- powerpc/setup_64: Set cache-line-size based on cache-block-size (bsc#1065729).\n- powerpc/sstep: Fix DS operand in ld encoding to appropriate value (bsc#1065729).\n- r8152: check disconnect status after long sleep (networking-stable-20_03_14).\n- raid6/ppc: Fix build for clang (git fixes (block drivers)).\n- rcu: locking and unlocking need to always be at least barriers (git fixes (block drivers)).\n- RDMA/ipoib: Fix use of sizeof() (bsc#1168503).\n- RDMA/netdev: Fix netlink support in IPoIB (bsc#1168503).\n- RDMA/netdev: Hoist alloc_netdev_mqs out of the driver (bsc#1168503).\n- RDMA/netdev: Use priv_destructor for netdev cleanup (bsc#1168503).\n- Remove 2 git-fixes that cause build issues. (bsc#1171691) \n- Revert \u0027ALSA: hda/realtek: Fix pop noise on ALC225\u0027 (git-fixes).\n- Revert \u0027drm/panel: simple: Add support for Sharp LQ150X1LG11 panels\u0027 (bsc#1114279) \t\n- Revert \u0027ipc,sem: remove uneeded sem_undo_list lock usage in exit_sem()\u0027 (bsc#1172221).\n- rtlwifi: Fix a double free in _rtl_usb_tx_urb_setup() (bsc#1051510).\n- s390/ftrace: fix potential crashes when switching tracers (git-fixes).\n- s390/ism: fix error return code in ism_probe() (git-fixes).\n- s390/pci: Fix possible deadlock in recover_store() (bsc#1165183 LTC#184103).\n- s390/pci: Recover handle in clp_set_pci_fn() (bsc#1165183 LTC#184103).\n- scripts/decodecode: fix trapping instruction formatting (bsc#1065729).\n- scripts/dtc: Remove redundant YYLOC global declaration (bsc#1160388).\n- scsi: bnx2i: fix potential use after free (bsc#1171600).\n- scsi: core: Handle drivers which set sg_tablesize to zero (bsc#1171601) This commit also required: \u003e scsi: core: avoid preallocating big SGL for data\n- scsi: core: save/restore command resid for error handling (bsc#1171602).\n- scsi: core: scsi_trace: Use get_unaligned_be*() (bsc#1171604).\n- scsi: core: try to get module before removing device (bsc#1171605).\n- scsi: csiostor: Adjust indentation in csio_device_reset (bsc#1171606).\n- scsi: csiostor: Do not enable IRQs too early (bsc#1171607).\n- scsi: esas2r: unlock on error in esas2r_nvram_read_direct() (bsc#1171608).\n- scsi: fnic: fix invalid stack access (bsc#1171609).\n- scsi: fnic: fix msix interrupt allocation (bsc#1171610).\n- scsi: ibmvscsi: Fix WARN_ON during event pool release (bsc#1170791 ltc#185128).\n- scsi: iscsi: Avoid potential deadlock in iscsi_if_rx func (bsc#1171611).\n- scsi: iscsi: Fix a potential deadlock in the timeout handler (bsc#1171612).\n- scsi: iscsi: qla4xxx: fix double free in probe (bsc#1171613).\n- scsi: lpfc: fix: Coverity: lpfc_cmpl_els_rsp(): Null pointer dereferences (bsc#1171614).\n- scsi: lpfc: Fix crash in target side cable pulls hitting WAIT_FOR_UNREG (bsc#1171615).\n- scsi: megaraid_sas: Do not initiate OCR if controller is not in ready state (bsc#1171616).\n- scsi: qla2xxx: add ring buffer for tracing debug logs (bsc#1157169).\n- scsi: qla2xxx: check UNLOADING before posting async work (bsc#1157169).\n- scsi: qla2xxx: Delete all sessions before unregister local nvme port (bsc#1157169).\n- scsi: qla2xxx: Do not log message when reading port speed via sysfs (bsc#1157169).\n- scsi: qla2xxx: Fix hang when issuing nvme disconnect-all in NPIV (bsc#1157169).\n- scsi: qla2xxx: Fix regression warnings (bsc#1157169).\n- scsi: qla2xxx: Remove non functional code (bsc#1157169).\n- scsi: qla2xxx: set UNLOADING before waiting for session deletion (bsc#1157169).\n- scsi: qla4xxx: Adjust indentation in qla4xxx_mem_free (bsc#1171617).\n- scsi: qla4xxx: fix double free bug (bsc#1171618).\n- scsi: sd: Clear sdkp-\u003eprotection_type if disk is reformatted without PI (bsc#1171619).\n- scsi: sg: add sg_remove_request in sg_common_write (bsc#1171620).\n- scsi: tracing: Fix handling of TRANSFER LENGTH == 0 for READ(6) and WRITE(6) (bsc#1171621).\n- scsi: ufs: change msleep to usleep_range (bsc#1171622).\n- scsi: ufs: Clean up ufshcd_scale_clks() and clock scaling error out path (bsc#1171623).\n- scsi: ufs: Fix ufshcd_hold() caused scheduling while atomic (bsc#1171624).\n- scsi: ufs: Fix ufshcd_probe_hba() reture value in case ufshcd_scsi_add_wlus() fails (bsc#1171625).\n- scsi: ufs: Recheck bkops level if bkops is disabled (bsc#1171626).\n- sctp: fix possibly using a bad saddr with a given dst (networking-stable-20_04_02).\n- sctp: fix refcount bug in sctp_wfree (networking-stable-20_04_02).\n- seq_file: fix problem when seeking mid-record (bsc#1170125).\n- serial: uartps: Move the spinlock after the read of the tx empty (git-fixes).\n- sfc: detach from cb_page in efx_copy_channel() (networking-stable-20_03_14).\n- signal/pid_namespace: Fix reboot_pid_ns to use send_sig not force_sig (bsc#1172185).\n- slcan: not call free_netdev before rtnl_unlock in slcan_open (networking-stable-20_03_28).\n- slip: make slhc_compress() more robust against malicious packets (networking-stable-20_03_14).\n- smb3: Additional compression structures (bsc#1144333).\n- smb3: Add new compression flags (bsc#1144333).\n- smb3: change noisy error message to FYI (bsc#1144333).\n- smb3: enable swap on SMB3 mounts (bsc#1144333).\n- smb3: Minor cleanup of protocol definitions (bsc#1144333).\n- smb3: remove overly noisy debug line in signing errors (bsc#1144333).\n- smb3: smbdirect support can be configured by default (bsc#1144333).\n- smb3: use SMB2_SIGNATURE_SIZE define (bsc#1144333).\n- spi: bcm2835: Fix 3-wire mode if DMA is enabled (git-fixes).\n- spi: bcm63xx-hsspi: Really keep pll clk enabled (bsc#1051510).\n- spi: bcm-qspi: when tx/rx buffer is NULL set to 0 (bsc#1051510).\n- spi: dw: Add SPI Rx-done wait method to DMA-based transfer (bsc#1051510).\n- spi: dw: Add SPI Tx-done wait method to DMA-based transfer (bsc#1051510).\n- spi: dw: Zero DMA Tx and Rx configurations on stack (bsc#1051510).\n- spi: fsl: do not map irq during probe (git-fixes).\n- spi: fsl: use platform_get_irq() instead of of_irq_to_resource() (git-fixes).\n- spi: pxa2xx: Add CS control clock quirk (bsc#1051510).\n- spi: qup: call spi_qup_pm_resume_runtime before suspending (bsc#1051510).\n- spi: spi-fsl-dspi: Replace interruptible wait queue with a simple completion (git-fixes).\n- spi: spi-s3c64xx: Fix system resume support (git-fixes).\n- spi/zynqmp: remove entry that causes a cs glitch (bsc#1051510).\n- staging: comedi: dt2815: fix writing hi byte of analog output (bsc#1051510).\n- staging: comedi: Fix comedi_device refcnt leak in comedi_open (bsc#1051510).\n- staging: iio: ad2s1210: Fix SPI reading (bsc#1051510).\n- staging: vt6656: Do not set RCR_MULTICAST or RCR_BROADCAST by default (git-fixes).\n- staging: vt6656: Fix drivers TBTT timing counter (git-fixes).\n- staging: vt6656: Fix pairwise key entry save (git-fixes).\n- sunrpc: expiry_time should be seconds not timeval (git-fixes).\n- SUNRPC: Fix a potential buffer overflow in \u0027svc_print_xprts()\u0027 (git-fixes).\n- supported.conf: Add br_netfilter to base (bsc#1169020).\n- svcrdma: Fix leak of transport addresses (git-fixes).\n- taskstats: fix data-race (bsc#1172188).\n- tcp: cache line align MAX_TCP_HEADER (networking-stable-20_04_27).\n- tcp: repair: fix TCP_QUEUE_SEQ implementation (networking-stable-20_03_28).\n- team: add missing attribute validation for array index (networking-stable-20_03_14).\n- team: add missing attribute validation for port ifindex (networking-stable-20_03_14).\n- team: fix hang in team_mode_get() (networking-stable-20_04_27).\n- tools lib traceevent: Remove unneeded qsort and uses memmove instead (git-fixes).\n- tpm: ibmvtpm: retry on H_CLOSED in tpm_ibmvtpm_send() (bsc#1065729).\n- tpm/tpm_tis: Free IRQ if probing fails (bsc#1082555).\n- tpm/tpm_tis: Free IRQ if probing fails (git-fixes).\n- tracing: Add a vmalloc_sync_mappings() for safe measure (git-fixes).\n- tracing: Disable trace_printk() on post poned tests (git-fixes).\n- tracing: Fix the race between registering \u0027snapshot\u0027 event trigger and triggering \u0027snapshot\u0027 operation (git-fixes).\n- tty: rocket, avoid OOB access (git-fixes).\n- UAS: fix deadlock in error handling and PM flushing work (git-fixes).\n- UAS: no use logging any details in case of ENODEV (git-fixes).\n- USB: Add USB_QUIRK_DELAY_CTRL_MSG and USB_QUIRK_DELAY_INIT for Corsair K70 RGB RAPIDFIRE (git-fixes).\n- USB: cdc-acm: restore capability check order (git-fixes).\n- USB: core: Fix misleading driver bug report (bsc#1051510).\n- USB: dwc3: do not set gadget-\u003eis_otg flag (git-fixes).\n- USB: dwc3: gadget: Do link recovery for SS and SSP (git-fixes).\n- USB: early: Handle AMD\u0027s spec-compliant identifiers, too (git-fixes).\n- USB: f_fs: Clear OS Extended descriptor counts to zero in ffs_data_reset() (git-fixes).\n- USB: gadget: audio: Fix a missing error return value in audio_bind() (git-fixes).\n- USB: gadget: composite: Inform controller driver of self-powered (git-fixes).\n- USB: gadget: legacy: fix error return code in cdc_bind() (git-fixes).\n- USB: gadget: legacy: fix error return code in gncm_bind() (git-fixes).\n- USB: gadget: legacy: fix redundant initialization warnings (bsc#1051510).\n- USB: gadget: net2272: Fix a memory leak in an error handling path in \u0027net2272_plat_probe()\u0027 (git-fixes).\n- USB: gadget: udc: atmel: Fix vbus disconnect handling (git-fixes).\n- USB: gadget: udc: atmel: Make some symbols static (git-fixes).\n- USB: gadget: udc: bdc: Remove unnecessary NULL checks in bdc_req_complete (git-fixes).\n- USB: host: xhci-plat: keep runtime active when removing host (git-fixes).\n- USB: hub: Fix handling of connect changes during sleep (git-fixes).\n- usbnet: silence an unnecessary warning (bsc#1170770).\n- USB: serial: garmin_gps: add sanity checking for data length (git-fixes).\n- USB: serial: option: add BroadMobi BM806U (git-fixes).\n- USB: serial: option: add support for ASKEY WWHC050 (git-fixes).\n- USB: serial: option: add Wistron Neweb D19Q1 (git-fixes).\n- USB: serial: qcserial: Add DW5816e support (git-fixes).\n- USB: sisusbvga: Change port variable from signed to unsigned (git-fixes).\n- usb-storage: Add unusual_devs entry for JMicron JMS566 (git-fixes).\n- USB: uas: add quirk for LaCie 2Big Quadra (git-fixes).\n- USB: xhci: Fix NULL pointer dereference when enqueuing trbs from urb sg list (git-fixes).\n- video: fbdev: sis: Remove unnecessary parentheses and commented code (bsc#1114279)\n- video: fbdev: w100fb: Fix a potential double free (bsc#1051510).\n- vrf: Check skb for XFRM_TRANSFORMED flag (networking-stable-20_04_27).\n- vt: ioctl, switch VT_IS_IN_USE and VT_BUSY to inlines (git-fixes).\n- vt: selection, introduce vc_is_sel (git-fixes).\n- vt: vt_ioctl: fix race in VT_RESIZEX (git-fixes).\n- vt: vt_ioctl: fix use-after-free in vt_in_use() (git-fixes).\n- vt: vt_ioctl: fix VT_DISALLOCATE freeing in-use virtual console (git-fixes).\n- vxlan: check return value of gro_cells_init() (networking-stable-20_03_28).\n- watchdog: reset last_hw_keepalive time at start (git-fixes).\n- wcn36xx: Fix error handling path in \u0027wcn36xx_probe()\u0027 (bsc#1051510).\n- wil6210: remove reset file from debugfs (git-fixes).\n- wimax/i2400m: Fix potential urb refcnt leak (bsc#1051510).\n- workqueue: do not use wq_select_unbound_cpu() for bound works (bsc#1172130).\n- x86/entry/64: Fix unwind hints in kernel exit path (bsc#1058115).\n- x86/entry/64: Fix unwind hints in register clearing code (bsc#1058115).\n- x86/entry/64: Fix unwind hints in rewind_stack_do_exit() (bsc#1058115).\n- x86/entry/64: Fix unwind hints in __switch_to_asm() (bsc#1058115).\n- x86/Hyper-V: Allow guests to enable InvariantTSC (bsc#1170620).\n- x86/Hyper-V: Free hv_panic_page when fail to register kmsg dump (bsc#1170618).\n- x86/Hyper-V: Report crash data in die() when panic_on_oops is set (bsc#1170618).\n- x86/Hyper-V: Report crash register data or kmsg before running crash kernel (bsc#1170618).\n- x86/Hyper-V: Report crash register data when sysctl_record_panic_msg is not set (bsc#1170618).\n- x86/Hyper-V: report value of misc_features (git-fixes).\n- x86/Hyper-V: Trigger crash enlightenment only once during system crash (bsc#1170618).\n- x86/Hyper-V: Unload vmbus channel in hv panic callback (bsc#1170618).\n- x86/kprobes: Avoid kretprobe recursion bug (bsc#1114279).\n- x86/resctrl: Fix invalid attempt at removing the default resource group (git-fixes).\n- x86/resctrl: Preserve CDP enable over CPU hotplug (bsc#1114279).\n- x86/unwind/orc: Do not skip the first frame for inactive tasks (bsc#1058115).\n- x86/unwind/orc: Fix error handling in __unwind_start() (bsc#1058115).\n- x86/unwind/orc: Fix error path for bad ORC entry type (bsc#1058115).\n- x86/unwind/orc: Fix unwind_get_return_address_ptr() for inactive tasks (bsc#1058115).\n- x86/unwind/orc: Prevent unwinding before ORC initialization (bsc#1058115).\n- x86/unwind: Prevent false warnings for non-current tasks (bsc#1058115).\n- xen/pci: reserve MCFG areas earlier (bsc#1170145).\n- xfrm: Always set XFRM_TRANSFORMED in xfrm{4,6}_output_finish (networking-stable-20_04_27).\n- xfs: Correctly invert xfs_buftarg LRU isolation logic (git-fixes).\n- xfs: do not ever return a stale pointer from __xfs_dir3_free_read (git-fixes).\n- xprtrdma: Fix completion wait during device removal (git-fixes).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2020-1603,SUSE-SLE-SERVER-12-SP4-2020-1603", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2020_1603-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2020:1603-1", "url": "https://www.suse.com/support/update/announcement/2020/suse-su-20201603-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2020:1603-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-June/006927.html" }, { "category": "self", "summary": "SUSE Bug 1051510", "url": "https://bugzilla.suse.com/1051510" }, { "category": "self", "summary": "SUSE Bug 1058115", "url": "https://bugzilla.suse.com/1058115" }, { "category": "self", "summary": "SUSE Bug 1065729", "url": "https://bugzilla.suse.com/1065729" }, { "category": "self", "summary": "SUSE Bug 1082555", "url": "https://bugzilla.suse.com/1082555" }, { "category": "self", "summary": "SUSE Bug 1089895", "url": "https://bugzilla.suse.com/1089895" }, { "category": "self", "summary": "SUSE Bug 1114279", "url": "https://bugzilla.suse.com/1114279" }, { "category": "self", "summary": "SUSE Bug 1133021", "url": "https://bugzilla.suse.com/1133021" }, { "category": "self", "summary": "SUSE Bug 1144333", "url": "https://bugzilla.suse.com/1144333" }, { "category": "self", "summary": "SUSE Bug 1151794", "url": "https://bugzilla.suse.com/1151794" }, { "category": "self", "summary": "SUSE Bug 1152489", "url": "https://bugzilla.suse.com/1152489" }, { "category": "self", "summary": "SUSE Bug 1154824", "url": "https://bugzilla.suse.com/1154824" }, { "category": "self", "summary": "SUSE Bug 1157169", "url": "https://bugzilla.suse.com/1157169" }, { "category": "self", "summary": "SUSE Bug 1158265", "url": "https://bugzilla.suse.com/1158265" }, { "category": "self", "summary": "SUSE Bug 1160388", "url": "https://bugzilla.suse.com/1160388" }, { "category": "self", "summary": "SUSE Bug 1160947", "url": "https://bugzilla.suse.com/1160947" }, { "category": "self", "summary": "SUSE Bug 1165183", "url": "https://bugzilla.suse.com/1165183" }, { "category": "self", "summary": "SUSE Bug 1165741", "url": "https://bugzilla.suse.com/1165741" }, { "category": "self", "summary": "SUSE Bug 1166969", "url": "https://bugzilla.suse.com/1166969" }, { "category": "self", "summary": "SUSE Bug 1167574", "url": "https://bugzilla.suse.com/1167574" }, { "category": "self", "summary": "SUSE Bug 1167851", "url": "https://bugzilla.suse.com/1167851" }, { "category": "self", "summary": "SUSE Bug 1168503", "url": "https://bugzilla.suse.com/1168503" }, { "category": "self", "summary": "SUSE Bug 1168670", "url": "https://bugzilla.suse.com/1168670" }, { "category": "self", "summary": "SUSE Bug 1169020", "url": "https://bugzilla.suse.com/1169020" }, { "category": "self", "summary": "SUSE Bug 1169514", "url": "https://bugzilla.suse.com/1169514" }, { "category": "self", "summary": "SUSE Bug 1169525", "url": "https://bugzilla.suse.com/1169525" }, { "category": "self", "summary": "SUSE Bug 1170056", "url": "https://bugzilla.suse.com/1170056" }, { "category": "self", "summary": "SUSE Bug 1170125", "url": "https://bugzilla.suse.com/1170125" }, { "category": "self", "summary": "SUSE Bug 1170145", "url": "https://bugzilla.suse.com/1170145" }, { "category": "self", "summary": "SUSE Bug 1170345", "url": "https://bugzilla.suse.com/1170345" }, { "category": "self", "summary": "SUSE Bug 1170457", "url": "https://bugzilla.suse.com/1170457" }, { "category": "self", "summary": "SUSE Bug 1170522", "url": "https://bugzilla.suse.com/1170522" }, { "category": "self", "summary": "SUSE Bug 1170592", "url": "https://bugzilla.suse.com/1170592" }, { "category": "self", "summary": "SUSE Bug 1170618", "url": "https://bugzilla.suse.com/1170618" }, { "category": "self", "summary": "SUSE Bug 1170620", "url": "https://bugzilla.suse.com/1170620" }, { "category": "self", "summary": "SUSE Bug 1170770", "url": "https://bugzilla.suse.com/1170770" }, { "category": "self", "summary": "SUSE Bug 1170778", "url": "https://bugzilla.suse.com/1170778" }, { "category": "self", "summary": "SUSE Bug 1170791", "url": "https://bugzilla.suse.com/1170791" }, { "category": "self", "summary": "SUSE Bug 1170901", "url": "https://bugzilla.suse.com/1170901" }, { "category": "self", "summary": "SUSE Bug 1171078", "url": "https://bugzilla.suse.com/1171078" }, { "category": "self", "summary": "SUSE Bug 1171098", "url": "https://bugzilla.suse.com/1171098" }, { "category": "self", "summary": "SUSE Bug 1171118", "url": "https://bugzilla.suse.com/1171118" }, { "category": "self", "summary": "SUSE Bug 1171189", "url": "https://bugzilla.suse.com/1171189" }, { "category": "self", "summary": "SUSE Bug 1171191", "url": "https://bugzilla.suse.com/1171191" }, { "category": "self", "summary": "SUSE Bug 1171195", "url": "https://bugzilla.suse.com/1171195" }, { "category": "self", "summary": "SUSE Bug 1171202", "url": "https://bugzilla.suse.com/1171202" }, { "category": "self", "summary": "SUSE Bug 1171205", "url": "https://bugzilla.suse.com/1171205" }, { "category": "self", "summary": "SUSE Bug 1171217", "url": "https://bugzilla.suse.com/1171217" }, { "category": "self", "summary": "SUSE Bug 1171218", "url": "https://bugzilla.suse.com/1171218" }, { "category": "self", "summary": "SUSE Bug 1171219", "url": "https://bugzilla.suse.com/1171219" }, { "category": "self", "summary": "SUSE Bug 1171220", "url": "https://bugzilla.suse.com/1171220" }, { "category": "self", "summary": "SUSE Bug 1171293", "url": "https://bugzilla.suse.com/1171293" }, { "category": "self", "summary": "SUSE Bug 1171417", "url": "https://bugzilla.suse.com/1171417" }, { "category": "self", "summary": "SUSE Bug 1171527", "url": "https://bugzilla.suse.com/1171527" }, { "category": "self", "summary": "SUSE Bug 1171599", "url": "https://bugzilla.suse.com/1171599" }, { "category": "self", "summary": "SUSE Bug 1171600", "url": "https://bugzilla.suse.com/1171600" }, { "category": "self", "summary": "SUSE Bug 1171601", "url": "https://bugzilla.suse.com/1171601" }, { "category": "self", "summary": "SUSE Bug 1171602", "url": "https://bugzilla.suse.com/1171602" }, { "category": "self", "summary": "SUSE Bug 1171604", "url": "https://bugzilla.suse.com/1171604" }, { "category": "self", "summary": "SUSE Bug 1171605", "url": "https://bugzilla.suse.com/1171605" }, { "category": "self", "summary": "SUSE Bug 1171606", "url": "https://bugzilla.suse.com/1171606" }, { "category": "self", "summary": "SUSE Bug 1171607", "url": "https://bugzilla.suse.com/1171607" }, { "category": "self", "summary": "SUSE Bug 1171608", "url": "https://bugzilla.suse.com/1171608" }, { "category": "self", "summary": "SUSE Bug 1171609", "url": "https://bugzilla.suse.com/1171609" }, { "category": "self", "summary": "SUSE Bug 1171610", "url": "https://bugzilla.suse.com/1171610" }, { "category": "self", "summary": "SUSE Bug 1171611", "url": "https://bugzilla.suse.com/1171611" }, { "category": "self", "summary": "SUSE Bug 1171612", "url": "https://bugzilla.suse.com/1171612" }, { "category": "self", "summary": "SUSE Bug 1171613", "url": "https://bugzilla.suse.com/1171613" }, { "category": "self", "summary": "SUSE Bug 1171614", "url": "https://bugzilla.suse.com/1171614" }, { "category": "self", "summary": "SUSE Bug 1171615", "url": "https://bugzilla.suse.com/1171615" }, { "category": "self", "summary": "SUSE Bug 1171616", "url": "https://bugzilla.suse.com/1171616" }, { "category": "self", "summary": "SUSE Bug 1171617", "url": "https://bugzilla.suse.com/1171617" }, { "category": "self", "summary": "SUSE Bug 1171618", "url": "https://bugzilla.suse.com/1171618" }, { "category": "self", "summary": "SUSE Bug 1171619", "url": "https://bugzilla.suse.com/1171619" }, { "category": "self", "summary": "SUSE Bug 1171620", "url": "https://bugzilla.suse.com/1171620" }, { "category": "self", "summary": "SUSE Bug 1171621", "url": "https://bugzilla.suse.com/1171621" }, { "category": "self", "summary": "SUSE Bug 1171622", "url": "https://bugzilla.suse.com/1171622" }, { "category": "self", "summary": "SUSE Bug 1171623", "url": "https://bugzilla.suse.com/1171623" }, { "category": "self", "summary": "SUSE Bug 1171624", "url": "https://bugzilla.suse.com/1171624" }, { "category": "self", "summary": "SUSE Bug 1171625", "url": "https://bugzilla.suse.com/1171625" }, { "category": "self", "summary": "SUSE Bug 1171626", "url": "https://bugzilla.suse.com/1171626" }, { "category": "self", "summary": "SUSE Bug 1171679", "url": "https://bugzilla.suse.com/1171679" }, { "category": "self", "summary": "SUSE Bug 1171691", "url": "https://bugzilla.suse.com/1171691" }, { "category": "self", "summary": "SUSE Bug 1171694", "url": "https://bugzilla.suse.com/1171694" }, { "category": "self", "summary": "SUSE Bug 1171695", "url": "https://bugzilla.suse.com/1171695" }, { "category": "self", "summary": "SUSE Bug 1171736", "url": "https://bugzilla.suse.com/1171736" }, { "category": "self", "summary": "SUSE Bug 1171761", "url": "https://bugzilla.suse.com/1171761" }, { "category": "self", "summary": "SUSE Bug 1171948", "url": "https://bugzilla.suse.com/1171948" }, { "category": "self", "summary": "SUSE Bug 1171949", "url": "https://bugzilla.suse.com/1171949" }, { "category": "self", "summary": "SUSE Bug 1171951", "url": "https://bugzilla.suse.com/1171951" }, { "category": "self", "summary": "SUSE Bug 1171952", "url": "https://bugzilla.suse.com/1171952" }, { "category": "self", "summary": "SUSE Bug 1171982", "url": "https://bugzilla.suse.com/1171982" }, { "category": "self", "summary": "SUSE Bug 1171983", "url": "https://bugzilla.suse.com/1171983" }, { "category": "self", "summary": "SUSE Bug 1172096", "url": "https://bugzilla.suse.com/1172096" }, { "category": "self", "summary": "SUSE Bug 1172097", "url": "https://bugzilla.suse.com/1172097" }, { "category": "self", "summary": "SUSE Bug 1172098", "url": "https://bugzilla.suse.com/1172098" }, { "category": "self", "summary": "SUSE Bug 1172099", "url": "https://bugzilla.suse.com/1172099" }, { "category": "self", "summary": "SUSE Bug 1172101", "url": "https://bugzilla.suse.com/1172101" }, { "category": "self", "summary": "SUSE Bug 1172102", "url": "https://bugzilla.suse.com/1172102" }, { "category": "self", "summary": "SUSE Bug 1172103", "url": "https://bugzilla.suse.com/1172103" }, { "category": "self", "summary": "SUSE Bug 1172104", "url": "https://bugzilla.suse.com/1172104" }, { "category": "self", "summary": "SUSE Bug 1172127", "url": "https://bugzilla.suse.com/1172127" }, { "category": "self", "summary": "SUSE Bug 1172130", "url": "https://bugzilla.suse.com/1172130" }, { "category": "self", "summary": "SUSE Bug 1172185", "url": "https://bugzilla.suse.com/1172185" }, { "category": "self", "summary": "SUSE Bug 1172188", "url": "https://bugzilla.suse.com/1172188" }, { "category": "self", "summary": "SUSE Bug 1172199", "url": "https://bugzilla.suse.com/1172199" }, { "category": "self", "summary": "SUSE Bug 1172221", "url": "https://bugzilla.suse.com/1172221" }, { "category": "self", "summary": "SUSE Bug 1172253", "url": "https://bugzilla.suse.com/1172253" }, { "category": "self", "summary": "SUSE Bug 1172317", "url": "https://bugzilla.suse.com/1172317" }, { "category": "self", "summary": "SUSE Bug 1172342", "url": "https://bugzilla.suse.com/1172342" }, { "category": "self", "summary": "SUSE Bug 1172343", "url": "https://bugzilla.suse.com/1172343" }, { "category": "self", "summary": "SUSE Bug 1172344", "url": "https://bugzilla.suse.com/1172344" }, { "category": "self", "summary": "SUSE Bug 1172366", "url": "https://bugzilla.suse.com/1172366" }, { "category": "self", "summary": "SUSE Bug 1172391", "url": "https://bugzilla.suse.com/1172391" }, { "category": "self", "summary": "SUSE Bug 1172397", "url": "https://bugzilla.suse.com/1172397" }, { "category": "self", "summary": "SUSE Bug 1172453", "url": "https://bugzilla.suse.com/1172453" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1000199 page", "url": "https://www.suse.com/security/cve/CVE-2018-1000199/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-19462 page", "url": "https://www.suse.com/security/cve/CVE-2019-19462/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-20806 page", "url": "https://www.suse.com/security/cve/CVE-2019-20806/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-20812 page", "url": "https://www.suse.com/security/cve/CVE-2019-20812/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9455 page", "url": "https://www.suse.com/security/cve/CVE-2019-9455/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-0543 page", "url": "https://www.suse.com/security/cve/CVE-2020-0543/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10690 page", "url": "https://www.suse.com/security/cve/CVE-2020-10690/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10711 page", "url": "https://www.suse.com/security/cve/CVE-2020-10711/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10720 page", "url": "https://www.suse.com/security/cve/CVE-2020-10720/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10732 page", "url": "https://www.suse.com/security/cve/CVE-2020-10732/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10751 page", "url": "https://www.suse.com/security/cve/CVE-2020-10751/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10757 page", "url": "https://www.suse.com/security/cve/CVE-2020-10757/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12114 page", "url": "https://www.suse.com/security/cve/CVE-2020-12114/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12464 page", "url": "https://www.suse.com/security/cve/CVE-2020-12464/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12652 page", "url": "https://www.suse.com/security/cve/CVE-2020-12652/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12653 page", "url": "https://www.suse.com/security/cve/CVE-2020-12653/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12654 page", "url": "https://www.suse.com/security/cve/CVE-2020-12654/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12655 page", "url": "https://www.suse.com/security/cve/CVE-2020-12655/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12656 page", "url": "https://www.suse.com/security/cve/CVE-2020-12656/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12657 page", "url": "https://www.suse.com/security/cve/CVE-2020-12657/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12768 page", "url": "https://www.suse.com/security/cve/CVE-2020-12768/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12769 page", "url": "https://www.suse.com/security/cve/CVE-2020-12769/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-13143 page", "url": "https://www.suse.com/security/cve/CVE-2020-13143/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2020-06-10T13:28:44Z", "generator": { "date": "2020-06-10T13:28:44Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2020:1603-1", "initial_release_date": "2020-06-10T13:28:44Z", "revision_history": [ { "date": "2020-06-10T13:28:44Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-devel-azure-4.12.14-6.43.1.noarch", "product": { "name": "kernel-devel-azure-4.12.14-6.43.1.noarch", "product_id": "kernel-devel-azure-4.12.14-6.43.1.noarch" } }, { "category": "product_version", "name": "kernel-source-azure-4.12.14-6.43.1.noarch", "product": { "name": "kernel-source-azure-4.12.14-6.43.1.noarch", "product_id": "kernel-source-azure-4.12.14-6.43.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-azure-4.12.14-6.43.1.x86_64", "product": { "name": "cluster-md-kmp-azure-4.12.14-6.43.1.x86_64", "product_id": "cluster-md-kmp-azure-4.12.14-6.43.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-azure-4.12.14-6.43.1.x86_64", "product": { "name": "dlm-kmp-azure-4.12.14-6.43.1.x86_64", "product_id": "dlm-kmp-azure-4.12.14-6.43.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-azure-4.12.14-6.43.1.x86_64", "product": { "name": "gfs2-kmp-azure-4.12.14-6.43.1.x86_64", "product_id": "gfs2-kmp-azure-4.12.14-6.43.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-4.12.14-6.43.1.x86_64", "product": { "name": "kernel-azure-4.12.14-6.43.1.x86_64", "product_id": "kernel-azure-4.12.14-6.43.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-base-4.12.14-6.43.1.x86_64", "product": { "name": "kernel-azure-base-4.12.14-6.43.1.x86_64", "product_id": "kernel-azure-base-4.12.14-6.43.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-devel-4.12.14-6.43.1.x86_64", "product": { "name": "kernel-azure-devel-4.12.14-6.43.1.x86_64", "product_id": "kernel-azure-devel-4.12.14-6.43.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-extra-4.12.14-6.43.1.x86_64", "product": { "name": "kernel-azure-extra-4.12.14-6.43.1.x86_64", "product_id": "kernel-azure-extra-4.12.14-6.43.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-kgraft-devel-4.12.14-6.43.1.x86_64", "product": { "name": "kernel-azure-kgraft-devel-4.12.14-6.43.1.x86_64", "product_id": "kernel-azure-kgraft-devel-4.12.14-6.43.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-azure-4.12.14-6.43.1.x86_64", "product": { "name": "kernel-syms-azure-4.12.14-6.43.1.x86_64", "product_id": "kernel-syms-azure-4.12.14-6.43.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-azure-4.12.14-6.43.1.x86_64", "product": { "name": "kselftests-kmp-azure-4.12.14-6.43.1.x86_64", "product_id": "kselftests-kmp-azure-4.12.14-6.43.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-azure-4.12.14-6.43.1.x86_64", "product": { "name": "ocfs2-kmp-azure-4.12.14-6.43.1.x86_64", "product_id": "ocfs2-kmp-azure-4.12.14-6.43.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP4", "product": { "name": "SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sles:12:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp4" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-4.12.14-6.43.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.43.1.x86_64" }, "product_reference": "kernel-azure-4.12.14-6.43.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-base-4.12.14-6.43.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.43.1.x86_64" }, "product_reference": "kernel-azure-base-4.12.14-6.43.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-devel-4.12.14-6.43.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.43.1.x86_64" }, "product_reference": "kernel-azure-devel-4.12.14-6.43.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-azure-4.12.14-6.43.1.noarch as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.43.1.noarch" }, "product_reference": "kernel-devel-azure-4.12.14-6.43.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-azure-4.12.14-6.43.1.noarch as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.43.1.noarch" }, "product_reference": "kernel-source-azure-4.12.14-6.43.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-azure-4.12.14-6.43.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.43.1.x86_64" }, "product_reference": "kernel-syms-azure-4.12.14-6.43.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-4.12.14-6.43.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.43.1.x86_64" }, "product_reference": "kernel-azure-4.12.14-6.43.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-base-4.12.14-6.43.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.43.1.x86_64" }, "product_reference": "kernel-azure-base-4.12.14-6.43.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-devel-4.12.14-6.43.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.43.1.x86_64" }, "product_reference": "kernel-azure-devel-4.12.14-6.43.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-azure-4.12.14-6.43.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.43.1.noarch" }, "product_reference": "kernel-devel-azure-4.12.14-6.43.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-azure-4.12.14-6.43.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.43.1.noarch" }, "product_reference": "kernel-source-azure-4.12.14-6.43.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-azure-4.12.14-6.43.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.43.1.x86_64" }, "product_reference": "kernel-syms-azure-4.12.14-6.43.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-1000199", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1000199" } ], "notes": [ { "category": "general", "text": "The Linux Kernel version 3.18 contains a dangerous feature vulnerability in modify_user_hw_breakpoint() that can result in crash and possibly memory corruption. This attack appear to be exploitable via local code execution and the ability to use ptrace. This vulnerability appears to have been fixed in git commit f67b15037a7a50c57f72e69a6d59941ad90a0f0f.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.43.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1000199", "url": "https://www.suse.com/security/cve/CVE-2018-1000199" }, { "category": "external", "summary": "SUSE Bug 1089895 for CVE-2018-1000199", "url": "https://bugzilla.suse.com/1089895" }, { "category": "external", "summary": "SUSE Bug 1090036 for CVE-2018-1000199", "url": "https://bugzilla.suse.com/1090036" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.43.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.43.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-10T13:28:44Z", "details": "important" } ], "title": "CVE-2018-1000199" }, { "cve": "CVE-2019-19462", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-19462" } ], "notes": [ { "category": "general", "text": "relay_open in kernel/relay.c in the Linux kernel through 5.4.1 allows local users to cause a denial of service (such as relay blockage) by triggering a NULL alloc_percpu result.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.43.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-19462", "url": "https://www.suse.com/security/cve/CVE-2019-19462" }, { "category": "external", "summary": "SUSE Bug 1158265 for CVE-2019-19462", "url": "https://bugzilla.suse.com/1158265" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.43.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.43.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-10T13:28:44Z", "details": "low" } ], "title": "CVE-2019-19462" }, { "cve": "CVE-2019-20806", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-20806" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.2. There is a NULL pointer dereference in tw5864_handle_frame() in drivers/media/pci/tw5864/tw5864-video.c, which may cause denial of service, aka CID-2e7682ebfc75.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.43.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-20806", "url": "https://www.suse.com/security/cve/CVE-2019-20806" }, { "category": "external", "summary": "SUSE Bug 1172199 for CVE-2019-20806", "url": "https://bugzilla.suse.com/1172199" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.43.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.9, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.43.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-10T13:28:44Z", "details": "low" } ], "title": "CVE-2019-20806" }, { "cve": "CVE-2019-20812", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-20812" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.4.7. The prb_calc_retire_blk_tmo() function in net/packet/af_packet.c can result in a denial of service (CPU consumption and soft lockup) in a certain failure case involving TPACKET_V3, aka CID-b43d1f9f7067.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.43.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-20812", "url": "https://www.suse.com/security/cve/CVE-2019-20812" }, { "category": "external", "summary": "SUSE Bug 1172453 for CVE-2019-20812", "url": "https://bugzilla.suse.com/1172453" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.43.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.43.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-10T13:28:44Z", "details": "moderate" } ], "title": "CVE-2019-20812" }, { "cve": "CVE-2019-9455", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9455" } ], "notes": [ { "category": "general", "text": "In the Android kernel in the video driver there is a kernel pointer leak due to a WARN_ON statement. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.43.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9455", "url": "https://www.suse.com/security/cve/CVE-2019-9455" }, { "category": "external", "summary": "SUSE Bug 1170345 for CVE-2019-9455", "url": "https://bugzilla.suse.com/1170345" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.43.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.43.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-10T13:28:44Z", "details": "moderate" } ], "title": "CVE-2019-9455" }, { "cve": "CVE-2020-0543", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-0543" } ], "notes": [ { "category": "general", "text": "Incomplete cleanup from specific special register read operations in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.43.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-0543", "url": "https://www.suse.com/security/cve/CVE-2020-0543" }, { "category": "external", "summary": "SUSE Bug 1154824 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1154824" }, { "category": "external", "summary": "SUSE Bug 1172205 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172205" }, { "category": "external", "summary": "SUSE Bug 1172206 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172206" }, { "category": "external", "summary": "SUSE Bug 1172207 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172207" }, { "category": "external", "summary": "SUSE Bug 1172770 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172770" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.43.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.43.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-10T13:28:44Z", "details": "moderate" } ], "title": "CVE-2020-0543" }, { "cve": "CVE-2020-10690", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10690" } ], "notes": [ { "category": "general", "text": "There is a use-after-free in kernel versions before 5.5 due to a race condition between the release of ptp_clock and cdev while resource deallocation. When a (high privileged) process allocates a ptp device file (like /dev/ptpX) and voluntarily goes to sleep. During this time if the underlying device is removed, it can cause an exploitable condition as the process wakes up to terminate and clean all attached files. The system crashes due to the cdev structure being invalid (as already freed) which is pointed to by the inode.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.43.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10690", "url": "https://www.suse.com/security/cve/CVE-2020-10690" }, { "category": "external", "summary": "SUSE Bug 1170056 for CVE-2020-10690", "url": "https://bugzilla.suse.com/1170056" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.43.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.43.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-10T13:28:44Z", "details": "moderate" } ], "title": "CVE-2020-10690" }, { "cve": "CVE-2020-10711", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10711" } ], "notes": [ { "category": "general", "text": "A NULL pointer dereference flaw was found in the Linux kernel\u0027s SELinux subsystem in versions before 5.7. This flaw occurs while importing the Commercial IP Security Option (CIPSO) protocol\u0027s category bitmap into the SELinux extensible bitmap via the\u0027 ebitmap_netlbl_import\u0027 routine. While processing the CIPSO restricted bitmap tag in the \u0027cipso_v4_parsetag_rbm\u0027 routine, it sets the security attribute to indicate that the category bitmap is present, even if it has not been allocated. This issue leads to a NULL pointer dereference issue while importing the same category bitmap into SELinux. This flaw allows a remote network user to crash the system kernel, resulting in a denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.43.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10711", "url": "https://www.suse.com/security/cve/CVE-2020-10711" }, { "category": "external", "summary": "SUSE Bug 1171191 for CVE-2020-10711", "url": "https://bugzilla.suse.com/1171191" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.43.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.43.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-10T13:28:44Z", "details": "moderate" } ], "title": "CVE-2020-10711" }, { "cve": "CVE-2020-10720", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10720" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s implementation of GRO in versions before 5.2. This flaw allows an attacker with local access to crash the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.43.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10720", "url": "https://www.suse.com/security/cve/CVE-2020-10720" }, { "category": "external", "summary": "SUSE Bug 1170778 for CVE-2020-10720", "url": "https://bugzilla.suse.com/1170778" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.43.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.43.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-10T13:28:44Z", "details": "moderate" } ], "title": "CVE-2020-10720" }, { "cve": "CVE-2020-10732", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10732" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s implementation of Userspace core dumps. This flaw allows an attacker with a local account to crash a trivial program and exfiltrate private kernel data.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.43.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10732", "url": "https://www.suse.com/security/cve/CVE-2020-10732" }, { "category": "external", "summary": "SUSE Bug 1171220 for CVE-2020-10732", "url": "https://bugzilla.suse.com/1171220" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.43.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.43.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-10T13:28:44Z", "details": "low" } ], "title": "CVE-2020-10732" }, { "cve": "CVE-2020-10751", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10751" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernels SELinux LSM hook implementation before version 5.7, where it incorrectly assumed that an skb would only contain a single netlink message. The hook would incorrectly only validate the first netlink message in the skb and allow or deny the rest of the messages within the skb with the granted permission without further processing.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.43.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10751", "url": "https://www.suse.com/security/cve/CVE-2020-10751" }, { "category": "external", "summary": "SUSE Bug 1171189 for CVE-2020-10751", "url": "https://bugzilla.suse.com/1171189" }, { "category": "external", "summary": "SUSE Bug 1174963 for CVE-2020-10751", "url": "https://bugzilla.suse.com/1174963" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.43.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.43.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-10T13:28:44Z", "details": "moderate" } ], "title": "CVE-2020-10751" }, { "cve": "CVE-2020-10757", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10757" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux Kernel in versions after 4.5-rc1 in the way mremap handled DAX Huge Pages. This flaw allows a local attacker with access to a DAX enabled storage to escalate their privileges on the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.43.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10757", "url": "https://www.suse.com/security/cve/CVE-2020-10757" }, { "category": "external", "summary": "SUSE Bug 1159281 for CVE-2020-10757", "url": "https://bugzilla.suse.com/1159281" }, { "category": "external", "summary": "SUSE Bug 1172317 for CVE-2020-10757", "url": "https://bugzilla.suse.com/1172317" }, { "category": "external", "summary": "SUSE Bug 1172437 for CVE-2020-10757", "url": "https://bugzilla.suse.com/1172437" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.43.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.43.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-10T13:28:44Z", "details": "important" } ], "title": "CVE-2020-10757" }, { "cve": "CVE-2020-12114", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12114" } ], "notes": [ { "category": "general", "text": "A pivot_root race condition in fs/namespace.c in the Linux kernel 4.4.x before 4.4.221, 4.9.x before 4.9.221, 4.14.x before 4.14.178, 4.19.x before 4.19.119, and 5.x before 5.3 allows local users to cause a denial of service (panic) by corrupting a mountpoint reference counter.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.43.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12114", "url": "https://www.suse.com/security/cve/CVE-2020-12114" }, { "category": "external", "summary": "SUSE Bug 1171098 for CVE-2020-12114", "url": "https://bugzilla.suse.com/1171098" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.43.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.43.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-10T13:28:44Z", "details": "moderate" } ], "title": "CVE-2020-12114" }, { "cve": "CVE-2020-12464", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12464" } ], "notes": [ { "category": "general", "text": "usb_sg_cancel in drivers/usb/core/message.c in the Linux kernel before 5.6.8 has a use-after-free because a transfer occurs without a reference, aka CID-056ad39ee925.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.43.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12464", "url": "https://www.suse.com/security/cve/CVE-2020-12464" }, { "category": "external", "summary": "SUSE Bug 1170901 for CVE-2020-12464", "url": "https://bugzilla.suse.com/1170901" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.43.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 1.8, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.43.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-10T13:28:44Z", "details": "low" } ], "title": "CVE-2020-12464" }, { "cve": "CVE-2020-12652", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12652" } ], "notes": [ { "category": "general", "text": "The __mptctl_ioctl function in drivers/message/fusion/mptctl.c in the Linux kernel before 5.4.14 allows local users to hold an incorrect lock during the ioctl operation and trigger a race condition, i.e., a \"double fetch\" vulnerability, aka CID-28d76df18f0a. NOTE: the vendor states \"The security impact of this bug is not as bad as it could have been because these operations are all privileged and root already has enormous destructive power.\"", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.43.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12652", "url": "https://www.suse.com/security/cve/CVE-2020-12652" }, { "category": "external", "summary": "SUSE Bug 1171218 for CVE-2020-12652", "url": "https://bugzilla.suse.com/1171218" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.43.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.43.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-10T13:28:44Z", "details": "moderate" } ], "title": "CVE-2020-12652" }, { "cve": "CVE-2020-12653", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12653" } ], "notes": [ { "category": "general", "text": "An issue was found in Linux kernel before 5.5.4. The mwifiex_cmd_append_vsie_tlv() function in drivers/net/wireless/marvell/mwifiex/scan.c allows local users to gain privileges or cause a denial of service because of an incorrect memcpy and buffer overflow, aka CID-b70261a288ea.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.43.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12653", "url": "https://www.suse.com/security/cve/CVE-2020-12653" }, { "category": "external", "summary": "SUSE Bug 1159281 for CVE-2020-12653", "url": "https://bugzilla.suse.com/1159281" }, { "category": "external", "summary": "SUSE Bug 1171195 for CVE-2020-12653", "url": "https://bugzilla.suse.com/1171195" }, { "category": "external", "summary": "SUSE Bug 1171254 for CVE-2020-12653", "url": "https://bugzilla.suse.com/1171254" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.43.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.43.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-10T13:28:44Z", "details": "important" } ], "title": "CVE-2020-12653" }, { "cve": "CVE-2020-12654", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12654" } ], "notes": [ { "category": "general", "text": "An issue was found in Linux kernel before 5.5.4. mwifiex_ret_wmm_get_status() in drivers/net/wireless/marvell/mwifiex/wmm.c allows a remote AP to trigger a heap-based buffer overflow because of an incorrect memcpy, aka CID-3a9b153c5591.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.43.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12654", "url": "https://www.suse.com/security/cve/CVE-2020-12654" }, { "category": "external", "summary": "SUSE Bug 1159281 for CVE-2020-12654", "url": "https://bugzilla.suse.com/1159281" }, { "category": "external", "summary": "SUSE Bug 1171202 for CVE-2020-12654", "url": "https://bugzilla.suse.com/1171202" }, { "category": "external", "summary": "SUSE Bug 1171252 for CVE-2020-12654", "url": "https://bugzilla.suse.com/1171252" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.43.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.43.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-10T13:28:44Z", "details": "important" } ], "title": "CVE-2020-12654" }, { "cve": "CVE-2020-12655", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12655" } ], "notes": [ { "category": "general", "text": "An issue was discovered in xfs_agf_verify in fs/xfs/libxfs/xfs_alloc.c in the Linux kernel through 5.6.10. Attackers may trigger a sync of excessive duration via an XFS v5 image with crafted metadata, aka CID-d0c7feaf8767.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.43.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12655", "url": "https://www.suse.com/security/cve/CVE-2020-12655" }, { "category": "external", "summary": "SUSE Bug 1171217 for CVE-2020-12655", "url": "https://bugzilla.suse.com/1171217" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.43.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.8, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.43.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-10T13:28:44Z", "details": "moderate" } ], "title": "CVE-2020-12655" }, { "cve": "CVE-2020-12656", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12656" } ], "notes": [ { "category": "general", "text": "gss_mech_free in net/sunrpc/auth_gss/gss_mech_switch.c in the rpcsec_gss_krb5 implementation in the Linux kernel through 5.6.10 lacks certain domain_release calls, leading to a memory leak. Note: This was disputed with the assertion that the issue does not grant any access not already available. It is a problem that on unloading a specific kernel module some memory is leaked, but loading kernel modules is a privileged operation. A user could also write a kernel module to consume any amount of memory they like and load that replicating the effect of this bug", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.43.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12656", "url": "https://www.suse.com/security/cve/CVE-2020-12656" }, { "category": "external", "summary": "SUSE Bug 1171219 for CVE-2020-12656", "url": "https://bugzilla.suse.com/1171219" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.43.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.9, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.43.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-10T13:28:44Z", "details": "low" } ], "title": "CVE-2020-12656" }, { "cve": "CVE-2020-12657", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12657" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.6.5. There is a use-after-free in block/bfq-iosched.c related to bfq_idle_slice_timer_body.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.43.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12657", "url": "https://www.suse.com/security/cve/CVE-2020-12657" }, { "category": "external", "summary": "SUSE Bug 1171205 for CVE-2020-12657", "url": "https://bugzilla.suse.com/1171205" }, { "category": "external", "summary": "SUSE Bug 1201585 for CVE-2020-12657", "url": "https://bugzilla.suse.com/1201585" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.43.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.43.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-10T13:28:44Z", "details": "important" } ], "title": "CVE-2020-12657" }, { "cve": "CVE-2020-12768", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12768" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.6. svm_cpu_uninit in arch/x86/kvm/svm.c has a memory leak, aka CID-d80b64ff297e. NOTE: third parties dispute this issue because it\u0027s a one-time leak at the boot, the size is negligible, and it can\u0027t be triggered at will", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.43.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12768", "url": "https://www.suse.com/security/cve/CVE-2020-12768" }, { "category": "external", "summary": "SUSE Bug 1171736 for CVE-2020-12768", "url": "https://bugzilla.suse.com/1171736" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.43.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.43.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-10T13:28:44Z", "details": "moderate" } ], "title": "CVE-2020-12768" }, { "cve": "CVE-2020-12769", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12769" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.4.17. drivers/spi/spi-dw.c allows attackers to cause a panic via concurrent calls to dw_spi_irq and dw_spi_transfer_one, aka CID-19b61392c5a8.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.43.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12769", "url": "https://www.suse.com/security/cve/CVE-2020-12769" }, { "category": "external", "summary": "SUSE Bug 1171983 for CVE-2020-12769", "url": "https://bugzilla.suse.com/1171983" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.43.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.43.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-10T13:28:44Z", "details": "moderate" } ], "title": "CVE-2020-12769" }, { "cve": "CVE-2020-13143", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-13143" } ], "notes": [ { "category": "general", "text": "gadget_dev_desc_UDC_store in drivers/usb/gadget/configfs.c in the Linux kernel 3.16 through 5.6.13 relies on kstrdup without considering the possibility of an internal \u0027\\0\u0027 value, which allows attackers to trigger an out-of-bounds read, aka CID-15753588bcd4.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.43.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-13143", "url": "https://www.suse.com/security/cve/CVE-2020-13143" }, { "category": "external", "summary": "SUSE Bug 1171982 for CVE-2020-13143", "url": "https://bugzilla.suse.com/1171982" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.43.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.43.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.43.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-10T13:28:44Z", "details": "moderate" } ], "title": "CVE-2020-13143" } ] }
suse-su-2020:2487-1
Vulnerability from csaf_suse
Published
2020-09-04 06:06
Modified
2020-09-04 06:06
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 15 SP1 RT kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2020-10135: Legacy pairing and secure-connections pairing authentication in Bluetooth BR/EDR Core Specification v5.2 and earlier may have allowed an unauthenticated user to complete authentication without pairing credentials via adjacent access. An unauthenticated, adjacent attacker could impersonate a Bluetooth BR/EDR master or slave to pair with a previously paired remote device to successfully complete the authentication procedure without knowing the link key (bnc#1171988).
- CVE-2020-0305: In cdev_get of char_dev.c, there is a possible use-after-free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation (bnc#1174462).
- CVE-2019-20908: An issue was discovered in drivers/firmware/efi/efi.c where incorrect access permissions for the efivar_ssdt ACPI variable could be used by attackers to bypass lockdown or secure boot restrictions, aka CID-1957a85b0032 (bnc#1173567).
- CVE-2020-10781: zram sysfs resource consumption was fixed (bnc#1173074).
- CVE-2020-15780: An issue was discovered in drivers/acpi/acpi_configfs.c where injection of malicious ACPI tables via configfs could be used by attackers to bypass lockdown and secure boot restrictions, aka CID-75b0cea7bf30 (bnc#1173573).
- CVE-2020-15393: usbtest_disconnect in drivers/usb/misc/usbtest.c had a memory leak, aka CID-28ebeb8db770 (bnc#1173514).
- CVE-2020-12771: btree_gc_coalesce in drivers/md/bcache/btree.c had a deadlock if a coalescing operation fails (bnc#1171732).
- CVE-2020-12888: The VFIO PCI driver mishandled attempts to access disabled memory space (bnc#1171868).
- CVE-2020-10769: A buffer over-read flaw was found in crypto_authenc_extractkeys in crypto/authenc.c in the IPsec Cryptographic algorithm's module, authenc. When a payload longer than 4 bytes, and is not following 4-byte alignment boundary guidelines, it causes a buffer over-read threat, leading to a system crash. This flaw allowed a local attacker with user privileges to cause a denial of service (bnc#1173265).
- CVE-2020-10773: A kernel stack information leak on s390/s390x was fixed (bnc#1172999).
- CVE-2020-14416: A race condition in tty->disc_data handling in the slip and slcan line discipline could lead to a use-after-free, aka CID-0ace17d56824. This affects drivers/net/slip/slip.c and drivers/net/can/slcan.c (bnc#1162002).
- CVE-2020-10766: Fixed an issue which allowed an attacker with a local account to disable SSBD protection (bnc#1172781).
- CVE-2020-10767: Fixed an issue where Indirect Branch Prediction Barrier was disabled in certain circumstances, leaving the system open to a spectre v2 style attack (bnc#1172782).
- CVE-2020-10768: Fixed an issue with the prctl() function, where indirect branch speculation could be enabled even though it was diabled before (bnc#1172783).
- CVE-2020-13974: Fixed a integer overflow in drivers/tty/vt/keyboard.c, if k_ascii is called several times in a row (bnc#1172775).
- CVE-2020-0543: Fixed a side channel attack against special registers which could have resulted in leaking of read values to cores other than the one which called it.
This attack is known as Special Register Buffer Data Sampling (SRBDS) or 'CrossTalk' (bsc#1154824).
- CVE-2020-13143: Fixed an out-of-bounds read in gadget_dev_desc_UDC_store in drivers/usb/gadget/configfs.c (bsc#1171982).
- CVE-2020-12769: Fixed an issue which could have allowed attackers to cause a panic via concurrent calls to dw_spi_irq and dw_spi_transfer_one (bsc#1171983).
- CVE-2020-12659: Fixed an out-of-bounds write (by a user with the CAP_NET_ADMIN capability) due to improper headroom validation (bsc#1171214).
- CVE-2020-12657: An a use-after-free in block/bfq-iosched.c (bsc#1171205).
- CVE-2020-12656: Fixed an improper handling of certain domain_release calls leadingch could have led to a memory leak (bsc#1171219).
- CVE-2020-12655: Fixed an issue which could have allowed attackers to trigger a sync of excessive duration via an XFS v5 image with crafted metadata (bsc#1171217).
- CVE-2020-12654: Fixed an issue in he wifi driver which could have allowed a remote AP to trigger a heap-based buffer overflow (bsc#1171202).
- CVE-2020-12653: Fixed an issue in the wifi driver which could have allowed local users to gain privileges or cause a denial of service (bsc#1171195).
- CVE-2020-12652: Fixed an issue which could have allowed local users to hold an incorrect lock during the ioctl operation and trigger a race condition (bsc#1171218).
- CVE-2020-12464: Fixed a use-after-free due to a transfer without a reference (bsc#1170901).
- CVE-2020-12114: Fixed a pivot_root race condition which could have allowed local users to cause a denial of service (panic) by corrupting a mountpoint reference counter (bsc#1171098).
- CVE-2020-11669: Fixed an issue where arch/powerpc/kernel/idle_book3s.S did not have save/restore functionality for PNV_POWERSAVE_AMR, PNV_POWERSAVE_UAMOR, and PNV_POWERSAVE_AMOR (bnc#1169390).
- CVE-2020-10757: Fixed an issue where remaping hugepage DAX to anon mmap could have caused user PTE access (bsc#1172317).
- CVE-2020-10751: Fixed an improper implementation in SELinux LSM hook where it was assumed that an skb would only contain a single netlink message (bsc#1171189).
- CVE-2020-10732: Fixed kernel data leak in userspace coredumps due to uninitialized data (bsc#1171220).
- CVE-2020-10720: Fixed a use-after-free read in napi_gro_frags() (bsc#1170778).
- CVE-2020-10711: Fixed a null pointer dereference in SELinux subsystem which could have allowed a remote network user to crash the kernel resulting in a denial of service (bsc#1171191).
- CVE-2020-10690: Fixed the race between the release of ptp_clock and cdev (bsc#1170056).
- CVE-2019-9455: Fixed a pointer leak due to a WARN_ON statement in a video driver. This could lead to local information disclosure with System execution privileges needed (bsc#1170345).
- CVE-2019-20812: Fixed an issue in prb_calc_retire_blk_tmo() which could have resulted in a denial of service (bsc#1172453).
- CVE-2019-20806: Fixed a null pointer dereference which may had lead to denial of service (bsc#1172199).
- CVE-2019-19462: Fixed an issue which could have allowed local user to cause denial of service (bsc#1158265).
- CVE-2019-20810: go7007_snd_init in drivers/media/usb/go7007/snd-go7007.c did not call snd_card_free for a failure path, which caused a memory leak, aka CID-9453264ef586 (bnc#1172458).
- CVE-2018-1000199: Fixed a potential local code execution via ptrace (bsc#1089895).
The following non-security bugs were fixed:
- ACPI: CPPC: Fix reference count leak in acpi_cppc_processor_probe() (bsc#1051510).
- ACPI: GED: add support for _Exx / _Lxx handler methods (bsc#1111666).
- ACPI: GED: use correct trigger type field in _Exx / _Lxx handling (bsc#1111666).
- ACPI: NFIT: Fix unlock on error in scrub_show() (bsc#1171753).
- ACPI: PM: Avoid using power resources if there are none for D0 (bsc#1051510).
- ACPI: sysfs: Fix pm_profile_attr type (bsc#1111666).
- ACPI: sysfs: Fix reference count leak in acpi_sysfs_add_hotplug_profile() (bsc#1051510).
- ACPI: video: Use native backlight on Acer Aspire 5783z (bsc#1111666).
- ACPI: video: Use native backlight on Acer TravelMate 5735Z (bsc#1111666).
- acpi/x86: ignore unspecified bit positions in the ACPI global lock field (bsc#1051510).
- Add br_netfilter to kernel-default-base (bsc#1169020)
- Add commit for git-fix that's not a fix This commit cleans up debug code but does not fix anything, and it relies on a new kernel function that isn't yet in this version of SLE.
- agp/intel: Reinforce the barrier after GTT updates (bsc#1051510).
- ALSA: ctxfi: Remove unnecessary cast in kfree (bsc#1051510).
- ALSA: doc: Document PC Beep Hidden Register on Realtek ALC256 (bsc#1051510).
- ALSA: dummy: Fix PCM format loop in proc output (bsc#1111666).
- ALSA: es1688: Add the missed snd_card_free() (bsc#1051510).
- ALSA: hda: Add driver blacklist (bsc#1051510).
- ALSA: hda: Add ElkhartLake HDMI codec vid (bsc#1111666).
- ALSA: hda: add sienna_cichlid audio asic id for sienna_cichlid up (bsc#1111666).
- ALSA: hda: Always use jackpoll helper for jack update after resume (bsc#1051510).
- ALSA: hda: call runtime_allow() for all hda controllers (bsc#1051510).
- ALSA: hda: Do not release card at firmware loading error (bsc#1051510).
- ALSA: hda: Explicitly permit using autosuspend if runtime PM is supported (bsc#1051510).
- ALSA: hda: Fix potential access overflow in beep helper (bsc#1051510).
- ALSA: hda/hdmi - enable runtime pm for newer AMD display audio (bsc#1111666).
- ALSA: hda/hdmi: fix race in monitor detection during probe (bsc#1051510).
- ALSA: hda/hdmi: fix without unlocked before return (bsc#1051510).
- ALSA: hda: Honor PM disablement in PM freeze and thaw_noirq ops (bsc#1051510).
- ALSA: hda: Keep the controller initialization even if no codecs found (bsc#1051510).
- ALSA: hda - let hs_mic be picked ahead of hp_mic (bsc#1111666).
- ALSA: hda: Match both PCI ID and SSID for driver blacklist (bsc#1111666).
- ALSA: hda/realtek - Add a model for Thinkpad T570 without DAC workaround (bsc#1172017).
- ALSA: hda/realtek - add a pintbl quirk for several Lenovo machines (bsc#1111666).
- ALSA: hda/realtek - Add COEF workaround for ASUS ZenBook UX431DA (git-fixes).
- ALSA: hda/realtek - Add HP new mute led supported for ALC236 (git-fixes).
- ALSA: hda/realtek - Add LED class support for micmute LED (bsc#1111666).
- ALSA: hda/realtek - Add more fixup entries for Clevo machines (git-fixes).
- ALSA: hda/realtek - Add new codec supported for ALC245 (bsc#1051510).
- ALSA: hda/realtek - Add new codec supported for ALC287 (git-fixes).
- ALSA: hda/realtek: Add quirk for Samsung Notebook (git-fixes).
- ALSA: hda/realtek - Add supported new mute Led for HP (git-fixes).
- ALSA: hda/realtek - Enable headset mic of ASUS GL503VM with ALC295 (git-fixes).
- ALSA: hda/realtek - Enable headset mic of ASUS UX550GE with ALC295 (git-fixes).
- ALSA: hda/realtek: Enable headset mic of ASUS UX581LV with ALC295 (git-fixes).
- ALSA: hda/realtek - Enable micmute LED on and HP system (bsc#1111666).
- ALSA: hda/realtek - Enable Speaker for ASUS UX533 and UX534 (bsc#1111666).
- ALSA: hda/realtek - Enable the headset mic on Asus FX505DT (bsc#1051510).
- ALSA: hda/realtek - Fix S3 pop noise on Dell Wyse (git-fixes).
- ALSA: hda/realtek - Fix silent output on Gigabyte X570 Aorus Xtreme (bsc#1111666).
- ALSA: hda/realtek - Fix unexpected init_amp override (bsc#1051510).
- ALSA: hda/realtek - Fix unused variable warning w/o CONFIG_LEDS_TRIGGER_AUDIO (bsc#1111666).
- ALSA: hda/realtek - Introduce polarity for micmute LED GPIO (bsc#1111666).
- ALSA: hda/realtek - Limit int mic boost for Thinkpad T530 (git-fixes bsc#1171293).
- ALSA: hda/realtek - Two front mics on a Lenovo ThinkCenter (bsc#1051510).
- ALSA: hda: Release resources at error in delayed probe (bsc#1051510).
- ALSA: hda: Remove ASUS ROG Zenith from the blacklist (bsc#1051510).
- ALSA: hda: Skip controller resume if not needed (bsc#1051510).
- ALSA: hwdep: fix a left shifting 1 by 31 UB bug (git-fixes).
- ALSA: ice1724: Fix invalid access for enumerated ctl items (bsc#1051510).
- ALSA: iec1712: Initialize STDSP24 properly when using the model=staudio option (git-fixes).
- ALSA: lx6464es - add support for LX6464ESe pci express variant (bsc#1111666).
- ALSA: opl3: fix infoleak in opl3 (bsc#1111666).
- ALSA: opti9xx: shut up gcc-10 range warning (bsc#1051510).
- ALSA: pcm: disallow linking stream to itself (bsc#1111666).
- ALSA: pcm: fix incorrect hw_base increase (git-fixes).
- ALSA: pcm: oss: Fix regression by buffer overflow fix (bsc#1051510).
- ALSA: pcm: oss: Place the plugin buffer overflow checks correctly (bsc#1170522).
- ALSA: rawmidi: Fix racy buffer resize under concurrent accesses (git-fixes).
- ALSA: usb-audio: Add connector notifier delegation (bsc#1051510).
- ALSA: usb-audio: Add control message quirk delay for Kingston HyperX headset (git-fixes).
- ALSA: usb-audio: Add duplex sound support for USB devices using implicit feedback (bsc#1111666).
- ALSA: usb-audio: add mapping for ASRock TRX40 Creator (git-fixes).
- ALSA: usb-audio: Add mixer workaround for TRX40 and co (bsc#1051510).
- ALSA: usb-audio: Add Pioneer DJ DJM-900NXS2 support (bsc#1111666).
- ALSA: usb-audio: Add quirk for Focusrite Scarlett 2i2 (bsc#1051510).
- ALSA: usb-audio: add quirk for MacroSilicon MS2109 (bsc#1111666).
- ALSA: usb-audio: Add static mapping table for ALC1220-VB-based mobos (bsc#1051510).
- ALSA: usb-audio: Add vendor, product and profile name for HP Thunderbolt Dock (bsc#1111666).
- ALSA: usb-audio: Apply async workaround for Scarlett 2i4 2nd gen (bsc#1051510).
- ALSA: usb-audio: Check mapping at creating connector controls, too (bsc#1051510).
- ALSA: usb-audio: Clean up quirk entries with macros (bsc#1111666).
- ALSA: usb-audio: Correct a typo of NuPrime DAC-10 USB ID (bsc#1051510).
- ALSA: usb-audio: Do not create jack controls for PCM terminals (bsc#1051510).
- ALSA: usb-audio: Do not override ignore_ctl_error value from the map (bsc#1051510).
- ALSA: usb-audio: Filter error from connector kctl ops, too (bsc#1051510).
- ALSA: usb-audio: Fix inconsistent card PM state after resume (bsc#1111666).
- ALSA: usb-audio: Fix packet size calculation (bsc#1111666).
- ALSA: usb-audio: Fix racy list management in output queue (bsc#1111666).
- ALSA: usb-audio: Fix usb audio refcnt leak when getting spdif (bsc#1051510).
- ALSA: usb-audio: Improve frames size computation (bsc#1111666).
- ALSA: usb-audio: Manage auto-pm of all bundled interfaces (bsc#1111666).
- ALSA: usb-audio: mixer: volume quirk for ESS Technology Asus USB DAC (git-fixes).
- ALSA: usb-audio: Quirks for Gigabyte TRX40 Aorus Master onboard audio (git-fixes).
- ALSA: usb-audio: Use the new macro for HP Dock rename quirks (bsc#1111666).
- ALSA: usx2y: Fix potential NULL dereference (bsc#1051510).
- amdgpu: a NULL ->mm does not mean a thread is a kthread (git-fixes).
- arm64: map FDT as RW for early_init_dt_scan() (jsc#SLE-12423).
- ASoC: codecs: hdac_hdmi: Fix incorrect use of list_for_each_entry (bsc#1051510).
- ASoC: dapm: connect virtual mux with default value (bsc#1051510).
- ASoC: dapm: fixup dapm kcontrol widget (bsc#1051510).
- ASoC: dpcm: allow start or stop during pause for backend (bsc#1051510).
- ASoC: fix regwmask (bsc#1051510).
- ASoC: Intel: atom: Take the drv->lock mutex before calling sst_send_slot_map() (bsc#1051510).
- ASoC: msm8916-wcd-digital: Reset RX interpolation path after use (bsc#1051510).
- ASoC: samsung: Prevent clk_get_rate() calls in atomic context (bsc#1111666).
- ASoC: topology: Check return value of pcm_new_ver (bsc#1051510).
- ASoC: topology: use name_prefix for new kcontrol (bsc#1051510).
- ath9k: Fix general protection fault in ath9k_hif_usb_rx_cb (bsc#1111666).
- ath9k: Fix use-after-free Read in ath9k_wmi_ctrl_rx (bsc#1111666).
- ath9k: Fix use-after-free Write in ath9k_htc_rx_msg (bsc#1111666).
- ath9x: Fix stack-out-of-bounds Write in ath9k_hif_usb_rx_cb (bsc#1111666).
- ax25: fix setsockopt(SO_BINDTODEVICE) (networking-stable-20_05_27).
- b43: Fix connection problem with WPA3 (bsc#1111666).
- b43legacy: Fix case where channel status is corrupted (bsc#1051510).
- b43_legacy: Fix connection problem with WPA3 (bsc#1111666).
- batman-adv: Avoid spurious warnings from bat_v neigh_cmp implementation (bsc#1051510).
- batman-adv: Do not schedule OGM for disabled interface (bsc#1051510).
- batman-adv: fix batadv_nc_random_weight_tq (git-fixes).
- batman-adv: Fix refcnt leak in batadv_show_throughput_override (git-fixes).
- batman-adv: Fix refcnt leak in batadv_store_throughput_override (git-fixes).
- batman-adv: Fix refcnt leak in batadv_v_ogm_process (git-fixes).
- batman-adv: prevent TT request storms by not sending inconsistent TT TLVLs (bsc#1051510).
- bcache: avoid unnecessary btree nodes flushing in btree_flush_write() (git fixes (block drivers)).
- bcache: Fix an error code in bch_dump_read() (git fixes (block drivers)).
- bcache: fix incorrect data type usage in btree_flush_write() (git fixes (block drivers)).
- bcache: Revert 'bcache: shrink btree node cache after bch_btree_check()' (git fixes (block drivers)).
- be2net: fix link failure after ethtool offline test (git-fixes).
- blk-mq: honor IO scheduler for multiqueue devices (bsc#1165478).
- blk-mq: simplify blk_mq_make_request() (bsc#1165478).
- block, bfq: fix use-after-free in bfq_idle_slice_timer_body (bsc#1168760).
- block/drbd: delete invalid function drbd_md_mark_dirty_ (bsc#1171527).
- block: drbd: remove a stray unlock in __drbd_send_protocol() (bsc#1171599).
- block: fix busy device checking in blk_drop_partitions again (bsc#1171948).
- block: fix busy device checking in blk_drop_partitions (bsc#1171948).
- block: fix memleak of bio integrity data (git fixes (block drivers)).
- block: keep bdi->io_pages in sync with max_sectors_kb for stacked devices (bsc#1168762).
- block: nr_sects_write(): Disable preemption on seqcount write (bsc#1173818).
- block: remove QUEUE_FLAG_STACKABLE (git fixes (block drivers)).
- block: remove the bd_openers checks in blk_drop_partitions (bsc#1171948).
- block: sed-opal: fix sparse warning: convert __be64 data (git fixes (block drivers)).
- Bluetooth: Add SCO fallback for invalid LMP parameters error (bsc#1111666).
- Bluetooth: RFCOMM: fix ODEBUG bug in rfcomm_dev_ioctl (bsc#1051510).
- bnxt_en: Fix AER reset logic on 57500 chips (git-fixes).
- bnxt_en: Fix ethtool selftest crash under error conditions (git-fixes).
- bnxt_en: Fix handling FRAG_ERR when NVM_INSTALL_UPDATE cmd fails (git-fixes).
- bnxt_en: Fix ipv6 RFS filter matching logic (git-fixes).
- bnxt_en: fix memory leaks in bnxt_dcbnl_ieee_getets() (networking-stable-20_03_28).
- bnxt_en: fix NULL dereference in case SR-IOV configuration fails (git-fixes).
- bnxt_en: Fix VF anti-spoof filter setup (networking-stable-20_05_12).
- bnxt_en: Fix VLAN acceleration handling in bnxt_fix_features() (networking-stable-20_05_12).
- bnxt_en: Improve AER slot reset (networking-stable-20_05_12).
- bnxt_en: Reduce BNXT_MSIX_VEC_MAX value to supported CQs per PF (bsc#1104745).
- bnxt_en: reinitialize IRQs when MTU is modified (networking-stable-20_03_14).
- bnxt_en: Return error if bnxt_alloc_ctx_mem() fails (bsc#1104745 ).
- bnxt_en: Return error when allocating zero size context memory (bsc#1104745).
- bonding/alb: make sure arp header is pulled before accessing it (networking-stable-20_03_14).
- bpf: Fix sk_psock refcnt leak when receiving message (bsc#1083647).
- bpf: Forbid XADD on spilled pointers for unprivileged users (bsc#1083647).
- brcmfmac: abort and release host after error (bsc#1051510).
- brcmfmac: fix wrong location to get firmware feature (bsc#1111666).
- brcmfmac: Transform compatible string for FW loading (bsc#1169771).
- btrfs: add assertions for tree == inode->io_tree to extent IO helpers (bsc#1174438).
- btrfs: add new helper btrfs_lock_and_flush_ordered_range (bsc#1174438).
- btrfs: Always use a cached extent_state in btrfs_lock_and_flush_ordered_range (bsc#1174438).
- btrfs: do not zero f_bavail if we have available space (bsc#1168081).
- btrfs: do not zero f_bavail if we have available space (bsc#1168081).
- btrfs: drop argument tree from btrfs_lock_and_flush_ordered_range (bsc#1174438).
- Btrfs: fix deadlock with memory reclaim during scrub (bsc#1172127).
- btrfs: fix extent_state leak in btrfs_lock_and_flush_ordered_range (bsc#1174438).
- btrfs: fix failure of RWF_NOWAIT write into prealloc extent beyond eof (bsc#1174438).
- btrfs: fix hang on snapshot creation after RWF_NOWAIT write (bsc#1174438).
- btrfs: fix log context list corruption after rename whiteout error (bsc#1172342).
- btrfs: fix partial loss of prealloc extent past i_size after fsync (bsc#1172343).
- btrfs: fix RWF_NOWAIT write not failling when we need to cow (bsc#1174438).
- btrfs: fix RWF_NOWAIT writes blocking on extent locks and waiting for IO (bsc#1174438).
- btrfs: qgroup: Fix a bug that prevents qgroup to be re-enabled after disable (bsc#1172247).
- btrfs: relocation: add error injection points for cancelling balance (bsc#1171417).
- btrfs: relocation: Check cancel request after each data page read (bsc#1171417).
- btrfs: relocation: Check cancel request after each extent found (bsc#1171417).
- btrfs: relocation: Clear the DEAD_RELOC_TREE bit for orphan roots to prevent runaway balance (bsc#1171417).
- btrfs: relocation: Fix reloc root leakage and the NULL pointer reference caused by the leakage (bsc#1171417).
- btrfs: relocation: Work around dead relocation stage loop (bsc#1171417).
- btrfs: reloc: clear DEAD_RELOC_TREE bit for orphan roots to prevent runaway balance (bsc#1171417 bsc#1160947 bsc#1172366).
- btrfs: reloc: fix reloc root leak and NULL pointer dereference (bsc#1171417 bsc#1160947 bsc#1172366).
- btrfs: Return EAGAIN if we can't start no snpashot write in check_can_nocow (bsc#1174438).
- Btrfs: setup a nofs context for memory allocation at btrfs_create_tree() (bsc#1172127).
- Btrfs: setup a nofs context for memory allocation at __btrfs_set_acl (bsc#1172127).
- btrfs: use correct count in btrfs_file_write_iter() (bsc#1174438).
- btrfs: Use newly introduced btrfs_lock_and_flush_ordered_range (bsc#1174438).
- Btrfs: use nofs context when initializing security xattrs to avoid deadlock (bsc#1172127).
- btrfs: volumes: Remove ENOSPC-prone btrfs_can_relocate() (bsc#1171124).
- bus: sunxi-rsb: Return correct data when mixing 16-bit and 8-bit reads (bsc#1111666).
- can: add missing attribute validation for termination (networking-stable-20_03_14).
- carl9170: remove P2P_GO support (bsc#1111666).
- cdc-acm: close race betrween suspend() and acm_softint (git-fixes).
- CDC-ACM: heed quirk also in error handling (git-fixes).
- cdc-acm: introduce a cool down (git-fixes).
- ceph: check if file lock exists before sending unlock request (bsc#1168789).
- ceph: convert mdsc->cap_dirty to a per-session list (bsc#1167104).
- ceph: demote quotarealm lookup warning to a debug message (bsc#1171692).
- ceph: fix double unlock in handle_cap_export() (bsc#1171694).
- ceph: fix endianness bug when handling MDS session feature bits (bsc#1171695).
- ceph: request expedited service on session's last cap flush (bsc#1167104).
- cgroup, blkcg: Prepare some symbols for module and !CONFIG_CGROUP usages (bsc#1173857).
- cgroup, netclassid: periodically release file_lock on classid updating (networking-stable-20_03_14).
- char/random: Add a newline at the end of the file (jsc#SLE-12423).
- CIFS: Allocate crypto structures on the fly for calculating signatures of incoming packets (bsc#1144333).
- CIFS: Allocate encryption header through kmalloc (bsc#1144333).
- CIFS: allow unlock flock and OFD lock across fork (bsc#1144333).
- CIFS: check new file size when extending file by fallocate (bsc#1144333).
- CIFS: cifspdu.h: Replace zero-length array with flexible-array member (bsc#1144333).
- CIFS: clear PF_MEMALLOC before exiting demultiplex thread (bsc#1144333).
- CIFS: do not share tcons with DFS (bsc#1144333).
- CIFS: dump the session id and keys also for SMB2 sessions (bsc#1144333).
- CIFS: ensure correct super block for DFS reconnect (bsc#1144333).
- CIFS: Fix bug which the return value by asynchronous read is error (bsc#1144333).
- CIFS: fix uninitialised lease_key in open_shroot() (bsc#1144333).
- cifs: get rid of unused parameter in reconn_setup_dfs_targets() (bsc#1144333).
- cifs: handle hostnames that resolve to same ip in failover (bsc#1144333 bsc#1161016).
- CIFS: ignore cached share root handle closing errors (bsc#1166780).
- CIFS: improve read performance for page size 64KB & cache=strict & vers=2.1+ (bsc#1144333).
- CIFS: Increment num_remote_opens stats counter even in case of smb2_query_dir_first (bsc#1144333).
- CIFS: minor update to comments around the cifs_tcp_ses_lock mutex (bsc#1144333).
- CIFS: protect updating server->dstaddr with a spinlock (bsc#1144333).
- cifs: set up next DFS target before generic_ip_connect() (bsc#1144333 bsc#1161016).
- CIFS: smb2pdu.h: Replace zero-length array with flexible-array member (bsc#1144333).
- CIFS: smbd: Calculate the correct maximum packet size for segmented SMBDirect send/receive (bsc#1144333).
- CIFS: smbd: Check and extend sender credits in interrupt context (bsc#1144333).
- CIFS: smbd: Check send queue size before posting a send (bsc#1144333).
- CIFS: smbd: Do not schedule work to send immediate packet on every receive (bsc#1144333).
- CIFS: smbd: Merge code to track pending packets (bsc#1144333).
- CIFS: smbd: Properly process errors on ib_post_send (bsc#1144333).
- CIFS: smbd: Update receive credits before sending and deal with credits roll back on failure before sending (bsc#1144333).
- CIFS: Warn less noisily on default mount (bsc#1144333).
- clk: Add clk_hw_unregister_composite helper function definition (bsc#1051510).
- clk: bcm2835: Fix return type of bcm2835_register_gate (bsc#1051510).
- clk: clk-flexgen: fix clock-critical handling (bsc#1051510).
- clk: imx6ull: use OSC clock during AXI rate change (bsc#1051510).
- clk: imx: make mux parent strings const (bsc#1051510).
- clk: mediatek: correct the clocks for MT2701 HDMI PHY module (bsc#1051510).
- clk: qcom: rcg: Return failure for RCG update (bsc#1051510).
- clk: sunxi: Fix incorrect usage of round_down() (bsc#1051510).
- clk: sunxi-ng: a64: Fix gate bit of DSI DPHY (bsc#1051510).
- clocksource/drivers/hyper-v: Set TSC clocksource as default w/ InvariantTSC (bsc#1170620, bsc#1170621).
- clocksource: dw_apb_timer: Make CPU-affiliation being optional (bsc#1111666).
- clocksource: dw_apb_timer_of: Fix missing clockevent timers (bsc#1051510).
- compat_ioctl: block: handle BLKREPORTZONE/BLKRESETZONE (git fixes (block drivers)).
- compat_ioctl: block: handle Persistent Reservations (git fixes (block drivers)).
- component: Silence bind error on -EPROBE_DEFER (bsc#1051510).
- config: Enable CONFIG_RCU_BOOST
- configfs: Fix bool initialization/comparison (bsc#1051510).
- copy_{to,from}_user(): consolidate object size checks (git fixes).
- coresight: do not use the BIT() macro in the UAPI header (git fixes (block drivers)).
- cpufreq: Register drivers only after CPU devices have been registered (bsc#1051510).
- cpufreq: s3c64xx: Remove pointless NULL check in s3c64xx_cpufreq_driver_init (bsc#1051510).
- cpuidle: Do not unset the driver if it is there already (bsc#1051510).
- crypto: algboss - do not wait during notifier callback (bsc#1111666).
- crypto: algif_skcipher - Cap recv SG list at ctx->used (bsc#1111666).
- crypto: arm64/sha-ce - implement export/import (bsc#1051510).
- crypto: caam - update xts sector size for large input length (bsc#1111666).
- crypto: cavium/nitrox - Fix 'nitrox_get_first_device()' when ndevlist is fully iterated (bsc#1111666).
- crypto: cavium/nitrox - Fix 'nitrox_get_first_device()' when ndevlist is fully iterated (git-fixes).
- crypto: ccp - AES CFB mode is a stream cipher (git-fixes).
- crypto: ccp - Clean up and exit correctly on allocation failure (git-fixes).
- crypto: ccp - Cleanup misc_dev on sev_exit() (bsc#1114279).
- crypto: ccp - Cleanup sp_dev_master in psp_dev_destroy() (bsc#1114279).
- Crypto/chcr: fix for ccm(aes) failed test (bsc#1111666).
- crypto: chelsio/chtls: properly set tp->lsndtime (bsc#1111666).
- crypto: mxs-dcp - fix scatterlist linearization for hash (bsc#1051510).
- crypto: talitos - fix IPsec cipher in length (git-fixes).
- crypto: talitos - reorder code in talitos_edesc_alloc() (git-fixes).
- crypto: tcrypt - fix printed skcipher [a]sync mode (bsc#1051510).
- cxgb4: fix MPS index overwrite when setting MAC address (bsc#1127355).
- cxgb4: fix Txq restart check during backpressure (bsc#1127354 bsc#1127371).
- debugfs: Add debugfs_create_xul() for hexadecimal unsigned long (git-fixes).
- debugfs: Check module state before warning in {full/open}_proxy_open() (bsc#1173746).
- debugfs_lookup(): switch to lookup_one_len_unlocked() (bsc#1171979).
- Deprecate NR_UNSTABLE_NFS, use NR_WRITEBACK (bsc#1163403).
- devinet: fix memleak in inetdev_init() (networking-stable-20_06_07).
- devlink: fix return value after hitting end in region read (bsc#1109837).
- devlink: validate length of param values (bsc#1109837).
- devlink: validate length of region addr/len (bsc#1109837).
- /dev/mem: Add missing memory barriers for devmem_inode (git-fixes).
- /dev/mem: Revoke mappings when a driver claims the region (git-fixes).
- dmaengine: dmatest: Fix iteration non-stop logic (bsc#1051510).
- dmaengine: ste_dma40: fix unneeded variable warning (bsc#1051510).
- dmaengine: tegra210-adma: Fix an error handling path in 'tegra_adma_probe()' (bsc#1111666).
- dm btree: increase rebalance threshold in __rebalance2() (git fixes (block drivers)).
- dm cache: fix a crash due to incorrect work item cancelling (git fixes (block drivers)).
- dm crypt: fix benbi IV constructor crash if used in authenticated mode (git fixes (block drivers)).
- dm: fix potential for q->make_request_fn NULL pointer (git fixes (block drivers)).
- dm mpath: switch paths in dm_blk_ioctl() code path (bsc#1167574).
- dm-raid1: fix invalid return value from dm_mirror (bsc#1172378).
- dm space map common: fix to ensure new block isn't already in use (git fixes (block drivers)).
- dm: various cleanups to md->queue initialization code (git fixes).
- dm verity fec: fix hash block number in verity_fec_decode (git fixes (block drivers)).
- dm verity fec: fix memory leak in verity_fec_dtr (git fixes (block drivers)).
- dm writecache: fix data corruption when reloading the target (git fixes (block drivers)).
- dm writecache: fix incorrect flush sequence when doing SSD mode commit (git fixes (block drivers)).
- dm writecache: verify watermark during resume (git fixes (block drivers)).
- dm zoned: fix invalid memory access (git fixes (block drivers)).
- dm zoned: reduce overhead of backing device checks (git fixes (block drivers)).
- dm zoned: remove duplicate nr_rnd_zones increase in dmz_init_zone() (git fixes (block drivers)).
- dm zoned: support zone sizes smaller than 128MiB (git fixes (block drivers)).
- dp83640: reverse arguments to list_add_tail (git-fixes).
- dpaa_eth: fix usage as DSA master, try 3 (networking-stable-20_05_27).
- driver-core, libnvdimm: Let device subsystems add local lockdep coverage (bsc#1171753).
- drivers: hv: Add a module description line to the hv_vmbus driver (bsc#1172249, bsc#1172251).
- Drivers: hv: Change flag to write log level in panic msg to false (bsc#1170617, bsc#1170618).
- drivers/net/ibmvnic: Update VNIC protocol version reporting (bsc#1065729).
- drivers: soc: ti: knav_qmss_queue: Make knav_gp_range_ops static (bsc#1051510).
- drivers: w1: add hwmon support structures (jsc#SLE-11048).
- drivers: w1: add hwmon temp support for w1_therm (jsc#SLE-11048).
- drivers: w1: refactor w1_slave_show to make the temp reading functionality separate (jsc#SLE-11048).
- drm: amd/acp: fix broken menu structure (bsc#1114279) * context changes
- drm: amd/display: fix Kconfig help text (bsc#1113956) * only fix DEBUG_KERNEL_DC
- drm/amdgpu: Correctly initialize thermal controller for GPUs with Powerplay table v0 (e.g Hawaii) (bsc#1111666).
- drm/amdgpu: Fix oops when pp_funcs is unset in ACPI event (bsc#1111666).
- drm/amd/powerplay: force the trim of the mclk dpm_levels if OD is (bsc#1113956)
- drm/atomic: Take the atomic toys away from X (bsc#1112178) * context changes
- drm/bochs: downgrade pci_request_region failure from error to warning (bsc#1051510).
- drm: bridge: adv7511: Extend list of audio sample rates (bsc#1111666).
- drm/crc: Actually allow to change the crc source (bsc#1114279) * offset changes
- drm/dp_mst: Fix clearing payload state on topology disable (bsc#1051510).
- drm/dp_mst: Increase ACT retry timeout to 3s (bsc#1113956) * context changes
- drm/dp_mst: Reformat drm_dp_check_act_status() a bit (bsc#1051510).
- drm_dp_mst_topology: fix broken drm_dp_sideband_parse_remote_dpcd_read() (bsc#1051510).
- drm/drm_dp_mst:remove set but not used variable 'origlen' (bsc#1051510).
- drm/edid: Fix off-by-one in DispID DTD pixel clock (bsc#1114279)
- drm: encoder_slave: fix refcouting error for modules (bsc#1111666).
- drm: encoder_slave: fix refcouting error for modules (bsc#1114279)
- drm/etnaviv: fix perfmon domain interation (bsc#1113956)
- drm/etnaviv: rework perfmon query infrastructure (bsc#1112178)
- drm/i915: Apply Wa_1406680159:icl,ehl as an engine workaround (bsc#1112178) * rename gt/intel_workarounds.c to intel_workarounds.c * context changes
- drm/i915/gvt: Init DPLL/DDI vreg for virtual display instead of (bsc#1114279)
- drm/i915: HDCP: fix Ri prime check done during link check (bsc#1112178) * rename display/intel_hdmi.c to intel_hdmi.c * context changes
- drm/i915/icl+: Fix hotplug interrupt disabling after storm detection (bsc#1112178)
- drm/i915: properly sanity check batch_start_offset (bsc#1114279) * renamed display/intel_fbc.c -> intel_fb.c * renamed gt/intel_rc6.c -> intel_pm.c * context changes
- drm/i915: Whitelist context-local timestamp in the gen9 cmdparser (bsc#1111666).
- drm/mediatek: Check plane visibility in atomic_update (bsc#1113956) * context changes
- drm/meson: Delete an error message in meson_dw_hdmi_bind() (bsc#1051510).
- drm/msm/dpu: fix error return code in dpu_encoder_init (bsc#1111666).
- drm/msm: stop abusing dma_map/unmap for cache (bsc#1051510).
- drm/msm: Use the correct dma_sync calls harder (bsc#1051510).
- drm/msm: Use the correct dma_sync calls in msm_gem (bsc#1051510).
- drm: NULL pointer dereference [null-pointer-deref] (CWE 476) problem (bsc#1114279)
- drm: panel-orientation-quirks: Add quirk for Asus T101HA panel (bsc#1111666).
- drm: panel-orientation-quirks: Use generic orientation-data for Acer S1003 (bsc#1111666).
- drm/qxl: qxl_release leak in qxl_draw_dirty_fb() (bsc#1051510).
- drm/qxl: qxl_release leak in qxl_hw_surface_alloc() (bsc#1051510).
- drm/qxl: qxl_release use after free (bsc#1051510).
- drm/qxl: Use correct notify port address when creating cursor ring (bsc#1113956)
- drm/radeon: fix double free (bsc#1113956)
- drm/radeon: fix fb_div check in ni_init_smc_spll_table() (bsc#1113956)
- drm: Remove PageReserved manipulation from drm_pci_alloc (bsc#1114279) * offset changes
- drm/sun4i: dsi: Allow binding the host without a panel (bsc#1113956)
- drm/sun4i: dsi: Avoid hotplug race with DRM driver bind (bsc#1113956)
- drm/sun4i: dsi: Remove incorrect use of runtime PM (bsc#1113956) * context changes
- drm/sun4i: dsi: Remove unused drv from driver context (bsc#1113956) * context changes * keep include of sun4i_drv.h
- drm/sun4i: hdmi ddc clk: Fix size of m divider (bsc#1111666).
- drm/tegra: hub: Do not enable orphaned window group (bsc#1111666).
- drm/vkms: Hold gem object while still in-use (bsc#1113956) * context changes
- dump_stack: avoid the livelock of the dump_lock (git fixes (block drivers)).
- e1000: Distribute switch variables for initialization (bsc#1111666).
- e1000e: Disable TSO for buffer overrun workaround (bsc#1051510).
- e1000e: Do not wake up the system via WOL if device wakeup is disabled (bsc#1051510).
- e1000e: Relax condition to trigger reset for ME workaround (bsc#1111666).
- EDAC/amd64: Read back the scrub rate PCI register on F15h (bsc#1114279).
- EDAC, sb_edac: Add support for systems with segmented PCI buses (bsc#1169525).
- efi/random: Increase size of firmware supplied randomness (jsc#SLE-12423).
- efi/random: Treat EFI_RNG_PROTOCOL output as bootloader randomness (jsc#SLE-12423).
- efi: READ_ONCE rng seed size before munmap (jsc#SLE-12423).
- efi: Reorder pr_notice() with add_device_randomness() call (jsc#SLE-12423).
- evm: Check also if *tfm is an error pointer in init_desc() (bsc#1051510).
- evm: Fix a small race in init_desc() (bsc#1051510).
- ext4: add cond_resched() to __ext4_find_entry() (bsc#1166862).
- ext4: Check for non-zero journal inum in ext4_calculate_overhead (bsc#1167288).
- ext4: do not assume that mmp_nodename/bdevname have NUL (bsc#1166860).
- ext4: do not zeroout extents beyond i_disksize (bsc#1167851).
- ext4: fix a data race at inode->i_blocks (bsc#1171835).
- ext4: fix a data race in EXT4_I(inode)->i_disksize (bsc#1166861).
- ext4: fix extent_status fragmentation for plain files (bsc#1171949).
- ext4: fix incorrect group count in ext4_fill_super error message (bsc#1168765).
- ext4: fix incorrect inodes per group in error message (bsc#1168764).
- ext4: fix partial cluster initialization when splitting extent (bsc#1173839).
- ext4: fix potential race between online resizing and write operations (bsc#1166864).
- ext4: fix potential race between s_flex_groups online resizing and access (bsc#1166867).
- ext4: fix potential race between s_group_info online resizing and access (bsc#1166866).
- ext4: fix race between ext4_sync_parent() and rename() (bsc#1173838).
- ext4: fix race between writepages and enabling EXT4_EXTENTS_FL (bsc#1166870).
- ext4: fix support for inode sizes > 1024 bytes (bsc#1164284).
- ext4, jbd2: ensure panic by fix a race between jbd2 abort and ext4 error handlers (bsc#1173833).
- ext4: potential crash on allocation error in ext4_alloc_flex_bg_array() (bsc#1166940).
- ext4: rename s_journal_flag_rwsem to s_writepages_rwsem (bsc#1166868).
- ext4: use non-movable memory for superblock readahead (bsc#1171952).
- ext4: validate the debug_want_extra_isize mount option at parse time (bsc#1163897).
- extcon: adc-jack: Fix an error handling path in 'adc_jack_probe()' (bsc#1051510).
- fanotify: fix ignore mask logic for events on child and on dir (bsc#1172719).
- fanotify: fix merging marks masks with FAN_ONDIR (bsc#1171679).
- fat: fix uninit-memory access for partial initialized inode (bsc#1051510).
- fat: work around race with userspace's read via blockdev while mounting (bsc#1051510).
- fbcon: fix null-ptr-deref in fbcon_switch (bsc#1114279) * rename drivers/video/fbdev/core to drivers/video/console * context changes
- fbdev: potential information leak in do_fb_ioctl() (bsc#1114279)
- fbmem: Adjust indentation in fb_prepare_logo and fb_blank (bsc#1114279)
- fdt: add support for rng-seed (jsc#SLE-12423).
- fdt: Update CRC check for rng-seed (jsc#SLE-12423).
- fib: add missing attribute validation for tun_id (networking-stable-20_03_14).
- firmware: imx: scu: Fix corruption of header (git-fixes).
- firmware: imx: scu: Fix possible memory leak in imx_scu_probe() (bsc#1111666).
- firmware: qcom: scm: fix compilation error when disabled (bsc#1051510).
- Fix boot crash with MD (bsc#1174343)
- fix multiplication overflow in copy_fdtable() (bsc#1173825).
- fpga: dfl: afu: Corrected error handling levels (git-fixes).
- fq_codel: fix TCA_FQ_CODEL_DROP_BATCH_SIZE sanity checks (networking-stable-20_05_12).
- fs/cifs: fix gcc warning in sid_to_id (bsc#1144333).
- fs/seq_file.c: simplify seq_file iteration code and interface (bsc#1170125).
- gpiolib: Document that GPIO line names are not globally unique (bsc#1051510).
- gpio: tegra: mask GPIO IRQs during IRQ shutdown (bsc#1051510).
- gpu: host1x: Detach driver on unregister (bsc#1111666).
- gpu: ipu-v3: pre: do not trigger update if buffer address does not change (bsc#1111666).
- gre: fix uninit-value in __iptunnel_pull_header (networking-stable-20_03_14).
- HID: hid-input: clear unmapped usages (git-fixes).
- HID: hyperv: Add a module description line (bsc#1172249, bsc#1172251).
- HID: i2c-hid: add Trekstor Primebook C11B to descriptor override (git-fixes).
- HID: i2c-hid: override HID descriptors for certain devices (git-fixes).
- HID: magicmouse: do not set up autorepeat (git-fixes).
- HID: multitouch: add eGalaxTouch P80H84 support (bsc#1051510).
- HID: sony: Fix for broken buttons on DS3 USB dongles (bsc#1051510).
- HID: wacom: Read HID_DG_CONTACTMAX directly for non-generic devices (git-fixes).
- hrtimer: Annotate lockless access to timer->state (git fixes (block drivers)).
- hsr: add restart routine into hsr_get_node_list() (networking-stable-20_03_28).
- hsr: check protocol version in hsr_newlink() (networking-stable-20_04_17).
- hsr: fix general protection fault in hsr_addr_is_self() (networking-stable-20_03_28).
- hsr: set .netnsok flag (networking-stable-20_03_28).
- hsr: use rcu_read_lock() in hsr_get_node_{list/status}() (networking-stable-20_03_28).
- hv_netvsc: Fix netvsc_start_xmit's return type (git-fixes).
- hwmon: (acpi_power_meter) Fix potential memory leak in acpi_power_meter_add() (bsc#1111666).
- hwmon: (emc2103) fix unable to change fan pwm1_enable attribute (bsc#1111666).
- hwmon: (max6697) Make sure the OVERT mask is set correctly (bsc#1111666).
- i2c: acpi: Force bus speed to 400KHz if a Silead touchscreen is present (git-fixes).
- i2c: acpi: put device when verifying client fails (git-fixes).
- i2c: algo-pca: Add 0x78 as SCL stuck low status for PCA9665 (bsc#1111666).
- i2c: brcmstb: remove unused struct member (git-fixes).
- i2c: core: Allow empty id_table in ACPI case as well (git-fixes).
- i2c: core: decrease reference count of device node in i2c_unregister_device (git-fixes).
- i2c: dev: Fix the race between the release of i2c_dev and cdev (bsc#1051510).
- i2c: eg20t: Load module automatically if ID matches (bsc#1111666).
- i2c: fix missing pm_runtime_put_sync in i2c_device_probe (git-fixes).
- i2c-hid: properly terminate i2c_hid_dmi_desc_override_table array (git-fixes).
- i2c: hix5hd2: add missed clk_disable_unprepare in remove (bsc#1051510).
- i2c: i801: Do not add ICH_RES_IO_SMI for the iTCO_wdt device (git-fixes).
- i2c: iproc: Stop advertising support of SMBUS quick cmd (git-fixes).
- i2c: isch: Remove unnecessary acpi.h include (git-fixes).
- i2c: jz4780: silence log flood on txabrt (bsc#1051510).
- i2c: mlxcpld: check correct size of maximum RECV_LEN packet (bsc#1111666).
- i2c: mux: demux-pinctrl: Fix an error handling path in 'i2c_demux_pinctrl_probe()' (bsc#1051510).
- i2c: st: fix missing struct parameter description (bsc#1051510).
- i40e: reduce stack usage in i40e_set_fc (git-fixes).
- IB/hfi1: Do not destroy hfi1_wq when the device is shut down (bsc#1174409).
- IB/hfi1: Do not destroy link_wq when the device is shut down (bsc#1174409).
- IB/mlx5: Fix missing congestion control debugfs on rep rdma device (bsc#1103991).
- ibmveth: Fix max MTU limit (bsc#1173428 ltc#186397).
- ibmvfc: do not send implicit logouts prior to NPIV login (bsc#1169625 ltc#184611).
- ibmvnic: continue to init in CRQ reset returns H_CLOSED (bsc#1173280 ltc#185369).
- ibmvnic: Flush existing work items before device removal (bsc#1065729).
- ibmvnic: Harden device login requests (bsc#1170011 ltc#183538).
- ibmvnic: Skip fatal error reset after passive init (bsc#1171078 ltc#184239).
- iio:ad7797: Use correct attribute_group (bsc#1051510).
- iio: adc: stm32-adc: fix device used to request dma (bsc#1051510).
- iio: adc: stm32-adc: fix sleep in atomic context (git-fixes).
- iio: adc: stm32-adc: Use dma_request_chan() instead dma_request_slave_channel() (bsc#1051510).
- iio: buffer: Do not allow buffers without any channels enabled to be activated (bsc#1051510).
- iio: dac: vf610: Fix an error handling path in 'vf610_dac_probe()' (bsc#1051510).
- iio:health:afe4404 Fix timestamp alignment and prevent data leak (bsc#1111666).
- iio:humidity:hdc100x Fix alignment and data leak issues (bsc#1111666).
- iio:magnetometer:ak8974: Fix alignment and data leak issues (bsc#1111666).
- iio: mma8452: Add missed iio_device_unregister() call in mma8452_probe() (bsc#1111666).
- iio: potentiostat: lmp9100: fix iio_triggered_buffer_{predisable,postenable} positions (bsc#1051510).
- iio: pressure: bmp280: Tolerate IRQ before registering (bsc#1051510).
- iio:pressure:ms5611 Fix buffer element alignment (bsc#1111666).
- iio: pressure: zpa2326: handle pm_runtime_get_sync failure (bsc#1111666).
- iio: sca3000: Remove an erroneous 'get_device()' (bsc#1051510).
- iio: xilinx-xadc: Fix ADC-B powerdown (bsc#1051510).
- iio: xilinx-xadc: Fix clearing interrupt when enabling trigger (bsc#1051510).
- iio: xilinx-xadc: Fix sequencer configuration for aux channels in simultaneous mode (bsc#1051510).
- ima: Directly assign the ima_default_policy pointer to ima_rules (bsc#1051510).
- ima: Fix ima digest hash table key calculation (bsc#1051510).
- ima: Fix return value of ima_write_policy() (git-fixes).
- include/asm-generic/topology.h: guard cpumask_of_node() macro argument (bsc#1148868).
- Input: evdev - call input_flush_device() on release(), not flush() (bsc#1051510).
- Input: hyperv-keyboard - add module description (bsc#1172249, bsc#1172251).
- Input: i8042 - add Acer Aspire 5738z to nomux list (bsc#1051510).
- Input: i8042 - add Lenovo XiaoXin Air 12 to i8042 nomux list (bsc#1111666).
- Input: i8042 - add ThinkPad S230u to i8042 reset list (bsc#1051510).
- input: i8042 - Remove special PowerPC handling (git-fixes).
- Input: raydium_i2c_ts - use true and false for boolean values (bsc#1051510).
- Input: synaptics - add a second working PNP_ID for Lenovo T470s (bsc#1111666).
- Input: synaptics - enable RMI on HP Envy 13-ad105ng (bsc#1051510).
- Input: synaptics-rmi4 - fix error return code in rmi_driver_probe() (bsc#1051510).
- Input: synaptics-rmi4 - really fix attn_data use-after-free (git-fixes).
- Input: usbtouchscreen - add support for BonXeon TP (bsc#1051510).
- Input: xpad - add custom init packet for Xbox One S controllers (bsc#1051510).
- intel_idle: Graceful probe failure when MWAIT is disabled (bsc#1174115).
- intel_th: Fix a NULL dereference when hub driver is not loaded (bsc#1111666).
- intel_th: pci: Add Elkhart Lake CPU support (bsc#1051510).
- iommu/amd: Call domain_flush_complete() in update_domain() (bsc#1172096).
- iommu/amd: Do not flush Device Table in iommu_map_page() (bsc#1172097).
- iommu/amd: Do not loop forever when trying to increase address space (bsc#1172098).
- iommu/amd: Fix legacy interrupt remapping for x2APIC-enabled system (bsc#1172099).
- iommu/amd: Fix over-read of ACPI UID from IVRS table (bsc#1172101).
- iommu/amd: Fix race in increase_address_space()/fetch_pte() (bsc#1172102).
- iommu/amd: Fix the configuration of GCR3 table root pointer (bsc#1169057).
- iommu/amd: Update Device Table in increase_address_space() (bsc#1172103).
- iommu: Fix reference count leak in iommu_group_alloc (bsc#1172397).
- ip6_tunnel: Allow rcv/xmit even if remote address is a local address (bsc#1166978).
- ipmi: fix hung processes in __get_guid() (git-fixes).
- ipv4: fix a RCU-list lock in fib_triestat_seq_show (networking-stable-20_04_02).
- ipv6/addrconf: call ipv6_mc_up() for non-Ethernet interface (networking-stable-20_03_14).
- ipv6: do not auto-add link-local address to lag ports (networking-stable-20_04_09).
- ipv6: fix IPV6_ADDRFORM operation logic (bsc#1171662).
- ipv6: Fix nlmsg_flags when splitting a multipath route (networking-stable-20_03_01).
- ipv6: fix restrict IPV6_ADDRFORM operation (bsc#1171662).
- ipv6: Fix route replacement with dev-only route (networking-stable-20_03_01).
- ipvlan: add cond_resched_rcu() while processing muticast backlog (networking-stable-20_03_14).
- ipvlan: call dev_change_flags when ipvlan mode is reset (git-fixes).
- ipvlan: do not add hardware address of master to its unicast filter list (bsc#1137325).
- ipvlan: do not deref eth hdr before checking it's set (networking-stable-20_03_14).
- ipvlan: do not use cond_resched_rcu() in ipvlan_process_multicast() (networking-stable-20_03_14).
- irqchip/bcm2835: Quiesce IRQs left enabled by bootloader (bsc#1051510).
- irqdomain: Fix a memory leak in irq_domain_push_irq() (bsc#1051510).
- iwlwifi: pcie: actually release queue memory in TVQM (bsc#1051510).
- ixgbe: do not check firmware errors (bsc#1170284).
- ixgbevf: Remove limit of 10 entries for unicast filter list (git-fixes).
- jbd2: avoid leaking transaction credits when unreserving handle (bsc#1173845).
- jbd2: Preserve kABI when adding j_abort_mutex (bsc#1173833).
- kabi fix for (bsc#1168202).
- kabi fix for early XHCI debug (git-fixes).
- kabi for for md: improve handling of bio with REQ_PREFLUSH in md_flush_request() (git-fixes).
- kabi: hv: prevent struct device_node to become defined (bsc#1172871).
- kabi: ppc64le: prevent struct dma_map_ops to become defined (jsc#SLE-12423).
- kABI: protect struct mlx5_cmd_work_ent (kabi).
- kABI: reintroduce inet_hashtables.h include to l2tp_ip (kabi).
- kabi/severities: Do not track KVM internal symbols.
- kabi/severities: Ingnore get_dev_data() The function is internal to the AMD IOMMU driver and must not be called by any third party.
- kabi workaround for snd_rawmidi buffer_ref field addition (git-fixes).
- kernfs: fix barrier usage in __kernfs_new_node() (bsc#1111666).
- KEYS: reaching the keys quotas correctly (bsc#1051510).
- KVM: arm64: Change hyp_panic()s dependency on tpidr_el2 (bsc#1133021).
- KVM: arm64: Stop save/restoring host tpidr_el1 on VHE (bsc#1133021).
- KVM: Check validity of resolved slot when searching memslots (bsc#1172104).
- KVM: nVMX: Do not reread VMCS-agnostic state when switching VMCS (bsc#1114279).
- KVM: nVMX: Skip IBPB when switching between vmcs01 and vmcs02 (bsc#1114279).
- KVM: s390: vsie: Fix delivery of addressing exceptions (git-fixes).
- KVM: s390: vsie: Fix possible race when shadowing region 3 tables (git-fixes).
- KVM: s390: vsie: Fix region 1 ASCE sanity shadow address checks (git-fixes).
- KVM: SVM: Fix potential memory leak in svm_cpu_init() (bsc#1171736).
- KVM x86: Extend AMD specific guest behavior to Hygon virtual CPUs (bsc#1152489).
- KVM: x86: Fix APIC page invalidation race (bsc#1174122).
- kvm: x86: Fix L1TF mitigation for shadow MMU (bsc#1171904).
- KVM: x86/mmu: Set mmio_value to '0' if reserved #PF can't be generated (bsc#1171904).
- KVM: x86: only do L1TF workaround on affected processors (bsc#1171904).
- l2tp: add sk_family checks to l2tp_validate_socket (networking-stable-20_06_07).
- l2tp: Allow management of tunnels and session in user namespace (networking-stable-20_04_17).
- l2tp: do not use inet_hash()/inet_unhash() (networking-stable-20_06_07).
- libata: Remove extra scsi_host_put() in ata_scsi_add_hosts() (bsc#1051510).
- libata: Return correct status in sata_pmp_eh_recover_pm() when ATA_DFLAG_DETACH is set (bsc#1051510).
- libceph: do not omit recovery_deletes in target_copy() (bsc#1174113).
- libceph: ignore pool overlay and cache logic on redirects (bsc#1173146).
- libfs: fix infoleak in simple_attr_read() (bsc#1168881).
- libnvdimm/bus: Fix wait_nvdimm_bus_probe_idle() ABBA deadlock (bsc#1171753).
- libnvdimm/bus: Prepare the nd_ioctl() path to be re-entrant (bsc#1171753).
- libnvdimm/bus: Stop holding nvdimm_bus_list_mutex over __nd_ioctl() (bsc#1171753).
- libnvdimm: cover up changes in struct nvdimm_bus (bsc#1171753).
- libnvdimm: cover up nd_pfn_sb changes (bsc#1171759).
- libnvdimm/dax: Pick the right alignment default when creating dax devices (bsc#1171759).
- libnvdimm/label: Remove the dpa align check (bsc#1171759).
- libnvdimm/of_pmem: Provide a unique name for bus provider (bsc#1171739).
- libnvdimm/pfn_dev: Add a build check to make sure we notice when struct page size change (bsc#1171743).
- libnvdimm/pfn_dev: Add page size and struct page size to pfn superblock (bsc#1171759).
- libnvdimm/pfn: Prevent raw mode fallback if pfn-infoblock valid (bsc#1171743).
- libnvdimm/pmem: Advance namespace seed for specific probe errors (bsc#1171743).
- libnvdimm/region: Initialize bad block for volatile namespaces (bnc#1151927 5.3.6).++ kernel-source-rt.spec (revision 4)Release: <RELEASE>.g93af9dfProvides: %name-srchash-93af9df3581407689c1ac5b0aa06fcfb62b08f1c
- libnvdimm/region: Rewrite _probe_success() to _advance_seeds() (bsc#1171743).
- libnvdimm: Use PAGE_SIZE instead of SZ_4K for align check (bsc#1171759).
- lib: raid6: fix awk build warnings (git fixes (block drivers)).
- lib/raid6/test: fix build on distros whose /bin/sh is not bash (git fixes (block drivers)).
- lib/stackdepot.c: fix global out-of-bounds in stack_slabs (git fixes (block drivers)).
- livepatch: Apply vmlinux-specific KLP relocations early (bsc#1071995).
- livepatch: Disallow vmlinux.ko (bsc#1071995).
- livepatch: Make klp_apply_object_relocs static (bsc#1071995).
- livepatch: Prevent module-specific KLP rela sections from referencing vmlinux symbols (bsc#1071995).
- livepatch: Remove .klp.arch (bsc#1071995).
- locks: print unsigned ino in /proc/locks (bsc#1171951).
- loop: replace kill_bdev with invalidate_bdev (bsc#1173820).
- lpfc_debugfs: get rid of pointless access_ok() (bsc#1172687 bsc#1171530).
- lpfc: Synchronize NVME transport and lpfc driver devloss_tmo (bcs#1173060).
- mac80211: add ieee80211_is_any_nullfunc() (bsc#1051510).
- mac80211: add option for setting control flags (bsc#1111666).
- mac80211: Do not send mesh HWMP PREQ if HWMP is disabled (bsc#1051510).
- mac80211_hwsim: Use kstrndup() in place of kasprintf() (bsc#1051510).
- mac80211: mesh: fix discovery timer re-arming issue / crash (bsc#1051510).
- mac80211: set IEEE80211_TX_CTRL_PORT_CTRL_PROTO for nl80211 TX (bsc#1111666).
- macsec: avoid to set wrong mtu (bsc#1051510).
- macsec: restrict to ethernet devices (networking-stable-20_03_28).
- macvlan: add cond_resched() during multicast processing (networking-stable-20_03_14).
- macvlan: fix null dereference in macvlan_device_event() (bsc#1051510).
- mailbox: imx: Disable the clock on devm_mbox_controller_register() failure (git-fixes).
- md: Avoid namespace collision with bitmap API (git fixes (block drivers)).
- md: improve handling of bio with REQ_PREFLUSH in md_flush_request() (git-fixes).
- md/raid0: Fix an error message in raid0_make_request() (git fixes (block drivers)).
- md/raid10: prevent access of uninitialized resync_pages offset (git-fixes).
- mdraid: fix read/write bytes accounting (bsc#1172537).
- md: use memalloc scope APIs in mddev_suspend()/mddev_resume() (bsc#1166985)).
- media: cec: silence shift wrapping warning in __cec_s_log_addrs() (git-fixes).
- media: dib0700: fix rc endpoint lookup (bsc#1051510).
- media: dvb: return -EREMOTEIO on i2c transfer failure (bsc#1051510).
- media: flexcop-usb: fix endpoint sanity check (git-fixes).
- media: go7007: Fix URB type for interrupt handling (bsc#1051510).
- media: platform: fcp: Set appropriate DMA parameters (bsc#1051510).
- media: si2157: Better check for running tuner in init (bsc#1111666).
- media: tda10071: fix unsigned sign extension overflow (bsc#1051510).
- media: ti-vpe: cal: fix disable_irqs to only the intended target (git-fixes).
- media: usbtv: fix control-message timeouts (bsc#1051510).
- media: v4l2-core: fix entity initialization in device_register_subdev (bsc#1051510).
- media: vsp1: tidyup VI6_HGT_LBn_H() macro (bsc#1051510).
- media: xirlink_cit: add missing descriptor sanity checks (bsc#1051510).
- mei: release me_cl object reference (bsc#1051510).
- mfd: dln2: Fix sanity checking for endpoints (bsc#1051510).
- misc: pci_endpoint_test: Fix to support > 10 pci-endpoint-test devices (bsc#1051510).
- mlxsw: core: Do not use WQ_MEM_RECLAIM for mlxsw ordered workqueue (git-fixes).
- mlxsw: core: Do not use WQ_MEM_RECLAIM for mlxsw workqueue (git-fixes).
- mlxsw: Fix some IS_ERR() vs NULL bugs (networking-stable-20_04_27).
- mlxsw: pci: Return error on PCI reset timeout (git-fixes).
- mlxsw: spectrum_acl_tcam: Position vchunk in a vregion list properly (networking-stable-20_05_12).
- mlxsw: spectrum: Disallow prio-tagged packets when PVID is removed (git-fixes).
- mlxsw: spectrum_dpipe: Add missing error path (git-fixes).
- mlxsw: spectrum_flower: Do not stop at FLOW_ACTION_VLAN_MANGLE (networking-stable-20_04_09).
- mlxsw: spectrum_mr: Fix list iteration in error path (bsc#1112374).
- mlxsw: spectrum: Prevent force of 56G (git-fixes).
- mlxsw: spectrum_router: Refresh nexthop neighbour when it becomes dead (git-fixes).
- mlxsw: spectrum_router: Remove inappropriate usage of WARN_ON() (git-fixes).
- mlxsw: spectrum_switchdev: Add MDB entries in prepare phase (git-fixes).
- mlxsw: spectrum_switchdev: Do not treat static FDB entries as sticky (git-fixes).
- mmc: atmel-mci: Fix debugfs on 64-bit platforms (git-fixes).
- mmc: block: Fix request completion in the CQE timeout path (bsc#1111666).
- mmc: block: Fix use-after-free issue for rpmb (bsc#1111666).
- mmc: core: Check request type before completing the request (git-fixes).
- mmc: core: Fix recursive locking issue in CQE recovery path (git-fixes).
- mmc: cqhci: Avoid false 'cqhci: CQE stuck on' by not open-coding timeout loop (git-fixes).
- mmc: dw_mmc: Fix debugfs on 64-bit platforms (git-fixes).
- mmc: fix compilation of user API (bsc#1051510).
- mmc: meson-gx: make sure the descriptor is stopped on errors (git-fixes).
- mmc: meson-gx: simplify interrupt handler (git-fixes).
- mmc: renesas_sdhi: limit block count to 16 bit for old revisions (git-fixes).
- mmc: sdhci: do not enable card detect interrupt for gpio cd type (bsc#1111666).
- mmc: sdhci-esdhc-imx: fix the mask for tuning start point (bsc#1051510).
- mmc: sdhci-msm: Clear tuning done flag while hs400 tuning (bsc#1051510).
- mmc: sdhci-msm: Set SDHCI_QUIRK_MULTIBLOCK_READ_ACMD12 quirk (bsc#1111666).
- mmc: sdhci-of-at91: fix memleak on clk_get failure (git-fixes).
- mmc: sdhci-pci: Fix eMMC driver strength for BYT-based controllers (bsc#1051510).
- mmc: sdhci-xenon: fix annoying 1.8V regulator warning (bsc#1051510).
- mmc: sdio: Fix potential NULL pointer error in mmc_sdio_init_card() (bsc#1051510).
- mmc: tmio: fix access width of Block Count Register (git-fixes).
- mm/filemap.c: do not initiate writeback if mapping has no dirty pages (bsc#1168884).
- mm: limit boost_watermark on small zones (git fixes (mm/pgalloc)).
- mm/memory_hotplug.c: only respect mem= parameter during boot stage (bsc#1065600).
- mm: replace PF_LESS_THROTTLE with PF_LOCAL_THROTTLE (bsc#1163403).
- mm: thp: handle page cache THP correctly in PageTransCompoundMap (git fixes (block drivers)).
- mtd: cfi: fix deadloop in cfi_cmdset_0002.c do_write_buffer (bsc#1051510).
- mtd: spi-nor: cadence-quadspi: add a delay in write sequence (git-fixes).
- mtd: spi-nor: enable 4B opcodes for mx66l51235l (git-fixes).
- mtd: spi-nor: fsl-quadspi: Do not let -EINVAL on the bus (git-fixes).
- mvpp2: remove misleading comment (git-fixes).
- mwifiex: avoid -Wstringop-overflow warning (bsc#1051510).
- mwifiex: Fix memory corruption in dump_station (bsc#1051510).
- net: bcmgenet: correct per TX/RX ring statistics (networking-stable-20_04_27).
- net: be more gentle about silly gso requests coming from user (networking-stable-20_06_07).
- net: check untrusted gso_size at kernel entry (networking-stable-20_06_07).
- net/cxgb4: Check the return from t4_query_params properly (git-fixes).
- net: dsa: b53: Fix ARL register definitions (networking-stable-20_04_27).
- net: dsa: b53: Rework ARL bin logic (networking-stable-20_04_27).
- net: dsa: bcm_sf2: Do not register slave MDIO bus with OF (networking-stable-20_04_09).
- net: dsa: bcm_sf2: Ensure correct sub-node is parsed (networking-stable-20_04_09).
- net: dsa: bcm_sf2: Fix node reference count (git-fixes).
- net: dsa: bcm_sf2: Fix overflow checks (git-fixes).
- net: dsa: Fix duplicate frames flooded by learning (networking-stable-20_03_28).
- net: dsa: loop: Add module soft dependency (networking-stable-20_05_16).
- net: dsa: mt7530: fix roaming from DSA user ports (networking-stable-20_05_27).
- net: dsa: mv88e6xxx: fix lockup on warm boot (networking-stable-20_03_14).
- net: ena: add intr_moder_rx_interval to struct ena_com_dev and use it (git-fixes).
- net: ena: add missing ethtool TX timestamping indication (git-fixes).
- net: ena: avoid memory access violation by validating req_id properly (git-fixes).
- net: ena: do not wake up tx queue when down (git-fixes).
- net: ena: ena-com.c: prevent NULL pointer dereference (git-fixes).
- net: ena: ethtool: use correct value for crc32 hash (git-fixes).
- net: ena: fix continuous keep-alive resets (git-fixes).
- net: ena: fix corruption of dev_idx_to_host_tbl (git-fixes).
- net: ena: fix default tx interrupt moderation interval (git-fixes).
- net: ena: fix incorrect default RSS key (git-fixes).
- net: ena: fix incorrectly saving queue numbers when setting RSS indirection table (git-fixes).
- net: ena: fix issues in setting interrupt moderation params in ethtool (git-fixes).
- net: ena: fix potential crash when rxfh key is NULL (git-fixes).
- net: ena: fix retrieval of nonadaptive interrupt moderation intervals (git-fixes).
- net: ena: fix uses of round_jiffies() (git-fixes).
- net: ena: make ena rxfh support ETH_RSS_HASH_NO_CHANGE (git-fixes).
- net: ena: reimplement set/get_coalesce() (git-fixes).
- net: ena: rss: do not allocate key when not supported (git-fixes).
- net: ena: rss: fix failure to get indirection table (git-fixes).
- net: ena: rss: store hash function as values and not bits (git-fixes).
- net/ethernet: add Google GVE driver (jsc#SLE-10538)
- net: fec: add phy_reset_after_clk_enable() support (git-fixes).
- net: fec: validate the new settings in fec_enet_set_coalesce() (networking-stable-20_03_14).
- net: fib_rules: Correctly set table field when table number exceeds 8 bits (networking-stable-20_03_01).
- netfilter: connlabels: prefer static lock initialiser (git-fixes).
- netfilter: conntrack: sctp: use distinct states for new SCTP connections (bsc#1159199).
- netfilter: ctnetlink: netns exit must wait for callbacks (bsc#1169795).
- netfilter: not mark a spinlock as __read_mostly (git-fixes).
- net: fix a potential recursive NETDEV_FEAT_CHANGE (networking-stable-20_05_16).
- net: fix race condition in __inet_lookup_established() (bsc#1151794).
- net: fq: add missing attribute validation for orphan mask (networking-stable-20_03_14).
- net: hns3: fix 'tc qdisc del' failed issue (bsc#1109837).
- net: inet_csk: Fix so_reuseport bind-address cache in tb->fast* (networking-stable-20_05_27).
- net: ipip: fix wrong address family in init error path (networking-stable-20_05_27).
- net, ip_tunnel: fix interface lookup with no key (networking-stable-20_04_02).
- net: ipv4: devinet: Fix crash when add/del multicast IP with autojoin (networking-stable-20_04_17).
- net: ipv6: do not consider routes via gateways for anycast address check (networking-stable-20_04_17).
- net: ipvlan: Fix ipvlan device tso disabled while NETIF_F_IP_CSUM is set (git-fixes).
- netlink: Use netlink header as base to calculate bad attribute offset (networking-stable-20_03_14).
- net: macsec: preserve ingress frame ordering (networking-stable-20_05_12).
- net: memcg: fix lockdep splat in inet_csk_accept() (networking-stable-20_03_14).
- net: memcg: late association of sock to memcg (networking-stable-20_03_14).
- net/mlx4_core: drop useless LIST_HEAD (git-fixes).
- net/mlx4_core: fix a memory leak bug (git-fixes).
- net/mlx4_core: Fix use of ENOSPC around mlx4_counter_alloc() (networking-stable-20_05_12).
- net/mlx4_en: avoid indirect call in TX completion (networking-stable-20_04_27).
- net/mlx5: Add command entry handling completion (networking-stable-20_05_27).
- net/mlx5: Add new fields to Port Type and Speed register (bsc#1171118).
- net/mlx5: Avoid panic when setting vport rate (git-fixes).
- net/mlx5: Continue driver initialization despite debugfs failure (git-fixes).
- net/mlx5e: ethtool, Fix a typo in WOL function names (git-fixes).
- net/mlx5e: Fix traffic duplication in ethtool steering (git-fixes).
- net/mlx5e: Remove unnecessary clear_bit()s (git-fixes).
- net/mlx5e: Update netdev txq on completions during closure (networking-stable-20_05_27).
- net/mlx5: Expose link speed directly (bsc#1171118).
- net/mlx5: Expose port speed when possible (bsc#1171118).
- net/mlx5: Fix command entry leak in Internal Error State (networking-stable-20_05_12).
- net/mlx5: Fix crash upon suspend/resume (networking-stable-20_06_07).
- net/mlx5: Fix failing fw tracer allocation on s390 (bsc#1103990 ).
- net/mlx5: Fix forced completion access non initialized command entry (networking-stable-20_05_12).
- net: mvmdio: allow up to four clocks to be specified for orion-mdio (git-fixes).
- net: mvneta: Fix the case where the last poll did not process all rx (networking-stable-20_03_28).
- net: mvpp2: prs: Do not override the sign bit in SRAM parser shift (git-fixes).
- net: netrom: Fix potential nr_neigh refcnt leak in nr_add_node (networking-stable-20_04_27).
- net/packet: tpacket_rcv: do not increment ring index on drop (networking-stable-20_03_14).
- net: phy: fix aneg restart in phy_ethtool_set_eee (networking-stable-20_05_16).
- net: phy: micrel: kszphy_resume(): add delay after genphy_resume() before accessing PHY registers (bsc#1051510).
- net: phy: restore mdio regs in the iproc mdio driver (networking-stable-20_03_01).
- netprio_cgroup: Fix unlimited memory leak of v2 cgroups (networking-stable-20_05_16).
- net: qede: stop adding events on an already destroyed workqueue (git-fixes).
- net: qed: fix excessive QM ILT lines consumption (git-fixes).
- net: qed: fix NVMe login fails over VFs (git-fixes).
- net: qmi_wwan: add support for ASKEY WWHC050 (networking-stable-20_03_28).
- net: qrtr: Fix passing invalid reference to qrtr_local_enqueue() (networking-stable-20_05_27).
- net: revert default NAPI poll timeout to 2 jiffies (networking-stable-20_04_17).
- net: revert 'net: get rid of an signed integer overflow in ip_idents_reserve()' (networking-stable-20_05_27).
- net_sched: cls_route: remove the right filter from hashtable (networking-stable-20_03_28).
- net sched: fix reporting the first-time use timestamp (networking-stable-20_05_27).
- net_sched: sch_skbprio: add message validation to skbprio_change() (bsc#1109837).
- net: stricter validation of untrusted gso packets (networking-stable-20_05_12).
- net/tls: Fix sk_psock refcnt leak in bpf_exec_tx_verdict() (networking-stable-20_05_12).
- net/tls: Fix sk_psock refcnt leak when in tls_data_ready() (networking-stable-20_05_12).
- net: usb: qmi_wwan: add support for DW5816e (networking-stable-20_05_12).
- net: usb: qmi_wwan: add Telit 0x1050 composition (networking-stable-20_06_07).
- net: usb: qmi_wwan: add Telit LE910C1-EUX composition (networking-stable-20_06_07).
- net: vmxnet3: fix possible buffer overflow caused by bad DMA value in vmxnet3_get_rss() (bsc#1172484).
- net/x25: Fix x25_neigh refcnt leak when receiving frame (networking-stable-20_04_27).
- nfc: add missing attribute validation for SE API (networking-stable-20_03_14).
- nfc: add missing attribute validation for vendor subcommand (networking-stable-20_03_14).
- nfc: fdp: Fix a signedness bug in fdp_nci_send_patch() (bsc#1051510).
- nfc: pn544: Fix occasional HW initialization failure (networking-stable-20_03_01).
- nfc: st21nfca: add missed kfree_skb() in an error path (bsc#1051510).
- nfp: abm: fix a memory leak bug (bsc#1109837).
- nfp: bpf: fix code-gen bug on BPF_ALU | BPF_XOR | BPF_K (git-fixes).
- nfsd4: fix up replay_matches_cache() (git-fixes).
- nfsd: Ensure CLONE persists data and metadata changes to the target file (git-fixes).
- nfsd: fix delay timer on 32-bit architectures (git-fixes).
- nfsd: fix jiffies/time_t mixup in LRU list (git-fixes).
- nfs: Directory page cache pages need to be locked when read (git-fixes).
- nfsd: memory corruption in nfsd4_lock() (git-fixes).
- nfs: Do not call generic_error_remove_page() while holding locks (bsc#1170457).
- NFS: Fix an RCU lock leak in nfs4_refresh_delegation_stateid() (bsc#1170592).
- nfs: Fix memory leaks and corruption in readdir (git-fixes).
- nfs: Fix O_DIRECT accounting of number of bytes read/written (git-fixes).
- nfs: Fix potential posix_acl refcnt leak in nfs3_set_acl (git-fixes).
- nfs: fix racey wait in nfs_set_open_stateid_locked (bsc#1170592).
- nfs/flexfiles: Use the correct TCP timeout for flexfiles I/O (git-fixes).
- nfs/pnfs: Fix pnfs_generic_prepare_to_resend_writes() (git-fixes).
- nfs: Revalidate the file size on a fatal write error (git-fixes).
- NFSv4.0: nfs4_do_fsinfo() should not do implicit lease renewals (git-fixes).
- NFSv4: Do not allow a cached open with a revoked delegation (git-fixes).
- NFSv4: Fix leak of clp->cl_acceptor string (git-fixes).
- NFSv4/pnfs: Return valid stateids in nfs_layout_find_inode_by_stateid() (git-fixes).
- NFSv4: Retry CLOSE and DELEGRETURN on NFS4ERR_OLD_STATEID (bsc#1170592).
- NFSv4: try lease recovery on NFS4ERR_EXPIRED (git-fixes).
- NFSv4.x: Drop the slot if nfs4_delegreturn_prepare waits for layoutreturn (git-fixes).
- nilfs2: fix null pointer dereference at nilfs_segctor_do_construct() (bsc#1173857).
- nl80211: fix NL80211_ATTR_CHANNEL_WIDTH attribute type (bsc#1111666).
- nl802154: add missing attribute validation for dev_type (networking-stable-20_03_14).
- nl802154: add missing attribute validation (networking-stable-20_03_14).
- nvdimm: Avoid race between probe and reading device attributes (bsc#1170442).
- nvme: check for NVME_CTRL_LIVE in nvme_report_ns_ids() (bcs#1171558 bsc#1159058).
- nvme: do not update multipath disk information if the controller is down (bcs#1171558 bsc#1159058).
- nvme: fail cancelled commands with NVME_SC_HOST_PATH_ERROR (bsc#1158983 bsc#1172538).
- nvme-fc: Fail transport errors with NVME_SC_HOST_PATH (bsc#1158983 bsc#1172538).
- nvme-fc: print proper nvme-fc devloss_tmo value (bsc#1172391).
- nvme-tcp: fail command with NVME_SC_HOST_PATH_ERROR send failed (bsc#1158983 bsc#1172538).
- objtool: Add is_static_jump() helper (bsc#1169514).
- objtool: Add relocation check for alternative sections (bsc#1169514).
- objtool: Clean instruction state before each function validation (bsc#1169514).
- objtool: Fix stack offset tracking for indirect CFAs (bsc#1169514).
- objtool: Fix switch table detection in .text.unlikely (bsc#1169514).
- objtool: Ignore empty alternatives (bsc#1169514).
- objtool: Make BP scratch register warning more robust (bsc#1169514).
- ocfs2: no need try to truncate file beyond i_size (bsc#1171841).
- OMAP: DSS2: remove non-zero check on variable r (bsc#1114279)
- overflow: Fix -Wtype-limits compilation warnings (git fixes).
- overflow.h: Add arithmetic shift helper (git fixes).
- p54usb: add AirVasT USB stick device-id (bsc#1051510).
- padata: ensure the reorder timer callback runs on the correct CPU (git-fixes).
- padata: Remove broken queue flushing (git-fixes).
- padata: reorder work kABI fixup (git-fixes).
- Partially revert 'kfifo: fix kfifo_alloc() and kfifo_init()' (git fixes (block drivers)).
- partitions/efi: Fix partition name parsing in GUID partition entry (bsc#1168763).
- PCI/AER: Remove HEST/FIRMWARE_FIRST parsing for AER ownership (bsc#1174356).
- PCI/AER: Use only _OSC to determine AER ownership (bsc#1174356).
- PCI: Allow pci_resize_resource() for devices on root bus (bsc#1051510).
- PCI/ASPM: Clear the correct bits when enabling L1 substates (bsc#1051510).
- PCI: endpoint: Fix clearing start entry in configfs (bsc#1051510).
- PCI: Fix pci_register_host_bridge() device_register() error handling (bsc#1051510).
- PCI: Generalize multi-function power dependency device links (bsc#1111666).
- PCI: hv: Add support for protocol 1.3 and support PCI_BUS_RELATIONS2 (bsc#1172201, bsc#1172202).
- PCI: hv: Change pci_protocol_version to per-hbus (bsc#1172871, bsc#1172872).
- PCI: hv: Decouple the func definition in hv_dr_state from VSP message (bsc#1172201, bsc#1172202).
- PCI: hv: Fix the PCI HyperV probe failure path to release resource properly (bsc#1172871, bsc#1172872).
- PCI: hv: Introduce hv_msi_entry (bsc#1172871, bsc#1172872).
- PCI: hv: Move hypercall related definitions into tlfs header (bsc#1172871, bsc#1172872).
- PCI: hv: Move retarget related structures into tlfs header (bsc#1172871, bsc#1172872).
- PCI: hv: Reorganize the code in preparation of hibernation (bsc#1172871, bsc#1172872).
- PCI: hv: Retry PCI bus D0 entry on invalid device state (bsc#1172871, bsc#1172872).
- PCI: pciehp: Fix indefinite wait on sysfs requests (git-fixes).
- PCI: pciehp: Fix MSI interrupt race (bsc#1159037).
- PCI: pciehp: Support interrupts sent from D3hot (git-fixes).
- PCI/PM: Call .bridge_d3() hook only if non-NULL (git-fixes).
- PCI: Program MPS for RCiEP devices (bsc#1051510).
- PCI/PTM: Inherit Switch Downstream Port PTM settings from Upstream Port (bsc#1051510).
- pci: Revive pci_dev __aer_firmware_first* fields for kABI (bsc#1174356).
- PCI/switchtec: Fix init_completion race condition with poll_wait() (bsc#1051510).
- pcm_native: result of put_user() needs to be checked (bsc#1111666).
- perf: Allocate context task_ctx_data for child event (git-fixes).
- perf/cgroup: Fix perf cgroup hierarchy support (git-fixes).
- perf: Copy parent's address filter offsets on clone (git-fixes).
- perf/core: Add sanity check to deal with pinned event failure (git-fixes).
- perf/core: Avoid freeing static PMU contexts when PMU is unregistered (git-fixes).
- perf/core: Correct event creation with PERF_FORMAT_GROUP (git-fixes).
- perf/core: Do not WARN() for impossible ring-buffer sizes (git-fixes).
- perf/core: Fix ctx_event_type in ctx_resched() (git-fixes).
- perf/core: Fix error handling in perf_event_alloc() (git-fixes).
- perf/core: Fix exclusive events' grouping (git-fixes).
- perf/core: Fix group scheduling with mixed hw and sw events (git-fixes).
- perf/core: Fix impossible ring-buffer sizes warning (git-fixes).
- perf/core: Fix locking for children siblings group read (git-fixes).
- perf/core: Fix perf_event_read_value() locking (git-fixes).
- perf/core: Fix perf_pmu_unregister() locking (git-fixes).
- perf/core: Fix perf_sample_regs_user() mm check (git-fixes).
- perf/core: Fix possible Spectre-v1 indexing for ->aux_pages (git-fixes).
- perf/core: Fix race between close() and fork() (git-fixes).
- perf/core: Fix the address filtering fix (git-fixes).
- perf/core: Fix use-after-free in uprobe_perf_close() (git-fixes).
- perf/core: Force USER_DS when recording user stack data (git-fixes).
- perf/core: Restore mmap record type correctly (git-fixes).
- perf: Fix header.size for namespace events (git-fixes).
- perf/ioctl: Add check for the sample_period value (git-fixes).
- perf, pt, coresight: Fix address filters for vmas with non-zero offset (git-fixes).
- perf: Return proper values for user stack errors (git-fixes).
- perf/x86/amd: Constrain Large Increment per Cycle events (git-fixes).
- perf/x86/amd/ibs: Fix reading of the IBS OpData register and thus precise RIP validity (git-fixes).
- perf/x86/amd/ibs: Fix sample bias for dispatched micro-ops (git-fixes).
- perf/x86/amd/ibs: Handle erratum #420 only on the affected CPU family (10h) (git-fixes).
- perf/x86/amd/iommu: Make the 'amd_iommu_attr_groups' symbol static (git-fixes).
- perf/x86/amd/uncore: Do not set 'ThreadMask' and 'SliceMask' for non-L3 PMCs (git-fixes stable).
- perf/x86/amd/uncore: Set the thread mask for F17h L3 PMCs (git-fixes).
- perf/x86/amd/uncore: Set ThreadMask and SliceMask for L3 Cache perf events (git-fixes stable).
- perf/x86: Enable free running PEBS for REGS_USER/INTR (git-fixes).
- perf/x86: Fix incorrect PEBS_REGS (git-fixes).
- perf/x86/intel: Add generic branch tracing check to intel_pmu_has_bts() (git-fixes).
- perf/x86/intel: Add proper condition to run sched_task callbacks (git-fixes).
- perf/x86/intel/bts: Fix the use of page_private() (git-fixes).
- perf/x86/intel: Fix PT PMI handling (git-fixes).
- perf/x86/intel: Move branch tracing setup to the Intel-specific source file (git-fixes).
- perf/x86/intel/uncore: Add Node ID mask (git-fixes).
- perf/x86/intel/uncore: Fix PCI BDF address of M3UPI on SKX (git-fixes).
- perf/x86/intel/uncore: Handle invalid event coding for free-running counter (git-fixes).
- perf/x86/uncore: Fix event group support (git-fixes).
- pid: Improve the comment about waiting in zap_pid_ns_processes (git fixes)).
- pinctrl: baytrail: Enable pin configuration setting for GPIO chip (git-fixes).
- pinctrl: cherryview: Add missing spinlock usage in chv_gpio_irq_handler (git-fixes).
- pinctrl: core: Remove extra kref_get which blocks hogs being freed (bsc#1051510).
- pinctrl: freescale: imx: Fix an error handling path in 'imx_pinctrl_probe()' (bsc#1051510).
- pinctrl: imxl: Fix an error handling path in 'imx1_pinctrl_core_probe()' (bsc#1051510).
- pinctrl: samsung: Save/restore eint_mask over suspend for EINT_TYPE GPIOs (bsc#1051510).
- pinctrl: sunrisepoint: Fix PAD lock register offset for SPT-H (git-fixes).
- platform/x86: asus-nb-wmi: Do not load on Asus T100TA and T200TA (bsc#1051510).
- platform/x86: dell-laptop: do not register micmute LED if there is no token (bsc#1111666).
- platform/x86: hp-wmi: Convert simple_strtoul() to kstrtou32() (bsc#1111666).
- PM / Domains: Allow genpd users to specify default active wakeup behavior (git-fixes).
- pNFS: Ensure we do clear the return-on-close layout stateid on fatal errors (git-fixes).
- pnp: Use list_for_each_entry() instead of open coding (git fixes).
- powerpc/64s: Do not let DT CPU features set FSCR_DSCR (bsc#1065729).
- powerpc/64s: Save FSCR to init_task.thread.fscr after feature init (bsc#1065729).
- powerpc: Add attributes for setjmp/longjmp (bsc#1065729).
- powerpc/book3s64: Export has_transparent_hugepage() related functions (bsc#1171759).
- powerpc/book3s64/pkeys: Fix pkey_access_permitted() for execute disable pkey (bsc#1065729).
- powerpc/fadump: fix race between pstore write and fadump crash trigger (bsc#1168959 ltc#185010).
- powerpc/hash64/devmap: Use H_PAGE_THP_HUGE when setting up huge devmap PTE entries (bsc#1065729).
- powerpc/pci/of: Parse unassigned resources (bsc#1065729).
- powerpc/setup_64: Set cache-line-size based on cache-block-size (bsc#1065729).
- powerpc/sstep: Fix DS operand in ld encoding to appropriate value (bsc#1065729).
- powerpc/xive: Clear the page tables for the ESB IO mapping (bsc#1085030).
- powerpc/xmon: Reset RCU and soft lockup watchdogs (bsc#1065729).
- power: supply: bq24257_charger: Replace depends on REGMAP_I2C with select (bsc#1051510).
- power: supply: lp8788: Fix an error handling path in 'lp8788_charger_probe()' (bsc#1051510).
- power: supply: smb347-charger: IRQSTAT_D is volatile (bsc#1051510).
- power: vexpress: add suppress_bind_attrs to true (bsc#1111666).
- pppoe: only process PADT targeted at local interfaces (networking-stable-20_05_16).
- pwm: bcm2835: Dynamically allocate base (bsc#1051510).
- pwm: meson: Fix confusing indentation (bsc#1051510).
- pwm: pca9685: Fix PWM/GPIO inter-operation (bsc#1051510).
- pwm: rcar: Fix late Runtime PM enablement (bsc#1051510).
- pwm: renesas-tpu: Fix late Runtime PM enablement (bsc#1051510).
- pxa168fb: fix release function mismatch in probe failure (bsc#1051510).
- qede: Fix race between rdma destroy workqueue and link change event (networking-stable-20_03_01).
- qed: reduce maximum stack frame size (git-fixes).
- qlcnic: fix missing release in qlcnic_83xx_interrupt_test (git-fixes).
- qmi_wwan: unconditionally reject 2 ep interfaces (bsc#1051510).
- r8152: check disconnect status after long sleep (networking-stable-20_03_14).
- r8152: support additional Microsoft Surface Ethernet Adapter variant (networking-stable-20_05_27).
- raid5: remove gfp flags from scribble_alloc() (bsc#1166985).
- raid6/ppc: Fix build for clang (git fixes (block drivers)).
- random: always use batched entropy for get_random_u{32,64} (bsc#1164871).
- rcu: locking and unlocking need to always be at least barriers (git fixes (block drivers)).
- RDMA/efa: Fix setting of wrong bit in get/set_feature commands (bsc#1111666)
- RDMA/efa: Set maximum pkeys device attribute (bsc#1111666)
- RDMA/efa: Support remote read access in MR registration (bsc#1111666)
- RDMA/efa: Unified getters/setters for device structs bitmask access (bsc#1111666)
- README.BRANCH: Add Takashi Iwai as primary maintainer.
- README.BRANCH: Replace Matt Fleming with Davidlohr Bueso as maintainer.
- regmap: debugfs: Do not sleep while atomic for fast_io regmaps (bsc#1111666).
- resolve KABI warning for perf-pt-coresight (git-fixes).
- Revert 'ALSA: hda/realtek: Fix pop noise on ALC225' (git-fixes).
- Revert 'bcache: ignore pending signals when creating gc and allocator thread' (git fixes (block drivers)).
- Revert commit e918e570415c ('tpm_tis: Remove the HID IFX0102') (bsc#1111666).
- Revert 'dm crypt: use WQ_HIGHPRI for the IO and crypt workqueues' (git fixes (block drivers)).
- Revert 'drm/panel: simple: Add support for Sharp LQ150X1LG11 panels' (bsc#1114279) * offset changes
- Revert 'HID: i2c-hid: add Trekstor Primebook C11B to descriptor override' Depends on 9b5c747685982d22efffeafc5ec601bd28f6d78b, which was also reverted.
- Revert 'HID: i2c-hid: override HID descriptors for certain devices' This broke i2c-hid.ko's build, there is no way around it without a big file rename or renaming the kernel module.
- Revert 'i2c-hid: properly terminate i2c_hid_dmi_desc_override_table' Fixed 9b5c747685982d22efffeafc5ec601bd28f6d78b, which was also reverted.
- Revert 'ipc,sem: remove uneeded sem_undo_list lock usage in exit_sem()' (bsc#1172221).
- Revert 'RDMA/cma: Simplify rdma_resolve_addr() error flow' (bsc#1103992).
- Revert 'thermal: mediatek: fix register index error' (bsc#1111666).
- Revert 'tools lib traceevent: Remove unneeded qsort and uses memmove'
- rtlwifi: Fix a double free in _rtl_usb_tx_urb_setup() (bsc#1051510).
- rtnetlink: Fix memory(net_device) leak when ->newlink fails (git-fixes).
- s390/bpf: Maintain 8-byte stack alignment (bsc#1169194).
- s390/cio: avoid duplicated 'ADD' uevents (git-fixes).
- s390/cio: generate delayed uevent for vfio-ccw subchannels (git-fixes).
- s390/cpuinfo: fix wrong output when CPU0 is offline (git-fixes).
- s390/cpum_cf: Add new extended counters for IBM z15 (bsc#1169762 LTC#185291).
- s390/diag: fix display of diagnose call statistics (git-fixes).
- s390: fix syscall_get_error for compat processes (git-fixes).
- s390/ftrace: fix potential crashes when switching tracers (git-fixes).
- s390/gmap: return proper error code on ksm unsharing (git-fixes).
- s390/ism: fix error return code in ism_probe() (git-fixes).
- s390/pci: do not set affinity for floating irqs (git-fixes).
- s390/pci: Fix possible deadlock in recover_store() (bsc#1165183 LTC#184103).
- s390/pci: Recover handle in clp_set_pci_fn() (bsc#1165183 LTC#184103).
- s390/qdio: consistently restore the IRQ handler (git-fixes).
- s390/qdio: lock device while installing IRQ handler (git-fixes).
- s390/qdio: put thinint indicator after early error (git-fixes).
- s390/qdio: tear down thinint indicator after early error (git-fixes).
- s390/qeth: cancel RX reclaim work earlier (git-fixes).
- s390/qeth: do not return -ENOTSUPP to userspace (git-fixes).
- s390/qeth: do not warn for napi with 0 budget (git-fixes).
- s390/qeth: fix error handling for isolation mode cmds (git-fixes).
- s390/qeth: fix off-by-one in RX copybreak check (git-fixes).
- s390/qeth: fix promiscuous mode after reset (git-fixes).
- s390/qeth: fix qdio teardown after early init error (git-fixes).
- s390/qeth: handle error due to unsupported transport mode (git-fixes).
- s390/qeth: handle error when backing RX buffer (git-fixes).
- s390/qeth: lock the card while changing its hsuid (git-fixes).
- s390/qeth: support net namespaces for L3 devices (git-fixes).
- s390/time: Fix clk type in get_tod_clock (git-fixes).
- sch_choke: avoid potential panic in choke_reset() (networking-stable-20_05_12).
- sch_sfq: validate silly quantum values (networking-stable-20_05_12).
- scripts/decodecode: fix trapping instruction formatting (bsc#1065729).
- scripts/dtc: Remove redundant YYLOC global declaration (bsc#1160388).
- scripts/git_sort/git_sort.py: add bluetooth/bluetooth-next.git repository
- scsi: aacraid: fix a signedness bug (bsc#1174296).
- scsi: bnx2i: fix potential use after free (bsc#1171600).
- scsi: core: avoid repetitive logging of device offline messages (bsc#1145929).
- scsi: core: Handle drivers which set sg_tablesize to zero (bsc#1171601) This commit also required: > scsi: core: avoid preallocating big SGL for data
- scsi: core: kABI fix offline_already (bsc#1145929).
- scsi: core: save/restore command resid for error handling (bsc#1171602).
- scsi: core: scsi_trace: Use get_unaligned_be*() (bsc#1171604).
- scsi: core: try to get module before removing device (bsc#1171605).
- scsi: csiostor: Adjust indentation in csio_device_reset (bsc#1171606).
- scsi: csiostor: Do not enable IRQs too early (bsc#1171607).
- scsi: esas2r: unlock on error in esas2r_nvram_read_direct() (bsc#1171608).
- scsi: fnic: fix invalid stack access (bsc#1171609).
- scsi: fnic: fix msix interrupt allocation (bsc#1171610).
- scsi: hisi_sas: fix calls to dma_set_mask_and_coherent() (bsc#1174296).
- scsi: ibmvscsi: Do not send host info in adapter info MAD after LPM (bsc#1172759 ltc#184814).
- scsi: ibmvscsi: Fix WARN_ON during event pool release (bsc#1170791 ltc#185128).
- scsi: iscsi: Avoid potential deadlock in iscsi_if_rx func (bsc#1171611).
- scsi: iscsi: Fix a potential deadlock in the timeout handler (bsc#1171612).
- scsi: iscsi: qla4xxx: fix double free in probe (bsc#1171613).
- scsi: lpfc: Add an internal trace log buffer (bsc#1172687 bsc#1171530).
- scsi: lpfc: Add blk_io_poll support for latency improvment (bsc#1172687 bsc#1171530).
- scsi: lpfc: Add support to display if adapter dumps are available (bsc#1172687 bsc#1171530).
- scsi: lpfc: Allow applications to issue Common Set Features mailbox command (bsc#1172687 bsc#1171530).
- scsi: lpfc: Avoid another null dereference in lpfc_sli4_hba_unset() (bsc#1172687 bsc#1171530).
- scsi: lpfc: Change default queue allocation for reduced memory consumption (bsc#1164780).
- scsi: lpfc: fix: Coverity: lpfc_cmpl_els_rsp(): Null pointer dereferences (bsc#1171614).
- scsi: lpfc: Fix crash in target side cable pulls hitting WAIT_FOR_UNREG (bsc#1171615).
- scsi: lpfc: Fix inconsistent indenting (bsc#1158983).
- scsi: lpfc: Fix interrupt assignments when multiple vectors are supported on same CPU (bsc#1158983).
- scsi: lpfc: Fix kdump hang on PPC (bsc#1172687 bsc#1171530).
- scsi: lpfc: Fix language in 0373 message to reflect non-error message (bsc#1172687 bsc#1171530).
- scsi: lpfc: Fix less-than-zero comparison of unsigned value (bsc#1158983).
- scsi: lpfc: Fix lpfc_nodelist leak when processing unsolicited event (bsc#1164780).
- scsi: lpfc: Fix MDS Diagnostic Enablement definition (bsc#1164780).
- scsi: lpfc: Fix missing MDS functionality (bsc#1172687 bsc#1171530).
- scsi: lpfc: Fix negation of else clause in lpfc_prep_node_fc4type (bsc#1164780).
- scsi: lpfc: Fix noderef and address space warnings (bsc#1164780).
- scsi: lpfc: Fix NVMe rport deregister and registration during ADISC (bsc#1172687 bsc#1171530).
- scsi: lpfc: Fix oops due to overrun when reading SLI3 data (bsc#1172687 bsc#1171530).
- scsi: lpfc: Fix shost refcount mismatch when deleting vport (bsc#1172687 bsc#1171530).
- scsi: lpfc: Fix stack trace seen while setting rrq active (bsc#1172687 bsc#1171530).
- scsi: lpfc: Fix unused assignment in lpfc_sli4_bsg_link_diag_test (bsc#1172687 bsc#1171530).
- scsi: lpfc: Maintain atomic consistency of queue_claimed flag (bsc#1164780).
- scsi: lpfc: remove duplicate unloading checks (bsc#1164780).
- scsi: lpfc: Remove re-binding of nvme rport during registration (bsc#1164780).
- scsi: lpfc: Remove redundant initialization to variable rc (bsc#1164780).
- scsi: lpfc: Remove unnecessary lockdep_assert_held calls (bsc#1164780).
- scsi: lpfc: Update lpfc version to 12.8.0.1 (bsc#1164780).
- scsi: lpfc: Update lpfc version to 12.8.0.2 (bsc#1158983).
- scsi: megaraid_sas: Do not initiate OCR if controller is not in ready state (bsc#1171616).
- scsi: megaraid_sas: Fix a compilation warning (bsc#1174296).
- scsi: mpt3sas: Fix double free in attach error handling (bsc#1174296).
- scsi: qedf: Add port_id getter (bsc#1150660).
- scsi: qla2xxx: add ring buffer for tracing debug logs (bsc#1157169).
- scsi: qla2xxx: check UNLOADING before posting async work (bsc#1157169).
- scsi: qla2xxx: Delete all sessions before unregister local nvme port (bsc#1157169).
- scsi: qla2xxx: Do not log message when reading port speed via sysfs (bsc#1157169).
- scsi: qla2xxx: Fix a condition in qla2x00_find_all_fabric_devs() (bsc#1174296).
- scsi: qla2xxx: Fix hang when issuing nvme disconnect-all in NPIV (bsc#1157169).
- scsi: qla2xxx: Fix regression warnings (bsc#1157169).
- scsi: qla2xxx: Remove non functional code (bsc#1157169).
- scsi: qla2xxx: Set NVMe status code for failed NVMe FCP request (bsc#1158983).
- scsi: qla2xxx: set UNLOADING before waiting for session deletion (bsc#1157169).
- scsi: qla4xxx: Adjust indentation in qla4xxx_mem_free (bsc#1171617).
- scsi: qla4xxx: fix double free bug (bsc#1171618).
- scsi: sd: Clear sdkp->protection_type if disk is reformatted without PI (bsc#1171619).
- scsi: sg: add sg_remove_request in sg_common_write (bsc#1171620).
- scsi: tracing: Fix handling of TRANSFER LENGTH == 0 for READ(6) and WRITE(6) (bsc#1171621).
- scsi: ufs: change msleep to usleep_range (bsc#1171622).
- scsi: ufs: Clean up ufshcd_scale_clks() and clock scaling error out path (bsc#1171623).
- scsi: ufs: Fix ufshcd_hold() caused scheduling while atomic (bsc#1171624).
- scsi: ufs: Fix ufshcd_probe_hba() reture value in case ufshcd_scsi_add_wlus() fails (bsc#1171625).
- scsi: ufs: Recheck bkops level if bkops is disabled (bsc#1171626).
- scsi: zfcp: fix missing erp_lock in port recovery trigger for point-to-point (git-fixes).
- sctp: Do not add the shutdown timer if its already been added (networking-stable-20_05_27).
- sctp: fix possibly using a bad saddr with a given dst (networking-stable-20_04_02).
- sctp: fix refcount bug in sctp_wfree (networking-stable-20_04_02).
- sctp: move the format error check out of __sctp_sf_do_9_1_abort (networking-stable-20_03_01).
- sctp: Start shutdown on association restart if in SHUTDOWN-SENT state and socket is closed (networking-stable-20_05_27).
- selftests/powerpc: Fix build errors in powerpc ptrace selftests (boo#1124278).
- Separate one more kABI fixup from the functional change:
- seq_file: fix problem when seeking mid-record (bsc#1170125).
- serdev: ttyport: restore client ops on deregistration (bsc#1051510).
- serial: uartps: Move the spinlock after the read of the tx empty (git-fixes).
- sfc: detach from cb_page in efx_copy_channel() (networking-stable-20_03_14).
- signal/pid_namespace: Fix reboot_pid_ns to use send_sig not force_sig (bsc#1172185).
- slcan: not call free_netdev before rtnl_unlock in slcan_open (networking-stable-20_03_28).
- slip: make slhc_compress() more robust against malicious packets (networking-stable-20_03_14).
- smb3: Additional compression structures (bsc#1144333).
- smb3: Add new compression flags (bsc#1144333).
- smb3: change noisy error message to FYI (bsc#1144333).
- smb3: enable swap on SMB3 mounts (bsc#1144333).
- smb3: Minor cleanup of protocol definitions (bsc#1144333).
- smb3: remove overly noisy debug line in signing errors (bsc#1144333).
- smb3: smbdirect support can be configured by default (bsc#1144333).
- smb3: use SMB2_SIGNATURE_SIZE define (bsc#1144333).
- spi: bcm2835: Fix 3-wire mode if DMA is enabled (git-fixes).
- spi: bcm63xx-hsspi: Really keep pll clk enabled (bsc#1051510).
- spi: bcm-qspi: when tx/rx buffer is NULL set to 0 (bsc#1051510).
- spi: dw: Add SPI Rx-done wait method to DMA-based transfer (bsc#1051510).
- spi: dw: Add SPI Tx-done wait method to DMA-based transfer (bsc#1051510).
- spi: dw: use 'smp_mb()' to avoid sending spi data error (bsc#1051510).
- spi: dw: Zero DMA Tx and Rx configurations on stack (bsc#1051510).
- spi: fix initial SPI_SR value in spi-fsl-dspi (bsc#1111666).
- spi: fsl: do not map irq during probe (git-fixes).
- spi: fsl: use platform_get_irq() instead of of_irq_to_resource() (git-fixes).
- spi: pxa2xx: Add CS control clock quirk (bsc#1051510).
- spi: pxa2xx: Apply CS clk quirk to BXT (bsc#1111666).
- spi: qup: call spi_qup_pm_resume_runtime before suspending (bsc#1051510).
- spi: spidev: fix a race between spidev_release and spidev_remove (bsc#1111666).
- spi: spi-fsl-dspi: Replace interruptible wait queue with a simple completion (git-fixes).
- spi: spi-mem: Fix Dual/Quad modes on Octal-capable devices (bsc#1111666).
- spi: spi-s3c64xx: Fix system resume support (git-fixes).
- spi: spi-sun6i: sun6i_spi_transfer_one(): fix setting of clock rate (bsc#1111666).
- spi/zynqmp: remove entry that causes a cs glitch (bsc#1051510).
- staging: comedi: dt2815: fix writing hi byte of analog output (bsc#1051510).
- staging: comedi: Fix comedi_device refcnt leak in comedi_open (bsc#1051510).
- staging: comedi: verify array index is correct before using it (bsc#1111666).
- staging: iio: ad2s1210: Fix SPI reading (bsc#1051510).
- staging: rtl8188eu: Add ASUS USB-N10 Nano B1 to device table (bsc#1051510).
- staging: rtl8712: Fix IEEE80211_ADDBA_PARAM_BUF_SIZE_MASK (bsc#1051510).
- staging: sm750fb: add missing case while setting FB_VISUAL (bsc#1051510).
- staging: vt6656: Do not set RCR_MULTICAST or RCR_BROADCAST by default (git-fixes).
- staging: vt6656: Fix drivers TBTT timing counter (git-fixes).
- staging: vt6656: Fix pairwise key entry save (git-fixes).
- staging: vt6656: fix sign of rx_dbm to bb_pre_ed_rssi (bsc#1051510).
- staging: wlan-ng: fix ODEBUG bug in prism2sta_disconnect_usb (bsc#1051510).
- staging: wlan-ng: fix use-after-free Read in hfa384x_usbin_callback (bsc#1051510).
- SUNRPC: defer slow parts of rpc_free_client() to a workqueue (bsc#1168202).
- SUNRPC: expiry_time should be seconds not timeval (git-fixes).
- SUNRPC: Fix a potential buffer overflow in 'svc_print_xprts()' (git-fixes).
- SUNRPC: The TCP back channel mustn't disappear while requests are outstanding (bsc#1152624).
- supported.conf: Add br_netfilter to base (bsc#1169020).
- svcrdma: Fix double svc_rdma_send_ctxt_put() in an error path (bsc#1103992).
- svcrdma: Fix leak of transport addresses (git-fixes).
- svcrdma: Fix trace point use-after-free race (bsc#1103992 ).
- taskstats: fix data-race (bsc#1172188).
- tcp: cache line align MAX_TCP_HEADER (networking-stable-20_04_27).
- tcp: repair: fix TCP_QUEUE_SEQ implementation (networking-stable-20_03_28).
- team: add missing attribute validation for array index (networking-stable-20_03_14).
- team: add missing attribute validation for port ifindex (networking-stable-20_03_14).
- team: fix hang in team_mode_get() (networking-stable-20_04_27).
- tg3: driver sleeps indefinitely when EEH errors exceed eeh_max_freezes (bsc#1173284).
- thermal: devfreq_cooling: inline all stubs for CONFIG_DEVFREQ_THERMAL=n (bsc#1051510).
- timers: Add a function to start/reduce a timer (networking-stable-20_05_27).
- tools lib traceevent: Remove unneeded qsort and uses memmove instead (git-fixes).
- tpm: ibmvtpm: retry on H_CLOSED in tpm_ibmvtpm_send() (bsc#1065729).
- tpm_tis: extra chip->ops check on error path in tpm_tis_core_init (bsc#1111666).
- tpm_tis: Remove the HID IFX0102 (bsc#1111666).
- tpm/tpm_tis: Free IRQ if probing fails (bsc#1082555).
- tpm/tpm_tis: Free IRQ if probing fails (git-fixes).
- tracing: Add a vmalloc_sync_mappings() for safe measure (git-fixes).
- tracing: Disable trace_printk() on post poned tests (git-fixes).
- tracing: Fix event trigger to accept redundant spaces (git-fixes).
- tracing: Fix the race between registering 'snapshot' event trigger and triggering 'snapshot' operation (git-fixes).
- tty: evh_bytechan: Fix out of bounds accesses (bsc#1051510).
- tty: hvc_console, fix crashes on parallel open/close (git-fixes).
- tty: n_gsm: Fix bogus i++ in gsm_data_kick (bsc#1051510).
- tty: n_gsm: Fix SOF skipping (bsc#1051510).
- tty: n_gsm: Fix waking up upper tty layer when room available (bsc#1051510).
- tty: rocket, avoid OOB access (git-fixes).
- tty/serial: atmel: manage shutdown in case of RS485 or ISO7816 mode (bsc#1051510).
- tty: serial: imx: setup the correct sg entry for tx dma (bsc#1051510).
- tun: Do not put_page() for all negative return values from XDP program (bsc#1109837).
- tunnel: Propagate ECT(1) when decapsulating as recommended by RFC6040 (networking-stable-20_05_12).
- UAS: fix deadlock in error handling and PM flushing work (git-fixes).
- UAS: no use logging any details in case of ENODEV (git-fixes).
- ubifs: remove broken lazytime support (bsc#1173826).
- Update config files: Build w1 bus on arm64 (jsc#SLE-11048)
- USB: Add USB_QUIRK_DELAY_CTRL_MSG and USB_QUIRK_DELAY_INIT for Corsair K70 RGB RAPIDFIRE (git-fixes).
- usb: add USB_QUIRK_DELAY_INIT for Logitech C922 (git-fixes).
- USB: c67x00: fix use after free in c67x00_giveback_urb (bsc#1111666).
- USB: cdc-acm: restore capability check order (git-fixes).
- usb: chipidea: core: add wakeup support for extcon (bsc#1111666).
- USB: core: Fix misleading driver bug report (bsc#1051510).
- usb: dwc2: Fix shutdown callback in platform (bsc#1111666).
- usb: dwc2: gadget: move gadget resume after the core is in L0 state (bsc#1051510).
- USB: dwc3: do not set gadget->is_otg flag (git-fixes).
- USB: dwc3: gadget: Do link recovery for SS and SSP (git-fixes).
- usb: dwc3: gadget: introduce cancelled_list (git-fixes).
- usb: dwc3: gadget: never call ->complete() from ->ep_queue() (git-fixes).
- usb: dwc3: gadget: Properly handle ClearFeature(halt) (git-fixes).
- usb: dwc3: gadget: Properly handle failed kick_transfer (git-fixes).
- USB: early: Handle AMD's spec-compliant identifiers, too (git-fixes).
- USB: ehci: reopen solution for Synopsys HC bug (git-fixes).
- USB: f_fs: Clear OS Extended descriptor counts to zero in ffs_data_reset() (git-fixes).
- USB: gadget: audio: Fix a missing error return value in audio_bind() (git-fixes).
- USB: gadget: composite: Inform controller driver of self-powered (git-fixes).
- USB: gadget: f_fs: Fix use after free issue as part of queue failure (bsc#1051510).
- usb: gadget: fix potential double-free in m66592_probe (bsc#1111666).
- USB: gadget: legacy: fix error return code in cdc_bind() (git-fixes).
- USB: gadget: legacy: fix error return code in gncm_bind() (git-fixes).
- USB: gadget: legacy: fix redundant initialization warnings (bsc#1051510).
- usb: gadget: lpc32xx_udc: do not dereference ep pointer before null check (bsc#1051510).
- USB: gadget: net2272: Fix a memory leak in an error handling path in 'net2272_plat_probe()' (git-fixes).
- usb: gadget: udc: atmel: fix uninitialized read in debug printk (bsc#1111666).
- USB: gadget: udc: atmel: Fix vbus disconnect handling (git-fixes).
- USB: gadget: udc: atmel: Make some symbols static (git-fixes).
- usb: gadget: udc: atmel: remove outdated comment in usba_ep_disable() (bsc#1111666).
- USB: gadget: udc: bdc: Remove unnecessary NULL checks in bdc_req_complete (git-fixes).
- usb: gadget: udc: Potential Oops in error handling code (bsc#1111666).
- USB: gadget: udc: s3c2410_udc: Remove pointless NULL check in s3c2410_udc_nuke (bsc#1051510).
- usb: host: ehci-exynos: Fix error check in exynos_ehci_probe() (bsc#1111666).
- USB: host: ehci-mxc: Add error handling in ehci_mxc_drv_probe() (bsc#1051510).
- USB: host: xhci-plat: keep runtime active when removing host (git-fixes).
- USB: hub: Fix handling of connect changes during sleep (git-fixes).
- USB: musb: fix crash with highmen PIO and usbmon (bsc#1051510).
- usb: musb: Fix runtime PM imbalance on error (bsc#1051510).
- usb: musb: start session in resume for host port (bsc#1051510).
- USBnet: silence an unnecessary warning (bsc#1170770).
- usbnet: smsc95xx: Fix use-after-free after removal (bsc#1111666).
- USB: ohci-sm501: Add missed iounmap() in remove (bsc#1111666).
- USB: serial: ch341: add new Product ID for CH340 (bsc#1111666).
- USB: serial: cypress_m8: enable Simply Automated UPB PIM (bsc#1111666).
- USB: serial: garmin_gps: add sanity checking for data length (git-fixes).
- USB: serial: io_edgeport: fix slab-out-of-bounds read in edge_interrupt_callback (bsc#1051510).
- USB: serial: iuu_phoenix: fix memory corruption (bsc#1111666).
- USB: serial: option: add BroadMobi BM806U (git-fixes).
- USB: serial: option: add GosunCn GM500 series (bsc#1111666).
- USB: serial: option: add Quectel EG95 LTE modem (bsc#1111666).
- USB: serial: option: add support for ASKEY WWHC050 (git-fixes).
- USB: serial: option: add Telit LE910C1-EUX compositions (bsc#1051510).
- USB: serial: option: add Wistron Neweb D19Q1 (git-fixes).
- USB: serial: qcserial: add DW5816e QDL support (bsc#1051510).
- USB: serial: qcserial: Add DW5816e support (git-fixes).
- USB: serial: usb_wwan: do not resubmit rx urb on fatal errors (bsc#1051510).
- USB: serial: usb_wwan: do not resubmit rx urb on fatal errors (git-fixes).
- USB: sisusbvga: Change port variable from signed to unsigned (git-fixes).
- usb-storage: Add unusual_devs entry for JMicron JMS566 (git-fixes).
- USB: uas: add quirk for LaCie 2Big Quadra (git-fixes).
- USB: xhci: Fix NULL pointer dereference when enqueuing trbs from urb sg list (git-fixes).
- vfio/pci: Fix SR-IOV VF handling with MMIO blocking (bsc#1174123).
- vfs: Fix EOVERFLOW testing in put_compat_statfs64 (bnc#1151927 5.3.6).
- video: fbdev: sis: Remove unnecessary parentheses and commented code (bsc#1114279)
- video: fbdev: w100fb: Fix a potential double free (bsc#1051510).
- virtio-blk: handle block_device_operations callbacks after hot unplug (git fixes (block drivers)).
- virtio: virtio_console: add missing MODULE_DEVICE_TABLE() for rproc serial (git-fixes).
- vmxnet3: add geneve and vxlan tunnel offload support (bsc#1172484).
- vmxnet3: add support to get/set rx flow hash (bsc#1172484).
- vmxnet3: allow rx flow hash ops only when rss is enabled (bsc#1172484).
- vmxnet3: avoid format strint overflow warning (bsc#1172484).
- vmxnet3: prepare for version 4 changes (bsc#1172484).
- vmxnet3: Remove always false conditional statement (bsc#1172484).
- vmxnet3: remove redundant initialization of pointer 'rq' (bsc#1172484).
- vmxnet3: remove unused flag 'rxcsum' from struct vmxnet3_adapter (bsc#1172484).
- vmxnet3: Replace msleep(1) with usleep_range() (bsc#1172484).
- vmxnet3: update to version 4 (bsc#1172484).
- vmxnet3: use correct hdr reference when packet is encapsulated (bsc#1172484).
- vrf: Check skb for XFRM_TRANSFORMED flag (networking-stable-20_04_27).
- vsock: fix timeout in vsock_accept() (networking-stable-20_06_07).
- vt: ioctl, switch VT_IS_IN_USE and VT_BUSY to inlines (git-fixes).
- vt: selection, introduce vc_is_sel (git-fixes).
- vt: vt_ioctl: fix race in VT_RESIZEX (git-fixes).
- vt: vt_ioctl: fix use-after-free in vt_in_use() (git-fixes).
- vt: vt_ioctl: fix VT_DISALLOCATE freeing in-use virtual console (git-fixes).
- vxlan: Avoid infinite loop when suppressing NS messages with invalid options (git-fixes).
- vxlan: check return value of gro_cells_init() (networking-stable-20_03_28).
- w1: Add subsystem kernel public interface (jsc#SLE-11048).
- w1: Fix slave count on 1-Wire bus (resend) (jsc#SLE-11048).
- w1: keep balance of mutex locks and refcnts (jsc#SLE-11048).
- w1: omap-hdq: cleanup to add missing newline for some dev_dbg (bsc#1051510).
- w1: use put_device() if device_register() fail (jsc#SLE-11048).
- watchdog: reset last_hw_keepalive time at start (git-fixes).
- watchdog: sp805: fix restart handler (bsc#1111666).
- wcn36xx: Fix error handling path in 'wcn36xx_probe()' (bsc#1051510).
- wil6210: add general initialization/size checks (bsc#1111666).
- wil6210: check rx_buff_mgmt before accessing it (bsc#1111666).
- wil6210: ignore HALP ICR if already handled (bsc#1111666).
- wil6210: make sure Rx ring sizes are correlated (git-fixes).
- wil6210: remove reset file from debugfs (git-fixes).
- wimax/i2400m: Fix potential urb refcnt leak (bsc#1051510).
- work around mvfs bug (bsc#1162063).
- workqueue: do not use wq_select_unbound_cpu() for bound works (bsc#1172130).
- x86/apic: Install an empty physflat_init_apic_ldr (bsc#1163309).
- x86/cpu/amd: Make erratum #1054 a legacy erratum (bsc#1114279).
- x86/entry/64: Fix unwind hints in kernel exit path (bsc#1058115).
- x86/entry/64: Fix unwind hints in register clearing code (bsc#1058115).
- x86/entry/64: Fix unwind hints in rewind_stack_do_exit() (bsc#1058115).
- x86/entry/64: Fix unwind hints in __switch_to_asm() (bsc#1058115).
- x86/events/intel/ds: Add PERF_SAMPLE_PERIOD into PEBS_FREERUNNING_FLAGS (git-fixes).
- x86: Fix early boot crash on gcc-10, third try (bsc#1114279).
- x86/hyperv: Allow guests to enable InvariantTSC (bsc#1170621, bsc#1170620).
- x86/Hyper-V: Free hv_panic_page when fail to register kmsg dump (bsc#1170617, bsc#1170618).
- x86/Hyper-V: Report crash data in die() when panic_on_oops is set (bsc#1170617, bsc#1170618).
- x86/Hyper-V: Report crash register data or kmsg before running crash kernel (bsc#1170617, bsc#1170618).
- x86/Hyper-V: Report crash register data when sysctl_record_panic_msg is not set (bsc#1170617, bsc#1170618).
- x86: hyperv: report value of misc_features (git fixes).
- x86/Hyper-V: Trigger crash enlightenment only once during system crash (bsc#1170617, bsc#1170618).
- x86/Hyper-V: Unload vmbus channel in hv panic callback (bsc#1170617, bsc#1170618).
- x86/kprobes: Avoid kretprobe recursion bug (bsc#1114279).
- x86/{mce,mm}: Unmap the entire page if the whole page is affected and poisoned (bsc#1172257).
- x86/reboot/quirks: Add MacBook6,1 reboot quirk (bsc#1114279).
- x86/resctrl: Fix invalid attempt at removing the default resource group (git-fixes).
- x86/resctrl: Preserve CDP enable over CPU hotplug (bsc#1114279).
- x86/unwind/orc: Do not skip the first frame for inactive tasks (bsc#1058115).
- x86/unwind/orc: Fix error handling in __unwind_start() (bsc#1058115).
- x86/unwind/orc: Fix error path for bad ORC entry type (bsc#1058115).
- x86/unwind/orc: Fix unwind_get_return_address_ptr() for inactive tasks (bsc#1058115).
- x86/unwind/orc: Prevent unwinding before ORC initialization (bsc#1058115).
- x86/unwind: Prevent false warnings for non-current tasks (bsc#1058115).
- x86/xen: fix booting 32-bit pv guest (bsc#1071995).
- x86/xen: Make the boot CPU idle task reliable (bsc#1071995).
- x86/xen: Make the secondary CPU idle tasks reliable (bsc#1071995).
- xen/blkfront: fix memory allocation flags in blkfront_setup_indirect() (bsc#1168486).
- xen/pci: reserve MCFG areas earlier (bsc#1170145).
- xfrm: Always set XFRM_TRANSFORMED in xfrm{4,6}_output_finish (networking-stable-20_04_27).
- xfrm: fix error in comment (git fixes).
- xfs: clear PF_MEMALLOC before exiting xfsaild thread (git-fixes).
- xfs: Correctly invert xfs_buftarg LRU isolation logic (git-fixes).
- xfs: do not ever return a stale pointer from __xfs_dir3_free_read (git-fixes).
- xhci: Fix incorrect EP_STATE_MASK (git-fixes).
- xprtrdma: Fix completion wait during device removal (git-fixes).
Patchnames
SUSE-2020-2487,SUSE-SLE-Module-RT-15-SP1-2020-2487
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "The SUSE Linux Enterprise 15 SP1 RT kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2020-10135: Legacy pairing and secure-connections pairing authentication in Bluetooth BR/EDR Core Specification v5.2 and earlier may have allowed an unauthenticated user to complete authentication without pairing credentials via adjacent access. An unauthenticated, adjacent attacker could impersonate a Bluetooth BR/EDR master or slave to pair with a previously paired remote device to successfully complete the authentication procedure without knowing the link key (bnc#1171988).\n- CVE-2020-0305: In cdev_get of char_dev.c, there is a possible use-after-free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation (bnc#1174462).\n- CVE-2019-20908: An issue was discovered in drivers/firmware/efi/efi.c where incorrect access permissions for the efivar_ssdt ACPI variable could be used by attackers to bypass lockdown or secure boot restrictions, aka CID-1957a85b0032 (bnc#1173567).\n- CVE-2020-10781: zram sysfs resource consumption was fixed (bnc#1173074).\n- CVE-2020-15780: An issue was discovered in drivers/acpi/acpi_configfs.c where injection of malicious ACPI tables via configfs could be used by attackers to bypass lockdown and secure boot restrictions, aka CID-75b0cea7bf30 (bnc#1173573).\n- CVE-2020-15393: usbtest_disconnect in drivers/usb/misc/usbtest.c had a memory leak, aka CID-28ebeb8db770 (bnc#1173514).\n- CVE-2020-12771: btree_gc_coalesce in drivers/md/bcache/btree.c had a deadlock if a coalescing operation fails (bnc#1171732).\n- CVE-2020-12888: The VFIO PCI driver mishandled attempts to access disabled memory space (bnc#1171868).\n- CVE-2020-10769: A buffer over-read flaw was found in crypto_authenc_extractkeys in crypto/authenc.c in the IPsec Cryptographic algorithm\u0027s module, authenc. When a payload longer than 4 bytes, and is not following 4-byte alignment boundary guidelines, it causes a buffer over-read threat, leading to a system crash. This flaw allowed a local attacker with user privileges to cause a denial of service (bnc#1173265).\n- CVE-2020-10773: A kernel stack information leak on s390/s390x was fixed (bnc#1172999).\n- CVE-2020-14416: A race condition in tty-\u003edisc_data handling in the slip and slcan line discipline could lead to a use-after-free, aka CID-0ace17d56824. This affects drivers/net/slip/slip.c and drivers/net/can/slcan.c (bnc#1162002).\n- CVE-2020-10766: Fixed an issue which allowed an attacker with a local account to disable SSBD protection (bnc#1172781).\n- CVE-2020-10767: Fixed an issue where Indirect Branch Prediction Barrier was disabled in certain circumstances, leaving the system open to a spectre v2 style attack (bnc#1172782).\n- CVE-2020-10768: Fixed an issue with the prctl() function, where indirect branch speculation could be enabled even though it was diabled before (bnc#1172783).\n- CVE-2020-13974: Fixed a integer overflow in drivers/tty/vt/keyboard.c, if k_ascii is called several times in a row (bnc#1172775).\n- CVE-2020-0543: Fixed a side channel attack against special registers which could have resulted in leaking of read values to cores other than the one which called it.\n This attack is known as Special Register Buffer Data Sampling (SRBDS) or \u0027CrossTalk\u0027 (bsc#1154824).\n- CVE-2020-13143: Fixed an out-of-bounds read in gadget_dev_desc_UDC_store in drivers/usb/gadget/configfs.c (bsc#1171982).\n- CVE-2020-12769: Fixed an issue which could have allowed attackers to cause a panic via concurrent calls to dw_spi_irq and dw_spi_transfer_one (bsc#1171983).\n- CVE-2020-12659: Fixed an out-of-bounds write (by a user with the CAP_NET_ADMIN capability) due to improper headroom validation (bsc#1171214).\n- CVE-2020-12657: An a use-after-free in block/bfq-iosched.c (bsc#1171205).\n- CVE-2020-12656: Fixed an improper handling of certain domain_release calls leadingch could have led to a memory leak (bsc#1171219).\n- CVE-2020-12655: Fixed an issue which could have allowed attackers to trigger a sync of excessive duration via an XFS v5 image with crafted metadata (bsc#1171217).\n- CVE-2020-12654: Fixed an issue in he wifi driver which could have allowed a remote AP to trigger a heap-based buffer overflow (bsc#1171202).\n- CVE-2020-12653: Fixed an issue in the wifi driver which could have allowed local users to gain privileges or cause a denial of service (bsc#1171195).\n- CVE-2020-12652: Fixed an issue which could have allowed local users to hold an incorrect lock during the ioctl operation and trigger a race condition (bsc#1171218).\n- CVE-2020-12464: Fixed a use-after-free due to a transfer without a reference (bsc#1170901).\n- CVE-2020-12114: Fixed a pivot_root race condition which could have allowed local users to cause a denial of service (panic) by corrupting a mountpoint reference counter (bsc#1171098).\n- CVE-2020-11669: Fixed an issue where arch/powerpc/kernel/idle_book3s.S did not have save/restore functionality for PNV_POWERSAVE_AMR, PNV_POWERSAVE_UAMOR, and PNV_POWERSAVE_AMOR (bnc#1169390).\n- CVE-2020-10757: Fixed an issue where remaping hugepage DAX to anon mmap could have caused user PTE access (bsc#1172317).\n- CVE-2020-10751: Fixed an improper implementation in SELinux LSM hook where it was assumed that an skb would only contain a single netlink message (bsc#1171189).\n- CVE-2020-10732: Fixed kernel data leak in userspace coredumps due to uninitialized data (bsc#1171220).\n- CVE-2020-10720: Fixed a use-after-free read in napi_gro_frags() (bsc#1170778).\n- CVE-2020-10711: Fixed a null pointer dereference in SELinux subsystem which could have allowed a remote network user to crash the kernel resulting in a denial of service (bsc#1171191).\n- CVE-2020-10690: Fixed the race between the release of ptp_clock and cdev (bsc#1170056).\n- CVE-2019-9455: Fixed a pointer leak due to a WARN_ON statement in a video driver. This could lead to local information disclosure with System execution privileges needed (bsc#1170345).\n- CVE-2019-20812: Fixed an issue in prb_calc_retire_blk_tmo() which could have resulted in a denial of service (bsc#1172453).\n- CVE-2019-20806: Fixed a null pointer dereference which may had lead to denial of service (bsc#1172199).\n- CVE-2019-19462: Fixed an issue which could have allowed local user to cause denial of service (bsc#1158265).\n- CVE-2019-20810: go7007_snd_init in drivers/media/usb/go7007/snd-go7007.c did not call snd_card_free for a failure path, which caused a memory leak, aka CID-9453264ef586 (bnc#1172458).\n- CVE-2018-1000199: Fixed a potential local code execution via ptrace (bsc#1089895).\n\nThe following non-security bugs were fixed:\n\n- ACPI: CPPC: Fix reference count leak in acpi_cppc_processor_probe() (bsc#1051510).\n- ACPI: GED: add support for _Exx / _Lxx handler methods (bsc#1111666).\n- ACPI: GED: use correct trigger type field in _Exx / _Lxx handling (bsc#1111666).\n- ACPI: NFIT: Fix unlock on error in scrub_show() (bsc#1171753).\n- ACPI: PM: Avoid using power resources if there are none for D0 (bsc#1051510).\n- ACPI: sysfs: Fix pm_profile_attr type (bsc#1111666).\n- ACPI: sysfs: Fix reference count leak in acpi_sysfs_add_hotplug_profile() (bsc#1051510).\n- ACPI: video: Use native backlight on Acer Aspire 5783z (bsc#1111666).\n- ACPI: video: Use native backlight on Acer TravelMate 5735Z (bsc#1111666).\n- acpi/x86: ignore unspecified bit positions in the ACPI global lock field (bsc#1051510).\n- Add br_netfilter to kernel-default-base (bsc#1169020)\n- Add commit for git-fix that\u0027s not a fix This commit cleans up debug code but does not fix anything, and it relies on a new kernel function that isn\u0027t yet in this version of SLE.\n- agp/intel: Reinforce the barrier after GTT updates (bsc#1051510).\n- ALSA: ctxfi: Remove unnecessary cast in kfree (bsc#1051510).\n- ALSA: doc: Document PC Beep Hidden Register on Realtek ALC256 (bsc#1051510).\n- ALSA: dummy: Fix PCM format loop in proc output (bsc#1111666).\n- ALSA: es1688: Add the missed snd_card_free() (bsc#1051510).\n- ALSA: hda: Add driver blacklist (bsc#1051510).\n- ALSA: hda: Add ElkhartLake HDMI codec vid (bsc#1111666).\n- ALSA: hda: add sienna_cichlid audio asic id for sienna_cichlid up (bsc#1111666).\n- ALSA: hda: Always use jackpoll helper for jack update after resume (bsc#1051510).\n- ALSA: hda: call runtime_allow() for all hda controllers (bsc#1051510).\n- ALSA: hda: Do not release card at firmware loading error (bsc#1051510).\n- ALSA: hda: Explicitly permit using autosuspend if runtime PM is supported (bsc#1051510).\n- ALSA: hda: Fix potential access overflow in beep helper (bsc#1051510).\n- ALSA: hda/hdmi - enable runtime pm for newer AMD display audio (bsc#1111666).\n- ALSA: hda/hdmi: fix race in monitor detection during probe (bsc#1051510).\n- ALSA: hda/hdmi: fix without unlocked before return (bsc#1051510).\n- ALSA: hda: Honor PM disablement in PM freeze and thaw_noirq ops (bsc#1051510).\n- ALSA: hda: Keep the controller initialization even if no codecs found (bsc#1051510).\n- ALSA: hda - let hs_mic be picked ahead of hp_mic (bsc#1111666).\n- ALSA: hda: Match both PCI ID and SSID for driver blacklist (bsc#1111666).\n- ALSA: hda/realtek - Add a model for Thinkpad T570 without DAC workaround (bsc#1172017).\n- ALSA: hda/realtek - add a pintbl quirk for several Lenovo machines (bsc#1111666).\n- ALSA: hda/realtek - Add COEF workaround for ASUS ZenBook UX431DA (git-fixes).\n- ALSA: hda/realtek - Add HP new mute led supported for ALC236 (git-fixes).\n- ALSA: hda/realtek - Add LED class support for micmute LED (bsc#1111666).\n- ALSA: hda/realtek - Add more fixup entries for Clevo machines (git-fixes).\n- ALSA: hda/realtek - Add new codec supported for ALC245 (bsc#1051510).\n- ALSA: hda/realtek - Add new codec supported for ALC287 (git-fixes).\n- ALSA: hda/realtek: Add quirk for Samsung Notebook (git-fixes).\n- ALSA: hda/realtek - Add supported new mute Led for HP (git-fixes).\n- ALSA: hda/realtek - Enable headset mic of ASUS GL503VM with ALC295 (git-fixes).\n- ALSA: hda/realtek - Enable headset mic of ASUS UX550GE with ALC295 (git-fixes).\n- ALSA: hda/realtek: Enable headset mic of ASUS UX581LV with ALC295 (git-fixes).\n- ALSA: hda/realtek - Enable micmute LED on and HP system (bsc#1111666).\n- ALSA: hda/realtek - Enable Speaker for ASUS UX533 and UX534 (bsc#1111666).\n- ALSA: hda/realtek - Enable the headset mic on Asus FX505DT (bsc#1051510).\n- ALSA: hda/realtek - Fix S3 pop noise on Dell Wyse (git-fixes).\n- ALSA: hda/realtek - Fix silent output on Gigabyte X570 Aorus Xtreme (bsc#1111666).\n- ALSA: hda/realtek - Fix unexpected init_amp override (bsc#1051510).\n- ALSA: hda/realtek - Fix unused variable warning w/o CONFIG_LEDS_TRIGGER_AUDIO (bsc#1111666).\n- ALSA: hda/realtek - Introduce polarity for micmute LED GPIO (bsc#1111666).\n- ALSA: hda/realtek - Limit int mic boost for Thinkpad T530 (git-fixes bsc#1171293).\n- ALSA: hda/realtek - Two front mics on a Lenovo ThinkCenter (bsc#1051510).\n- ALSA: hda: Release resources at error in delayed probe (bsc#1051510).\n- ALSA: hda: Remove ASUS ROG Zenith from the blacklist (bsc#1051510).\n- ALSA: hda: Skip controller resume if not needed (bsc#1051510).\n- ALSA: hwdep: fix a left shifting 1 by 31 UB bug (git-fixes).\n- ALSA: ice1724: Fix invalid access for enumerated ctl items (bsc#1051510).\n- ALSA: iec1712: Initialize STDSP24 properly when using the model=staudio option (git-fixes).\n- ALSA: lx6464es - add support for LX6464ESe pci express variant (bsc#1111666).\n- ALSA: opl3: fix infoleak in opl3 (bsc#1111666).\n- ALSA: opti9xx: shut up gcc-10 range warning (bsc#1051510).\n- ALSA: pcm: disallow linking stream to itself (bsc#1111666).\n- ALSA: pcm: fix incorrect hw_base increase (git-fixes).\n- ALSA: pcm: oss: Fix regression by buffer overflow fix (bsc#1051510).\n- ALSA: pcm: oss: Place the plugin buffer overflow checks correctly (bsc#1170522).\n- ALSA: rawmidi: Fix racy buffer resize under concurrent accesses (git-fixes).\n- ALSA: usb-audio: Add connector notifier delegation (bsc#1051510).\n- ALSA: usb-audio: Add control message quirk delay for Kingston HyperX headset (git-fixes).\n- ALSA: usb-audio: Add duplex sound support for USB devices using implicit feedback (bsc#1111666).\n- ALSA: usb-audio: add mapping for ASRock TRX40 Creator (git-fixes).\n- ALSA: usb-audio: Add mixer workaround for TRX40 and co (bsc#1051510).\n- ALSA: usb-audio: Add Pioneer DJ DJM-900NXS2 support (bsc#1111666).\n- ALSA: usb-audio: Add quirk for Focusrite Scarlett 2i2 (bsc#1051510).\n- ALSA: usb-audio: add quirk for MacroSilicon MS2109 (bsc#1111666).\n- ALSA: usb-audio: Add static mapping table for ALC1220-VB-based mobos (bsc#1051510).\n- ALSA: usb-audio: Add vendor, product and profile name for HP Thunderbolt Dock (bsc#1111666).\n- ALSA: usb-audio: Apply async workaround for Scarlett 2i4 2nd gen (bsc#1051510).\n- ALSA: usb-audio: Check mapping at creating connector controls, too (bsc#1051510).\n- ALSA: usb-audio: Clean up quirk entries with macros (bsc#1111666).\n- ALSA: usb-audio: Correct a typo of NuPrime DAC-10 USB ID (bsc#1051510).\n- ALSA: usb-audio: Do not create jack controls for PCM terminals (bsc#1051510).\n- ALSA: usb-audio: Do not override ignore_ctl_error value from the map (bsc#1051510).\n- ALSA: usb-audio: Filter error from connector kctl ops, too (bsc#1051510).\n- ALSA: usb-audio: Fix inconsistent card PM state after resume (bsc#1111666).\n- ALSA: usb-audio: Fix packet size calculation (bsc#1111666).\n- ALSA: usb-audio: Fix racy list management in output queue (bsc#1111666).\n- ALSA: usb-audio: Fix usb audio refcnt leak when getting spdif (bsc#1051510).\n- ALSA: usb-audio: Improve frames size computation (bsc#1111666).\n- ALSA: usb-audio: Manage auto-pm of all bundled interfaces (bsc#1111666).\n- ALSA: usb-audio: mixer: volume quirk for ESS Technology Asus USB DAC (git-fixes).\n- ALSA: usb-audio: Quirks for Gigabyte TRX40 Aorus Master onboard audio (git-fixes).\n- ALSA: usb-audio: Use the new macro for HP Dock rename quirks (bsc#1111666).\n- ALSA: usx2y: Fix potential NULL dereference (bsc#1051510).\n- amdgpu: a NULL -\u003emm does not mean a thread is a kthread (git-fixes).\n- arm64: map FDT as RW for early_init_dt_scan() (jsc#SLE-12423).\n- ASoC: codecs: hdac_hdmi: Fix incorrect use of list_for_each_entry (bsc#1051510).\n- ASoC: dapm: connect virtual mux with default value (bsc#1051510).\n- ASoC: dapm: fixup dapm kcontrol widget (bsc#1051510).\n- ASoC: dpcm: allow start or stop during pause for backend (bsc#1051510).\n- ASoC: fix regwmask (bsc#1051510).\n- ASoC: Intel: atom: Take the drv-\u003elock mutex before calling sst_send_slot_map() (bsc#1051510).\n- ASoC: msm8916-wcd-digital: Reset RX interpolation path after use (bsc#1051510).\n- ASoC: samsung: Prevent clk_get_rate() calls in atomic context (bsc#1111666).\n- ASoC: topology: Check return value of pcm_new_ver (bsc#1051510).\n- ASoC: topology: use name_prefix for new kcontrol (bsc#1051510).\n- ath9k: Fix general protection fault in ath9k_hif_usb_rx_cb (bsc#1111666).\n- ath9k: Fix use-after-free Read in ath9k_wmi_ctrl_rx (bsc#1111666).\n- ath9k: Fix use-after-free Write in ath9k_htc_rx_msg (bsc#1111666).\n- ath9x: Fix stack-out-of-bounds Write in ath9k_hif_usb_rx_cb (bsc#1111666).\n- ax25: fix setsockopt(SO_BINDTODEVICE) (networking-stable-20_05_27).\n- b43: Fix connection problem with WPA3 (bsc#1111666).\n- b43legacy: Fix case where channel status is corrupted (bsc#1051510).\n- b43_legacy: Fix connection problem with WPA3 (bsc#1111666).\n- batman-adv: Avoid spurious warnings from bat_v neigh_cmp implementation (bsc#1051510).\n- batman-adv: Do not schedule OGM for disabled interface (bsc#1051510).\n- batman-adv: fix batadv_nc_random_weight_tq (git-fixes).\n- batman-adv: Fix refcnt leak in batadv_show_throughput_override (git-fixes).\n- batman-adv: Fix refcnt leak in batadv_store_throughput_override (git-fixes).\n- batman-adv: Fix refcnt leak in batadv_v_ogm_process (git-fixes).\n- batman-adv: prevent TT request storms by not sending inconsistent TT TLVLs (bsc#1051510).\n- bcache: avoid unnecessary btree nodes flushing in btree_flush_write() (git fixes (block drivers)).\n- bcache: Fix an error code in bch_dump_read() (git fixes (block drivers)).\n- bcache: fix incorrect data type usage in btree_flush_write() (git fixes (block drivers)).\n- bcache: Revert \u0027bcache: shrink btree node cache after bch_btree_check()\u0027 (git fixes (block drivers)).\n- be2net: fix link failure after ethtool offline test (git-fixes).\n- blk-mq: honor IO scheduler for multiqueue devices (bsc#1165478).\n- blk-mq: simplify blk_mq_make_request() (bsc#1165478).\n- block, bfq: fix use-after-free in bfq_idle_slice_timer_body (bsc#1168760).\n- block/drbd: delete invalid function drbd_md_mark_dirty_ (bsc#1171527).\n- block: drbd: remove a stray unlock in __drbd_send_protocol() (bsc#1171599).\n- block: fix busy device checking in blk_drop_partitions again (bsc#1171948).\n- block: fix busy device checking in blk_drop_partitions (bsc#1171948).\n- block: fix memleak of bio integrity data (git fixes (block drivers)).\n- block: keep bdi-\u003eio_pages in sync with max_sectors_kb for stacked devices (bsc#1168762).\n- block: nr_sects_write(): Disable preemption on seqcount write (bsc#1173818).\n- block: remove QUEUE_FLAG_STACKABLE (git fixes (block drivers)).\n- block: remove the bd_openers checks in blk_drop_partitions (bsc#1171948).\n- block: sed-opal: fix sparse warning: convert __be64 data (git fixes (block drivers)).\n- Bluetooth: Add SCO fallback for invalid LMP parameters error (bsc#1111666).\n- Bluetooth: RFCOMM: fix ODEBUG bug in rfcomm_dev_ioctl (bsc#1051510).\n- bnxt_en: Fix AER reset logic on 57500 chips (git-fixes).\n- bnxt_en: Fix ethtool selftest crash under error conditions (git-fixes).\n- bnxt_en: Fix handling FRAG_ERR when NVM_INSTALL_UPDATE cmd fails (git-fixes).\n- bnxt_en: Fix ipv6 RFS filter matching logic (git-fixes).\n- bnxt_en: fix memory leaks in bnxt_dcbnl_ieee_getets() (networking-stable-20_03_28).\n- bnxt_en: fix NULL dereference in case SR-IOV configuration fails (git-fixes).\n- bnxt_en: Fix VF anti-spoof filter setup (networking-stable-20_05_12).\n- bnxt_en: Fix VLAN acceleration handling in bnxt_fix_features() (networking-stable-20_05_12).\n- bnxt_en: Improve AER slot reset (networking-stable-20_05_12).\n- bnxt_en: Reduce BNXT_MSIX_VEC_MAX value to supported CQs per PF (bsc#1104745).\n- bnxt_en: reinitialize IRQs when MTU is modified (networking-stable-20_03_14).\n- bnxt_en: Return error if bnxt_alloc_ctx_mem() fails (bsc#1104745 ).\n- bnxt_en: Return error when allocating zero size context memory (bsc#1104745).\n- bonding/alb: make sure arp header is pulled before accessing it (networking-stable-20_03_14).\n- bpf: Fix sk_psock refcnt leak when receiving message (bsc#1083647).\n- bpf: Forbid XADD on spilled pointers for unprivileged users (bsc#1083647).\n- brcmfmac: abort and release host after error (bsc#1051510).\n- brcmfmac: fix wrong location to get firmware feature (bsc#1111666).\n- brcmfmac: Transform compatible string for FW loading (bsc#1169771).\n- btrfs: add assertions for tree == inode-\u003eio_tree to extent IO helpers (bsc#1174438).\n- btrfs: add new helper btrfs_lock_and_flush_ordered_range (bsc#1174438).\n- btrfs: Always use a cached extent_state in btrfs_lock_and_flush_ordered_range (bsc#1174438).\n- btrfs: do not zero f_bavail if we have available space (bsc#1168081).\n- btrfs: do not zero f_bavail if we have available space (bsc#1168081).\n- btrfs: drop argument tree from btrfs_lock_and_flush_ordered_range (bsc#1174438).\n- Btrfs: fix deadlock with memory reclaim during scrub (bsc#1172127).\n- btrfs: fix extent_state leak in btrfs_lock_and_flush_ordered_range (bsc#1174438).\n- btrfs: fix failure of RWF_NOWAIT write into prealloc extent beyond eof (bsc#1174438).\n- btrfs: fix hang on snapshot creation after RWF_NOWAIT write (bsc#1174438).\n- btrfs: fix log context list corruption after rename whiteout error (bsc#1172342).\n- btrfs: fix partial loss of prealloc extent past i_size after fsync (bsc#1172343).\n- btrfs: fix RWF_NOWAIT write not failling when we need to cow (bsc#1174438).\n- btrfs: fix RWF_NOWAIT writes blocking on extent locks and waiting for IO (bsc#1174438).\n- btrfs: qgroup: Fix a bug that prevents qgroup to be re-enabled after disable (bsc#1172247).\n- btrfs: relocation: add error injection points for cancelling balance (bsc#1171417).\n- btrfs: relocation: Check cancel request after each data page read (bsc#1171417).\n- btrfs: relocation: Check cancel request after each extent found (bsc#1171417).\n- btrfs: relocation: Clear the DEAD_RELOC_TREE bit for orphan roots to prevent runaway balance (bsc#1171417).\n- btrfs: relocation: Fix reloc root leakage and the NULL pointer reference caused by the leakage (bsc#1171417).\n- btrfs: relocation: Work around dead relocation stage loop (bsc#1171417).\n- btrfs: reloc: clear DEAD_RELOC_TREE bit for orphan roots to prevent runaway balance (bsc#1171417 bsc#1160947 bsc#1172366).\n- btrfs: reloc: fix reloc root leak and NULL pointer dereference (bsc#1171417 bsc#1160947 bsc#1172366).\n- btrfs: Return EAGAIN if we can\u0027t start no snpashot write in check_can_nocow (bsc#1174438).\n- Btrfs: setup a nofs context for memory allocation at btrfs_create_tree() (bsc#1172127).\n- Btrfs: setup a nofs context for memory allocation at __btrfs_set_acl (bsc#1172127).\n- btrfs: use correct count in btrfs_file_write_iter() (bsc#1174438).\n- btrfs: Use newly introduced btrfs_lock_and_flush_ordered_range (bsc#1174438).\n- Btrfs: use nofs context when initializing security xattrs to avoid deadlock (bsc#1172127).\n- btrfs: volumes: Remove ENOSPC-prone btrfs_can_relocate() (bsc#1171124).\n- bus: sunxi-rsb: Return correct data when mixing 16-bit and 8-bit reads (bsc#1111666).\n- can: add missing attribute validation for termination (networking-stable-20_03_14).\n- carl9170: remove P2P_GO support (bsc#1111666).\n- cdc-acm: close race betrween suspend() and acm_softint (git-fixes).\n- CDC-ACM: heed quirk also in error handling (git-fixes).\n- cdc-acm: introduce a cool down (git-fixes).\n- ceph: check if file lock exists before sending unlock request (bsc#1168789).\n- ceph: convert mdsc-\u003ecap_dirty to a per-session list (bsc#1167104).\n- ceph: demote quotarealm lookup warning to a debug message (bsc#1171692).\n- ceph: fix double unlock in handle_cap_export() (bsc#1171694).\n- ceph: fix endianness bug when handling MDS session feature bits (bsc#1171695).\n- ceph: request expedited service on session\u0027s last cap flush (bsc#1167104).\n- cgroup, blkcg: Prepare some symbols for module and !CONFIG_CGROUP usages (bsc#1173857).\n- cgroup, netclassid: periodically release file_lock on classid updating (networking-stable-20_03_14).\n- char/random: Add a newline at the end of the file (jsc#SLE-12423).\n- CIFS: Allocate crypto structures on the fly for calculating signatures of incoming packets (bsc#1144333).\n- CIFS: Allocate encryption header through kmalloc (bsc#1144333).\n- CIFS: allow unlock flock and OFD lock across fork (bsc#1144333).\n- CIFS: check new file size when extending file by fallocate (bsc#1144333).\n- CIFS: cifspdu.h: Replace zero-length array with flexible-array member (bsc#1144333).\n- CIFS: clear PF_MEMALLOC before exiting demultiplex thread (bsc#1144333).\n- CIFS: do not share tcons with DFS (bsc#1144333).\n- CIFS: dump the session id and keys also for SMB2 sessions (bsc#1144333).\n- CIFS: ensure correct super block for DFS reconnect (bsc#1144333).\n- CIFS: Fix bug which the return value by asynchronous read is error (bsc#1144333).\n- CIFS: fix uninitialised lease_key in open_shroot() (bsc#1144333).\n- cifs: get rid of unused parameter in reconn_setup_dfs_targets() (bsc#1144333).\n- cifs: handle hostnames that resolve to same ip in failover (bsc#1144333 bsc#1161016).\n- CIFS: ignore cached share root handle closing errors (bsc#1166780).\n- CIFS: improve read performance for page size 64KB \u0026 cache=strict \u0026 vers=2.1+ (bsc#1144333).\n- CIFS: Increment num_remote_opens stats counter even in case of smb2_query_dir_first (bsc#1144333).\n- CIFS: minor update to comments around the cifs_tcp_ses_lock mutex (bsc#1144333).\n- CIFS: protect updating server-\u003edstaddr with a spinlock (bsc#1144333).\n- cifs: set up next DFS target before generic_ip_connect() (bsc#1144333 bsc#1161016).\n- CIFS: smb2pdu.h: Replace zero-length array with flexible-array member (bsc#1144333).\n- CIFS: smbd: Calculate the correct maximum packet size for segmented SMBDirect send/receive (bsc#1144333).\n- CIFS: smbd: Check and extend sender credits in interrupt context (bsc#1144333).\n- CIFS: smbd: Check send queue size before posting a send (bsc#1144333).\n- CIFS: smbd: Do not schedule work to send immediate packet on every receive (bsc#1144333).\n- CIFS: smbd: Merge code to track pending packets (bsc#1144333).\n- CIFS: smbd: Properly process errors on ib_post_send (bsc#1144333).\n- CIFS: smbd: Update receive credits before sending and deal with credits roll back on failure before sending (bsc#1144333).\n- CIFS: Warn less noisily on default mount (bsc#1144333).\n- clk: Add clk_hw_unregister_composite helper function definition (bsc#1051510).\n- clk: bcm2835: Fix return type of bcm2835_register_gate (bsc#1051510).\n- clk: clk-flexgen: fix clock-critical handling (bsc#1051510).\n- clk: imx6ull: use OSC clock during AXI rate change (bsc#1051510).\n- clk: imx: make mux parent strings const (bsc#1051510).\n- clk: mediatek: correct the clocks for MT2701 HDMI PHY module (bsc#1051510).\n- clk: qcom: rcg: Return failure for RCG update (bsc#1051510).\n- clk: sunxi: Fix incorrect usage of round_down() (bsc#1051510).\n- clk: sunxi-ng: a64: Fix gate bit of DSI DPHY (bsc#1051510).\n- clocksource/drivers/hyper-v: Set TSC clocksource as default w/ InvariantTSC (bsc#1170620, bsc#1170621).\n- clocksource: dw_apb_timer: Make CPU-affiliation being optional (bsc#1111666).\n- clocksource: dw_apb_timer_of: Fix missing clockevent timers (bsc#1051510).\n- compat_ioctl: block: handle BLKREPORTZONE/BLKRESETZONE (git fixes (block drivers)).\n- compat_ioctl: block: handle Persistent Reservations (git fixes (block drivers)).\n- component: Silence bind error on -EPROBE_DEFER (bsc#1051510).\n- config: Enable CONFIG_RCU_BOOST\n- configfs: Fix bool initialization/comparison (bsc#1051510).\n- copy_{to,from}_user(): consolidate object size checks (git fixes).\n- coresight: do not use the BIT() macro in the UAPI header (git fixes (block drivers)).\n- cpufreq: Register drivers only after CPU devices have been registered (bsc#1051510).\n- cpufreq: s3c64xx: Remove pointless NULL check in s3c64xx_cpufreq_driver_init (bsc#1051510).\n- cpuidle: Do not unset the driver if it is there already (bsc#1051510).\n- crypto: algboss - do not wait during notifier callback (bsc#1111666).\n- crypto: algif_skcipher - Cap recv SG list at ctx-\u003eused (bsc#1111666).\n- crypto: arm64/sha-ce - implement export/import (bsc#1051510).\n- crypto: caam - update xts sector size for large input length (bsc#1111666).\n- crypto: cavium/nitrox - Fix \u0027nitrox_get_first_device()\u0027 when ndevlist is fully iterated (bsc#1111666).\n- crypto: cavium/nitrox - Fix \u0027nitrox_get_first_device()\u0027 when ndevlist is fully iterated (git-fixes).\n- crypto: ccp - AES CFB mode is a stream cipher (git-fixes).\n- crypto: ccp - Clean up and exit correctly on allocation failure (git-fixes).\n- crypto: ccp - Cleanup misc_dev on sev_exit() (bsc#1114279).\n- crypto: ccp - Cleanup sp_dev_master in psp_dev_destroy() (bsc#1114279).\n- Crypto/chcr: fix for ccm(aes) failed test (bsc#1111666).\n- crypto: chelsio/chtls: properly set tp-\u003elsndtime (bsc#1111666).\n- crypto: mxs-dcp - fix scatterlist linearization for hash (bsc#1051510).\n- crypto: talitos - fix IPsec cipher in length (git-fixes).\n- crypto: talitos - reorder code in talitos_edesc_alloc() (git-fixes).\n- crypto: tcrypt - fix printed skcipher [a]sync mode (bsc#1051510).\n- cxgb4: fix MPS index overwrite when setting MAC address (bsc#1127355).\n- cxgb4: fix Txq restart check during backpressure (bsc#1127354 bsc#1127371).\n- debugfs: Add debugfs_create_xul() for hexadecimal unsigned long (git-fixes).\n- debugfs: Check module state before warning in {full/open}_proxy_open() (bsc#1173746).\n- debugfs_lookup(): switch to lookup_one_len_unlocked() (bsc#1171979).\n- Deprecate NR_UNSTABLE_NFS, use NR_WRITEBACK (bsc#1163403).\n- devinet: fix memleak in inetdev_init() (networking-stable-20_06_07).\n- devlink: fix return value after hitting end in region read (bsc#1109837).\n- devlink: validate length of param values (bsc#1109837).\n- devlink: validate length of region addr/len (bsc#1109837).\n- /dev/mem: Add missing memory barriers for devmem_inode (git-fixes).\n- /dev/mem: Revoke mappings when a driver claims the region (git-fixes).\n- dmaengine: dmatest: Fix iteration non-stop logic (bsc#1051510).\n- dmaengine: ste_dma40: fix unneeded variable warning (bsc#1051510).\n- dmaengine: tegra210-adma: Fix an error handling path in \u0027tegra_adma_probe()\u0027 (bsc#1111666).\n- dm btree: increase rebalance threshold in __rebalance2() (git fixes (block drivers)).\n- dm cache: fix a crash due to incorrect work item cancelling (git fixes (block drivers)).\n- dm crypt: fix benbi IV constructor crash if used in authenticated mode (git fixes (block drivers)).\n- dm: fix potential for q-\u003emake_request_fn NULL pointer (git fixes (block drivers)).\n- dm mpath: switch paths in dm_blk_ioctl() code path (bsc#1167574).\n- dm-raid1: fix invalid return value from dm_mirror (bsc#1172378).\n- dm space map common: fix to ensure new block isn\u0027t already in use (git fixes (block drivers)).\n- dm: various cleanups to md-\u003equeue initialization code (git fixes).\n- dm verity fec: fix hash block number in verity_fec_decode (git fixes (block drivers)).\n- dm verity fec: fix memory leak in verity_fec_dtr (git fixes (block drivers)).\n- dm writecache: fix data corruption when reloading the target (git fixes (block drivers)).\n- dm writecache: fix incorrect flush sequence when doing SSD mode commit (git fixes (block drivers)).\n- dm writecache: verify watermark during resume (git fixes (block drivers)).\n- dm zoned: fix invalid memory access (git fixes (block drivers)).\n- dm zoned: reduce overhead of backing device checks (git fixes (block drivers)).\n- dm zoned: remove duplicate nr_rnd_zones increase in dmz_init_zone() (git fixes (block drivers)).\n- dm zoned: support zone sizes smaller than 128MiB (git fixes (block drivers)).\n- dp83640: reverse arguments to list_add_tail (git-fixes).\n- dpaa_eth: fix usage as DSA master, try 3 (networking-stable-20_05_27).\n- driver-core, libnvdimm: Let device subsystems add local lockdep coverage (bsc#1171753).\n- drivers: hv: Add a module description line to the hv_vmbus driver (bsc#1172249, bsc#1172251).\n- Drivers: hv: Change flag to write log level in panic msg to false (bsc#1170617, bsc#1170618).\n- drivers/net/ibmvnic: Update VNIC protocol version reporting (bsc#1065729).\n- drivers: soc: ti: knav_qmss_queue: Make knav_gp_range_ops static (bsc#1051510).\n- drivers: w1: add hwmon support structures (jsc#SLE-11048).\n- drivers: w1: add hwmon temp support for w1_therm (jsc#SLE-11048).\n- drivers: w1: refactor w1_slave_show to make the temp reading functionality separate (jsc#SLE-11048).\n- drm: amd/acp: fix broken menu structure (bsc#1114279) \t* context changes\n- drm: amd/display: fix Kconfig help text (bsc#1113956) \t* only fix DEBUG_KERNEL_DC\n- drm/amdgpu: Correctly initialize thermal controller for GPUs with Powerplay table v0 (e.g Hawaii) (bsc#1111666).\n- drm/amdgpu: Fix oops when pp_funcs is unset in ACPI event (bsc#1111666).\n- drm/amd/powerplay: force the trim of the mclk dpm_levels if OD is (bsc#1113956)\n- drm/atomic: Take the atomic toys away from X (bsc#1112178) \t* context changes\n- drm/bochs: downgrade pci_request_region failure from error to warning (bsc#1051510).\n- drm: bridge: adv7511: Extend list of audio sample rates (bsc#1111666).\n- drm/crc: Actually allow to change the crc source (bsc#1114279) \t* offset changes\n- drm/dp_mst: Fix clearing payload state on topology disable (bsc#1051510).\n- drm/dp_mst: Increase ACT retry timeout to 3s (bsc#1113956) * context changes\n- drm/dp_mst: Reformat drm_dp_check_act_status() a bit (bsc#1051510).\n- drm_dp_mst_topology: fix broken drm_dp_sideband_parse_remote_dpcd_read() (bsc#1051510).\n- drm/drm_dp_mst:remove set but not used variable \u0027origlen\u0027 (bsc#1051510).\n- drm/edid: Fix off-by-one in DispID DTD pixel clock (bsc#1114279)\n- drm: encoder_slave: fix refcouting error for modules (bsc#1111666).\n- drm: encoder_slave: fix refcouting error for modules (bsc#1114279)\n- drm/etnaviv: fix perfmon domain interation (bsc#1113956)\n- drm/etnaviv: rework perfmon query infrastructure (bsc#1112178)\n- drm/i915: Apply Wa_1406680159:icl,ehl as an engine workaround (bsc#1112178) \t* rename gt/intel_workarounds.c to intel_workarounds.c \t* context changes\n- drm/i915/gvt: Init DPLL/DDI vreg for virtual display instead of (bsc#1114279)\n- drm/i915: HDCP: fix Ri prime check done during link check (bsc#1112178) \t* rename display/intel_hdmi.c to intel_hdmi.c \t* context changes\n- drm/i915/icl+: Fix hotplug interrupt disabling after storm detection (bsc#1112178)\n- drm/i915: properly sanity check batch_start_offset (bsc#1114279) \t* renamed display/intel_fbc.c -\u003e intel_fb.c \t* renamed gt/intel_rc6.c -\u003e intel_pm.c \t* context changes\n- drm/i915: Whitelist context-local timestamp in the gen9 cmdparser (bsc#1111666).\n- drm/mediatek: Check plane visibility in atomic_update (bsc#1113956) * context changes\n- drm/meson: Delete an error message in meson_dw_hdmi_bind() (bsc#1051510).\n- drm/msm/dpu: fix error return code in dpu_encoder_init (bsc#1111666).\n- drm/msm: stop abusing dma_map/unmap for cache (bsc#1051510).\n- drm/msm: Use the correct dma_sync calls harder (bsc#1051510).\n- drm/msm: Use the correct dma_sync calls in msm_gem (bsc#1051510).\n- drm: NULL pointer dereference [null-pointer-deref] (CWE 476) problem (bsc#1114279)\n- drm: panel-orientation-quirks: Add quirk for Asus T101HA panel (bsc#1111666).\n- drm: panel-orientation-quirks: Use generic orientation-data for Acer S1003 (bsc#1111666).\n- drm/qxl: qxl_release leak in qxl_draw_dirty_fb() (bsc#1051510).\n- drm/qxl: qxl_release leak in qxl_hw_surface_alloc() (bsc#1051510).\n- drm/qxl: qxl_release use after free (bsc#1051510).\n- drm/qxl: Use correct notify port address when creating cursor ring (bsc#1113956)\n- drm/radeon: fix double free (bsc#1113956)\n- drm/radeon: fix fb_div check in ni_init_smc_spll_table() (bsc#1113956)\n- drm: Remove PageReserved manipulation from drm_pci_alloc (bsc#1114279) \t* offset changes\n- drm/sun4i: dsi: Allow binding the host without a panel (bsc#1113956)\n- drm/sun4i: dsi: Avoid hotplug race with DRM driver bind (bsc#1113956)\n- drm/sun4i: dsi: Remove incorrect use of runtime PM (bsc#1113956) \t* context changes\n- drm/sun4i: dsi: Remove unused drv from driver context (bsc#1113956) \t* context changes \t* keep include of sun4i_drv.h\n- drm/sun4i: hdmi ddc clk: Fix size of m divider (bsc#1111666).\n- drm/tegra: hub: Do not enable orphaned window group (bsc#1111666).\n- drm/vkms: Hold gem object while still in-use (bsc#1113956) * context changes\n- dump_stack: avoid the livelock of the dump_lock (git fixes (block drivers)).\n- e1000: Distribute switch variables for initialization (bsc#1111666).\n- e1000e: Disable TSO for buffer overrun workaround (bsc#1051510).\n- e1000e: Do not wake up the system via WOL if device wakeup is disabled (bsc#1051510).\n- e1000e: Relax condition to trigger reset for ME workaround (bsc#1111666).\n- EDAC/amd64: Read back the scrub rate PCI register on F15h (bsc#1114279).\n- EDAC, sb_edac: Add support for systems with segmented PCI buses (bsc#1169525).\n- efi/random: Increase size of firmware supplied randomness (jsc#SLE-12423).\n- efi/random: Treat EFI_RNG_PROTOCOL output as bootloader randomness (jsc#SLE-12423).\n- efi: READ_ONCE rng seed size before munmap (jsc#SLE-12423).\n- efi: Reorder pr_notice() with add_device_randomness() call (jsc#SLE-12423).\n- evm: Check also if *tfm is an error pointer in init_desc() (bsc#1051510).\n- evm: Fix a small race in init_desc() (bsc#1051510).\n- ext4: add cond_resched() to __ext4_find_entry() (bsc#1166862).\n- ext4: Check for non-zero journal inum in ext4_calculate_overhead (bsc#1167288).\n- ext4: do not assume that mmp_nodename/bdevname have NUL (bsc#1166860).\n- ext4: do not zeroout extents beyond i_disksize (bsc#1167851).\n- ext4: fix a data race at inode-\u003ei_blocks (bsc#1171835).\n- ext4: fix a data race in EXT4_I(inode)-\u003ei_disksize (bsc#1166861).\n- ext4: fix extent_status fragmentation for plain files (bsc#1171949).\n- ext4: fix incorrect group count in ext4_fill_super error message (bsc#1168765).\n- ext4: fix incorrect inodes per group in error message (bsc#1168764).\n- ext4: fix partial cluster initialization when splitting extent (bsc#1173839).\n- ext4: fix potential race between online resizing and write operations (bsc#1166864).\n- ext4: fix potential race between s_flex_groups online resizing and access (bsc#1166867).\n- ext4: fix potential race between s_group_info online resizing and access (bsc#1166866).\n- ext4: fix race between ext4_sync_parent() and rename() (bsc#1173838).\n- ext4: fix race between writepages and enabling EXT4_EXTENTS_FL (bsc#1166870).\n- ext4: fix support for inode sizes \u003e 1024 bytes (bsc#1164284).\n- ext4, jbd2: ensure panic by fix a race between jbd2 abort and ext4 error handlers (bsc#1173833).\n- ext4: potential crash on allocation error in ext4_alloc_flex_bg_array() (bsc#1166940).\n- ext4: rename s_journal_flag_rwsem to s_writepages_rwsem (bsc#1166868).\n- ext4: use non-movable memory for superblock readahead (bsc#1171952).\n- ext4: validate the debug_want_extra_isize mount option at parse time (bsc#1163897).\n- extcon: adc-jack: Fix an error handling path in \u0027adc_jack_probe()\u0027 (bsc#1051510).\n- fanotify: fix ignore mask logic for events on child and on dir (bsc#1172719).\n- fanotify: fix merging marks masks with FAN_ONDIR (bsc#1171679).\n- fat: fix uninit-memory access for partial initialized inode (bsc#1051510).\n- fat: work around race with userspace\u0027s read via blockdev while mounting (bsc#1051510).\n- fbcon: fix null-ptr-deref in fbcon_switch (bsc#1114279) \t* rename drivers/video/fbdev/core to drivers/video/console \t* context changes\n- fbdev: potential information leak in do_fb_ioctl() (bsc#1114279)\n- fbmem: Adjust indentation in fb_prepare_logo and fb_blank (bsc#1114279)\n- fdt: add support for rng-seed (jsc#SLE-12423).\n- fdt: Update CRC check for rng-seed (jsc#SLE-12423).\n- fib: add missing attribute validation for tun_id (networking-stable-20_03_14).\n- firmware: imx: scu: Fix corruption of header (git-fixes).\n- firmware: imx: scu: Fix possible memory leak in imx_scu_probe() (bsc#1111666).\n- firmware: qcom: scm: fix compilation error when disabled (bsc#1051510).\n- Fix boot crash with MD (bsc#1174343)\n- fix multiplication overflow in copy_fdtable() (bsc#1173825).\n- fpga: dfl: afu: Corrected error handling levels (git-fixes).\n- fq_codel: fix TCA_FQ_CODEL_DROP_BATCH_SIZE sanity checks (networking-stable-20_05_12).\n- fs/cifs: fix gcc warning in sid_to_id (bsc#1144333).\n- fs/seq_file.c: simplify seq_file iteration code and interface (bsc#1170125).\n- gpiolib: Document that GPIO line names are not globally unique (bsc#1051510).\n- gpio: tegra: mask GPIO IRQs during IRQ shutdown (bsc#1051510).\n- gpu: host1x: Detach driver on unregister (bsc#1111666).\n- gpu: ipu-v3: pre: do not trigger update if buffer address does not change (bsc#1111666).\n- gre: fix uninit-value in __iptunnel_pull_header (networking-stable-20_03_14).\n- HID: hid-input: clear unmapped usages (git-fixes).\n- HID: hyperv: Add a module description line (bsc#1172249, bsc#1172251).\n- HID: i2c-hid: add Trekstor Primebook C11B to descriptor override (git-fixes).\n- HID: i2c-hid: override HID descriptors for certain devices (git-fixes).\n- HID: magicmouse: do not set up autorepeat (git-fixes).\n- HID: multitouch: add eGalaxTouch P80H84 support (bsc#1051510).\n- HID: sony: Fix for broken buttons on DS3 USB dongles (bsc#1051510).\n- HID: wacom: Read HID_DG_CONTACTMAX directly for non-generic devices (git-fixes).\n- hrtimer: Annotate lockless access to timer-\u003estate (git fixes (block drivers)).\n- hsr: add restart routine into hsr_get_node_list() (networking-stable-20_03_28).\n- hsr: check protocol version in hsr_newlink() (networking-stable-20_04_17).\n- hsr: fix general protection fault in hsr_addr_is_self() (networking-stable-20_03_28).\n- hsr: set .netnsok flag (networking-stable-20_03_28).\n- hsr: use rcu_read_lock() in hsr_get_node_{list/status}() (networking-stable-20_03_28).\n- hv_netvsc: Fix netvsc_start_xmit\u0027s return type (git-fixes).\n- hwmon: (acpi_power_meter) Fix potential memory leak in acpi_power_meter_add() (bsc#1111666).\n- hwmon: (emc2103) fix unable to change fan pwm1_enable attribute (bsc#1111666).\n- hwmon: (max6697) Make sure the OVERT mask is set correctly (bsc#1111666).\n- i2c: acpi: Force bus speed to 400KHz if a Silead touchscreen is present (git-fixes).\n- i2c: acpi: put device when verifying client fails (git-fixes).\n- i2c: algo-pca: Add 0x78 as SCL stuck low status for PCA9665 (bsc#1111666).\n- i2c: brcmstb: remove unused struct member (git-fixes).\n- i2c: core: Allow empty id_table in ACPI case as well (git-fixes).\n- i2c: core: decrease reference count of device node in i2c_unregister_device (git-fixes).\n- i2c: dev: Fix the race between the release of i2c_dev and cdev (bsc#1051510).\n- i2c: eg20t: Load module automatically if ID matches (bsc#1111666).\n- i2c: fix missing pm_runtime_put_sync in i2c_device_probe (git-fixes).\n- i2c-hid: properly terminate i2c_hid_dmi_desc_override_table array (git-fixes).\n- i2c: hix5hd2: add missed clk_disable_unprepare in remove (bsc#1051510).\n- i2c: i801: Do not add ICH_RES_IO_SMI for the iTCO_wdt device (git-fixes).\n- i2c: iproc: Stop advertising support of SMBUS quick cmd (git-fixes).\n- i2c: isch: Remove unnecessary acpi.h include (git-fixes).\n- i2c: jz4780: silence log flood on txabrt (bsc#1051510).\n- i2c: mlxcpld: check correct size of maximum RECV_LEN packet (bsc#1111666).\n- i2c: mux: demux-pinctrl: Fix an error handling path in \u0027i2c_demux_pinctrl_probe()\u0027 (bsc#1051510).\n- i2c: st: fix missing struct parameter description (bsc#1051510).\n- i40e: reduce stack usage in i40e_set_fc (git-fixes).\n- IB/hfi1: Do not destroy hfi1_wq when the device is shut down (bsc#1174409).\n- IB/hfi1: Do not destroy link_wq when the device is shut down (bsc#1174409).\n- IB/mlx5: Fix missing congestion control debugfs on rep rdma device (bsc#1103991).\n- ibmveth: Fix max MTU limit (bsc#1173428 ltc#186397).\n- ibmvfc: do not send implicit logouts prior to NPIV login (bsc#1169625 ltc#184611).\n- ibmvnic: continue to init in CRQ reset returns H_CLOSED (bsc#1173280 ltc#185369).\n- ibmvnic: Flush existing work items before device removal (bsc#1065729).\n- ibmvnic: Harden device login requests (bsc#1170011 ltc#183538).\n- ibmvnic: Skip fatal error reset after passive init (bsc#1171078 ltc#184239).\n- iio:ad7797: Use correct attribute_group (bsc#1051510).\n- iio: adc: stm32-adc: fix device used to request dma (bsc#1051510).\n- iio: adc: stm32-adc: fix sleep in atomic context (git-fixes).\n- iio: adc: stm32-adc: Use dma_request_chan() instead dma_request_slave_channel() (bsc#1051510).\n- iio: buffer: Do not allow buffers without any channels enabled to be activated (bsc#1051510).\n- iio: dac: vf610: Fix an error handling path in \u0027vf610_dac_probe()\u0027 (bsc#1051510).\n- iio:health:afe4404 Fix timestamp alignment and prevent data leak (bsc#1111666).\n- iio:humidity:hdc100x Fix alignment and data leak issues (bsc#1111666).\n- iio:magnetometer:ak8974: Fix alignment and data leak issues (bsc#1111666).\n- iio: mma8452: Add missed iio_device_unregister() call in mma8452_probe() (bsc#1111666).\n- iio: potentiostat: lmp9100: fix iio_triggered_buffer_{predisable,postenable} positions (bsc#1051510).\n- iio: pressure: bmp280: Tolerate IRQ before registering (bsc#1051510).\n- iio:pressure:ms5611 Fix buffer element alignment (bsc#1111666).\n- iio: pressure: zpa2326: handle pm_runtime_get_sync failure (bsc#1111666).\n- iio: sca3000: Remove an erroneous \u0027get_device()\u0027 (bsc#1051510).\n- iio: xilinx-xadc: Fix ADC-B powerdown (bsc#1051510).\n- iio: xilinx-xadc: Fix clearing interrupt when enabling trigger (bsc#1051510).\n- iio: xilinx-xadc: Fix sequencer configuration for aux channels in simultaneous mode (bsc#1051510).\n- ima: Directly assign the ima_default_policy pointer to ima_rules (bsc#1051510).\n- ima: Fix ima digest hash table key calculation (bsc#1051510).\n- ima: Fix return value of ima_write_policy() (git-fixes).\n- include/asm-generic/topology.h: guard cpumask_of_node() macro argument (bsc#1148868).\n- Input: evdev - call input_flush_device() on release(), not flush() (bsc#1051510).\n- Input: hyperv-keyboard - add module description (bsc#1172249, bsc#1172251).\n- Input: i8042 - add Acer Aspire 5738z to nomux list (bsc#1051510).\n- Input: i8042 - add Lenovo XiaoXin Air 12 to i8042 nomux list (bsc#1111666).\n- Input: i8042 - add ThinkPad S230u to i8042 reset list (bsc#1051510).\n- input: i8042 - Remove special PowerPC handling (git-fixes).\n- Input: raydium_i2c_ts - use true and false for boolean values (bsc#1051510).\n- Input: synaptics - add a second working PNP_ID for Lenovo T470s (bsc#1111666).\n- Input: synaptics - enable RMI on HP Envy 13-ad105ng (bsc#1051510).\n- Input: synaptics-rmi4 - fix error return code in rmi_driver_probe() (bsc#1051510).\n- Input: synaptics-rmi4 - really fix attn_data use-after-free (git-fixes).\n- Input: usbtouchscreen - add support for BonXeon TP (bsc#1051510).\n- Input: xpad - add custom init packet for Xbox One S controllers (bsc#1051510).\n- intel_idle: Graceful probe failure when MWAIT is disabled (bsc#1174115).\n- intel_th: Fix a NULL dereference when hub driver is not loaded (bsc#1111666).\n- intel_th: pci: Add Elkhart Lake CPU support (bsc#1051510).\n- iommu/amd: Call domain_flush_complete() in update_domain() (bsc#1172096).\n- iommu/amd: Do not flush Device Table in iommu_map_page() (bsc#1172097).\n- iommu/amd: Do not loop forever when trying to increase address space (bsc#1172098).\n- iommu/amd: Fix legacy interrupt remapping for x2APIC-enabled system (bsc#1172099).\n- iommu/amd: Fix over-read of ACPI UID from IVRS table (bsc#1172101).\n- iommu/amd: Fix race in increase_address_space()/fetch_pte() (bsc#1172102).\n- iommu/amd: Fix the configuration of GCR3 table root pointer (bsc#1169057).\n- iommu/amd: Update Device Table in increase_address_space() (bsc#1172103).\n- iommu: Fix reference count leak in iommu_group_alloc (bsc#1172397).\n- ip6_tunnel: Allow rcv/xmit even if remote address is a local address (bsc#1166978).\n- ipmi: fix hung processes in __get_guid() (git-fixes).\n- ipv4: fix a RCU-list lock in fib_triestat_seq_show (networking-stable-20_04_02).\n- ipv6/addrconf: call ipv6_mc_up() for non-Ethernet interface (networking-stable-20_03_14).\n- ipv6: do not auto-add link-local address to lag ports (networking-stable-20_04_09).\n- ipv6: fix IPV6_ADDRFORM operation logic (bsc#1171662).\n- ipv6: Fix nlmsg_flags when splitting a multipath route (networking-stable-20_03_01).\n- ipv6: fix restrict IPV6_ADDRFORM operation (bsc#1171662).\n- ipv6: Fix route replacement with dev-only route (networking-stable-20_03_01).\n- ipvlan: add cond_resched_rcu() while processing muticast backlog (networking-stable-20_03_14).\n- ipvlan: call dev_change_flags when ipvlan mode is reset (git-fixes).\n- ipvlan: do not add hardware address of master to its unicast filter list (bsc#1137325).\n- ipvlan: do not deref eth hdr before checking it\u0027s set (networking-stable-20_03_14).\n- ipvlan: do not use cond_resched_rcu() in ipvlan_process_multicast() (networking-stable-20_03_14).\n- irqchip/bcm2835: Quiesce IRQs left enabled by bootloader (bsc#1051510).\n- irqdomain: Fix a memory leak in irq_domain_push_irq() (bsc#1051510).\n- iwlwifi: pcie: actually release queue memory in TVQM (bsc#1051510).\n- ixgbe: do not check firmware errors (bsc#1170284).\n- ixgbevf: Remove limit of 10 entries for unicast filter list (git-fixes).\n- jbd2: avoid leaking transaction credits when unreserving handle (bsc#1173845).\n- jbd2: Preserve kABI when adding j_abort_mutex (bsc#1173833).\n- kabi fix for (bsc#1168202).\n- kabi fix for early XHCI debug (git-fixes).\n- kabi for for md: improve handling of bio with REQ_PREFLUSH in md_flush_request() (git-fixes).\n- kabi: hv: prevent struct device_node to become defined (bsc#1172871).\n- kabi: ppc64le: prevent struct dma_map_ops to become defined (jsc#SLE-12423).\n- kABI: protect struct mlx5_cmd_work_ent (kabi).\n- kABI: reintroduce inet_hashtables.h include to l2tp_ip (kabi).\n- kabi/severities: Do not track KVM internal symbols.\n- kabi/severities: Ingnore get_dev_data() The function is internal to the AMD IOMMU driver and must not be called by any third party.\n- kabi workaround for snd_rawmidi buffer_ref field addition (git-fixes).\n- kernfs: fix barrier usage in __kernfs_new_node() (bsc#1111666).\n- KEYS: reaching the keys quotas correctly (bsc#1051510).\n- KVM: arm64: Change hyp_panic()s dependency on tpidr_el2 (bsc#1133021).\n- KVM: arm64: Stop save/restoring host tpidr_el1 on VHE (bsc#1133021).\n- KVM: Check validity of resolved slot when searching memslots (bsc#1172104).\n- KVM: nVMX: Do not reread VMCS-agnostic state when switching VMCS (bsc#1114279).\n- KVM: nVMX: Skip IBPB when switching between vmcs01 and vmcs02 (bsc#1114279).\n- KVM: s390: vsie: Fix delivery of addressing exceptions (git-fixes).\n- KVM: s390: vsie: Fix possible race when shadowing region 3 tables (git-fixes).\n- KVM: s390: vsie: Fix region 1 ASCE sanity shadow address checks (git-fixes).\n- KVM: SVM: Fix potential memory leak in svm_cpu_init() (bsc#1171736).\n- KVM x86: Extend AMD specific guest behavior to Hygon virtual CPUs (bsc#1152489).\n- KVM: x86: Fix APIC page invalidation race (bsc#1174122).\n- kvm: x86: Fix L1TF mitigation for shadow MMU (bsc#1171904).\n- KVM: x86/mmu: Set mmio_value to \u00270\u0027 if reserved #PF can\u0027t be generated (bsc#1171904).\n- KVM: x86: only do L1TF workaround on affected processors (bsc#1171904).\n- l2tp: add sk_family checks to l2tp_validate_socket (networking-stable-20_06_07).\n- l2tp: Allow management of tunnels and session in user namespace (networking-stable-20_04_17).\n- l2tp: do not use inet_hash()/inet_unhash() (networking-stable-20_06_07).\n- libata: Remove extra scsi_host_put() in ata_scsi_add_hosts() (bsc#1051510).\n- libata: Return correct status in sata_pmp_eh_recover_pm() when ATA_DFLAG_DETACH is set (bsc#1051510).\n- libceph: do not omit recovery_deletes in target_copy() (bsc#1174113).\n- libceph: ignore pool overlay and cache logic on redirects (bsc#1173146).\n- libfs: fix infoleak in simple_attr_read() (bsc#1168881).\n- libnvdimm/bus: Fix wait_nvdimm_bus_probe_idle() ABBA deadlock (bsc#1171753).\n- libnvdimm/bus: Prepare the nd_ioctl() path to be re-entrant (bsc#1171753).\n- libnvdimm/bus: Stop holding nvdimm_bus_list_mutex over __nd_ioctl() (bsc#1171753).\n- libnvdimm: cover up changes in struct nvdimm_bus (bsc#1171753).\n- libnvdimm: cover up nd_pfn_sb changes (bsc#1171759).\n- libnvdimm/dax: Pick the right alignment default when creating dax devices (bsc#1171759).\n- libnvdimm/label: Remove the dpa align check (bsc#1171759).\n- libnvdimm/of_pmem: Provide a unique name for bus provider (bsc#1171739).\n- libnvdimm/pfn_dev: Add a build check to make sure we notice when struct page size change (bsc#1171743).\n- libnvdimm/pfn_dev: Add page size and struct page size to pfn superblock (bsc#1171759).\n- libnvdimm/pfn: Prevent raw mode fallback if pfn-infoblock valid (bsc#1171743).\n- libnvdimm/pmem: Advance namespace seed for specific probe errors (bsc#1171743).\n- libnvdimm/region: Initialize bad block for volatile namespaces (bnc#1151927 5.3.6).++ kernel-source-rt.spec (revision 4)Release: \u0026lt;RELEASE\u003e.g93af9dfProvides: %name-srchash-93af9df3581407689c1ac5b0aa06fcfb62b08f1c\n- libnvdimm/region: Rewrite _probe_success() to _advance_seeds() (bsc#1171743).\n- libnvdimm: Use PAGE_SIZE instead of SZ_4K for align check (bsc#1171759).\n- lib: raid6: fix awk build warnings (git fixes (block drivers)).\n- lib/raid6/test: fix build on distros whose /bin/sh is not bash (git fixes (block drivers)).\n- lib/stackdepot.c: fix global out-of-bounds in stack_slabs (git fixes (block drivers)).\n- livepatch: Apply vmlinux-specific KLP relocations early (bsc#1071995).\n- livepatch: Disallow vmlinux.ko (bsc#1071995).\n- livepatch: Make klp_apply_object_relocs static (bsc#1071995).\n- livepatch: Prevent module-specific KLP rela sections from referencing vmlinux symbols (bsc#1071995).\n- livepatch: Remove .klp.arch (bsc#1071995).\n- locks: print unsigned ino in /proc/locks (bsc#1171951). \n- loop: replace kill_bdev with invalidate_bdev (bsc#1173820).\n- lpfc_debugfs: get rid of pointless access_ok() (bsc#1172687 bsc#1171530).\n- lpfc: Synchronize NVME transport and lpfc driver devloss_tmo (bcs#1173060).\n- mac80211: add ieee80211_is_any_nullfunc() (bsc#1051510).\n- mac80211: add option for setting control flags (bsc#1111666).\n- mac80211: Do not send mesh HWMP PREQ if HWMP is disabled (bsc#1051510).\n- mac80211_hwsim: Use kstrndup() in place of kasprintf() (bsc#1051510).\n- mac80211: mesh: fix discovery timer re-arming issue / crash (bsc#1051510).\n- mac80211: set IEEE80211_TX_CTRL_PORT_CTRL_PROTO for nl80211 TX (bsc#1111666).\n- macsec: avoid to set wrong mtu (bsc#1051510).\n- macsec: restrict to ethernet devices (networking-stable-20_03_28).\n- macvlan: add cond_resched() during multicast processing (networking-stable-20_03_14).\n- macvlan: fix null dereference in macvlan_device_event() (bsc#1051510).\n- mailbox: imx: Disable the clock on devm_mbox_controller_register() failure (git-fixes).\n- md: Avoid namespace collision with bitmap API (git fixes (block drivers)).\n- md: improve handling of bio with REQ_PREFLUSH in md_flush_request() (git-fixes).\n- md/raid0: Fix an error message in raid0_make_request() (git fixes (block drivers)).\n- md/raid10: prevent access of uninitialized resync_pages offset (git-fixes).\n- mdraid: fix read/write bytes accounting (bsc#1172537).\n- md: use memalloc scope APIs in mddev_suspend()/mddev_resume() (bsc#1166985)).\n- media: cec: silence shift wrapping warning in __cec_s_log_addrs() (git-fixes).\n- media: dib0700: fix rc endpoint lookup (bsc#1051510).\n- media: dvb: return -EREMOTEIO on i2c transfer failure (bsc#1051510).\n- media: flexcop-usb: fix endpoint sanity check (git-fixes).\n- media: go7007: Fix URB type for interrupt handling (bsc#1051510).\n- media: platform: fcp: Set appropriate DMA parameters (bsc#1051510).\n- media: si2157: Better check for running tuner in init (bsc#1111666).\n- media: tda10071: fix unsigned sign extension overflow (bsc#1051510).\n- media: ti-vpe: cal: fix disable_irqs to only the intended target (git-fixes).\n- media: usbtv: fix control-message timeouts (bsc#1051510).\n- media: v4l2-core: fix entity initialization in device_register_subdev (bsc#1051510).\n- media: vsp1: tidyup VI6_HGT_LBn_H() macro (bsc#1051510).\n- media: xirlink_cit: add missing descriptor sanity checks (bsc#1051510).\n- mei: release me_cl object reference (bsc#1051510).\n- mfd: dln2: Fix sanity checking for endpoints (bsc#1051510).\n- misc: pci_endpoint_test: Fix to support \u003e 10 pci-endpoint-test devices (bsc#1051510).\n- mlxsw: core: Do not use WQ_MEM_RECLAIM for mlxsw ordered workqueue (git-fixes).\n- mlxsw: core: Do not use WQ_MEM_RECLAIM for mlxsw workqueue (git-fixes).\n- mlxsw: Fix some IS_ERR() vs NULL bugs (networking-stable-20_04_27).\n- mlxsw: pci: Return error on PCI reset timeout (git-fixes).\n- mlxsw: spectrum_acl_tcam: Position vchunk in a vregion list properly (networking-stable-20_05_12).\n- mlxsw: spectrum: Disallow prio-tagged packets when PVID is removed (git-fixes).\n- mlxsw: spectrum_dpipe: Add missing error path (git-fixes).\n- mlxsw: spectrum_flower: Do not stop at FLOW_ACTION_VLAN_MANGLE (networking-stable-20_04_09).\n- mlxsw: spectrum_mr: Fix list iteration in error path (bsc#1112374).\n- mlxsw: spectrum: Prevent force of 56G (git-fixes).\n- mlxsw: spectrum_router: Refresh nexthop neighbour when it becomes dead (git-fixes).\n- mlxsw: spectrum_router: Remove inappropriate usage of WARN_ON() (git-fixes).\n- mlxsw: spectrum_switchdev: Add MDB entries in prepare phase (git-fixes).\n- mlxsw: spectrum_switchdev: Do not treat static FDB entries as sticky (git-fixes).\n- mmc: atmel-mci: Fix debugfs on 64-bit platforms (git-fixes).\n- mmc: block: Fix request completion in the CQE timeout path (bsc#1111666).\n- mmc: block: Fix use-after-free issue for rpmb (bsc#1111666).\n- mmc: core: Check request type before completing the request (git-fixes).\n- mmc: core: Fix recursive locking issue in CQE recovery path (git-fixes).\n- mmc: cqhci: Avoid false \u0027cqhci: CQE stuck on\u0027 by not open-coding timeout loop (git-fixes).\n- mmc: dw_mmc: Fix debugfs on 64-bit platforms (git-fixes).\n- mmc: fix compilation of user API (bsc#1051510).\n- mmc: meson-gx: make sure the descriptor is stopped on errors (git-fixes).\n- mmc: meson-gx: simplify interrupt handler (git-fixes).\n- mmc: renesas_sdhi: limit block count to 16 bit for old revisions (git-fixes).\n- mmc: sdhci: do not enable card detect interrupt for gpio cd type (bsc#1111666).\n- mmc: sdhci-esdhc-imx: fix the mask for tuning start point (bsc#1051510).\n- mmc: sdhci-msm: Clear tuning done flag while hs400 tuning (bsc#1051510).\n- mmc: sdhci-msm: Set SDHCI_QUIRK_MULTIBLOCK_READ_ACMD12 quirk (bsc#1111666).\n- mmc: sdhci-of-at91: fix memleak on clk_get failure (git-fixes).\n- mmc: sdhci-pci: Fix eMMC driver strength for BYT-based controllers (bsc#1051510).\n- mmc: sdhci-xenon: fix annoying 1.8V regulator warning (bsc#1051510).\n- mmc: sdio: Fix potential NULL pointer error in mmc_sdio_init_card() (bsc#1051510).\n- mmc: tmio: fix access width of Block Count Register (git-fixes).\n- mm/filemap.c: do not initiate writeback if mapping has no dirty pages (bsc#1168884).\n- mm: limit boost_watermark on small zones (git fixes (mm/pgalloc)).\n- mm/memory_hotplug.c: only respect mem= parameter during boot stage (bsc#1065600).\n- mm: replace PF_LESS_THROTTLE with PF_LOCAL_THROTTLE (bsc#1163403).\n- mm: thp: handle page cache THP correctly in PageTransCompoundMap (git fixes (block drivers)).\n- mtd: cfi: fix deadloop in cfi_cmdset_0002.c do_write_buffer (bsc#1051510).\n- mtd: spi-nor: cadence-quadspi: add a delay in write sequence (git-fixes).\n- mtd: spi-nor: enable 4B opcodes for mx66l51235l (git-fixes).\n- mtd: spi-nor: fsl-quadspi: Do not let -EINVAL on the bus (git-fixes).\n- mvpp2: remove misleading comment (git-fixes).\n- mwifiex: avoid -Wstringop-overflow warning (bsc#1051510).\n- mwifiex: Fix memory corruption in dump_station (bsc#1051510).\n- net: bcmgenet: correct per TX/RX ring statistics (networking-stable-20_04_27).\n- net: be more gentle about silly gso requests coming from user (networking-stable-20_06_07).\n- net: check untrusted gso_size at kernel entry (networking-stable-20_06_07).\n- net/cxgb4: Check the return from t4_query_params properly (git-fixes).\n- net: dsa: b53: Fix ARL register definitions (networking-stable-20_04_27).\n- net: dsa: b53: Rework ARL bin logic (networking-stable-20_04_27).\n- net: dsa: bcm_sf2: Do not register slave MDIO bus with OF (networking-stable-20_04_09).\n- net: dsa: bcm_sf2: Ensure correct sub-node is parsed (networking-stable-20_04_09).\n- net: dsa: bcm_sf2: Fix node reference count (git-fixes).\n- net: dsa: bcm_sf2: Fix overflow checks (git-fixes).\n- net: dsa: Fix duplicate frames flooded by learning (networking-stable-20_03_28).\n- net: dsa: loop: Add module soft dependency (networking-stable-20_05_16).\n- net: dsa: mt7530: fix roaming from DSA user ports (networking-stable-20_05_27).\n- net: dsa: mv88e6xxx: fix lockup on warm boot (networking-stable-20_03_14).\n- net: ena: add intr_moder_rx_interval to struct ena_com_dev and use it (git-fixes).\n- net: ena: add missing ethtool TX timestamping indication (git-fixes).\n- net: ena: avoid memory access violation by validating req_id properly (git-fixes).\n- net: ena: do not wake up tx queue when down (git-fixes).\n- net: ena: ena-com.c: prevent NULL pointer dereference (git-fixes).\n- net: ena: ethtool: use correct value for crc32 hash (git-fixes).\n- net: ena: fix continuous keep-alive resets (git-fixes).\n- net: ena: fix corruption of dev_idx_to_host_tbl (git-fixes).\n- net: ena: fix default tx interrupt moderation interval (git-fixes).\n- net: ena: fix incorrect default RSS key (git-fixes).\n- net: ena: fix incorrectly saving queue numbers when setting RSS indirection table (git-fixes).\n- net: ena: fix issues in setting interrupt moderation params in ethtool (git-fixes).\n- net: ena: fix potential crash when rxfh key is NULL (git-fixes).\n- net: ena: fix retrieval of nonadaptive interrupt moderation intervals (git-fixes).\n- net: ena: fix uses of round_jiffies() (git-fixes).\n- net: ena: make ena rxfh support ETH_RSS_HASH_NO_CHANGE (git-fixes).\n- net: ena: reimplement set/get_coalesce() (git-fixes).\n- net: ena: rss: do not allocate key when not supported (git-fixes).\n- net: ena: rss: fix failure to get indirection table (git-fixes).\n- net: ena: rss: store hash function as values and not bits (git-fixes).\n- net/ethernet: add Google GVE driver (jsc#SLE-10538)\n- net: fec: add phy_reset_after_clk_enable() support (git-fixes).\n- net: fec: validate the new settings in fec_enet_set_coalesce() (networking-stable-20_03_14).\n- net: fib_rules: Correctly set table field when table number exceeds 8 bits (networking-stable-20_03_01).\n- netfilter: connlabels: prefer static lock initialiser (git-fixes).\n- netfilter: conntrack: sctp: use distinct states for new SCTP connections (bsc#1159199).\n- netfilter: ctnetlink: netns exit must wait for callbacks (bsc#1169795).\n- netfilter: not mark a spinlock as __read_mostly (git-fixes).\n- net: fix a potential recursive NETDEV_FEAT_CHANGE (networking-stable-20_05_16).\n- net: fix race condition in __inet_lookup_established() (bsc#1151794).\n- net: fq: add missing attribute validation for orphan mask (networking-stable-20_03_14).\n- net: hns3: fix \u0027tc qdisc del\u0027 failed issue (bsc#1109837).\n- net: inet_csk: Fix so_reuseport bind-address cache in tb-\u003efast* (networking-stable-20_05_27).\n- net: ipip: fix wrong address family in init error path (networking-stable-20_05_27).\n- net, ip_tunnel: fix interface lookup with no key (networking-stable-20_04_02).\n- net: ipv4: devinet: Fix crash when add/del multicast IP with autojoin (networking-stable-20_04_17).\n- net: ipv6: do not consider routes via gateways for anycast address check (networking-stable-20_04_17).\n- net: ipvlan: Fix ipvlan device tso disabled while NETIF_F_IP_CSUM is set (git-fixes).\n- netlink: Use netlink header as base to calculate bad attribute offset (networking-stable-20_03_14).\n- net: macsec: preserve ingress frame ordering (networking-stable-20_05_12).\n- net: memcg: fix lockdep splat in inet_csk_accept() (networking-stable-20_03_14).\n- net: memcg: late association of sock to memcg (networking-stable-20_03_14).\n- net/mlx4_core: drop useless LIST_HEAD (git-fixes).\n- net/mlx4_core: fix a memory leak bug (git-fixes).\n- net/mlx4_core: Fix use of ENOSPC around mlx4_counter_alloc() (networking-stable-20_05_12).\n- net/mlx4_en: avoid indirect call in TX completion (networking-stable-20_04_27).\n- net/mlx5: Add command entry handling completion (networking-stable-20_05_27).\n- net/mlx5: Add new fields to Port Type and Speed register (bsc#1171118).\n- net/mlx5: Avoid panic when setting vport rate (git-fixes).\n- net/mlx5: Continue driver initialization despite debugfs failure (git-fixes).\n- net/mlx5e: ethtool, Fix a typo in WOL function names (git-fixes).\n- net/mlx5e: Fix traffic duplication in ethtool steering (git-fixes).\n- net/mlx5e: Remove unnecessary clear_bit()s (git-fixes).\n- net/mlx5e: Update netdev txq on completions during closure (networking-stable-20_05_27).\n- net/mlx5: Expose link speed directly (bsc#1171118).\n- net/mlx5: Expose port speed when possible (bsc#1171118).\n- net/mlx5: Fix command entry leak in Internal Error State (networking-stable-20_05_12).\n- net/mlx5: Fix crash upon suspend/resume (networking-stable-20_06_07).\n- net/mlx5: Fix failing fw tracer allocation on s390 (bsc#1103990 ).\n- net/mlx5: Fix forced completion access non initialized command entry (networking-stable-20_05_12).\n- net: mvmdio: allow up to four clocks to be specified for orion-mdio (git-fixes).\n- net: mvneta: Fix the case where the last poll did not process all rx (networking-stable-20_03_28).\n- net: mvpp2: prs: Do not override the sign bit in SRAM parser shift (git-fixes).\n- net: netrom: Fix potential nr_neigh refcnt leak in nr_add_node (networking-stable-20_04_27).\n- net/packet: tpacket_rcv: do not increment ring index on drop (networking-stable-20_03_14).\n- net: phy: fix aneg restart in phy_ethtool_set_eee (networking-stable-20_05_16).\n- net: phy: micrel: kszphy_resume(): add delay after genphy_resume() before accessing PHY registers (bsc#1051510).\n- net: phy: restore mdio regs in the iproc mdio driver (networking-stable-20_03_01).\n- netprio_cgroup: Fix unlimited memory leak of v2 cgroups (networking-stable-20_05_16).\n- net: qede: stop adding events on an already destroyed workqueue (git-fixes).\n- net: qed: fix excessive QM ILT lines consumption (git-fixes).\n- net: qed: fix NVMe login fails over VFs (git-fixes).\n- net: qmi_wwan: add support for ASKEY WWHC050 (networking-stable-20_03_28).\n- net: qrtr: Fix passing invalid reference to qrtr_local_enqueue() (networking-stable-20_05_27).\n- net: revert default NAPI poll timeout to 2 jiffies (networking-stable-20_04_17).\n- net: revert \u0027net: get rid of an signed integer overflow in ip_idents_reserve()\u0027 (networking-stable-20_05_27).\n- net_sched: cls_route: remove the right filter from hashtable (networking-stable-20_03_28).\n- net sched: fix reporting the first-time use timestamp (networking-stable-20_05_27).\n- net_sched: sch_skbprio: add message validation to skbprio_change() (bsc#1109837).\n- net: stricter validation of untrusted gso packets (networking-stable-20_05_12).\n- net/tls: Fix sk_psock refcnt leak in bpf_exec_tx_verdict() (networking-stable-20_05_12).\n- net/tls: Fix sk_psock refcnt leak when in tls_data_ready() (networking-stable-20_05_12).\n- net: usb: qmi_wwan: add support for DW5816e (networking-stable-20_05_12).\n- net: usb: qmi_wwan: add Telit 0x1050 composition (networking-stable-20_06_07).\n- net: usb: qmi_wwan: add Telit LE910C1-EUX composition (networking-stable-20_06_07).\n- net: vmxnet3: fix possible buffer overflow caused by bad DMA value in vmxnet3_get_rss() (bsc#1172484).\n- net/x25: Fix x25_neigh refcnt leak when receiving frame (networking-stable-20_04_27).\n- nfc: add missing attribute validation for SE API (networking-stable-20_03_14).\n- nfc: add missing attribute validation for vendor subcommand (networking-stable-20_03_14).\n- nfc: fdp: Fix a signedness bug in fdp_nci_send_patch() (bsc#1051510).\n- nfc: pn544: Fix occasional HW initialization failure (networking-stable-20_03_01).\n- nfc: st21nfca: add missed kfree_skb() in an error path (bsc#1051510).\n- nfp: abm: fix a memory leak bug (bsc#1109837).\n- nfp: bpf: fix code-gen bug on BPF_ALU | BPF_XOR | BPF_K (git-fixes).\n- nfsd4: fix up replay_matches_cache() (git-fixes).\n- nfsd: Ensure CLONE persists data and metadata changes to the target file (git-fixes).\n- nfsd: fix delay timer on 32-bit architectures (git-fixes).\n- nfsd: fix jiffies/time_t mixup in LRU list (git-fixes).\n- nfs: Directory page cache pages need to be locked when read (git-fixes).\n- nfsd: memory corruption in nfsd4_lock() (git-fixes).\n- nfs: Do not call generic_error_remove_page() while holding locks (bsc#1170457).\n- NFS: Fix an RCU lock leak in nfs4_refresh_delegation_stateid() (bsc#1170592).\n- nfs: Fix memory leaks and corruption in readdir (git-fixes).\n- nfs: Fix O_DIRECT accounting of number of bytes read/written (git-fixes).\n- nfs: Fix potential posix_acl refcnt leak in nfs3_set_acl (git-fixes).\n- nfs: fix racey wait in nfs_set_open_stateid_locked (bsc#1170592).\n- nfs/flexfiles: Use the correct TCP timeout for flexfiles I/O (git-fixes).\n- nfs/pnfs: Fix pnfs_generic_prepare_to_resend_writes() (git-fixes).\n- nfs: Revalidate the file size on a fatal write error (git-fixes).\n- NFSv4.0: nfs4_do_fsinfo() should not do implicit lease renewals (git-fixes).\n- NFSv4: Do not allow a cached open with a revoked delegation (git-fixes).\n- NFSv4: Fix leak of clp-\u003ecl_acceptor string (git-fixes).\n- NFSv4/pnfs: Return valid stateids in nfs_layout_find_inode_by_stateid() (git-fixes).\n- NFSv4: Retry CLOSE and DELEGRETURN on NFS4ERR_OLD_STATEID (bsc#1170592).\n- NFSv4: try lease recovery on NFS4ERR_EXPIRED (git-fixes).\n- NFSv4.x: Drop the slot if nfs4_delegreturn_prepare waits for layoutreturn (git-fixes).\n- nilfs2: fix null pointer dereference at nilfs_segctor_do_construct() (bsc#1173857).\n- nl80211: fix NL80211_ATTR_CHANNEL_WIDTH attribute type (bsc#1111666).\n- nl802154: add missing attribute validation for dev_type (networking-stable-20_03_14).\n- nl802154: add missing attribute validation (networking-stable-20_03_14).\n- nvdimm: Avoid race between probe and reading device attributes (bsc#1170442).\n- nvme: check for NVME_CTRL_LIVE in nvme_report_ns_ids() (bcs#1171558 bsc#1159058).\n- nvme: do not update multipath disk information if the controller is down (bcs#1171558 bsc#1159058).\n- nvme: fail cancelled commands with NVME_SC_HOST_PATH_ERROR (bsc#1158983 bsc#1172538).\n- nvme-fc: Fail transport errors with NVME_SC_HOST_PATH (bsc#1158983 bsc#1172538).\n- nvme-fc: print proper nvme-fc devloss_tmo value (bsc#1172391).\n- nvme-tcp: fail command with NVME_SC_HOST_PATH_ERROR send failed (bsc#1158983 bsc#1172538).\n- objtool: Add is_static_jump() helper (bsc#1169514).\n- objtool: Add relocation check for alternative sections (bsc#1169514).\n- objtool: Clean instruction state before each function validation (bsc#1169514).\n- objtool: Fix stack offset tracking for indirect CFAs (bsc#1169514).\n- objtool: Fix switch table detection in .text.unlikely (bsc#1169514).\n- objtool: Ignore empty alternatives (bsc#1169514).\n- objtool: Make BP scratch register warning more robust (bsc#1169514).\n- ocfs2: no need try to truncate file beyond i_size (bsc#1171841).\n- OMAP: DSS2: remove non-zero check on variable r (bsc#1114279)\n- overflow: Fix -Wtype-limits compilation warnings (git fixes).\n- overflow.h: Add arithmetic shift helper (git fixes).\n- p54usb: add AirVasT USB stick device-id (bsc#1051510).\n- padata: ensure the reorder timer callback runs on the correct CPU (git-fixes).\n- padata: Remove broken queue flushing (git-fixes).\n- padata: reorder work kABI fixup (git-fixes).\n- Partially revert \u0027kfifo: fix kfifo_alloc() and kfifo_init()\u0027 (git fixes (block drivers)).\n- partitions/efi: Fix partition name parsing in GUID partition entry (bsc#1168763).\n- PCI/AER: Remove HEST/FIRMWARE_FIRST parsing for AER ownership (bsc#1174356).\n- PCI/AER: Use only _OSC to determine AER ownership (bsc#1174356).\n- PCI: Allow pci_resize_resource() for devices on root bus (bsc#1051510).\n- PCI/ASPM: Clear the correct bits when enabling L1 substates (bsc#1051510).\n- PCI: endpoint: Fix clearing start entry in configfs (bsc#1051510).\n- PCI: Fix pci_register_host_bridge() device_register() error handling (bsc#1051510).\n- PCI: Generalize multi-function power dependency device links (bsc#1111666).\n- PCI: hv: Add support for protocol 1.3 and support PCI_BUS_RELATIONS2 (bsc#1172201, bsc#1172202).\n- PCI: hv: Change pci_protocol_version to per-hbus (bsc#1172871, bsc#1172872).\n- PCI: hv: Decouple the func definition in hv_dr_state from VSP message (bsc#1172201, bsc#1172202).\n- PCI: hv: Fix the PCI HyperV probe failure path to release resource properly (bsc#1172871, bsc#1172872).\n- PCI: hv: Introduce hv_msi_entry (bsc#1172871, bsc#1172872).\n- PCI: hv: Move hypercall related definitions into tlfs header (bsc#1172871, bsc#1172872).\n- PCI: hv: Move retarget related structures into tlfs header (bsc#1172871, bsc#1172872).\n- PCI: hv: Reorganize the code in preparation of hibernation (bsc#1172871, bsc#1172872).\n- PCI: hv: Retry PCI bus D0 entry on invalid device state (bsc#1172871, bsc#1172872).\n- PCI: pciehp: Fix indefinite wait on sysfs requests (git-fixes).\n- PCI: pciehp: Fix MSI interrupt race (bsc#1159037).\n- PCI: pciehp: Support interrupts sent from D3hot (git-fixes).\n- PCI/PM: Call .bridge_d3() hook only if non-NULL (git-fixes).\n- PCI: Program MPS for RCiEP devices (bsc#1051510).\n- PCI/PTM: Inherit Switch Downstream Port PTM settings from Upstream Port (bsc#1051510).\n- pci: Revive pci_dev __aer_firmware_first* fields for kABI (bsc#1174356).\n- PCI/switchtec: Fix init_completion race condition with poll_wait() (bsc#1051510).\n- pcm_native: result of put_user() needs to be checked (bsc#1111666).\n- perf: Allocate context task_ctx_data for child event (git-fixes).\n- perf/cgroup: Fix perf cgroup hierarchy support (git-fixes).\n- perf: Copy parent\u0027s address filter offsets on clone (git-fixes).\n- perf/core: Add sanity check to deal with pinned event failure (git-fixes).\n- perf/core: Avoid freeing static PMU contexts when PMU is unregistered (git-fixes).\n- perf/core: Correct event creation with PERF_FORMAT_GROUP (git-fixes).\n- perf/core: Do not WARN() for impossible ring-buffer sizes (git-fixes).\n- perf/core: Fix ctx_event_type in ctx_resched() (git-fixes).\n- perf/core: Fix error handling in perf_event_alloc() (git-fixes).\n- perf/core: Fix exclusive events\u0027 grouping (git-fixes).\n- perf/core: Fix group scheduling with mixed hw and sw events (git-fixes).\n- perf/core: Fix impossible ring-buffer sizes warning (git-fixes).\n- perf/core: Fix locking for children siblings group read (git-fixes).\n- perf/core: Fix perf_event_read_value() locking (git-fixes).\n- perf/core: Fix perf_pmu_unregister() locking (git-fixes).\n- perf/core: Fix perf_sample_regs_user() mm check (git-fixes).\n- perf/core: Fix possible Spectre-v1 indexing for -\u003eaux_pages (git-fixes).\n- perf/core: Fix race between close() and fork() (git-fixes).\n- perf/core: Fix the address filtering fix (git-fixes).\n- perf/core: Fix use-after-free in uprobe_perf_close() (git-fixes).\n- perf/core: Force USER_DS when recording user stack data (git-fixes).\n- perf/core: Restore mmap record type correctly (git-fixes).\n- perf: Fix header.size for namespace events (git-fixes).\n- perf/ioctl: Add check for the sample_period value (git-fixes).\n- perf, pt, coresight: Fix address filters for vmas with non-zero offset (git-fixes).\n- perf: Return proper values for user stack errors (git-fixes).\n- perf/x86/amd: Constrain Large Increment per Cycle events (git-fixes).\n- perf/x86/amd/ibs: Fix reading of the IBS OpData register and thus precise RIP validity (git-fixes).\n- perf/x86/amd/ibs: Fix sample bias for dispatched micro-ops (git-fixes).\n- perf/x86/amd/ibs: Handle erratum #420 only on the affected CPU family (10h) (git-fixes).\n- perf/x86/amd/iommu: Make the \u0027amd_iommu_attr_groups\u0027 symbol static (git-fixes).\n- perf/x86/amd/uncore: Do not set \u0027ThreadMask\u0027 and \u0027SliceMask\u0027 for non-L3 PMCs (git-fixes stable).\n- perf/x86/amd/uncore: Set the thread mask for F17h L3 PMCs (git-fixes).\n- perf/x86/amd/uncore: Set ThreadMask and SliceMask for L3 Cache perf events (git-fixes stable).\n- perf/x86: Enable free running PEBS for REGS_USER/INTR (git-fixes).\n- perf/x86: Fix incorrect PEBS_REGS (git-fixes).\n- perf/x86/intel: Add generic branch tracing check to intel_pmu_has_bts() (git-fixes).\n- perf/x86/intel: Add proper condition to run sched_task callbacks (git-fixes).\n- perf/x86/intel/bts: Fix the use of page_private() (git-fixes).\n- perf/x86/intel: Fix PT PMI handling (git-fixes).\n- perf/x86/intel: Move branch tracing setup to the Intel-specific source file (git-fixes).\n- perf/x86/intel/uncore: Add Node ID mask (git-fixes).\n- perf/x86/intel/uncore: Fix PCI BDF address of M3UPI on SKX (git-fixes).\n- perf/x86/intel/uncore: Handle invalid event coding for free-running counter (git-fixes).\n- perf/x86/uncore: Fix event group support (git-fixes).\n- pid: Improve the comment about waiting in zap_pid_ns_processes (git fixes)).\n- pinctrl: baytrail: Enable pin configuration setting for GPIO chip (git-fixes).\n- pinctrl: cherryview: Add missing spinlock usage in chv_gpio_irq_handler (git-fixes).\n- pinctrl: core: Remove extra kref_get which blocks hogs being freed (bsc#1051510).\n- pinctrl: freescale: imx: Fix an error handling path in \u0027imx_pinctrl_probe()\u0027 (bsc#1051510).\n- pinctrl: imxl: Fix an error handling path in \u0027imx1_pinctrl_core_probe()\u0027 (bsc#1051510).\n- pinctrl: samsung: Save/restore eint_mask over suspend for EINT_TYPE GPIOs (bsc#1051510).\n- pinctrl: sunrisepoint: Fix PAD lock register offset for SPT-H (git-fixes).\n- platform/x86: asus-nb-wmi: Do not load on Asus T100TA and T200TA (bsc#1051510).\n- platform/x86: dell-laptop: do not register micmute LED if there is no token (bsc#1111666).\n- platform/x86: hp-wmi: Convert simple_strtoul() to kstrtou32() (bsc#1111666).\n- PM / Domains: Allow genpd users to specify default active wakeup behavior (git-fixes).\n- pNFS: Ensure we do clear the return-on-close layout stateid on fatal errors (git-fixes).\n- pnp: Use list_for_each_entry() instead of open coding (git fixes).\n- powerpc/64s: Do not let DT CPU features set FSCR_DSCR (bsc#1065729).\n- powerpc/64s: Save FSCR to init_task.thread.fscr after feature init (bsc#1065729).\n- powerpc: Add attributes for setjmp/longjmp (bsc#1065729).\n- powerpc/book3s64: Export has_transparent_hugepage() related functions (bsc#1171759).\n- powerpc/book3s64/pkeys: Fix pkey_access_permitted() for execute disable pkey (bsc#1065729).\n- powerpc/fadump: fix race between pstore write and fadump crash trigger (bsc#1168959 ltc#185010).\n- powerpc/hash64/devmap: Use H_PAGE_THP_HUGE when setting up huge devmap PTE entries (bsc#1065729).\n- powerpc/pci/of: Parse unassigned resources (bsc#1065729).\n- powerpc/setup_64: Set cache-line-size based on cache-block-size (bsc#1065729).\n- powerpc/sstep: Fix DS operand in ld encoding to appropriate value (bsc#1065729).\n- powerpc/xive: Clear the page tables for the ESB IO mapping (bsc#1085030).\n- powerpc/xmon: Reset RCU and soft lockup watchdogs (bsc#1065729).\n- power: supply: bq24257_charger: Replace depends on REGMAP_I2C with select (bsc#1051510).\n- power: supply: lp8788: Fix an error handling path in \u0027lp8788_charger_probe()\u0027 (bsc#1051510).\n- power: supply: smb347-charger: IRQSTAT_D is volatile (bsc#1051510).\n- power: vexpress: add suppress_bind_attrs to true (bsc#1111666).\n- pppoe: only process PADT targeted at local interfaces (networking-stable-20_05_16).\n- pwm: bcm2835: Dynamically allocate base (bsc#1051510).\n- pwm: meson: Fix confusing indentation (bsc#1051510).\n- pwm: pca9685: Fix PWM/GPIO inter-operation (bsc#1051510).\n- pwm: rcar: Fix late Runtime PM enablement (bsc#1051510).\n- pwm: renesas-tpu: Fix late Runtime PM enablement (bsc#1051510).\n- pxa168fb: fix release function mismatch in probe failure (bsc#1051510).\n- qede: Fix race between rdma destroy workqueue and link change event (networking-stable-20_03_01).\n- qed: reduce maximum stack frame size (git-fixes).\n- qlcnic: fix missing release in qlcnic_83xx_interrupt_test (git-fixes).\n- qmi_wwan: unconditionally reject 2 ep interfaces (bsc#1051510).\n- r8152: check disconnect status after long sleep (networking-stable-20_03_14).\n- r8152: support additional Microsoft Surface Ethernet Adapter variant (networking-stable-20_05_27).\n- raid5: remove gfp flags from scribble_alloc() (bsc#1166985).\n- raid6/ppc: Fix build for clang (git fixes (block drivers)).\n- random: always use batched entropy for get_random_u{32,64} (bsc#1164871).\n- rcu: locking and unlocking need to always be at least barriers (git fixes (block drivers)).\n- RDMA/efa: Fix setting of wrong bit in get/set_feature commands (bsc#1111666)\n- RDMA/efa: Set maximum pkeys device attribute (bsc#1111666)\n- RDMA/efa: Support remote read access in MR registration (bsc#1111666)\n- RDMA/efa: Unified getters/setters for device structs bitmask access (bsc#1111666)\n- README.BRANCH: Add Takashi Iwai as primary maintainer.\n- README.BRANCH: Replace Matt Fleming with Davidlohr Bueso as maintainer.\n- regmap: debugfs: Do not sleep while atomic for fast_io regmaps (bsc#1111666).\n- resolve KABI warning for perf-pt-coresight (git-fixes).\n- Revert \u0027ALSA: hda/realtek: Fix pop noise on ALC225\u0027 (git-fixes).\n- Revert \u0027bcache: ignore pending signals when creating gc and allocator thread\u0027 (git fixes (block drivers)).\n- Revert commit e918e570415c (\u0027tpm_tis: Remove the HID IFX0102\u0027) (bsc#1111666).\n- Revert \u0027dm crypt: use WQ_HIGHPRI for the IO and crypt workqueues\u0027 (git fixes (block drivers)).\n- Revert \u0027drm/panel: simple: Add support for Sharp LQ150X1LG11 panels\u0027 (bsc#1114279) \t* offset changes\n- Revert \u0027HID: i2c-hid: add Trekstor Primebook C11B to descriptor override\u0027 Depends on 9b5c747685982d22efffeafc5ec601bd28f6d78b, which was also reverted.\n- Revert \u0027HID: i2c-hid: override HID descriptors for certain devices\u0027 This broke i2c-hid.ko\u0027s build, there is no way around it without a big file rename or renaming the kernel module.\n- Revert \u0027i2c-hid: properly terminate i2c_hid_dmi_desc_override_table\u0027 Fixed 9b5c747685982d22efffeafc5ec601bd28f6d78b, which was also reverted.\n- Revert \u0027ipc,sem: remove uneeded sem_undo_list lock usage in exit_sem()\u0027 (bsc#1172221).\n- Revert \u0027RDMA/cma: Simplify rdma_resolve_addr() error flow\u0027 (bsc#1103992).\n- Revert \u0027thermal: mediatek: fix register index error\u0027 (bsc#1111666).\n- Revert \u0027tools lib traceevent: Remove unneeded qsort and uses memmove\u0027\n- rtlwifi: Fix a double free in _rtl_usb_tx_urb_setup() (bsc#1051510).\n- rtnetlink: Fix memory(net_device) leak when -\u003enewlink fails (git-fixes).\n- s390/bpf: Maintain 8-byte stack alignment (bsc#1169194).\n- s390/cio: avoid duplicated \u0027ADD\u0027 uevents (git-fixes).\n- s390/cio: generate delayed uevent for vfio-ccw subchannels (git-fixes).\n- s390/cpuinfo: fix wrong output when CPU0 is offline (git-fixes).\n- s390/cpum_cf: Add new extended counters for IBM z15 (bsc#1169762 LTC#185291).\n- s390/diag: fix display of diagnose call statistics (git-fixes).\n- s390: fix syscall_get_error for compat processes (git-fixes).\n- s390/ftrace: fix potential crashes when switching tracers (git-fixes).\n- s390/gmap: return proper error code on ksm unsharing (git-fixes).\n- s390/ism: fix error return code in ism_probe() (git-fixes).\n- s390/pci: do not set affinity for floating irqs (git-fixes).\n- s390/pci: Fix possible deadlock in recover_store() (bsc#1165183 LTC#184103).\n- s390/pci: Recover handle in clp_set_pci_fn() (bsc#1165183 LTC#184103).\n- s390/qdio: consistently restore the IRQ handler (git-fixes).\n- s390/qdio: lock device while installing IRQ handler (git-fixes).\n- s390/qdio: put thinint indicator after early error (git-fixes).\n- s390/qdio: tear down thinint indicator after early error (git-fixes).\n- s390/qeth: cancel RX reclaim work earlier (git-fixes).\n- s390/qeth: do not return -ENOTSUPP to userspace (git-fixes).\n- s390/qeth: do not warn for napi with 0 budget (git-fixes).\n- s390/qeth: fix error handling for isolation mode cmds (git-fixes).\n- s390/qeth: fix off-by-one in RX copybreak check (git-fixes).\n- s390/qeth: fix promiscuous mode after reset (git-fixes).\n- s390/qeth: fix qdio teardown after early init error (git-fixes).\n- s390/qeth: handle error due to unsupported transport mode (git-fixes).\n- s390/qeth: handle error when backing RX buffer (git-fixes).\n- s390/qeth: lock the card while changing its hsuid (git-fixes).\n- s390/qeth: support net namespaces for L3 devices (git-fixes).\n- s390/time: Fix clk type in get_tod_clock (git-fixes).\n- sch_choke: avoid potential panic in choke_reset() (networking-stable-20_05_12).\n- sch_sfq: validate silly quantum values (networking-stable-20_05_12).\n- scripts/decodecode: fix trapping instruction formatting (bsc#1065729).\n- scripts/dtc: Remove redundant YYLOC global declaration (bsc#1160388).\n- scripts/git_sort/git_sort.py: add bluetooth/bluetooth-next.git repository\n- scsi: aacraid: fix a signedness bug (bsc#1174296).\n- scsi: bnx2i: fix potential use after free (bsc#1171600).\n- scsi: core: avoid repetitive logging of device offline messages (bsc#1145929).\n- scsi: core: Handle drivers which set sg_tablesize to zero (bsc#1171601) This commit also required: \u003e scsi: core: avoid preallocating big SGL for data\n- scsi: core: kABI fix offline_already (bsc#1145929).\n- scsi: core: save/restore command resid for error handling (bsc#1171602).\n- scsi: core: scsi_trace: Use get_unaligned_be*() (bsc#1171604).\n- scsi: core: try to get module before removing device (bsc#1171605).\n- scsi: csiostor: Adjust indentation in csio_device_reset (bsc#1171606).\n- scsi: csiostor: Do not enable IRQs too early (bsc#1171607).\n- scsi: esas2r: unlock on error in esas2r_nvram_read_direct() (bsc#1171608).\n- scsi: fnic: fix invalid stack access (bsc#1171609).\n- scsi: fnic: fix msix interrupt allocation (bsc#1171610).\n- scsi: hisi_sas: fix calls to dma_set_mask_and_coherent() (bsc#1174296).\n- scsi: ibmvscsi: Do not send host info in adapter info MAD after LPM (bsc#1172759 ltc#184814).\n- scsi: ibmvscsi: Fix WARN_ON during event pool release (bsc#1170791 ltc#185128).\n- scsi: iscsi: Avoid potential deadlock in iscsi_if_rx func (bsc#1171611).\n- scsi: iscsi: Fix a potential deadlock in the timeout handler (bsc#1171612).\n- scsi: iscsi: qla4xxx: fix double free in probe (bsc#1171613).\n- scsi: lpfc: Add an internal trace log buffer (bsc#1172687 bsc#1171530).\n- scsi: lpfc: Add blk_io_poll support for latency improvment (bsc#1172687 bsc#1171530).\n- scsi: lpfc: Add support to display if adapter dumps are available (bsc#1172687 bsc#1171530).\n- scsi: lpfc: Allow applications to issue Common Set Features mailbox command (bsc#1172687 bsc#1171530).\n- scsi: lpfc: Avoid another null dereference in lpfc_sli4_hba_unset() (bsc#1172687 bsc#1171530).\n- scsi: lpfc: Change default queue allocation for reduced memory consumption (bsc#1164780).\n- scsi: lpfc: fix: Coverity: lpfc_cmpl_els_rsp(): Null pointer dereferences (bsc#1171614).\n- scsi: lpfc: Fix crash in target side cable pulls hitting WAIT_FOR_UNREG (bsc#1171615).\n- scsi: lpfc: Fix inconsistent indenting (bsc#1158983).\n- scsi: lpfc: Fix interrupt assignments when multiple vectors are supported on same CPU (bsc#1158983).\n- scsi: lpfc: Fix kdump hang on PPC (bsc#1172687 bsc#1171530).\n- scsi: lpfc: Fix language in 0373 message to reflect non-error message (bsc#1172687 bsc#1171530).\n- scsi: lpfc: Fix less-than-zero comparison of unsigned value (bsc#1158983).\n- scsi: lpfc: Fix lpfc_nodelist leak when processing unsolicited event (bsc#1164780).\n- scsi: lpfc: Fix MDS Diagnostic Enablement definition (bsc#1164780).\n- scsi: lpfc: Fix missing MDS functionality (bsc#1172687 bsc#1171530).\n- scsi: lpfc: Fix negation of else clause in lpfc_prep_node_fc4type (bsc#1164780).\n- scsi: lpfc: Fix noderef and address space warnings (bsc#1164780).\n- scsi: lpfc: Fix NVMe rport deregister and registration during ADISC (bsc#1172687 bsc#1171530).\n- scsi: lpfc: Fix oops due to overrun when reading SLI3 data (bsc#1172687 bsc#1171530).\n- scsi: lpfc: Fix shost refcount mismatch when deleting vport (bsc#1172687 bsc#1171530).\n- scsi: lpfc: Fix stack trace seen while setting rrq active (bsc#1172687 bsc#1171530).\n- scsi: lpfc: Fix unused assignment in lpfc_sli4_bsg_link_diag_test (bsc#1172687 bsc#1171530).\n- scsi: lpfc: Maintain atomic consistency of queue_claimed flag (bsc#1164780).\n- scsi: lpfc: remove duplicate unloading checks (bsc#1164780).\n- scsi: lpfc: Remove re-binding of nvme rport during registration (bsc#1164780).\n- scsi: lpfc: Remove redundant initialization to variable rc (bsc#1164780).\n- scsi: lpfc: Remove unnecessary lockdep_assert_held calls (bsc#1164780).\n- scsi: lpfc: Update lpfc version to 12.8.0.1 (bsc#1164780).\n- scsi: lpfc: Update lpfc version to 12.8.0.2 (bsc#1158983).\n- scsi: megaraid_sas: Do not initiate OCR if controller is not in ready state (bsc#1171616).\n- scsi: megaraid_sas: Fix a compilation warning (bsc#1174296).\n- scsi: mpt3sas: Fix double free in attach error handling (bsc#1174296).\n- scsi: qedf: Add port_id getter (bsc#1150660).\n- scsi: qla2xxx: add ring buffer for tracing debug logs (bsc#1157169).\n- scsi: qla2xxx: check UNLOADING before posting async work (bsc#1157169).\n- scsi: qla2xxx: Delete all sessions before unregister local nvme port (bsc#1157169).\n- scsi: qla2xxx: Do not log message when reading port speed via sysfs (bsc#1157169).\n- scsi: qla2xxx: Fix a condition in qla2x00_find_all_fabric_devs() (bsc#1174296).\n- scsi: qla2xxx: Fix hang when issuing nvme disconnect-all in NPIV (bsc#1157169).\n- scsi: qla2xxx: Fix regression warnings (bsc#1157169).\n- scsi: qla2xxx: Remove non functional code (bsc#1157169).\n- scsi: qla2xxx: Set NVMe status code for failed NVMe FCP request (bsc#1158983).\n- scsi: qla2xxx: set UNLOADING before waiting for session deletion (bsc#1157169).\n- scsi: qla4xxx: Adjust indentation in qla4xxx_mem_free (bsc#1171617).\n- scsi: qla4xxx: fix double free bug (bsc#1171618).\n- scsi: sd: Clear sdkp-\u003eprotection_type if disk is reformatted without PI (bsc#1171619).\n- scsi: sg: add sg_remove_request in sg_common_write (bsc#1171620).\n- scsi: tracing: Fix handling of TRANSFER LENGTH == 0 for READ(6) and WRITE(6) (bsc#1171621).\n- scsi: ufs: change msleep to usleep_range (bsc#1171622).\n- scsi: ufs: Clean up ufshcd_scale_clks() and clock scaling error out path (bsc#1171623).\n- scsi: ufs: Fix ufshcd_hold() caused scheduling while atomic (bsc#1171624).\n- scsi: ufs: Fix ufshcd_probe_hba() reture value in case ufshcd_scsi_add_wlus() fails (bsc#1171625).\n- scsi: ufs: Recheck bkops level if bkops is disabled (bsc#1171626).\n- scsi: zfcp: fix missing erp_lock in port recovery trigger for point-to-point (git-fixes).\n- sctp: Do not add the shutdown timer if its already been added (networking-stable-20_05_27).\n- sctp: fix possibly using a bad saddr with a given dst (networking-stable-20_04_02).\n- sctp: fix refcount bug in sctp_wfree (networking-stable-20_04_02).\n- sctp: move the format error check out of __sctp_sf_do_9_1_abort (networking-stable-20_03_01).\n- sctp: Start shutdown on association restart if in SHUTDOWN-SENT state and socket is closed (networking-stable-20_05_27).\n- selftests/powerpc: Fix build errors in powerpc ptrace selftests (boo#1124278).\n- Separate one more kABI fixup from the functional change:\n- seq_file: fix problem when seeking mid-record (bsc#1170125).\n- serdev: ttyport: restore client ops on deregistration (bsc#1051510).\n- serial: uartps: Move the spinlock after the read of the tx empty (git-fixes).\n- sfc: detach from cb_page in efx_copy_channel() (networking-stable-20_03_14).\n- signal/pid_namespace: Fix reboot_pid_ns to use send_sig not force_sig (bsc#1172185).\n- slcan: not call free_netdev before rtnl_unlock in slcan_open (networking-stable-20_03_28).\n- slip: make slhc_compress() more robust against malicious packets (networking-stable-20_03_14).\n- smb3: Additional compression structures (bsc#1144333).\n- smb3: Add new compression flags (bsc#1144333).\n- smb3: change noisy error message to FYI (bsc#1144333).\n- smb3: enable swap on SMB3 mounts (bsc#1144333).\n- smb3: Minor cleanup of protocol definitions (bsc#1144333).\n- smb3: remove overly noisy debug line in signing errors (bsc#1144333).\n- smb3: smbdirect support can be configured by default (bsc#1144333).\n- smb3: use SMB2_SIGNATURE_SIZE define (bsc#1144333).\n- spi: bcm2835: Fix 3-wire mode if DMA is enabled (git-fixes).\n- spi: bcm63xx-hsspi: Really keep pll clk enabled (bsc#1051510).\n- spi: bcm-qspi: when tx/rx buffer is NULL set to 0 (bsc#1051510).\n- spi: dw: Add SPI Rx-done wait method to DMA-based transfer (bsc#1051510).\n- spi: dw: Add SPI Tx-done wait method to DMA-based transfer (bsc#1051510).\n- spi: dw: use \u0027smp_mb()\u0027 to avoid sending spi data error (bsc#1051510).\n- spi: dw: Zero DMA Tx and Rx configurations on stack (bsc#1051510).\n- spi: fix initial SPI_SR value in spi-fsl-dspi (bsc#1111666).\n- spi: fsl: do not map irq during probe (git-fixes).\n- spi: fsl: use platform_get_irq() instead of of_irq_to_resource() (git-fixes).\n- spi: pxa2xx: Add CS control clock quirk (bsc#1051510).\n- spi: pxa2xx: Apply CS clk quirk to BXT (bsc#1111666).\n- spi: qup: call spi_qup_pm_resume_runtime before suspending (bsc#1051510).\n- spi: spidev: fix a race between spidev_release and spidev_remove (bsc#1111666).\n- spi: spi-fsl-dspi: Replace interruptible wait queue with a simple completion (git-fixes).\n- spi: spi-mem: Fix Dual/Quad modes on Octal-capable devices (bsc#1111666).\n- spi: spi-s3c64xx: Fix system resume support (git-fixes).\n- spi: spi-sun6i: sun6i_spi_transfer_one(): fix setting of clock rate (bsc#1111666).\n- spi/zynqmp: remove entry that causes a cs glitch (bsc#1051510).\n- staging: comedi: dt2815: fix writing hi byte of analog output (bsc#1051510).\n- staging: comedi: Fix comedi_device refcnt leak in comedi_open (bsc#1051510).\n- staging: comedi: verify array index is correct before using it (bsc#1111666).\n- staging: iio: ad2s1210: Fix SPI reading (bsc#1051510).\n- staging: rtl8188eu: Add ASUS USB-N10 Nano B1 to device table (bsc#1051510).\n- staging: rtl8712: Fix IEEE80211_ADDBA_PARAM_BUF_SIZE_MASK (bsc#1051510).\n- staging: sm750fb: add missing case while setting FB_VISUAL (bsc#1051510).\n- staging: vt6656: Do not set RCR_MULTICAST or RCR_BROADCAST by default (git-fixes).\n- staging: vt6656: Fix drivers TBTT timing counter (git-fixes).\n- staging: vt6656: Fix pairwise key entry save (git-fixes).\n- staging: vt6656: fix sign of rx_dbm to bb_pre_ed_rssi (bsc#1051510).\n- staging: wlan-ng: fix ODEBUG bug in prism2sta_disconnect_usb (bsc#1051510).\n- staging: wlan-ng: fix use-after-free Read in hfa384x_usbin_callback (bsc#1051510).\n- SUNRPC: defer slow parts of rpc_free_client() to a workqueue (bsc#1168202).\n- SUNRPC: expiry_time should be seconds not timeval (git-fixes).\n- SUNRPC: Fix a potential buffer overflow in \u0027svc_print_xprts()\u0027 (git-fixes).\n- SUNRPC: The TCP back channel mustn\u0027t disappear while requests are outstanding (bsc#1152624).\n- supported.conf: Add br_netfilter to base (bsc#1169020).\n- svcrdma: Fix double svc_rdma_send_ctxt_put() in an error path (bsc#1103992).\n- svcrdma: Fix leak of transport addresses (git-fixes).\n- svcrdma: Fix trace point use-after-free race (bsc#1103992 ).\n- taskstats: fix data-race (bsc#1172188).\n- tcp: cache line align MAX_TCP_HEADER (networking-stable-20_04_27).\n- tcp: repair: fix TCP_QUEUE_SEQ implementation (networking-stable-20_03_28).\n- team: add missing attribute validation for array index (networking-stable-20_03_14).\n- team: add missing attribute validation for port ifindex (networking-stable-20_03_14).\n- team: fix hang in team_mode_get() (networking-stable-20_04_27).\n- tg3: driver sleeps indefinitely when EEH errors exceed eeh_max_freezes (bsc#1173284).\n- thermal: devfreq_cooling: inline all stubs for CONFIG_DEVFREQ_THERMAL=n (bsc#1051510).\n- timers: Add a function to start/reduce a timer (networking-stable-20_05_27).\n- tools lib traceevent: Remove unneeded qsort and uses memmove instead (git-fixes).\n- tpm: ibmvtpm: retry on H_CLOSED in tpm_ibmvtpm_send() (bsc#1065729).\n- tpm_tis: extra chip-\u003eops check on error path in tpm_tis_core_init (bsc#1111666).\n- tpm_tis: Remove the HID IFX0102 (bsc#1111666).\n- tpm/tpm_tis: Free IRQ if probing fails (bsc#1082555).\n- tpm/tpm_tis: Free IRQ if probing fails (git-fixes).\n- tracing: Add a vmalloc_sync_mappings() for safe measure (git-fixes).\n- tracing: Disable trace_printk() on post poned tests (git-fixes).\n- tracing: Fix event trigger to accept redundant spaces (git-fixes).\n- tracing: Fix the race between registering \u0027snapshot\u0027 event trigger and triggering \u0027snapshot\u0027 operation (git-fixes).\n- tty: evh_bytechan: Fix out of bounds accesses (bsc#1051510).\n- tty: hvc_console, fix crashes on parallel open/close (git-fixes).\n- tty: n_gsm: Fix bogus i++ in gsm_data_kick (bsc#1051510).\n- tty: n_gsm: Fix SOF skipping (bsc#1051510).\n- tty: n_gsm: Fix waking up upper tty layer when room available (bsc#1051510).\n- tty: rocket, avoid OOB access (git-fixes).\n- tty/serial: atmel: manage shutdown in case of RS485 or ISO7816 mode (bsc#1051510).\n- tty: serial: imx: setup the correct sg entry for tx dma (bsc#1051510).\n- tun: Do not put_page() for all negative return values from XDP program (bsc#1109837).\n- tunnel: Propagate ECT(1) when decapsulating as recommended by RFC6040 (networking-stable-20_05_12).\n- UAS: fix deadlock in error handling and PM flushing work (git-fixes).\n- UAS: no use logging any details in case of ENODEV (git-fixes).\n- ubifs: remove broken lazytime support (bsc#1173826).\n- Update config files: Build w1 bus on arm64 (jsc#SLE-11048)\n- USB: Add USB_QUIRK_DELAY_CTRL_MSG and USB_QUIRK_DELAY_INIT for Corsair K70 RGB RAPIDFIRE (git-fixes).\n- usb: add USB_QUIRK_DELAY_INIT for Logitech C922 (git-fixes).\n- USB: c67x00: fix use after free in c67x00_giveback_urb (bsc#1111666).\n- USB: cdc-acm: restore capability check order (git-fixes).\n- usb: chipidea: core: add wakeup support for extcon (bsc#1111666).\n- USB: core: Fix misleading driver bug report (bsc#1051510).\n- usb: dwc2: Fix shutdown callback in platform (bsc#1111666).\n- usb: dwc2: gadget: move gadget resume after the core is in L0 state (bsc#1051510).\n- USB: dwc3: do not set gadget-\u003eis_otg flag (git-fixes).\n- USB: dwc3: gadget: Do link recovery for SS and SSP (git-fixes).\n- usb: dwc3: gadget: introduce cancelled_list (git-fixes).\n- usb: dwc3: gadget: never call -\u003ecomplete() from -\u003eep_queue() (git-fixes).\n- usb: dwc3: gadget: Properly handle ClearFeature(halt) (git-fixes).\n- usb: dwc3: gadget: Properly handle failed kick_transfer (git-fixes).\n- USB: early: Handle AMD\u0027s spec-compliant identifiers, too (git-fixes).\n- USB: ehci: reopen solution for Synopsys HC bug (git-fixes).\n- USB: f_fs: Clear OS Extended descriptor counts to zero in ffs_data_reset() (git-fixes).\n- USB: gadget: audio: Fix a missing error return value in audio_bind() (git-fixes).\n- USB: gadget: composite: Inform controller driver of self-powered (git-fixes).\n- USB: gadget: f_fs: Fix use after free issue as part of queue failure (bsc#1051510).\n- usb: gadget: fix potential double-free in m66592_probe (bsc#1111666).\n- USB: gadget: legacy: fix error return code in cdc_bind() (git-fixes).\n- USB: gadget: legacy: fix error return code in gncm_bind() (git-fixes).\n- USB: gadget: legacy: fix redundant initialization warnings (bsc#1051510).\n- usb: gadget: lpc32xx_udc: do not dereference ep pointer before null check (bsc#1051510).\n- USB: gadget: net2272: Fix a memory leak in an error handling path in \u0027net2272_plat_probe()\u0027 (git-fixes).\n- usb: gadget: udc: atmel: fix uninitialized read in debug printk (bsc#1111666).\n- USB: gadget: udc: atmel: Fix vbus disconnect handling (git-fixes).\n- USB: gadget: udc: atmel: Make some symbols static (git-fixes).\n- usb: gadget: udc: atmel: remove outdated comment in usba_ep_disable() (bsc#1111666).\n- USB: gadget: udc: bdc: Remove unnecessary NULL checks in bdc_req_complete (git-fixes).\n- usb: gadget: udc: Potential Oops in error handling code (bsc#1111666).\n- USB: gadget: udc: s3c2410_udc: Remove pointless NULL check in s3c2410_udc_nuke (bsc#1051510).\n- usb: host: ehci-exynos: Fix error check in exynos_ehci_probe() (bsc#1111666).\n- USB: host: ehci-mxc: Add error handling in ehci_mxc_drv_probe() (bsc#1051510).\n- USB: host: xhci-plat: keep runtime active when removing host (git-fixes).\n- USB: hub: Fix handling of connect changes during sleep (git-fixes).\n- USB: musb: fix crash with highmen PIO and usbmon (bsc#1051510).\n- usb: musb: Fix runtime PM imbalance on error (bsc#1051510).\n- usb: musb: start session in resume for host port (bsc#1051510).\n- USBnet: silence an unnecessary warning (bsc#1170770).\n- usbnet: smsc95xx: Fix use-after-free after removal (bsc#1111666).\n- USB: ohci-sm501: Add missed iounmap() in remove (bsc#1111666).\n- USB: serial: ch341: add new Product ID for CH340 (bsc#1111666).\n- USB: serial: cypress_m8: enable Simply Automated UPB PIM (bsc#1111666).\n- USB: serial: garmin_gps: add sanity checking for data length (git-fixes).\n- USB: serial: io_edgeport: fix slab-out-of-bounds read in edge_interrupt_callback (bsc#1051510).\n- USB: serial: iuu_phoenix: fix memory corruption (bsc#1111666).\n- USB: serial: option: add BroadMobi BM806U (git-fixes).\n- USB: serial: option: add GosunCn GM500 series (bsc#1111666).\n- USB: serial: option: add Quectel EG95 LTE modem (bsc#1111666).\n- USB: serial: option: add support for ASKEY WWHC050 (git-fixes).\n- USB: serial: option: add Telit LE910C1-EUX compositions (bsc#1051510).\n- USB: serial: option: add Wistron Neweb D19Q1 (git-fixes).\n- USB: serial: qcserial: add DW5816e QDL support (bsc#1051510).\n- USB: serial: qcserial: Add DW5816e support (git-fixes).\n- USB: serial: usb_wwan: do not resubmit rx urb on fatal errors (bsc#1051510).\n- USB: serial: usb_wwan: do not resubmit rx urb on fatal errors (git-fixes).\n- USB: sisusbvga: Change port variable from signed to unsigned (git-fixes).\n- usb-storage: Add unusual_devs entry for JMicron JMS566 (git-fixes).\n- USB: uas: add quirk for LaCie 2Big Quadra (git-fixes).\n- USB: xhci: Fix NULL pointer dereference when enqueuing trbs from urb sg list (git-fixes).\n- vfio/pci: Fix SR-IOV VF handling with MMIO blocking (bsc#1174123).\n- vfs: Fix EOVERFLOW testing in put_compat_statfs64 (bnc#1151927 5.3.6).\n- video: fbdev: sis: Remove unnecessary parentheses and commented code (bsc#1114279)\n- video: fbdev: w100fb: Fix a potential double free (bsc#1051510).\n- virtio-blk: handle block_device_operations callbacks after hot unplug (git fixes (block drivers)).\n- virtio: virtio_console: add missing MODULE_DEVICE_TABLE() for rproc serial (git-fixes).\n- vmxnet3: add geneve and vxlan tunnel offload support (bsc#1172484).\n- vmxnet3: add support to get/set rx flow hash (bsc#1172484).\n- vmxnet3: allow rx flow hash ops only when rss is enabled (bsc#1172484).\n- vmxnet3: avoid format strint overflow warning (bsc#1172484).\n- vmxnet3: prepare for version 4 changes (bsc#1172484).\n- vmxnet3: Remove always false conditional statement (bsc#1172484).\n- vmxnet3: remove redundant initialization of pointer \u0027rq\u0027 (bsc#1172484).\n- vmxnet3: remove unused flag \u0027rxcsum\u0027 from struct vmxnet3_adapter (bsc#1172484).\n- vmxnet3: Replace msleep(1) with usleep_range() (bsc#1172484).\n- vmxnet3: update to version 4 (bsc#1172484).\n- vmxnet3: use correct hdr reference when packet is encapsulated (bsc#1172484).\n- vrf: Check skb for XFRM_TRANSFORMED flag (networking-stable-20_04_27).\n- vsock: fix timeout in vsock_accept() (networking-stable-20_06_07).\n- vt: ioctl, switch VT_IS_IN_USE and VT_BUSY to inlines (git-fixes).\n- vt: selection, introduce vc_is_sel (git-fixes).\n- vt: vt_ioctl: fix race in VT_RESIZEX (git-fixes).\n- vt: vt_ioctl: fix use-after-free in vt_in_use() (git-fixes).\n- vt: vt_ioctl: fix VT_DISALLOCATE freeing in-use virtual console (git-fixes).\n- vxlan: Avoid infinite loop when suppressing NS messages with invalid options (git-fixes).\n- vxlan: check return value of gro_cells_init() (networking-stable-20_03_28).\n- w1: Add subsystem kernel public interface (jsc#SLE-11048).\n- w1: Fix slave count on 1-Wire bus (resend) (jsc#SLE-11048).\n- w1: keep balance of mutex locks and refcnts (jsc#SLE-11048).\n- w1: omap-hdq: cleanup to add missing newline for some dev_dbg (bsc#1051510).\n- w1: use put_device() if device_register() fail (jsc#SLE-11048).\n- watchdog: reset last_hw_keepalive time at start (git-fixes).\n- watchdog: sp805: fix restart handler (bsc#1111666).\n- wcn36xx: Fix error handling path in \u0027wcn36xx_probe()\u0027 (bsc#1051510).\n- wil6210: add general initialization/size checks (bsc#1111666).\n- wil6210: check rx_buff_mgmt before accessing it (bsc#1111666).\n- wil6210: ignore HALP ICR if already handled (bsc#1111666).\n- wil6210: make sure Rx ring sizes are correlated (git-fixes).\n- wil6210: remove reset file from debugfs (git-fixes).\n- wimax/i2400m: Fix potential urb refcnt leak (bsc#1051510).\n- work around mvfs bug (bsc#1162063).\n- workqueue: do not use wq_select_unbound_cpu() for bound works (bsc#1172130).\n- x86/apic: Install an empty physflat_init_apic_ldr (bsc#1163309).\n- x86/cpu/amd: Make erratum #1054 a legacy erratum (bsc#1114279).\n- x86/entry/64: Fix unwind hints in kernel exit path (bsc#1058115).\n- x86/entry/64: Fix unwind hints in register clearing code (bsc#1058115).\n- x86/entry/64: Fix unwind hints in rewind_stack_do_exit() (bsc#1058115).\n- x86/entry/64: Fix unwind hints in __switch_to_asm() (bsc#1058115).\n- x86/events/intel/ds: Add PERF_SAMPLE_PERIOD into PEBS_FREERUNNING_FLAGS (git-fixes).\n- x86: Fix early boot crash on gcc-10, third try (bsc#1114279).\n- x86/hyperv: Allow guests to enable InvariantTSC (bsc#1170621, bsc#1170620).\n- x86/Hyper-V: Free hv_panic_page when fail to register kmsg dump (bsc#1170617, bsc#1170618).\n- x86/Hyper-V: Report crash data in die() when panic_on_oops is set (bsc#1170617, bsc#1170618).\n- x86/Hyper-V: Report crash register data or kmsg before running crash kernel (bsc#1170617, bsc#1170618).\n- x86/Hyper-V: Report crash register data when sysctl_record_panic_msg is not set (bsc#1170617, bsc#1170618).\n- x86: hyperv: report value of misc_features (git fixes).\n- x86/Hyper-V: Trigger crash enlightenment only once during system crash (bsc#1170617, bsc#1170618).\n- x86/Hyper-V: Unload vmbus channel in hv panic callback (bsc#1170617, bsc#1170618).\n- x86/kprobes: Avoid kretprobe recursion bug (bsc#1114279).\n- x86/{mce,mm}: Unmap the entire page if the whole page is affected and poisoned (bsc#1172257).\n- x86/reboot/quirks: Add MacBook6,1 reboot quirk (bsc#1114279).\n- x86/resctrl: Fix invalid attempt at removing the default resource group (git-fixes).\n- x86/resctrl: Preserve CDP enable over CPU hotplug (bsc#1114279).\n- x86/unwind/orc: Do not skip the first frame for inactive tasks (bsc#1058115).\n- x86/unwind/orc: Fix error handling in __unwind_start() (bsc#1058115).\n- x86/unwind/orc: Fix error path for bad ORC entry type (bsc#1058115).\n- x86/unwind/orc: Fix unwind_get_return_address_ptr() for inactive tasks (bsc#1058115).\n- x86/unwind/orc: Prevent unwinding before ORC initialization (bsc#1058115).\n- x86/unwind: Prevent false warnings for non-current tasks (bsc#1058115).\n- x86/xen: fix booting 32-bit pv guest (bsc#1071995).\n- x86/xen: Make the boot CPU idle task reliable (bsc#1071995).\n- x86/xen: Make the secondary CPU idle tasks reliable (bsc#1071995).\n- xen/blkfront: fix memory allocation flags in blkfront_setup_indirect() (bsc#1168486).\n- xen/pci: reserve MCFG areas earlier (bsc#1170145).\n- xfrm: Always set XFRM_TRANSFORMED in xfrm{4,6}_output_finish (networking-stable-20_04_27).\n- xfrm: fix error in comment (git fixes).\n- xfs: clear PF_MEMALLOC before exiting xfsaild thread (git-fixes).\n- xfs: Correctly invert xfs_buftarg LRU isolation logic (git-fixes).\n- xfs: do not ever return a stale pointer from __xfs_dir3_free_read (git-fixes).\n- xhci: Fix incorrect EP_STATE_MASK (git-fixes).\n- xprtrdma: Fix completion wait during device removal (git-fixes).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2020-2487,SUSE-SLE-Module-RT-15-SP1-2020-2487", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2020_2487-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2020:2487-1", "url": "https://www.suse.com/support/update/announcement/2020/suse-su-20202487-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2020:2487-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-September/007352.html" }, { "category": "self", "summary": "SUSE Bug 1051510", "url": "https://bugzilla.suse.com/1051510" }, { "category": "self", "summary": "SUSE Bug 1058115", "url": "https://bugzilla.suse.com/1058115" }, { "category": "self", "summary": "SUSE Bug 1065600", "url": "https://bugzilla.suse.com/1065600" }, { "category": "self", "summary": "SUSE Bug 1065729", "url": "https://bugzilla.suse.com/1065729" }, { "category": "self", "summary": "SUSE Bug 1071995", "url": "https://bugzilla.suse.com/1071995" }, { "category": "self", "summary": "SUSE Bug 1082555", "url": "https://bugzilla.suse.com/1082555" }, { "category": "self", "summary": "SUSE Bug 1083647", "url": "https://bugzilla.suse.com/1083647" }, { "category": "self", "summary": "SUSE Bug 1085030", "url": "https://bugzilla.suse.com/1085030" }, { "category": "self", "summary": "SUSE Bug 1089895", "url": "https://bugzilla.suse.com/1089895" }, { "category": "self", "summary": "SUSE Bug 1090036", "url": "https://bugzilla.suse.com/1090036" }, { "category": "self", "summary": "SUSE Bug 1103990", "url": "https://bugzilla.suse.com/1103990" }, { "category": "self", "summary": "SUSE Bug 1103991", "url": "https://bugzilla.suse.com/1103991" }, { "category": "self", "summary": "SUSE Bug 1103992", "url": "https://bugzilla.suse.com/1103992" }, { "category": "self", "summary": "SUSE Bug 1104745", "url": "https://bugzilla.suse.com/1104745" }, { "category": "self", "summary": "SUSE Bug 1109837", "url": "https://bugzilla.suse.com/1109837" }, { "category": "self", "summary": "SUSE Bug 1111666", "url": "https://bugzilla.suse.com/1111666" }, { "category": "self", "summary": "SUSE Bug 1112178", "url": "https://bugzilla.suse.com/1112178" }, { "category": "self", "summary": "SUSE Bug 1112374", "url": "https://bugzilla.suse.com/1112374" }, { "category": "self", "summary": "SUSE Bug 1113956", "url": "https://bugzilla.suse.com/1113956" }, { "category": "self", "summary": "SUSE Bug 1114279", "url": "https://bugzilla.suse.com/1114279" }, { "category": "self", "summary": "SUSE Bug 1124278", "url": "https://bugzilla.suse.com/1124278" }, { "category": "self", "summary": "SUSE Bug 1127354", "url": "https://bugzilla.suse.com/1127354" }, { "category": "self", "summary": "SUSE Bug 1127355", "url": "https://bugzilla.suse.com/1127355" }, { "category": "self", "summary": "SUSE Bug 1127371", "url": "https://bugzilla.suse.com/1127371" }, { "category": "self", "summary": "SUSE Bug 1133021", "url": "https://bugzilla.suse.com/1133021" }, { "category": "self", "summary": "SUSE Bug 1137325", "url": "https://bugzilla.suse.com/1137325" }, { "category": "self", "summary": "SUSE Bug 1142685", "url": "https://bugzilla.suse.com/1142685" }, { "category": "self", "summary": "SUSE Bug 1144333", "url": "https://bugzilla.suse.com/1144333" }, { "category": "self", "summary": "SUSE Bug 1145929", "url": "https://bugzilla.suse.com/1145929" }, { "category": "self", "summary": "SUSE Bug 1148868", "url": "https://bugzilla.suse.com/1148868" }, { "category": "self", "summary": "SUSE Bug 1150660", "url": "https://bugzilla.suse.com/1150660" }, { "category": "self", "summary": "SUSE Bug 1151794", "url": "https://bugzilla.suse.com/1151794" }, { "category": "self", "summary": "SUSE Bug 1151927", "url": "https://bugzilla.suse.com/1151927" }, { "category": "self", "summary": "SUSE Bug 1152489", "url": "https://bugzilla.suse.com/1152489" }, { "category": "self", "summary": "SUSE Bug 1152624", "url": "https://bugzilla.suse.com/1152624" }, { "category": "self", "summary": "SUSE Bug 1154824", "url": "https://bugzilla.suse.com/1154824" }, { "category": "self", "summary": "SUSE Bug 1157169", "url": "https://bugzilla.suse.com/1157169" }, { "category": "self", "summary": "SUSE Bug 1158265", "url": "https://bugzilla.suse.com/1158265" }, { "category": "self", "summary": "SUSE Bug 1158983", "url": "https://bugzilla.suse.com/1158983" }, { "category": "self", "summary": "SUSE Bug 1159037", "url": "https://bugzilla.suse.com/1159037" }, { "category": "self", "summary": "SUSE Bug 1159058", "url": "https://bugzilla.suse.com/1159058" }, { "category": "self", "summary": "SUSE Bug 1159199", "url": "https://bugzilla.suse.com/1159199" }, { "category": "self", "summary": "SUSE Bug 1160388", "url": "https://bugzilla.suse.com/1160388" }, { "category": "self", "summary": "SUSE Bug 1160947", "url": "https://bugzilla.suse.com/1160947" }, { "category": "self", "summary": "SUSE Bug 1161016", "url": "https://bugzilla.suse.com/1161016" }, { "category": "self", "summary": "SUSE Bug 1162002", "url": "https://bugzilla.suse.com/1162002" }, { "category": "self", "summary": "SUSE Bug 1162063", "url": "https://bugzilla.suse.com/1162063" }, { "category": "self", "summary": "SUSE Bug 1163309", "url": "https://bugzilla.suse.com/1163309" }, { "category": "self", "summary": "SUSE Bug 1163403", "url": "https://bugzilla.suse.com/1163403" }, { "category": "self", "summary": "SUSE Bug 1163897", "url": "https://bugzilla.suse.com/1163897" }, { "category": "self", "summary": "SUSE Bug 1164284", "url": "https://bugzilla.suse.com/1164284" }, { "category": "self", "summary": "SUSE Bug 1164780", "url": "https://bugzilla.suse.com/1164780" }, { "category": "self", "summary": "SUSE Bug 1164871", "url": "https://bugzilla.suse.com/1164871" }, { "category": "self", "summary": "SUSE Bug 1165183", "url": "https://bugzilla.suse.com/1165183" }, { "category": "self", "summary": "SUSE Bug 1165478", "url": "https://bugzilla.suse.com/1165478" }, { "category": "self", "summary": "SUSE Bug 1165741", "url": "https://bugzilla.suse.com/1165741" }, { "category": "self", "summary": "SUSE Bug 1166780", "url": "https://bugzilla.suse.com/1166780" }, { "category": "self", "summary": "SUSE Bug 1166860", "url": "https://bugzilla.suse.com/1166860" }, { "category": "self", "summary": "SUSE Bug 1166861", "url": "https://bugzilla.suse.com/1166861" }, { "category": "self", "summary": "SUSE Bug 1166862", "url": "https://bugzilla.suse.com/1166862" }, { "category": "self", "summary": "SUSE Bug 1166864", "url": "https://bugzilla.suse.com/1166864" }, { "category": "self", "summary": "SUSE Bug 1166866", "url": "https://bugzilla.suse.com/1166866" }, { "category": "self", "summary": "SUSE Bug 1166867", "url": "https://bugzilla.suse.com/1166867" }, { "category": "self", "summary": "SUSE Bug 1166868", "url": "https://bugzilla.suse.com/1166868" }, { "category": "self", "summary": "SUSE Bug 1166870", "url": "https://bugzilla.suse.com/1166870" }, { "category": "self", "summary": "SUSE Bug 1166940", "url": "https://bugzilla.suse.com/1166940" }, { "category": "self", "summary": "SUSE Bug 1166969", "url": "https://bugzilla.suse.com/1166969" }, { "category": "self", "summary": "SUSE Bug 1166978", "url": "https://bugzilla.suse.com/1166978" }, { "category": "self", "summary": "SUSE Bug 1166985", "url": "https://bugzilla.suse.com/1166985" }, { "category": "self", "summary": "SUSE Bug 1167104", "url": "https://bugzilla.suse.com/1167104" }, { "category": "self", "summary": "SUSE Bug 1167288", "url": "https://bugzilla.suse.com/1167288" }, { "category": "self", "summary": "SUSE Bug 1167574", "url": "https://bugzilla.suse.com/1167574" }, { "category": "self", "summary": "SUSE Bug 1167851", "url": "https://bugzilla.suse.com/1167851" }, { "category": "self", "summary": "SUSE Bug 1167867", "url": "https://bugzilla.suse.com/1167867" }, { "category": "self", "summary": "SUSE Bug 1168081", "url": "https://bugzilla.suse.com/1168081" }, { "category": "self", "summary": "SUSE Bug 1168202", "url": "https://bugzilla.suse.com/1168202" }, { "category": "self", "summary": "SUSE Bug 1168332", "url": "https://bugzilla.suse.com/1168332" }, { "category": "self", "summary": "SUSE Bug 1168486", "url": "https://bugzilla.suse.com/1168486" }, { "category": "self", "summary": "SUSE Bug 1168670", "url": "https://bugzilla.suse.com/1168670" }, { "category": "self", "summary": "SUSE Bug 1168760", "url": "https://bugzilla.suse.com/1168760" }, { "category": "self", "summary": "SUSE Bug 1168762", "url": "https://bugzilla.suse.com/1168762" }, { "category": "self", "summary": "SUSE Bug 1168763", "url": "https://bugzilla.suse.com/1168763" }, { "category": "self", "summary": "SUSE Bug 1168764", "url": "https://bugzilla.suse.com/1168764" }, { "category": "self", "summary": "SUSE Bug 1168765", "url": "https://bugzilla.suse.com/1168765" }, { "category": "self", "summary": "SUSE Bug 1168789", "url": "https://bugzilla.suse.com/1168789" }, { "category": "self", "summary": "SUSE Bug 1168881", "url": "https://bugzilla.suse.com/1168881" }, { "category": "self", "summary": "SUSE Bug 1168884", "url": "https://bugzilla.suse.com/1168884" }, { "category": "self", "summary": "SUSE Bug 1168952", "url": "https://bugzilla.suse.com/1168952" }, { "category": "self", "summary": "SUSE Bug 1168959", "url": "https://bugzilla.suse.com/1168959" }, { "category": "self", "summary": "SUSE Bug 1169020", "url": "https://bugzilla.suse.com/1169020" }, { "category": "self", "summary": "SUSE Bug 1169057", "url": "https://bugzilla.suse.com/1169057" }, { "category": "self", "summary": "SUSE Bug 1169194", "url": "https://bugzilla.suse.com/1169194" }, { "category": "self", "summary": "SUSE Bug 1169390", "url": "https://bugzilla.suse.com/1169390" }, { "category": "self", "summary": "SUSE Bug 1169514", "url": "https://bugzilla.suse.com/1169514" }, { "category": "self", "summary": "SUSE Bug 1169525", "url": "https://bugzilla.suse.com/1169525" }, { "category": "self", "summary": "SUSE Bug 1169625", "url": "https://bugzilla.suse.com/1169625" }, { "category": "self", "summary": "SUSE Bug 1169762", "url": "https://bugzilla.suse.com/1169762" }, { "category": "self", "summary": "SUSE Bug 1169771", "url": "https://bugzilla.suse.com/1169771" }, { "category": "self", "summary": "SUSE Bug 1169795", "url": "https://bugzilla.suse.com/1169795" }, { "category": "self", "summary": "SUSE Bug 1170011", "url": "https://bugzilla.suse.com/1170011" }, { "category": "self", "summary": "SUSE Bug 1170056", "url": "https://bugzilla.suse.com/1170056" }, { "category": "self", "summary": "SUSE Bug 1170125", "url": "https://bugzilla.suse.com/1170125" }, { "category": "self", "summary": "SUSE Bug 1170145", "url": "https://bugzilla.suse.com/1170145" }, { "category": "self", "summary": "SUSE Bug 1170284", "url": "https://bugzilla.suse.com/1170284" }, { "category": "self", "summary": "SUSE Bug 1170345", "url": "https://bugzilla.suse.com/1170345" }, { "category": "self", "summary": "SUSE Bug 1170442", "url": "https://bugzilla.suse.com/1170442" }, { "category": "self", "summary": "SUSE Bug 1170457", "url": "https://bugzilla.suse.com/1170457" }, { "category": "self", "summary": "SUSE Bug 1170522", "url": "https://bugzilla.suse.com/1170522" }, { "category": "self", "summary": "SUSE Bug 1170592", "url": "https://bugzilla.suse.com/1170592" }, { "category": "self", "summary": "SUSE Bug 1170617", "url": "https://bugzilla.suse.com/1170617" }, { "category": "self", "summary": "SUSE Bug 1170618", "url": "https://bugzilla.suse.com/1170618" }, { "category": "self", "summary": "SUSE Bug 1170620", "url": "https://bugzilla.suse.com/1170620" }, { "category": "self", "summary": "SUSE Bug 1170621", "url": "https://bugzilla.suse.com/1170621" }, { "category": "self", "summary": "SUSE Bug 1170770", "url": "https://bugzilla.suse.com/1170770" }, { "category": "self", "summary": "SUSE Bug 1170778", "url": "https://bugzilla.suse.com/1170778" }, { "category": "self", "summary": "SUSE Bug 1170791", "url": "https://bugzilla.suse.com/1170791" }, { "category": "self", "summary": "SUSE Bug 1170901", "url": "https://bugzilla.suse.com/1170901" }, { "category": "self", "summary": "SUSE Bug 1171078", "url": "https://bugzilla.suse.com/1171078" }, { "category": "self", "summary": "SUSE Bug 1171098", "url": "https://bugzilla.suse.com/1171098" }, { "category": "self", "summary": "SUSE Bug 1171118", "url": "https://bugzilla.suse.com/1171118" }, { "category": "self", "summary": "SUSE Bug 1171124", "url": "https://bugzilla.suse.com/1171124" }, { "category": "self", "summary": "SUSE Bug 1171189", "url": "https://bugzilla.suse.com/1171189" }, { "category": "self", "summary": "SUSE Bug 1171191", "url": "https://bugzilla.suse.com/1171191" }, { "category": "self", "summary": "SUSE Bug 1171195", "url": "https://bugzilla.suse.com/1171195" }, { "category": "self", "summary": "SUSE Bug 1171202", "url": "https://bugzilla.suse.com/1171202" }, { "category": "self", "summary": "SUSE Bug 1171205", "url": "https://bugzilla.suse.com/1171205" }, { "category": "self", "summary": "SUSE Bug 1171214", "url": "https://bugzilla.suse.com/1171214" }, { "category": "self", "summary": "SUSE Bug 1171217", "url": "https://bugzilla.suse.com/1171217" }, { "category": "self", "summary": "SUSE Bug 1171218", "url": "https://bugzilla.suse.com/1171218" }, { "category": "self", "summary": "SUSE Bug 1171219", "url": "https://bugzilla.suse.com/1171219" }, { "category": "self", "summary": "SUSE Bug 1171220", "url": "https://bugzilla.suse.com/1171220" }, { "category": "self", "summary": "SUSE Bug 1171244", "url": "https://bugzilla.suse.com/1171244" }, { "category": "self", "summary": "SUSE Bug 1171293", "url": "https://bugzilla.suse.com/1171293" }, { "category": "self", "summary": "SUSE Bug 1171417", "url": "https://bugzilla.suse.com/1171417" }, { "category": "self", "summary": "SUSE Bug 1171424", "url": "https://bugzilla.suse.com/1171424" }, { "category": "self", "summary": "SUSE Bug 1171527", "url": "https://bugzilla.suse.com/1171527" }, { "category": "self", "summary": "SUSE Bug 1171529", "url": "https://bugzilla.suse.com/1171529" }, { "category": "self", "summary": "SUSE Bug 1171530", "url": "https://bugzilla.suse.com/1171530" }, { "category": "self", "summary": "SUSE Bug 1171558", "url": "https://bugzilla.suse.com/1171558" }, { "category": "self", "summary": "SUSE Bug 1171599", "url": "https://bugzilla.suse.com/1171599" }, { "category": "self", "summary": "SUSE Bug 1171600", "url": "https://bugzilla.suse.com/1171600" }, { "category": "self", "summary": "SUSE Bug 1171601", "url": "https://bugzilla.suse.com/1171601" }, { "category": "self", "summary": "SUSE Bug 1171602", "url": "https://bugzilla.suse.com/1171602" }, { "category": "self", "summary": "SUSE Bug 1171604", "url": "https://bugzilla.suse.com/1171604" }, { "category": "self", "summary": "SUSE Bug 1171605", "url": "https://bugzilla.suse.com/1171605" }, { "category": "self", "summary": "SUSE Bug 1171606", "url": "https://bugzilla.suse.com/1171606" }, { "category": "self", "summary": "SUSE Bug 1171607", "url": "https://bugzilla.suse.com/1171607" }, { "category": "self", "summary": "SUSE Bug 1171608", "url": "https://bugzilla.suse.com/1171608" }, { "category": "self", "summary": "SUSE Bug 1171609", "url": "https://bugzilla.suse.com/1171609" }, { "category": "self", "summary": "SUSE Bug 1171610", "url": "https://bugzilla.suse.com/1171610" }, { "category": "self", "summary": "SUSE Bug 1171611", "url": "https://bugzilla.suse.com/1171611" }, { "category": "self", "summary": "SUSE Bug 1171612", "url": "https://bugzilla.suse.com/1171612" }, { "category": "self", "summary": "SUSE Bug 1171613", "url": "https://bugzilla.suse.com/1171613" }, { "category": "self", "summary": "SUSE Bug 1171614", "url": "https://bugzilla.suse.com/1171614" }, { "category": "self", "summary": "SUSE Bug 1171615", "url": "https://bugzilla.suse.com/1171615" }, { "category": "self", "summary": "SUSE Bug 1171616", "url": "https://bugzilla.suse.com/1171616" }, { "category": "self", "summary": "SUSE Bug 1171617", "url": "https://bugzilla.suse.com/1171617" }, { "category": "self", "summary": "SUSE Bug 1171618", "url": "https://bugzilla.suse.com/1171618" }, { "category": "self", "summary": "SUSE Bug 1171619", "url": "https://bugzilla.suse.com/1171619" }, { "category": "self", "summary": "SUSE Bug 1171620", "url": "https://bugzilla.suse.com/1171620" }, { "category": "self", "summary": "SUSE Bug 1171621", "url": "https://bugzilla.suse.com/1171621" }, { "category": "self", "summary": "SUSE Bug 1171622", "url": "https://bugzilla.suse.com/1171622" }, { "category": "self", "summary": "SUSE Bug 1171623", "url": "https://bugzilla.suse.com/1171623" }, { "category": "self", "summary": "SUSE Bug 1171624", "url": "https://bugzilla.suse.com/1171624" }, { "category": "self", "summary": "SUSE Bug 1171625", "url": "https://bugzilla.suse.com/1171625" }, { "category": "self", "summary": "SUSE Bug 1171626", "url": "https://bugzilla.suse.com/1171626" }, { "category": "self", "summary": "SUSE Bug 1171662", "url": "https://bugzilla.suse.com/1171662" }, { "category": "self", "summary": "SUSE Bug 1171679", "url": "https://bugzilla.suse.com/1171679" }, { "category": "self", "summary": "SUSE Bug 1171691", "url": "https://bugzilla.suse.com/1171691" }, { "category": "self", "summary": "SUSE Bug 1171692", "url": "https://bugzilla.suse.com/1171692" }, { "category": "self", "summary": "SUSE Bug 1171694", "url": "https://bugzilla.suse.com/1171694" }, { "category": "self", "summary": "SUSE Bug 1171695", "url": "https://bugzilla.suse.com/1171695" }, { "category": "self", "summary": "SUSE Bug 1171732", "url": "https://bugzilla.suse.com/1171732" }, { "category": "self", "summary": "SUSE Bug 1171736", "url": "https://bugzilla.suse.com/1171736" }, { "category": "self", "summary": "SUSE Bug 1171739", "url": "https://bugzilla.suse.com/1171739" }, { "category": "self", "summary": "SUSE Bug 1171743", "url": "https://bugzilla.suse.com/1171743" }, { "category": "self", "summary": "SUSE Bug 1171753", "url": "https://bugzilla.suse.com/1171753" }, { "category": "self", "summary": "SUSE Bug 1171759", "url": "https://bugzilla.suse.com/1171759" }, { "category": "self", "summary": "SUSE Bug 1171817", "url": "https://bugzilla.suse.com/1171817" }, { "category": "self", "summary": "SUSE Bug 1171835", "url": "https://bugzilla.suse.com/1171835" }, { "category": "self", "summary": "SUSE Bug 1171841", "url": "https://bugzilla.suse.com/1171841" }, { "category": "self", "summary": "SUSE Bug 1171868", "url": "https://bugzilla.suse.com/1171868" }, { "category": "self", "summary": "SUSE Bug 1171904", "url": "https://bugzilla.suse.com/1171904" }, { "category": "self", "summary": "SUSE Bug 1171948", "url": "https://bugzilla.suse.com/1171948" }, { "category": "self", "summary": "SUSE Bug 1171949", "url": "https://bugzilla.suse.com/1171949" }, { "category": "self", "summary": "SUSE Bug 1171951", "url": "https://bugzilla.suse.com/1171951" }, { "category": "self", "summary": "SUSE Bug 1171952", "url": "https://bugzilla.suse.com/1171952" }, { "category": "self", "summary": "SUSE Bug 1171979", "url": "https://bugzilla.suse.com/1171979" }, { "category": "self", "summary": "SUSE Bug 1171982", "url": "https://bugzilla.suse.com/1171982" }, { "category": "self", "summary": "SUSE Bug 1171983", "url": "https://bugzilla.suse.com/1171983" }, { "category": "self", "summary": "SUSE Bug 1171988", "url": "https://bugzilla.suse.com/1171988" }, { "category": "self", "summary": "SUSE Bug 1172017", "url": "https://bugzilla.suse.com/1172017" }, { "category": "self", "summary": "SUSE Bug 1172096", "url": "https://bugzilla.suse.com/1172096" }, { "category": "self", "summary": "SUSE Bug 1172097", "url": "https://bugzilla.suse.com/1172097" }, { "category": "self", "summary": "SUSE Bug 1172098", "url": "https://bugzilla.suse.com/1172098" }, { "category": "self", "summary": "SUSE Bug 1172099", "url": "https://bugzilla.suse.com/1172099" }, { "category": "self", "summary": "SUSE Bug 1172101", "url": "https://bugzilla.suse.com/1172101" }, { "category": "self", "summary": "SUSE Bug 1172102", "url": "https://bugzilla.suse.com/1172102" }, { "category": "self", "summary": "SUSE Bug 1172103", "url": "https://bugzilla.suse.com/1172103" }, { "category": "self", "summary": "SUSE Bug 1172104", "url": "https://bugzilla.suse.com/1172104" }, { "category": "self", "summary": "SUSE Bug 1172127", "url": "https://bugzilla.suse.com/1172127" }, { "category": "self", "summary": "SUSE Bug 1172130", "url": "https://bugzilla.suse.com/1172130" }, { "category": "self", "summary": "SUSE Bug 1172185", "url": "https://bugzilla.suse.com/1172185" }, { "category": "self", "summary": "SUSE Bug 1172188", "url": "https://bugzilla.suse.com/1172188" }, { "category": "self", "summary": "SUSE Bug 1172199", "url": "https://bugzilla.suse.com/1172199" }, { "category": "self", "summary": "SUSE Bug 1172201", "url": "https://bugzilla.suse.com/1172201" }, { "category": "self", "summary": "SUSE Bug 1172202", "url": "https://bugzilla.suse.com/1172202" }, { "category": "self", "summary": "SUSE Bug 1172221", "url": "https://bugzilla.suse.com/1172221" }, { "category": "self", "summary": "SUSE Bug 1172247", "url": "https://bugzilla.suse.com/1172247" }, { "category": "self", "summary": "SUSE Bug 1172249", "url": "https://bugzilla.suse.com/1172249" }, { "category": "self", "summary": "SUSE Bug 1172251", "url": "https://bugzilla.suse.com/1172251" }, { "category": "self", "summary": "SUSE Bug 1172257", "url": "https://bugzilla.suse.com/1172257" }, { "category": "self", "summary": "SUSE Bug 1172317", "url": "https://bugzilla.suse.com/1172317" }, { "category": "self", "summary": "SUSE Bug 1172342", "url": "https://bugzilla.suse.com/1172342" }, { "category": "self", "summary": "SUSE Bug 1172343", "url": "https://bugzilla.suse.com/1172343" }, { "category": "self", "summary": "SUSE Bug 1172344", "url": "https://bugzilla.suse.com/1172344" }, { "category": "self", "summary": "SUSE Bug 1172366", "url": "https://bugzilla.suse.com/1172366" }, { "category": "self", "summary": "SUSE Bug 1172378", "url": "https://bugzilla.suse.com/1172378" }, { "category": "self", "summary": "SUSE Bug 1172391", "url": "https://bugzilla.suse.com/1172391" }, { "category": "self", "summary": "SUSE Bug 1172397", "url": "https://bugzilla.suse.com/1172397" }, { "category": "self", "summary": "SUSE Bug 1172453", "url": "https://bugzilla.suse.com/1172453" }, { "category": "self", "summary": "SUSE Bug 1172458", "url": "https://bugzilla.suse.com/1172458" }, { "category": "self", "summary": "SUSE Bug 1172484", "url": "https://bugzilla.suse.com/1172484" }, { "category": "self", "summary": "SUSE Bug 1172537", "url": "https://bugzilla.suse.com/1172537" }, { "category": "self", "summary": "SUSE Bug 1172538", "url": "https://bugzilla.suse.com/1172538" }, { "category": "self", "summary": "SUSE Bug 1172687", "url": "https://bugzilla.suse.com/1172687" }, { "category": "self", "summary": "SUSE Bug 1172719", "url": "https://bugzilla.suse.com/1172719" }, { "category": "self", "summary": "SUSE Bug 1172759", "url": "https://bugzilla.suse.com/1172759" }, { "category": "self", "summary": "SUSE Bug 1172775", "url": "https://bugzilla.suse.com/1172775" }, { "category": "self", "summary": "SUSE Bug 1172781", "url": "https://bugzilla.suse.com/1172781" }, { "category": "self", "summary": "SUSE Bug 1172782", "url": "https://bugzilla.suse.com/1172782" }, { "category": "self", "summary": "SUSE Bug 1172783", "url": "https://bugzilla.suse.com/1172783" }, { "category": "self", "summary": "SUSE Bug 1172871", "url": "https://bugzilla.suse.com/1172871" }, { "category": "self", "summary": "SUSE Bug 1172872", "url": "https://bugzilla.suse.com/1172872" }, { "category": "self", "summary": "SUSE Bug 1172999", "url": "https://bugzilla.suse.com/1172999" }, { "category": "self", "summary": "SUSE Bug 1173060", "url": "https://bugzilla.suse.com/1173060" }, { "category": "self", "summary": "SUSE Bug 1173074", "url": "https://bugzilla.suse.com/1173074" }, { "category": "self", "summary": "SUSE Bug 1173146", "url": "https://bugzilla.suse.com/1173146" }, { "category": "self", "summary": "SUSE Bug 1173265", "url": "https://bugzilla.suse.com/1173265" }, { "category": "self", "summary": "SUSE Bug 1173280", "url": "https://bugzilla.suse.com/1173280" }, { "category": "self", "summary": "SUSE Bug 1173284", "url": "https://bugzilla.suse.com/1173284" }, { "category": "self", "summary": "SUSE Bug 1173428", "url": "https://bugzilla.suse.com/1173428" }, { "category": "self", "summary": "SUSE Bug 1173514", "url": "https://bugzilla.suse.com/1173514" }, { "category": "self", "summary": "SUSE Bug 1173567", "url": "https://bugzilla.suse.com/1173567" }, { "category": "self", "summary": "SUSE Bug 1173573", "url": "https://bugzilla.suse.com/1173573" }, { "category": "self", "summary": "SUSE Bug 1173746", "url": "https://bugzilla.suse.com/1173746" }, { "category": "self", "summary": "SUSE Bug 1173818", "url": "https://bugzilla.suse.com/1173818" }, { "category": "self", "summary": "SUSE Bug 1173820", "url": "https://bugzilla.suse.com/1173820" }, { "category": "self", "summary": "SUSE Bug 1173825", "url": "https://bugzilla.suse.com/1173825" }, { "category": "self", "summary": "SUSE Bug 1173826", "url": "https://bugzilla.suse.com/1173826" }, { "category": "self", "summary": "SUSE Bug 1173833", "url": "https://bugzilla.suse.com/1173833" }, { "category": "self", "summary": "SUSE Bug 1173838", "url": "https://bugzilla.suse.com/1173838" }, { "category": "self", "summary": "SUSE Bug 1173839", "url": "https://bugzilla.suse.com/1173839" }, { "category": "self", "summary": "SUSE Bug 1173845", "url": "https://bugzilla.suse.com/1173845" }, { "category": "self", "summary": "SUSE Bug 1173857", "url": "https://bugzilla.suse.com/1173857" }, { "category": "self", "summary": "SUSE Bug 1174113", "url": "https://bugzilla.suse.com/1174113" }, { "category": "self", "summary": "SUSE Bug 1174115", "url": "https://bugzilla.suse.com/1174115" }, { "category": "self", "summary": "SUSE Bug 1174122", "url": "https://bugzilla.suse.com/1174122" }, { "category": "self", "summary": "SUSE Bug 1174123", "url": "https://bugzilla.suse.com/1174123" }, { "category": "self", "summary": "SUSE Bug 1174186", "url": "https://bugzilla.suse.com/1174186" }, { "category": "self", "summary": "SUSE Bug 1174187", "url": "https://bugzilla.suse.com/1174187" }, { "category": "self", "summary": "SUSE Bug 1174296", "url": "https://bugzilla.suse.com/1174296" }, { "category": "self", "summary": "SUSE Bug 1174343", "url": "https://bugzilla.suse.com/1174343" }, { "category": "self", "summary": "SUSE Bug 1174356", "url": "https://bugzilla.suse.com/1174356" }, { "category": "self", "summary": "SUSE Bug 1174409", "url": "https://bugzilla.suse.com/1174409" }, { "category": "self", "summary": "SUSE Bug 1174438", "url": "https://bugzilla.suse.com/1174438" }, { "category": "self", "summary": "SUSE Bug 1174462", "url": "https://bugzilla.suse.com/1174462" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1000199 page", "url": "https://www.suse.com/security/cve/CVE-2018-1000199/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-19462 page", "url": "https://www.suse.com/security/cve/CVE-2019-19462/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-20806 page", "url": "https://www.suse.com/security/cve/CVE-2019-20806/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-20810 page", "url": "https://www.suse.com/security/cve/CVE-2019-20810/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-20812 page", "url": "https://www.suse.com/security/cve/CVE-2019-20812/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-20908 page", "url": "https://www.suse.com/security/cve/CVE-2019-20908/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9455 page", "url": "https://www.suse.com/security/cve/CVE-2019-9455/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-0305 page", "url": "https://www.suse.com/security/cve/CVE-2020-0305/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-0543 page", "url": "https://www.suse.com/security/cve/CVE-2020-0543/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10135 page", "url": "https://www.suse.com/security/cve/CVE-2020-10135/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10690 page", "url": "https://www.suse.com/security/cve/CVE-2020-10690/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10711 page", "url": "https://www.suse.com/security/cve/CVE-2020-10711/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10720 page", "url": "https://www.suse.com/security/cve/CVE-2020-10720/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10732 page", "url": "https://www.suse.com/security/cve/CVE-2020-10732/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10751 page", "url": "https://www.suse.com/security/cve/CVE-2020-10751/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10757 page", "url": "https://www.suse.com/security/cve/CVE-2020-10757/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10766 page", "url": "https://www.suse.com/security/cve/CVE-2020-10766/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10767 page", "url": "https://www.suse.com/security/cve/CVE-2020-10767/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10768 page", "url": "https://www.suse.com/security/cve/CVE-2020-10768/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10769 page", "url": "https://www.suse.com/security/cve/CVE-2020-10769/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10773 page", "url": "https://www.suse.com/security/cve/CVE-2020-10773/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10781 page", "url": "https://www.suse.com/security/cve/CVE-2020-10781/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-11669 page", "url": "https://www.suse.com/security/cve/CVE-2020-11669/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12114 page", "url": "https://www.suse.com/security/cve/CVE-2020-12114/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12464 page", "url": "https://www.suse.com/security/cve/CVE-2020-12464/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12652 page", "url": "https://www.suse.com/security/cve/CVE-2020-12652/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12653 page", "url": "https://www.suse.com/security/cve/CVE-2020-12653/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12654 page", "url": "https://www.suse.com/security/cve/CVE-2020-12654/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12655 page", "url": "https://www.suse.com/security/cve/CVE-2020-12655/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12656 page", "url": "https://www.suse.com/security/cve/CVE-2020-12656/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12657 page", "url": "https://www.suse.com/security/cve/CVE-2020-12657/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12659 page", "url": "https://www.suse.com/security/cve/CVE-2020-12659/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12769 page", "url": "https://www.suse.com/security/cve/CVE-2020-12769/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12771 page", "url": "https://www.suse.com/security/cve/CVE-2020-12771/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12888 page", "url": "https://www.suse.com/security/cve/CVE-2020-12888/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-13143 page", "url": "https://www.suse.com/security/cve/CVE-2020-13143/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-13974 page", "url": "https://www.suse.com/security/cve/CVE-2020-13974/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14416 page", "url": "https://www.suse.com/security/cve/CVE-2020-14416/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-15393 page", "url": "https://www.suse.com/security/cve/CVE-2020-15393/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-15780 page", "url": "https://www.suse.com/security/cve/CVE-2020-15780/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2020-09-04T06:06:02Z", "generator": { "date": "2020-09-04T06:06:02Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2020:2487-1", "initial_release_date": "2020-09-04T06:06:02Z", "revision_history": [ { "date": "2020-09-04T06:06:02Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-devel-rt-4.12.14-14.28.1.noarch", "product": { "name": "kernel-devel-rt-4.12.14-14.28.1.noarch", "product_id": "kernel-devel-rt-4.12.14-14.28.1.noarch" } }, { "category": "product_version", "name": "kernel-source-rt-4.12.14-14.28.1.noarch", "product": { "name": "kernel-source-rt-4.12.14-14.28.1.noarch", "product_id": "kernel-source-rt-4.12.14-14.28.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "product": { "name": "cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "product_id": "cluster-md-kmp-rt-4.12.14-14.28.1.x86_64" } }, { "category": "product_version", "name": "cluster-md-kmp-rt_debug-4.12.14-14.28.1.x86_64", "product": { "name": "cluster-md-kmp-rt_debug-4.12.14-14.28.1.x86_64", "product_id": "cluster-md-kmp-rt_debug-4.12.14-14.28.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-rt-4.12.14-14.28.1.x86_64", "product": { "name": "dlm-kmp-rt-4.12.14-14.28.1.x86_64", "product_id": "dlm-kmp-rt-4.12.14-14.28.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-rt_debug-4.12.14-14.28.1.x86_64", "product": { "name": "dlm-kmp-rt_debug-4.12.14-14.28.1.x86_64", "product_id": "dlm-kmp-rt_debug-4.12.14-14.28.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "product": { "name": "gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "product_id": "gfs2-kmp-rt-4.12.14-14.28.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-rt_debug-4.12.14-14.28.1.x86_64", "product": { "name": "gfs2-kmp-rt_debug-4.12.14-14.28.1.x86_64", "product_id": "gfs2-kmp-rt_debug-4.12.14-14.28.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-4.12.14-14.28.1.x86_64", "product": { "name": "kernel-rt-4.12.14-14.28.1.x86_64", "product_id": "kernel-rt-4.12.14-14.28.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-base-4.12.14-14.28.1.x86_64", "product": { "name": "kernel-rt-base-4.12.14-14.28.1.x86_64", "product_id": "kernel-rt-base-4.12.14-14.28.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-devel-4.12.14-14.28.1.x86_64", "product": { "name": "kernel-rt-devel-4.12.14-14.28.1.x86_64", "product_id": "kernel-rt-devel-4.12.14-14.28.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-extra-4.12.14-14.28.1.x86_64", "product": { "name": "kernel-rt-extra-4.12.14-14.28.1.x86_64", "product_id": "kernel-rt-extra-4.12.14-14.28.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-livepatch-devel-4.12.14-14.28.1.x86_64", "product": { "name": "kernel-rt-livepatch-devel-4.12.14-14.28.1.x86_64", "product_id": "kernel-rt-livepatch-devel-4.12.14-14.28.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_debug-4.12.14-14.28.1.x86_64", "product": { "name": "kernel-rt_debug-4.12.14-14.28.1.x86_64", "product_id": "kernel-rt_debug-4.12.14-14.28.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_debug-base-4.12.14-14.28.1.x86_64", "product": { "name": "kernel-rt_debug-base-4.12.14-14.28.1.x86_64", "product_id": "kernel-rt_debug-base-4.12.14-14.28.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "product": { "name": "kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "product_id": "kernel-rt_debug-devel-4.12.14-14.28.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_debug-extra-4.12.14-14.28.1.x86_64", "product": { "name": "kernel-rt_debug-extra-4.12.14-14.28.1.x86_64", "product_id": "kernel-rt_debug-extra-4.12.14-14.28.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_debug-livepatch-devel-4.12.14-14.28.1.x86_64", "product": { "name": "kernel-rt_debug-livepatch-devel-4.12.14-14.28.1.x86_64", "product_id": "kernel-rt_debug-livepatch-devel-4.12.14-14.28.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-rt-4.12.14-14.28.1.x86_64", "product": { "name": "kernel-syms-rt-4.12.14-14.28.1.x86_64", "product_id": "kernel-syms-rt-4.12.14-14.28.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-rt-4.12.14-14.28.1.x86_64", "product": { "name": "kselftests-kmp-rt-4.12.14-14.28.1.x86_64", "product_id": "kselftests-kmp-rt-4.12.14-14.28.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-rt_debug-4.12.14-14.28.1.x86_64", "product": { "name": "kselftests-kmp-rt_debug-4.12.14-14.28.1.x86_64", "product_id": "kselftests-kmp-rt_debug-4.12.14-14.28.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-rt-4.12.14-14.28.1.x86_64", "product": { "name": "ocfs2-kmp-rt-4.12.14-14.28.1.x86_64", "product_id": "ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-rt_debug-4.12.14-14.28.1.x86_64", "product": { "name": "ocfs2-kmp-rt_debug-4.12.14-14.28.1.x86_64", "product_id": "ocfs2-kmp-rt_debug-4.12.14-14.28.1.x86_64" } }, { "category": "product_version", "name": "reiserfs-kmp-rt-4.12.14-14.28.1.x86_64", "product": { "name": "reiserfs-kmp-rt-4.12.14-14.28.1.x86_64", "product_id": "reiserfs-kmp-rt-4.12.14-14.28.1.x86_64" } }, { "category": "product_version", "name": "reiserfs-kmp-rt_debug-4.12.14-14.28.1.x86_64", "product": { "name": "reiserfs-kmp-rt_debug-4.12.14-14.28.1.x86_64", "product_id": "reiserfs-kmp-rt_debug-4.12.14-14.28.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Real Time Module 15 SP1", "product": { "name": "SUSE Real Time Module 15 SP1", "product_id": "SUSE Real Time Module 15 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-rt:15:sp1" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-rt-4.12.14-14.28.1.x86_64 as component of SUSE Real Time Module 15 SP1", "product_id": "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64" }, "product_reference": "cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "relates_to_product_reference": "SUSE Real Time Module 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-rt-4.12.14-14.28.1.x86_64 as component of SUSE Real Time Module 15 SP1", "product_id": "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64" }, "product_reference": "dlm-kmp-rt-4.12.14-14.28.1.x86_64", "relates_to_product_reference": "SUSE Real Time Module 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-rt-4.12.14-14.28.1.x86_64 as component of SUSE Real Time Module 15 SP1", "product_id": "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64" }, "product_reference": "gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "relates_to_product_reference": "SUSE Real Time Module 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-rt-4.12.14-14.28.1.noarch as component of SUSE Real Time Module 15 SP1", "product_id": "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch" }, "product_reference": "kernel-devel-rt-4.12.14-14.28.1.noarch", "relates_to_product_reference": "SUSE Real Time Module 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-4.12.14-14.28.1.x86_64 as component of SUSE Real Time Module 15 SP1", "product_id": "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64" }, "product_reference": "kernel-rt-4.12.14-14.28.1.x86_64", "relates_to_product_reference": "SUSE Real Time Module 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-base-4.12.14-14.28.1.x86_64 as component of SUSE Real Time Module 15 SP1", "product_id": "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64" }, "product_reference": "kernel-rt-base-4.12.14-14.28.1.x86_64", "relates_to_product_reference": "SUSE Real Time Module 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-4.12.14-14.28.1.x86_64 as component of SUSE Real Time Module 15 SP1", "product_id": "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64" }, "product_reference": "kernel-rt-devel-4.12.14-14.28.1.x86_64", "relates_to_product_reference": "SUSE Real Time Module 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt_debug-devel-4.12.14-14.28.1.x86_64 as component of SUSE Real Time Module 15 SP1", "product_id": "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64" }, "product_reference": "kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "relates_to_product_reference": "SUSE Real Time Module 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-rt-4.12.14-14.28.1.noarch as component of SUSE Real Time Module 15 SP1", "product_id": "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch" }, "product_reference": "kernel-source-rt-4.12.14-14.28.1.noarch", "relates_to_product_reference": "SUSE Real Time Module 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-rt-4.12.14-14.28.1.x86_64 as component of SUSE Real Time Module 15 SP1", "product_id": "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64" }, "product_reference": "kernel-syms-rt-4.12.14-14.28.1.x86_64", "relates_to_product_reference": "SUSE Real Time Module 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-rt-4.12.14-14.28.1.x86_64 as component of SUSE Real Time Module 15 SP1", "product_id": "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" }, "product_reference": "ocfs2-kmp-rt-4.12.14-14.28.1.x86_64", "relates_to_product_reference": "SUSE Real Time Module 15 SP1" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-1000199", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1000199" } ], "notes": [ { "category": "general", "text": "The Linux Kernel version 3.18 contains a dangerous feature vulnerability in modify_user_hw_breakpoint() that can result in crash and possibly memory corruption. This attack appear to be exploitable via local code execution and the ability to use ptrace. This vulnerability appears to have been fixed in git commit f67b15037a7a50c57f72e69a6d59941ad90a0f0f.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1000199", "url": "https://www.suse.com/security/cve/CVE-2018-1000199" }, { "category": "external", "summary": "SUSE Bug 1089895 for CVE-2018-1000199", "url": "https://bugzilla.suse.com/1089895" }, { "category": "external", "summary": "SUSE Bug 1090036 for CVE-2018-1000199", "url": "https://bugzilla.suse.com/1090036" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-04T06:06:02Z", "details": "important" } ], "title": "CVE-2018-1000199" }, { "cve": "CVE-2019-19462", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-19462" } ], "notes": [ { "category": "general", "text": "relay_open in kernel/relay.c in the Linux kernel through 5.4.1 allows local users to cause a denial of service (such as relay blockage) by triggering a NULL alloc_percpu result.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-19462", "url": "https://www.suse.com/security/cve/CVE-2019-19462" }, { "category": "external", "summary": "SUSE Bug 1158265 for CVE-2019-19462", "url": "https://bugzilla.suse.com/1158265" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-04T06:06:02Z", "details": "low" } ], "title": "CVE-2019-19462" }, { "cve": "CVE-2019-20806", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-20806" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.2. There is a NULL pointer dereference in tw5864_handle_frame() in drivers/media/pci/tw5864/tw5864-video.c, which may cause denial of service, aka CID-2e7682ebfc75.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-20806", "url": "https://www.suse.com/security/cve/CVE-2019-20806" }, { "category": "external", "summary": "SUSE Bug 1172199 for CVE-2019-20806", "url": "https://bugzilla.suse.com/1172199" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.9, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-04T06:06:02Z", "details": "low" } ], "title": "CVE-2019-20806" }, { "cve": "CVE-2019-20810", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-20810" } ], "notes": [ { "category": "general", "text": "go7007_snd_init in drivers/media/usb/go7007/snd-go7007.c in the Linux kernel before 5.6 does not call snd_card_free for a failure path, which causes a memory leak, aka CID-9453264ef586.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-20810", "url": "https://www.suse.com/security/cve/CVE-2019-20810" }, { "category": "external", "summary": "SUSE Bug 1172458 for CVE-2019-20810", "url": "https://bugzilla.suse.com/1172458" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-04T06:06:02Z", "details": "low" } ], "title": "CVE-2019-20810" }, { "cve": "CVE-2019-20812", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-20812" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.4.7. The prb_calc_retire_blk_tmo() function in net/packet/af_packet.c can result in a denial of service (CPU consumption and soft lockup) in a certain failure case involving TPACKET_V3, aka CID-b43d1f9f7067.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-20812", "url": "https://www.suse.com/security/cve/CVE-2019-20812" }, { "category": "external", "summary": "SUSE Bug 1172453 for CVE-2019-20812", "url": "https://bugzilla.suse.com/1172453" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-04T06:06:02Z", "details": "moderate" } ], "title": "CVE-2019-20812" }, { "cve": "CVE-2019-20908", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-20908" } ], "notes": [ { "category": "general", "text": "An issue was discovered in drivers/firmware/efi/efi.c in the Linux kernel before 5.4. Incorrect access permissions for the efivar_ssdt ACPI variable could be used by attackers to bypass lockdown or secure boot restrictions, aka CID-1957a85b0032.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-20908", "url": "https://www.suse.com/security/cve/CVE-2019-20908" }, { "category": "external", "summary": "SUSE Bug 1173567 for CVE-2019-20908", "url": "https://bugzilla.suse.com/1173567" }, { "category": "external", "summary": "SUSE Bug 1174187 for CVE-2019-20908", "url": "https://bugzilla.suse.com/1174187" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-04T06:06:02Z", "details": "important" } ], "title": "CVE-2019-20908" }, { "cve": "CVE-2019-9455", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9455" } ], "notes": [ { "category": "general", "text": "In the Android kernel in the video driver there is a kernel pointer leak due to a WARN_ON statement. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9455", "url": "https://www.suse.com/security/cve/CVE-2019-9455" }, { "category": "external", "summary": "SUSE Bug 1170345 for CVE-2019-9455", "url": "https://bugzilla.suse.com/1170345" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-04T06:06:02Z", "details": "moderate" } ], "title": "CVE-2019-9455" }, { "cve": "CVE-2020-0305", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-0305" } ], "notes": [ { "category": "general", "text": "In cdev_get of char_dev.c, there is a possible use-after-free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-153467744", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-0305", "url": "https://www.suse.com/security/cve/CVE-2020-0305" }, { "category": "external", "summary": "SUSE Bug 1174462 for CVE-2020-0305", "url": "https://bugzilla.suse.com/1174462" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-04T06:06:02Z", "details": "moderate" } ], "title": "CVE-2020-0305" }, { "cve": "CVE-2020-0543", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-0543" } ], "notes": [ { "category": "general", "text": "Incomplete cleanup from specific special register read operations in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-0543", "url": "https://www.suse.com/security/cve/CVE-2020-0543" }, { "category": "external", "summary": "SUSE Bug 1154824 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1154824" }, { "category": "external", "summary": "SUSE Bug 1172205 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172205" }, { "category": "external", "summary": "SUSE Bug 1172206 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172206" }, { "category": "external", "summary": "SUSE Bug 1172207 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172207" }, { "category": "external", "summary": "SUSE Bug 1172770 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172770" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-04T06:06:02Z", "details": "moderate" } ], "title": "CVE-2020-0543" }, { "cve": "CVE-2020-10135", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10135" } ], "notes": [ { "category": "general", "text": "Legacy pairing and secure-connections pairing authentication in Bluetooth BR/EDR Core Specification v5.2 and earlier may allow an unauthenticated user to complete authentication without pairing credentials via adjacent access. An unauthenticated, adjacent attacker could impersonate a Bluetooth BR/EDR master or slave to pair with a previously paired remote device to successfully complete the authentication procedure without knowing the link key.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10135", "url": "https://www.suse.com/security/cve/CVE-2020-10135" }, { "category": "external", "summary": "SUSE Bug 1171988 for CVE-2020-10135", "url": "https://bugzilla.suse.com/1171988" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-04T06:06:02Z", "details": "moderate" } ], "title": "CVE-2020-10135" }, { "cve": "CVE-2020-10690", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10690" } ], "notes": [ { "category": "general", "text": "There is a use-after-free in kernel versions before 5.5 due to a race condition between the release of ptp_clock and cdev while resource deallocation. When a (high privileged) process allocates a ptp device file (like /dev/ptpX) and voluntarily goes to sleep. During this time if the underlying device is removed, it can cause an exploitable condition as the process wakes up to terminate and clean all attached files. The system crashes due to the cdev structure being invalid (as already freed) which is pointed to by the inode.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10690", "url": "https://www.suse.com/security/cve/CVE-2020-10690" }, { "category": "external", "summary": "SUSE Bug 1170056 for CVE-2020-10690", "url": "https://bugzilla.suse.com/1170056" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-04T06:06:02Z", "details": "moderate" } ], "title": "CVE-2020-10690" }, { "cve": "CVE-2020-10711", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10711" } ], "notes": [ { "category": "general", "text": "A NULL pointer dereference flaw was found in the Linux kernel\u0027s SELinux subsystem in versions before 5.7. This flaw occurs while importing the Commercial IP Security Option (CIPSO) protocol\u0027s category bitmap into the SELinux extensible bitmap via the\u0027 ebitmap_netlbl_import\u0027 routine. While processing the CIPSO restricted bitmap tag in the \u0027cipso_v4_parsetag_rbm\u0027 routine, it sets the security attribute to indicate that the category bitmap is present, even if it has not been allocated. This issue leads to a NULL pointer dereference issue while importing the same category bitmap into SELinux. This flaw allows a remote network user to crash the system kernel, resulting in a denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10711", "url": "https://www.suse.com/security/cve/CVE-2020-10711" }, { "category": "external", "summary": "SUSE Bug 1171191 for CVE-2020-10711", "url": "https://bugzilla.suse.com/1171191" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-04T06:06:02Z", "details": "moderate" } ], "title": "CVE-2020-10711" }, { "cve": "CVE-2020-10720", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10720" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s implementation of GRO in versions before 5.2. This flaw allows an attacker with local access to crash the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10720", "url": "https://www.suse.com/security/cve/CVE-2020-10720" }, { "category": "external", "summary": "SUSE Bug 1170778 for CVE-2020-10720", "url": "https://bugzilla.suse.com/1170778" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-04T06:06:02Z", "details": "moderate" } ], "title": "CVE-2020-10720" }, { "cve": "CVE-2020-10732", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10732" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s implementation of Userspace core dumps. This flaw allows an attacker with a local account to crash a trivial program and exfiltrate private kernel data.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10732", "url": "https://www.suse.com/security/cve/CVE-2020-10732" }, { "category": "external", "summary": "SUSE Bug 1171220 for CVE-2020-10732", "url": "https://bugzilla.suse.com/1171220" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-04T06:06:02Z", "details": "low" } ], "title": "CVE-2020-10732" }, { "cve": "CVE-2020-10751", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10751" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernels SELinux LSM hook implementation before version 5.7, where it incorrectly assumed that an skb would only contain a single netlink message. The hook would incorrectly only validate the first netlink message in the skb and allow or deny the rest of the messages within the skb with the granted permission without further processing.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10751", "url": "https://www.suse.com/security/cve/CVE-2020-10751" }, { "category": "external", "summary": "SUSE Bug 1171189 for CVE-2020-10751", "url": "https://bugzilla.suse.com/1171189" }, { "category": "external", "summary": "SUSE Bug 1174963 for CVE-2020-10751", "url": "https://bugzilla.suse.com/1174963" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-04T06:06:02Z", "details": "moderate" } ], "title": "CVE-2020-10751" }, { "cve": "CVE-2020-10757", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10757" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux Kernel in versions after 4.5-rc1 in the way mremap handled DAX Huge Pages. This flaw allows a local attacker with access to a DAX enabled storage to escalate their privileges on the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10757", "url": "https://www.suse.com/security/cve/CVE-2020-10757" }, { "category": "external", "summary": "SUSE Bug 1159281 for CVE-2020-10757", "url": "https://bugzilla.suse.com/1159281" }, { "category": "external", "summary": "SUSE Bug 1172317 for CVE-2020-10757", "url": "https://bugzilla.suse.com/1172317" }, { "category": "external", "summary": "SUSE Bug 1172437 for CVE-2020-10757", "url": "https://bugzilla.suse.com/1172437" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-04T06:06:02Z", "details": "important" } ], "title": "CVE-2020-10757" }, { "cve": "CVE-2020-10766", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10766" } ], "notes": [ { "category": "general", "text": "A logic bug flaw was found in Linux kernel before 5.8-rc1 in the implementation of SSBD. A bug in the logic handling allows an attacker with a local account to disable SSBD protection during a context switch when additional speculative execution mitigations are in place. This issue was introduced when the per task/process conditional STIPB switching was added on top of the existing SSBD switching. The highest threat from this vulnerability is to confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10766", "url": "https://www.suse.com/security/cve/CVE-2020-10766" }, { "category": "external", "summary": "SUSE Bug 1159281 for CVE-2020-10766", "url": "https://bugzilla.suse.com/1159281" }, { "category": "external", "summary": "SUSE Bug 1172781 for CVE-2020-10766", "url": "https://bugzilla.suse.com/1172781" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-04T06:06:02Z", "details": "moderate" } ], "title": "CVE-2020-10766" }, { "cve": "CVE-2020-10767", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10767" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel before 5.8-rc1 in the implementation of the Enhanced IBPB (Indirect Branch Prediction Barrier). The IBPB mitigation will be disabled when STIBP is not available or when the Enhanced Indirect Branch Restricted Speculation (IBRS) is available. This flaw allows a local attacker to perform a Spectre V2 style attack when this configuration is active. The highest threat from this vulnerability is to confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10767", "url": "https://www.suse.com/security/cve/CVE-2020-10767" }, { "category": "external", "summary": "SUSE Bug 1159281 for CVE-2020-10767", "url": "https://bugzilla.suse.com/1159281" }, { "category": "external", "summary": "SUSE Bug 1172782 for CVE-2020-10767", "url": "https://bugzilla.suse.com/1172782" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-04T06:06:02Z", "details": "moderate" } ], "title": "CVE-2020-10767" }, { "cve": "CVE-2020-10768", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10768" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux Kernel before 5.8-rc1 in the prctl() function, where it can be used to enable indirect branch speculation after it has been disabled. This call incorrectly reports it as being \u0027force disabled\u0027 when it is not and opens the system to Spectre v2 attacks. The highest threat from this vulnerability is to confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10768", "url": "https://www.suse.com/security/cve/CVE-2020-10768" }, { "category": "external", "summary": "SUSE Bug 1159281 for CVE-2020-10768", "url": "https://bugzilla.suse.com/1159281" }, { "category": "external", "summary": "SUSE Bug 1172783 for CVE-2020-10768", "url": "https://bugzilla.suse.com/1172783" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-04T06:06:02Z", "details": "moderate" } ], "title": "CVE-2020-10768" }, { "cve": "CVE-2020-10769", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10769" } ], "notes": [ { "category": "general", "text": "A buffer over-read flaw was found in RH kernel versions before 5.0 in crypto_authenc_extractkeys in crypto/authenc.c in the IPsec Cryptographic algorithm\u0027s module, authenc. When a payload longer than 4 bytes, and is not following 4-byte alignment boundary guidelines, it causes a buffer over-read threat, leading to a system crash. This flaw allows a local attacker with user privileges to cause a denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10769", "url": "https://www.suse.com/security/cve/CVE-2020-10769" }, { "category": "external", "summary": "SUSE Bug 1173265 for CVE-2020-10769", "url": "https://bugzilla.suse.com/1173265" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-04T06:06:02Z", "details": "moderate" } ], "title": "CVE-2020-10769" }, { "cve": "CVE-2020-10773", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10773" } ], "notes": [ { "category": "general", "text": "A stack information leak flaw was found in s390/s390x in the Linux kernel\u0027s memory manager functionality, where it incorrectly writes to the /proc/sys/vm/cmm_timeout file. This flaw allows a local user to see the kernel data.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10773", "url": "https://www.suse.com/security/cve/CVE-2020-10773" }, { "category": "external", "summary": "SUSE Bug 1172999 for CVE-2020-10773", "url": "https://bugzilla.suse.com/1172999" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.5, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-04T06:06:02Z", "details": "low" } ], "title": "CVE-2020-10773" }, { "cve": "CVE-2020-10781", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10781" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux Kernel before 5.8-rc6 in the ZRAM kernel module, where a user with a local account and the ability to read the /sys/class/zram-control/hot_add file can create ZRAM device nodes in the /dev/ directory. This read allocates kernel memory and is not accounted for a user that triggers the creation of that ZRAM device. With this vulnerability, continually reading the device may consume a large amount of system memory and cause the Out-of-Memory (OOM) killer to activate and terminate random userspace processes, possibly making the system inoperable.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10781", "url": "https://www.suse.com/security/cve/CVE-2020-10781" }, { "category": "external", "summary": "SUSE Bug 1173074 for CVE-2020-10781", "url": "https://bugzilla.suse.com/1173074" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-04T06:06:02Z", "details": "moderate" } ], "title": "CVE-2020-10781" }, { "cve": "CVE-2020-11669", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-11669" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.2 on the powerpc platform. arch/powerpc/kernel/idle_book3s.S does not have save/restore functionality for PNV_POWERSAVE_AMR, PNV_POWERSAVE_UAMOR, and PNV_POWERSAVE_AMOR, aka CID-53a712bae5dd.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-11669", "url": "https://www.suse.com/security/cve/CVE-2020-11669" }, { "category": "external", "summary": "SUSE Bug 1169390 for CVE-2020-11669", "url": "https://bugzilla.suse.com/1169390" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-04T06:06:02Z", "details": "moderate" } ], "title": "CVE-2020-11669" }, { "cve": "CVE-2020-12114", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12114" } ], "notes": [ { "category": "general", "text": "A pivot_root race condition in fs/namespace.c in the Linux kernel 4.4.x before 4.4.221, 4.9.x before 4.9.221, 4.14.x before 4.14.178, 4.19.x before 4.19.119, and 5.x before 5.3 allows local users to cause a denial of service (panic) by corrupting a mountpoint reference counter.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12114", "url": "https://www.suse.com/security/cve/CVE-2020-12114" }, { "category": "external", "summary": "SUSE Bug 1171098 for CVE-2020-12114", "url": "https://bugzilla.suse.com/1171098" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-04T06:06:02Z", "details": "moderate" } ], "title": "CVE-2020-12114" }, { "cve": "CVE-2020-12464", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12464" } ], "notes": [ { "category": "general", "text": "usb_sg_cancel in drivers/usb/core/message.c in the Linux kernel before 5.6.8 has a use-after-free because a transfer occurs without a reference, aka CID-056ad39ee925.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12464", "url": "https://www.suse.com/security/cve/CVE-2020-12464" }, { "category": "external", "summary": "SUSE Bug 1170901 for CVE-2020-12464", "url": "https://bugzilla.suse.com/1170901" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 1.8, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-04T06:06:02Z", "details": "low" } ], "title": "CVE-2020-12464" }, { "cve": "CVE-2020-12652", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12652" } ], "notes": [ { "category": "general", "text": "The __mptctl_ioctl function in drivers/message/fusion/mptctl.c in the Linux kernel before 5.4.14 allows local users to hold an incorrect lock during the ioctl operation and trigger a race condition, i.e., a \"double fetch\" vulnerability, aka CID-28d76df18f0a. NOTE: the vendor states \"The security impact of this bug is not as bad as it could have been because these operations are all privileged and root already has enormous destructive power.\"", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12652", "url": "https://www.suse.com/security/cve/CVE-2020-12652" }, { "category": "external", "summary": "SUSE Bug 1171218 for CVE-2020-12652", "url": "https://bugzilla.suse.com/1171218" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-04T06:06:02Z", "details": "moderate" } ], "title": "CVE-2020-12652" }, { "cve": "CVE-2020-12653", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12653" } ], "notes": [ { "category": "general", "text": "An issue was found in Linux kernel before 5.5.4. The mwifiex_cmd_append_vsie_tlv() function in drivers/net/wireless/marvell/mwifiex/scan.c allows local users to gain privileges or cause a denial of service because of an incorrect memcpy and buffer overflow, aka CID-b70261a288ea.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12653", "url": "https://www.suse.com/security/cve/CVE-2020-12653" }, { "category": "external", "summary": "SUSE Bug 1159281 for CVE-2020-12653", "url": "https://bugzilla.suse.com/1159281" }, { "category": "external", "summary": "SUSE Bug 1171195 for CVE-2020-12653", "url": "https://bugzilla.suse.com/1171195" }, { "category": "external", "summary": "SUSE Bug 1171254 for CVE-2020-12653", "url": "https://bugzilla.suse.com/1171254" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-04T06:06:02Z", "details": "important" } ], "title": "CVE-2020-12653" }, { "cve": "CVE-2020-12654", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12654" } ], "notes": [ { "category": "general", "text": "An issue was found in Linux kernel before 5.5.4. mwifiex_ret_wmm_get_status() in drivers/net/wireless/marvell/mwifiex/wmm.c allows a remote AP to trigger a heap-based buffer overflow because of an incorrect memcpy, aka CID-3a9b153c5591.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12654", "url": "https://www.suse.com/security/cve/CVE-2020-12654" }, { "category": "external", "summary": "SUSE Bug 1159281 for CVE-2020-12654", "url": "https://bugzilla.suse.com/1159281" }, { "category": "external", "summary": "SUSE Bug 1171202 for CVE-2020-12654", "url": "https://bugzilla.suse.com/1171202" }, { "category": "external", "summary": "SUSE Bug 1171252 for CVE-2020-12654", "url": "https://bugzilla.suse.com/1171252" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-04T06:06:02Z", "details": "important" } ], "title": "CVE-2020-12654" }, { "cve": "CVE-2020-12655", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12655" } ], "notes": [ { "category": "general", "text": "An issue was discovered in xfs_agf_verify in fs/xfs/libxfs/xfs_alloc.c in the Linux kernel through 5.6.10. Attackers may trigger a sync of excessive duration via an XFS v5 image with crafted metadata, aka CID-d0c7feaf8767.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12655", "url": "https://www.suse.com/security/cve/CVE-2020-12655" }, { "category": "external", "summary": "SUSE Bug 1171217 for CVE-2020-12655", "url": "https://bugzilla.suse.com/1171217" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.8, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-04T06:06:02Z", "details": "moderate" } ], "title": "CVE-2020-12655" }, { "cve": "CVE-2020-12656", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12656" } ], "notes": [ { "category": "general", "text": "gss_mech_free in net/sunrpc/auth_gss/gss_mech_switch.c in the rpcsec_gss_krb5 implementation in the Linux kernel through 5.6.10 lacks certain domain_release calls, leading to a memory leak. Note: This was disputed with the assertion that the issue does not grant any access not already available. It is a problem that on unloading a specific kernel module some memory is leaked, but loading kernel modules is a privileged operation. A user could also write a kernel module to consume any amount of memory they like and load that replicating the effect of this bug", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12656", "url": "https://www.suse.com/security/cve/CVE-2020-12656" }, { "category": "external", "summary": "SUSE Bug 1171219 for CVE-2020-12656", "url": "https://bugzilla.suse.com/1171219" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.9, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-04T06:06:02Z", "details": "low" } ], "title": "CVE-2020-12656" }, { "cve": "CVE-2020-12657", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12657" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.6.5. There is a use-after-free in block/bfq-iosched.c related to bfq_idle_slice_timer_body.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12657", "url": "https://www.suse.com/security/cve/CVE-2020-12657" }, { "category": "external", "summary": "SUSE Bug 1171205 for CVE-2020-12657", "url": "https://bugzilla.suse.com/1171205" }, { "category": "external", "summary": "SUSE Bug 1201585 for CVE-2020-12657", "url": "https://bugzilla.suse.com/1201585" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-04T06:06:02Z", "details": "important" } ], "title": "CVE-2020-12657" }, { "cve": "CVE-2020-12659", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12659" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.6.7. xdp_umem_reg in net/xdp/xdp_umem.c has an out-of-bounds write (by a user with the CAP_NET_ADMIN capability) because of a lack of headroom validation.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12659", "url": "https://www.suse.com/security/cve/CVE-2020-12659" }, { "category": "external", "summary": "SUSE Bug 1171214 for CVE-2020-12659", "url": "https://bugzilla.suse.com/1171214" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H", "version": "3.1" }, "products": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-04T06:06:02Z", "details": "moderate" } ], "title": "CVE-2020-12659" }, { "cve": "CVE-2020-12769", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12769" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.4.17. drivers/spi/spi-dw.c allows attackers to cause a panic via concurrent calls to dw_spi_irq and dw_spi_transfer_one, aka CID-19b61392c5a8.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12769", "url": "https://www.suse.com/security/cve/CVE-2020-12769" }, { "category": "external", "summary": "SUSE Bug 1171983 for CVE-2020-12769", "url": "https://bugzilla.suse.com/1171983" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-04T06:06:02Z", "details": "moderate" } ], "title": "CVE-2020-12769" }, { "cve": "CVE-2020-12771", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12771" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel through 5.6.11. btree_gc_coalesce in drivers/md/bcache/btree.c has a deadlock if a coalescing operation fails.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12771", "url": "https://www.suse.com/security/cve/CVE-2020-12771" }, { "category": "external", "summary": "SUSE Bug 1171732 for CVE-2020-12771", "url": "https://bugzilla.suse.com/1171732" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-04T06:06:02Z", "details": "moderate" } ], "title": "CVE-2020-12771" }, { "cve": "CVE-2020-12888", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12888" } ], "notes": [ { "category": "general", "text": "The VFIO PCI driver in the Linux kernel through 5.6.13 mishandles attempts to access disabled memory space.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12888", "url": "https://www.suse.com/security/cve/CVE-2020-12888" }, { "category": "external", "summary": "SUSE Bug 1159281 for CVE-2020-12888", "url": "https://bugzilla.suse.com/1159281" }, { "category": "external", "summary": "SUSE Bug 1171868 for CVE-2020-12888", "url": "https://bugzilla.suse.com/1171868" }, { "category": "external", "summary": "SUSE Bug 1176979 for CVE-2020-12888", "url": "https://bugzilla.suse.com/1176979" }, { "category": "external", "summary": "SUSE Bug 1179612 for CVE-2020-12888", "url": "https://bugzilla.suse.com/1179612" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-04T06:06:02Z", "details": "moderate" } ], "title": "CVE-2020-12888" }, { "cve": "CVE-2020-13143", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-13143" } ], "notes": [ { "category": "general", "text": "gadget_dev_desc_UDC_store in drivers/usb/gadget/configfs.c in the Linux kernel 3.16 through 5.6.13 relies on kstrdup without considering the possibility of an internal \u0027\\0\u0027 value, which allows attackers to trigger an out-of-bounds read, aka CID-15753588bcd4.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-13143", "url": "https://www.suse.com/security/cve/CVE-2020-13143" }, { "category": "external", "summary": "SUSE Bug 1171982 for CVE-2020-13143", "url": "https://bugzilla.suse.com/1171982" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-04T06:06:02Z", "details": "moderate" } ], "title": "CVE-2020-13143" }, { "cve": "CVE-2020-13974", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-13974" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel 4.4 through 5.7.1. drivers/tty/vt/keyboard.c has an integer overflow if k_ascii is called several times in a row, aka CID-b86dab054059. NOTE: Members in the community argue that the integer overflow does not lead to a security issue in this case.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-13974", "url": "https://www.suse.com/security/cve/CVE-2020-13974" }, { "category": "external", "summary": "SUSE Bug 1172775 for CVE-2020-13974", "url": "https://bugzilla.suse.com/1172775" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-04T06:06:02Z", "details": "moderate" } ], "title": "CVE-2020-13974" }, { "cve": "CVE-2020-14416", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14416" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 5.4.16, a race condition in tty-\u003edisc_data handling in the slip and slcan line discipline could lead to a use-after-free, aka CID-0ace17d56824. This affects drivers/net/slip/slip.c and drivers/net/can/slcan.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14416", "url": "https://www.suse.com/security/cve/CVE-2020-14416" }, { "category": "external", "summary": "SUSE Bug 1162002 for CVE-2020-14416", "url": "https://bugzilla.suse.com/1162002" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-04T06:06:02Z", "details": "moderate" } ], "title": "CVE-2020-14416" }, { "cve": "CVE-2020-15393", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-15393" } ], "notes": [ { "category": "general", "text": "In the Linux kernel 4.4 through 5.7.6, usbtest_disconnect in drivers/usb/misc/usbtest.c has a memory leak, aka CID-28ebeb8db770.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-15393", "url": "https://www.suse.com/security/cve/CVE-2020-15393" }, { "category": "external", "summary": "SUSE Bug 1173514 for CVE-2020-15393", "url": "https://bugzilla.suse.com/1173514" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-04T06:06:02Z", "details": "moderate" } ], "title": "CVE-2020-15393" }, { "cve": "CVE-2020-15780", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-15780" } ], "notes": [ { "category": "general", "text": "An issue was discovered in drivers/acpi/acpi_configfs.c in the Linux kernel before 5.7.7. Injection of malicious ACPI tables via configfs could be used by attackers to bypass lockdown and secure boot restrictions, aka CID-75b0cea7bf30.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-15780", "url": "https://www.suse.com/security/cve/CVE-2020-15780" }, { "category": "external", "summary": "SUSE Bug 1173573 for CVE-2020-15780", "url": "https://bugzilla.suse.com/1173573" }, { "category": "external", "summary": "SUSE Bug 1174186 for CVE-2020-15780", "url": "https://bugzilla.suse.com/1174186" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-04T06:06:02Z", "details": "important" } ], "title": "CVE-2020-15780" } ] }
suse-su-2020:14394-1
Vulnerability from csaf_suse
Published
2020-06-10 08:06
Modified
2020-06-10 08:06
Summary
Security update for microcode_ctl
Notes
Title of the patch
Security update for microcode_ctl
Description of the patch
This update for microcode_ctl fixes the following issues:
Updated Intel CPU Microcode to 20200602 (prerelease) (bsc#1172466)
This update contains security mitigations for:
- CVE-2020-0543: Fixed a side channel attack against special registers
which could have resulted in leaking of read values to cores other
than the one which called it. This attack is known as Special Register
Buffer Data Sampling (SRBDS) or 'CrossTalk' (bsc#1154824).
- CVE-2020-0548,CVE-2020-0549: Additional ucode updates were supplied to
mitigate the Vector Register and L1D Eviction Sampling aka 'CacheOutAttack'
attacks. (bsc#1156353)
Microcode Table:
Processor Identifier Version Products
Model Stepping F-MO-S/PI Old->New
---- new platforms ----------------------------------------
---- updated platforms ------------------------------------
HSW C0 6-3c-3/32 00000027->00000028 Core Gen4
BDW-U/Y E0/F0 6-3d-4/c0 0000002e->0000002f Core Gen5
HSW-U C0/D0 6-45-1/72 00000025->00000026 Core Gen4
HSW-H C0 6-46-1/32 0000001b->0000001c Core Gen4
BDW-H/E3 E0/G0 6-47-1/22 00000021->00000022 Core Gen5
SKL-U/Y D0 6-4e-3/c0 000000d6->000000dc Core Gen6 Mobile
SKL-U23e K1 6-4e-3/c0 000000d6->000000dc Core Gen6 Mobile
SKX-SP B1 6-55-3/97 01000151->01000157 Xeon Scalable
SKX-SP H0/M0/U0 6-55-4/b7 02000065->02006906 Xeon Scalable
SKX-D M1 6-55-4/b7 02000065->02006906 Xeon D-21xx
CLX-SP B0 6-55-6/bf 0400002c->04002f01 Xeon Scalable Gen2
CLX-SP B1 6-55-7/bf 0500002c->04002f01 Xeon Scalable Gen2
SKL-H/S R0/N0 6-5e-3/36 000000d6->000000dc Core Gen6; Xeon E3 v5
AML-Y22 H0 6-8e-9/10 000000ca->000000d6 Core Gen8 Mobile
KBL-U/Y H0 6-8e-9/c0 000000ca->000000d6 Core Gen7 Mobile
CFL-U43e D0 6-8e-a/c0 000000ca->000000d6 Core Gen8 Mobile
WHL-U W0 6-8e-b/d0 000000ca->000000d6 Core Gen8 Mobile
AML-Y42 V0 6-8e-c/94 000000ca->000000d6 Core Gen10 Mobile
CML-Y42 V0 6-8e-c/94 000000ca->000000d6 Core Gen10 Mobile
WHL-U V0 6-8e-c/94 000000ca->000000d6 Core Gen8 Mobile
KBL-G/H/S/E3 B0 6-9e-9/2a 000000ca->000000d6 Core Gen7; Xeon E3 v6
CFL-H/S/E3 U0 6-9e-a/22 000000ca->000000d6 Core Gen8 Desktop, Mobile, Xeon E
CFL-S B0 6-9e-b/02 000000ca->000000d6 Core Gen8
CFL-H/S P0 6-9e-c/22 000000ca->000000d6 Core Gen9
CFL-H R0 6-9e-d/22 000000ca->000000d6 Core Gen9 Mobile
Also contains the Intel CPU Microcode update to 20200520:
Processor Identifier Version Products
Model Stepping F-MO-S/PI Old->New
---- new platforms ----------------------------------------
---- updated platforms ------------------------------------
SNB-E/EN/EP C1/M0 6-2d-6/6d 0000061f->00000621 Xeon E3/E5, Core X
SNB-E/EN/EP C2/M1 6-2d-7/6d 00000718->0000071a Xeon E3/E5, Core X
Patchnames
sleposp3-microcode_ctl-14394,slessp4-microcode_ctl-14394
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for microcode_ctl", "title": "Title of the patch" }, { "category": "description", "text": "This update for microcode_ctl fixes the following issues:\n\nUpdated Intel CPU Microcode to 20200602 (prerelease) (bsc#1172466)\n \nThis update contains security mitigations for:\n\n- CVE-2020-0543: Fixed a side channel attack against special registers\n which could have resulted in leaking of read values to cores other\n than the one which called it. This attack is known as Special Register\n Buffer Data Sampling (SRBDS) or \u0027CrossTalk\u0027 (bsc#1154824).\n- CVE-2020-0548,CVE-2020-0549: Additional ucode updates were supplied to\n mitigate the Vector Register and L1D Eviction Sampling aka \u0027CacheOutAttack\u0027\n attacks. (bsc#1156353)\n\nMicrocode Table:\n\n Processor Identifier Version Products\n Model Stepping F-MO-S/PI Old-\u003eNew\n ---- new platforms ----------------------------------------\n ---- updated platforms ------------------------------------\n HSW C0 6-3c-3/32 00000027-\u003e00000028 Core Gen4\n BDW-U/Y E0/F0 6-3d-4/c0 0000002e-\u003e0000002f Core Gen5\n HSW-U C0/D0 6-45-1/72 00000025-\u003e00000026 Core Gen4\n HSW-H C0 6-46-1/32 0000001b-\u003e0000001c Core Gen4\n BDW-H/E3 E0/G0 6-47-1/22 00000021-\u003e00000022 Core Gen5\n SKL-U/Y D0 6-4e-3/c0 000000d6-\u003e000000dc Core Gen6 Mobile\n SKL-U23e K1 6-4e-3/c0 000000d6-\u003e000000dc Core Gen6 Mobile\n SKX-SP B1 6-55-3/97 01000151-\u003e01000157 Xeon Scalable\n SKX-SP H0/M0/U0 6-55-4/b7 02000065-\u003e02006906 Xeon Scalable\n SKX-D M1 6-55-4/b7 02000065-\u003e02006906 Xeon D-21xx\n CLX-SP B0 6-55-6/bf 0400002c-\u003e04002f01 Xeon Scalable Gen2\n CLX-SP B1 6-55-7/bf 0500002c-\u003e04002f01 Xeon Scalable Gen2\n SKL-H/S R0/N0 6-5e-3/36 000000d6-\u003e000000dc Core Gen6; Xeon E3 v5\n AML-Y22 H0 6-8e-9/10 000000ca-\u003e000000d6 Core Gen8 Mobile\n KBL-U/Y H0 6-8e-9/c0 000000ca-\u003e000000d6 Core Gen7 Mobile\n CFL-U43e D0 6-8e-a/c0 000000ca-\u003e000000d6 Core Gen8 Mobile\n WHL-U W0 6-8e-b/d0 000000ca-\u003e000000d6 Core Gen8 Mobile\n AML-Y42 V0 6-8e-c/94 000000ca-\u003e000000d6 Core Gen10 Mobile\n CML-Y42 V0 6-8e-c/94 000000ca-\u003e000000d6 Core Gen10 Mobile\n WHL-U V0 6-8e-c/94 000000ca-\u003e000000d6 Core Gen8 Mobile\n KBL-G/H/S/E3 B0 6-9e-9/2a 000000ca-\u003e000000d6 Core Gen7; Xeon E3 v6\n CFL-H/S/E3 U0 6-9e-a/22 000000ca-\u003e000000d6 Core Gen8 Desktop, Mobile, Xeon E\n CFL-S B0 6-9e-b/02 000000ca-\u003e000000d6 Core Gen8\n CFL-H/S P0 6-9e-c/22 000000ca-\u003e000000d6 Core Gen9\n CFL-H R0 6-9e-d/22 000000ca-\u003e000000d6 Core Gen9 Mobile\n\nAlso contains the Intel CPU Microcode update to 20200520:\n\n Processor Identifier Version Products\n Model Stepping F-MO-S/PI Old-\u003eNew\n ---- new platforms ----------------------------------------\n ---- updated platforms ------------------------------------\n SNB-E/EN/EP C1/M0 6-2d-6/6d 0000061f-\u003e00000621 Xeon E3/E5, Core X\n SNB-E/EN/EP C2/M1 6-2d-7/6d 00000718-\u003e0000071a Xeon E3/E5, Core X\n", "title": "Description of the patch" }, { "category": "details", "text": "sleposp3-microcode_ctl-14394,slessp4-microcode_ctl-14394", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2020_14394-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2020:14394-1", "url": "https://www.suse.com/support/update/announcement/2020/suse-su-202014394-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2020:14394-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-June/006920.html" }, { "category": "self", "summary": "SUSE Bug 1154824", "url": "https://bugzilla.suse.com/1154824" }, { "category": "self", "summary": "SUSE Bug 1156353", "url": "https://bugzilla.suse.com/1156353" }, { "category": "self", "summary": "SUSE Bug 1172466", "url": "https://bugzilla.suse.com/1172466" }, { "category": "self", "summary": "SUSE CVE CVE-2020-0543 page", "url": "https://www.suse.com/security/cve/CVE-2020-0543/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-0548 page", "url": "https://www.suse.com/security/cve/CVE-2020-0548/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-0549 page", "url": "https://www.suse.com/security/cve/CVE-2020-0549/" } ], "title": "Security update for microcode_ctl", "tracking": { "current_release_date": "2020-06-10T08:06:27Z", "generator": { "date": "2020-06-10T08:06:27Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2020:14394-1", "initial_release_date": "2020-06-10T08:06:27Z", "revision_history": [ { "date": "2020-06-10T08:06:27Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "microcode_ctl-1.17-102.83.53.1.i586", "product": { "name": "microcode_ctl-1.17-102.83.53.1.i586", "product_id": "microcode_ctl-1.17-102.83.53.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "microcode_ctl-1.17-102.83.53.1.x86_64", "product": { "name": "microcode_ctl-1.17-102.83.53.1.x86_64", "product_id": "microcode_ctl-1.17-102.83.53.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Point of Sale 11 SP3", "product": { "name": "SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-pos:11:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 11 SP4-LTSS", "product": { "name": "SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_sles:11:sp4" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "microcode_ctl-1.17-102.83.53.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:microcode_ctl-1.17-102.83.53.1.i586" }, "product_reference": "microcode_ctl-1.17-102.83.53.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "microcode_ctl-1.17-102.83.53.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:microcode_ctl-1.17-102.83.53.1.i586" }, "product_reference": "microcode_ctl-1.17-102.83.53.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "microcode_ctl-1.17-102.83.53.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:microcode_ctl-1.17-102.83.53.1.x86_64" }, "product_reference": "microcode_ctl-1.17-102.83.53.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-0543", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-0543" } ], "notes": [ { "category": "general", "text": "Incomplete cleanup from specific special register read operations in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:microcode_ctl-1.17-102.83.53.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:microcode_ctl-1.17-102.83.53.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:microcode_ctl-1.17-102.83.53.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-0543", "url": "https://www.suse.com/security/cve/CVE-2020-0543" }, { "category": "external", "summary": "SUSE Bug 1154824 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1154824" }, { "category": "external", "summary": "SUSE Bug 1172205 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172205" }, { "category": "external", "summary": "SUSE Bug 1172206 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172206" }, { "category": "external", "summary": "SUSE Bug 1172207 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172207" }, { "category": "external", "summary": "SUSE Bug 1172770 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172770" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:microcode_ctl-1.17-102.83.53.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:microcode_ctl-1.17-102.83.53.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:microcode_ctl-1.17-102.83.53.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:microcode_ctl-1.17-102.83.53.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:microcode_ctl-1.17-102.83.53.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:microcode_ctl-1.17-102.83.53.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-10T08:06:27Z", "details": "moderate" } ], "title": "CVE-2020-0543" }, { "cve": "CVE-2020-0548", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-0548" } ], "notes": [ { "category": "general", "text": "Cleanup errors in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:microcode_ctl-1.17-102.83.53.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:microcode_ctl-1.17-102.83.53.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:microcode_ctl-1.17-102.83.53.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-0548", "url": "https://www.suse.com/security/cve/CVE-2020-0548" }, { "category": "external", "summary": "SUSE Bug 1156353 for CVE-2020-0548", "url": "https://bugzilla.suse.com/1156353" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:microcode_ctl-1.17-102.83.53.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:microcode_ctl-1.17-102.83.53.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:microcode_ctl-1.17-102.83.53.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.8, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:microcode_ctl-1.17-102.83.53.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:microcode_ctl-1.17-102.83.53.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:microcode_ctl-1.17-102.83.53.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-10T08:06:27Z", "details": "moderate" } ], "title": "CVE-2020-0548" }, { "cve": "CVE-2020-0549", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-0549" } ], "notes": [ { "category": "general", "text": "Cleanup errors in some data cache evictions for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:microcode_ctl-1.17-102.83.53.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:microcode_ctl-1.17-102.83.53.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:microcode_ctl-1.17-102.83.53.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-0549", "url": "https://www.suse.com/security/cve/CVE-2020-0549" }, { "category": "external", "summary": "SUSE Bug 1156353 for CVE-2020-0549", "url": "https://bugzilla.suse.com/1156353" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:microcode_ctl-1.17-102.83.53.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:microcode_ctl-1.17-102.83.53.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:microcode_ctl-1.17-102.83.53.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:microcode_ctl-1.17-102.83.53.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:microcode_ctl-1.17-102.83.53.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:microcode_ctl-1.17-102.83.53.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-10T08:06:27Z", "details": "moderate" } ], "title": "CVE-2020-0549" } ] }
suse-su-2020:1596-1
Vulnerability from csaf_suse
Published
2020-06-10 08:30
Modified
2020-06-10 08:30
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 12 SP3 kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2020-0543: Fixed a side channel attack against special registers which could have resulted in leaking of read values to cores other than the one which called it.
This attack is known as Special Register Buffer Data Sampling (SRBDS) or 'CrossTalk' (bsc#1154824).
- CVE-2020-12652: Fixed an issue which could have allowed local users to hold an incorrect lock during the ioctl operation and trigger a race condition (bsc#1171218).
- CVE-2020-12653: Fixed an issue in the wifi driver which could have allowed local users to gain privileges or cause a denial of service (bsc#1171195).
- CVE-2020-12654: Fixed an issue in he wifi driver which could have allowed a remote AP to trigger a heap-based buffer overflow (bsc#1171202).
- CVE-2020-12656: Fixed an improper handling of certain domain_release calls leadingch could have led to a memory leak (bsc#1171219).
- CVE-2020-12114: Fixed A pivot_root race condition which could have allowed local users to cause a denial of service (panic) by corrupting a mountpoint reference counter (bsc#1171098).
- CVE-2020-10757: Fixed an issue where remaping hugepage DAX to anon mmap could have caused user PTE access (bsc#1172317).
The following non-security bugs were fixed:
- can, slip: Protect tty->disc_data in write_wakeup and close with RCU (bsc#1171698).
- clocksource/drivers/hyper-v: Set TSC clocksource as default w/ InvariantTSC (bsc#1170620).
- Drivers: HV: Send one page worth of kmsg dump over Hyper-V during panic (bsc#1170618).
- Drivers: hv: vmbus: Fix the issue with freeing up hv_ctl_table_hdr (bsc#1170618).
- Drivers: hv: vmbus: Get rid of MSR access from vmbus_drv.c (bsc#1170618).
- Drivers: hv: vmbus: Make panic reporting to be more useful (bsc#1170618).
- Drivers: hv: vmus: Fix the check for return value from kmsg get dump buffer (bsc#1170618).
- EDAC: Convert to new X86 CPU match macros
- ibmvfc: do not send implicit logouts prior to NPIV login (bsc#1169625 ltc#184611).
- ibmvfc: Fix NULL return compiler warning (bsc#1161951 ltc#183551).
- KEYS: reaching the keys quotas correctly (bsc#1171689).
- NFS: Cleanup if nfs_match_client is interrupted (bsc#1169025).
- NFS: Fix a double unlock from nfs_match,get_client (bsc#1169025).
- NFS: make nfs_match_client killable (bsc#1169025).
- NFS: Unlock requests must never fail (bsc#1172032).
- random: always use batched entropy for get_random_u{32,64} (bsc#1164871).
- Revert 'ipc,sem: remove uneeded sem_undo_list lock usage in exit_sem()' (bsc#1172221).
- scsi: ibmvfc: Avoid loss of all paths during SVC node reboot (bsc#1161951 ltc#183551).
- scsi: ibmvfc: Fix NULL return compiler warning (bsc#1161951 ltc#183551).
- x86/dumpstack/64: Handle faults when printing the 'Stack: ' part of an OOPS (bsc#1170383).
- x86/hyperv: Allow guests to enable InvariantTSC (bsc#1170620).
- x86/Hyper-V: Free hv_panic_page when fail to register kmsg dump (bsc#1170618).
- x86/Hyper-V: Report crash data in die() when panic_on_oops is set (bsc#1170618).
- x86/Hyper-V: Report crash register data or kmsg before running crash kernel (bsc#1170618).
- x86/Hyper-V: Report crash register data when sysctl_record_panic_msg is not set (bsc#1170618).
- x86: hyperv: report value of misc_features (git fixes).
- x86/Hyper-V: Trigger crash enlightenment only once during system crash (bsc#1170618).
- x86/Hyper-V: Unload vmbus channel in hv panic callback (bsc#1170618).
Patchnames
HPE-Helion-OpenStack-8-2020-1596,SUSE-2020-1596,SUSE-OpenStack-Cloud-8-2020-1596,SUSE-OpenStack-Cloud-Crowbar-8-2020-1596,SUSE-SLE-HA-12-SP3-2020-1596,SUSE-SLE-SAP-12-SP3-2020-1596,SUSE-SLE-SERVER-12-SP3-2020-1596,SUSE-SLE-SERVER-12-SP3-BCL-2020-1596,SUSE-Storage-5-2020-1596
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "The SUSE Linux Enterprise 12 SP3 kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2020-0543: Fixed a side channel attack against special registers which could have resulted in leaking of read values to cores other than the one which called it.\n This attack is known as Special Register Buffer Data Sampling (SRBDS) or \u0027CrossTalk\u0027 (bsc#1154824).\n- CVE-2020-12652: Fixed an issue which could have allowed local users to hold an incorrect lock during the ioctl operation and trigger a race condition (bsc#1171218).\n- CVE-2020-12653: Fixed an issue in the wifi driver which could have allowed local users to gain privileges or cause a denial of service (bsc#1171195).\n- CVE-2020-12654: Fixed an issue in he wifi driver which could have allowed a remote AP to trigger a heap-based buffer overflow (bsc#1171202).\n- CVE-2020-12656: Fixed an improper handling of certain domain_release calls leadingch could have led to a memory leak (bsc#1171219).\n- CVE-2020-12114: Fixed A pivot_root race condition which could have allowed local users to cause a denial of service (panic) by corrupting a mountpoint reference counter (bsc#1171098).\n- CVE-2020-10757: Fixed an issue where remaping hugepage DAX to anon mmap could have caused user PTE access (bsc#1172317).\n\nThe following non-security bugs were fixed:\n\n- can, slip: Protect tty-\u003edisc_data in write_wakeup and close with RCU (bsc#1171698).\n- clocksource/drivers/hyper-v: Set TSC clocksource as default w/ InvariantTSC (bsc#1170620).\n- Drivers: HV: Send one page worth of kmsg dump over Hyper-V during panic (bsc#1170618).\n- Drivers: hv: vmbus: Fix the issue with freeing up hv_ctl_table_hdr (bsc#1170618).\n- Drivers: hv: vmbus: Get rid of MSR access from vmbus_drv.c (bsc#1170618).\n- Drivers: hv: vmbus: Make panic reporting to be more useful (bsc#1170618).\n- Drivers: hv: vmus: Fix the check for return value from kmsg get dump buffer (bsc#1170618).\n- EDAC: Convert to new X86 CPU match macros\n- ibmvfc: do not send implicit logouts prior to NPIV login (bsc#1169625 ltc#184611).\n- ibmvfc: Fix NULL return compiler warning (bsc#1161951 ltc#183551).\n- KEYS: reaching the keys quotas correctly (bsc#1171689).\n- NFS: Cleanup if nfs_match_client is interrupted (bsc#1169025).\n- NFS: Fix a double unlock from nfs_match,get_client (bsc#1169025).\n- NFS: make nfs_match_client killable (bsc#1169025).\n- NFS: Unlock requests must never fail (bsc#1172032).\n- random: always use batched entropy for get_random_u{32,64} (bsc#1164871).\n- Revert \u0027ipc,sem: remove uneeded sem_undo_list lock usage in exit_sem()\u0027 (bsc#1172221).\n- scsi: ibmvfc: Avoid loss of all paths during SVC node reboot (bsc#1161951 ltc#183551).\n- scsi: ibmvfc: Fix NULL return compiler warning (bsc#1161951 ltc#183551).\n- x86/dumpstack/64: Handle faults when printing the \u0027Stack: \u0027 part of an OOPS (bsc#1170383).\n- x86/hyperv: Allow guests to enable InvariantTSC (bsc#1170620).\n- x86/Hyper-V: Free hv_panic_page when fail to register kmsg dump (bsc#1170618).\n- x86/Hyper-V: Report crash data in die() when panic_on_oops is set (bsc#1170618).\n- x86/Hyper-V: Report crash register data or kmsg before running crash kernel (bsc#1170618).\n- x86/Hyper-V: Report crash register data when sysctl_record_panic_msg is not set (bsc#1170618).\n- x86: hyperv: report value of misc_features (git fixes).\n- x86/Hyper-V: Trigger crash enlightenment only once during system crash (bsc#1170618).\n- x86/Hyper-V: Unload vmbus channel in hv panic callback (bsc#1170618).\n", "title": "Description of the patch" }, { "category": "details", "text": "HPE-Helion-OpenStack-8-2020-1596,SUSE-2020-1596,SUSE-OpenStack-Cloud-8-2020-1596,SUSE-OpenStack-Cloud-Crowbar-8-2020-1596,SUSE-SLE-HA-12-SP3-2020-1596,SUSE-SLE-SAP-12-SP3-2020-1596,SUSE-SLE-SERVER-12-SP3-2020-1596,SUSE-SLE-SERVER-12-SP3-BCL-2020-1596,SUSE-Storage-5-2020-1596", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2020_1596-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2020:1596-1", "url": "https://www.suse.com/support/update/announcement/2020/suse-su-20201596-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2020:1596-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-June/006919.html" }, { "category": "self", "summary": "SUSE Bug 1154824", "url": "https://bugzilla.suse.com/1154824" }, { "category": "self", "summary": "SUSE Bug 1161951", "url": "https://bugzilla.suse.com/1161951" }, { "category": "self", "summary": "SUSE Bug 1164871", "url": "https://bugzilla.suse.com/1164871" }, { "category": "self", "summary": "SUSE Bug 1169025", "url": "https://bugzilla.suse.com/1169025" }, { "category": "self", "summary": "SUSE Bug 1169625", "url": "https://bugzilla.suse.com/1169625" }, { "category": "self", "summary": "SUSE Bug 1170383", "url": "https://bugzilla.suse.com/1170383" }, { "category": "self", "summary": "SUSE Bug 1170618", "url": "https://bugzilla.suse.com/1170618" }, { "category": "self", "summary": "SUSE Bug 1170620", "url": "https://bugzilla.suse.com/1170620" }, { "category": "self", "summary": "SUSE Bug 1171098", "url": "https://bugzilla.suse.com/1171098" }, { "category": "self", "summary": "SUSE Bug 1171195", "url": "https://bugzilla.suse.com/1171195" }, { "category": "self", "summary": "SUSE Bug 1171202", "url": "https://bugzilla.suse.com/1171202" }, { "category": "self", "summary": "SUSE Bug 1171218", "url": "https://bugzilla.suse.com/1171218" }, { "category": "self", "summary": "SUSE Bug 1171219", "url": "https://bugzilla.suse.com/1171219" }, { "category": "self", "summary": "SUSE Bug 1171689", "url": "https://bugzilla.suse.com/1171689" }, { "category": "self", "summary": "SUSE Bug 1171698", "url": "https://bugzilla.suse.com/1171698" }, { "category": "self", "summary": "SUSE Bug 1172032", "url": "https://bugzilla.suse.com/1172032" }, { "category": "self", "summary": "SUSE Bug 1172221", "url": "https://bugzilla.suse.com/1172221" }, { "category": "self", "summary": "SUSE Bug 1172317", "url": "https://bugzilla.suse.com/1172317" }, { "category": "self", "summary": "SUSE CVE CVE-2020-0543 page", "url": "https://www.suse.com/security/cve/CVE-2020-0543/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10757 page", "url": "https://www.suse.com/security/cve/CVE-2020-10757/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12114 page", "url": "https://www.suse.com/security/cve/CVE-2020-12114/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12652 page", "url": "https://www.suse.com/security/cve/CVE-2020-12652/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12653 page", "url": "https://www.suse.com/security/cve/CVE-2020-12653/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12654 page", "url": "https://www.suse.com/security/cve/CVE-2020-12654/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12656 page", "url": "https://www.suse.com/security/cve/CVE-2020-12656/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2020-06-10T08:30:18Z", "generator": { "date": "2020-06-10T08:30:18Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2020:1596-1", "initial_release_date": "2020-06-10T08:30:18Z", "revision_history": [ { "date": "2020-06-10T08:30:18Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.4.180-94.121.1.aarch64", "product": { "name": "cluster-md-kmp-default-4.4.180-94.121.1.aarch64", "product_id": "cluster-md-kmp-default-4.4.180-94.121.1.aarch64" } }, { "category": "product_version", "name": "dlm-kmp-default-4.4.180-94.121.1.aarch64", "product": { "name": "dlm-kmp-default-4.4.180-94.121.1.aarch64", "product_id": "dlm-kmp-default-4.4.180-94.121.1.aarch64" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.4.180-94.121.1.aarch64", "product": { "name": "gfs2-kmp-default-4.4.180-94.121.1.aarch64", "product_id": "gfs2-kmp-default-4.4.180-94.121.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-4.4.180-94.121.1.aarch64", "product": { "name": "kernel-default-4.4.180-94.121.1.aarch64", "product_id": "kernel-default-4.4.180-94.121.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-base-4.4.180-94.121.1.aarch64", "product": { "name": "kernel-default-base-4.4.180-94.121.1.aarch64", "product_id": "kernel-default-base-4.4.180-94.121.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-devel-4.4.180-94.121.1.aarch64", "product": { "name": "kernel-default-devel-4.4.180-94.121.1.aarch64", "product_id": "kernel-default-devel-4.4.180-94.121.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-extra-4.4.180-94.121.1.aarch64", "product": { "name": "kernel-default-extra-4.4.180-94.121.1.aarch64", "product_id": "kernel-default-extra-4.4.180-94.121.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.4.180-94.121.1.aarch64", "product": { "name": "kernel-default-kgraft-4.4.180-94.121.1.aarch64", "product_id": "kernel-default-kgraft-4.4.180-94.121.1.aarch64" } }, { "category": "product_version", "name": "kernel-obs-build-4.4.180-94.121.1.aarch64", "product": { "name": "kernel-obs-build-4.4.180-94.121.1.aarch64", "product_id": "kernel-obs-build-4.4.180-94.121.1.aarch64" } }, { "category": "product_version", "name": "kernel-obs-qa-4.4.180-94.121.1.aarch64", "product": { "name": "kernel-obs-qa-4.4.180-94.121.1.aarch64", "product_id": "kernel-obs-qa-4.4.180-94.121.1.aarch64" } }, { "category": "product_version", "name": "kernel-syms-4.4.180-94.121.1.aarch64", "product": { "name": "kernel-syms-4.4.180-94.121.1.aarch64", "product_id": "kernel-syms-4.4.180-94.121.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-4.4.180-94.121.1.aarch64", "product": { "name": "kernel-vanilla-4.4.180-94.121.1.aarch64", "product_id": "kernel-vanilla-4.4.180-94.121.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.4.180-94.121.1.aarch64", "product": { "name": "kernel-vanilla-base-4.4.180-94.121.1.aarch64", "product_id": "kernel-vanilla-base-4.4.180-94.121.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.4.180-94.121.1.aarch64", "product": { "name": "kernel-vanilla-devel-4.4.180-94.121.1.aarch64", "product_id": "kernel-vanilla-devel-4.4.180-94.121.1.aarch64" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.4.180-94.121.1.aarch64", "product": { "name": "kselftests-kmp-default-4.4.180-94.121.1.aarch64", "product_id": "kselftests-kmp-default-4.4.180-94.121.1.aarch64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.4.180-94.121.1.aarch64", "product": { "name": "ocfs2-kmp-default-4.4.180-94.121.1.aarch64", "product_id": "ocfs2-kmp-default-4.4.180-94.121.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-4.4.180-94.121.1.noarch", "product": { "name": "kernel-devel-4.4.180-94.121.1.noarch", "product_id": "kernel-devel-4.4.180-94.121.1.noarch" } }, { "category": "product_version", "name": "kernel-macros-4.4.180-94.121.1.noarch", "product": { "name": "kernel-macros-4.4.180-94.121.1.noarch", "product_id": "kernel-macros-4.4.180-94.121.1.noarch" } }, { "category": "product_version", "name": "kernel-source-4.4.180-94.121.1.noarch", "product": { "name": "kernel-source-4.4.180-94.121.1.noarch", "product_id": "kernel-source-4.4.180-94.121.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-4.4.180-94.121.2.noarch", "product": { "name": "kernel-docs-4.4.180-94.121.2.noarch", "product_id": "kernel-docs-4.4.180-94.121.2.noarch" } }, { "category": "product_version", "name": "kernel-docs-html-4.4.180-94.121.2.noarch", "product": { "name": "kernel-docs-html-4.4.180-94.121.2.noarch", "product_id": "kernel-docs-html-4.4.180-94.121.2.noarch" } }, { "category": "product_version", "name": "kernel-docs-pdf-4.4.180-94.121.2.noarch", "product": { "name": "kernel-docs-pdf-4.4.180-94.121.2.noarch", "product_id": "kernel-docs-pdf-4.4.180-94.121.2.noarch" } }, { "category": "product_version", "name": "kernel-source-vanilla-4.4.180-94.121.1.noarch", "product": { "name": "kernel-source-vanilla-4.4.180-94.121.1.noarch", "product_id": "kernel-source-vanilla-4.4.180-94.121.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-debug-4.4.180-94.121.1.ppc64le", "product": { "name": "cluster-md-kmp-debug-4.4.180-94.121.1.ppc64le", "product_id": "cluster-md-kmp-debug-4.4.180-94.121.1.ppc64le" } }, { "category": "product_version", "name": "cluster-md-kmp-default-4.4.180-94.121.1.ppc64le", "product": { "name": "cluster-md-kmp-default-4.4.180-94.121.1.ppc64le", "product_id": "cluster-md-kmp-default-4.4.180-94.121.1.ppc64le" } }, { "category": "product_version", "name": "dlm-kmp-debug-4.4.180-94.121.1.ppc64le", "product": { "name": "dlm-kmp-debug-4.4.180-94.121.1.ppc64le", "product_id": "dlm-kmp-debug-4.4.180-94.121.1.ppc64le" } }, { "category": "product_version", "name": "dlm-kmp-default-4.4.180-94.121.1.ppc64le", "product": { "name": "dlm-kmp-default-4.4.180-94.121.1.ppc64le", "product_id": "dlm-kmp-default-4.4.180-94.121.1.ppc64le" } }, { "category": "product_version", "name": "gfs2-kmp-debug-4.4.180-94.121.1.ppc64le", "product": { "name": "gfs2-kmp-debug-4.4.180-94.121.1.ppc64le", "product_id": "gfs2-kmp-debug-4.4.180-94.121.1.ppc64le" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.4.180-94.121.1.ppc64le", "product": { "name": "gfs2-kmp-default-4.4.180-94.121.1.ppc64le", "product_id": "gfs2-kmp-default-4.4.180-94.121.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-4.4.180-94.121.1.ppc64le", "product": { "name": "kernel-debug-4.4.180-94.121.1.ppc64le", "product_id": "kernel-debug-4.4.180-94.121.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-base-4.4.180-94.121.1.ppc64le", "product": { "name": "kernel-debug-base-4.4.180-94.121.1.ppc64le", "product_id": "kernel-debug-base-4.4.180-94.121.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-devel-4.4.180-94.121.1.ppc64le", "product": { "name": "kernel-debug-devel-4.4.180-94.121.1.ppc64le", "product_id": "kernel-debug-devel-4.4.180-94.121.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-extra-4.4.180-94.121.1.ppc64le", "product": { "name": "kernel-debug-extra-4.4.180-94.121.1.ppc64le", "product_id": "kernel-debug-extra-4.4.180-94.121.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-kgraft-4.4.180-94.121.1.ppc64le", "product": { "name": "kernel-debug-kgraft-4.4.180-94.121.1.ppc64le", "product_id": "kernel-debug-kgraft-4.4.180-94.121.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-4.4.180-94.121.1.ppc64le", "product": { "name": "kernel-default-4.4.180-94.121.1.ppc64le", "product_id": "kernel-default-4.4.180-94.121.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-base-4.4.180-94.121.1.ppc64le", "product": { "name": "kernel-default-base-4.4.180-94.121.1.ppc64le", "product_id": "kernel-default-base-4.4.180-94.121.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-devel-4.4.180-94.121.1.ppc64le", "product": { "name": "kernel-default-devel-4.4.180-94.121.1.ppc64le", "product_id": "kernel-default-devel-4.4.180-94.121.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-extra-4.4.180-94.121.1.ppc64le", "product": { "name": "kernel-default-extra-4.4.180-94.121.1.ppc64le", "product_id": "kernel-default-extra-4.4.180-94.121.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.4.180-94.121.1.ppc64le", "product": { "name": "kernel-default-kgraft-4.4.180-94.121.1.ppc64le", "product_id": "kernel-default-kgraft-4.4.180-94.121.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-build-4.4.180-94.121.1.ppc64le", "product": { "name": "kernel-obs-build-4.4.180-94.121.1.ppc64le", "product_id": "kernel-obs-build-4.4.180-94.121.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-qa-4.4.180-94.121.1.ppc64le", "product": { "name": "kernel-obs-qa-4.4.180-94.121.1.ppc64le", "product_id": "kernel-obs-qa-4.4.180-94.121.1.ppc64le" } }, { "category": "product_version", "name": "kernel-syms-4.4.180-94.121.1.ppc64le", "product": { "name": "kernel-syms-4.4.180-94.121.1.ppc64le", "product_id": "kernel-syms-4.4.180-94.121.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-4.4.180-94.121.1.ppc64le", "product": { "name": "kernel-vanilla-4.4.180-94.121.1.ppc64le", "product_id": "kernel-vanilla-4.4.180-94.121.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.4.180-94.121.1.ppc64le", "product": { "name": "kernel-vanilla-base-4.4.180-94.121.1.ppc64le", "product_id": "kernel-vanilla-base-4.4.180-94.121.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.4.180-94.121.1.ppc64le", "product": { "name": "kernel-vanilla-devel-4.4.180-94.121.1.ppc64le", "product_id": "kernel-vanilla-devel-4.4.180-94.121.1.ppc64le" } }, { "category": "product_version", "name": "kgraft-patch-4_4_180-94_121-default-1-4.5.1.ppc64le", "product": { "name": "kgraft-patch-4_4_180-94_121-default-1-4.5.1.ppc64le", "product_id": "kgraft-patch-4_4_180-94_121-default-1-4.5.1.ppc64le" } }, { "category": "product_version", "name": "kselftests-kmp-debug-4.4.180-94.121.1.ppc64le", "product": { "name": "kselftests-kmp-debug-4.4.180-94.121.1.ppc64le", "product_id": "kselftests-kmp-debug-4.4.180-94.121.1.ppc64le" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.4.180-94.121.1.ppc64le", "product": { "name": "kselftests-kmp-default-4.4.180-94.121.1.ppc64le", "product_id": "kselftests-kmp-default-4.4.180-94.121.1.ppc64le" } }, { "category": "product_version", "name": "ocfs2-kmp-debug-4.4.180-94.121.1.ppc64le", "product": { "name": "ocfs2-kmp-debug-4.4.180-94.121.1.ppc64le", "product_id": "ocfs2-kmp-debug-4.4.180-94.121.1.ppc64le" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.4.180-94.121.1.ppc64le", "product": { "name": "ocfs2-kmp-default-4.4.180-94.121.1.ppc64le", "product_id": "ocfs2-kmp-default-4.4.180-94.121.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.4.180-94.121.1.s390x", "product": { "name": "cluster-md-kmp-default-4.4.180-94.121.1.s390x", "product_id": "cluster-md-kmp-default-4.4.180-94.121.1.s390x" } }, { "category": "product_version", "name": "dlm-kmp-default-4.4.180-94.121.1.s390x", "product": { "name": "dlm-kmp-default-4.4.180-94.121.1.s390x", "product_id": "dlm-kmp-default-4.4.180-94.121.1.s390x" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.4.180-94.121.1.s390x", "product": { "name": "gfs2-kmp-default-4.4.180-94.121.1.s390x", "product_id": "gfs2-kmp-default-4.4.180-94.121.1.s390x" } }, { "category": "product_version", "name": "kernel-default-4.4.180-94.121.1.s390x", "product": { "name": "kernel-default-4.4.180-94.121.1.s390x", "product_id": "kernel-default-4.4.180-94.121.1.s390x" } }, { "category": "product_version", "name": "kernel-default-base-4.4.180-94.121.1.s390x", "product": { "name": "kernel-default-base-4.4.180-94.121.1.s390x", "product_id": "kernel-default-base-4.4.180-94.121.1.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-4.4.180-94.121.1.s390x", "product": { "name": "kernel-default-devel-4.4.180-94.121.1.s390x", "product_id": "kernel-default-devel-4.4.180-94.121.1.s390x" } }, { "category": "product_version", "name": "kernel-default-extra-4.4.180-94.121.1.s390x", "product": { "name": "kernel-default-extra-4.4.180-94.121.1.s390x", "product_id": "kernel-default-extra-4.4.180-94.121.1.s390x" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.4.180-94.121.1.s390x", "product": { "name": "kernel-default-kgraft-4.4.180-94.121.1.s390x", "product_id": "kernel-default-kgraft-4.4.180-94.121.1.s390x" } }, { "category": "product_version", "name": "kernel-default-man-4.4.180-94.121.1.s390x", "product": { "name": "kernel-default-man-4.4.180-94.121.1.s390x", "product_id": "kernel-default-man-4.4.180-94.121.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-build-4.4.180-94.121.1.s390x", "product": { "name": "kernel-obs-build-4.4.180-94.121.1.s390x", "product_id": "kernel-obs-build-4.4.180-94.121.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-qa-4.4.180-94.121.1.s390x", "product": { "name": "kernel-obs-qa-4.4.180-94.121.1.s390x", "product_id": "kernel-obs-qa-4.4.180-94.121.1.s390x" } }, { "category": "product_version", "name": "kernel-syms-4.4.180-94.121.1.s390x", "product": { "name": "kernel-syms-4.4.180-94.121.1.s390x", "product_id": "kernel-syms-4.4.180-94.121.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-4.4.180-94.121.1.s390x", "product": { "name": "kernel-vanilla-4.4.180-94.121.1.s390x", "product_id": "kernel-vanilla-4.4.180-94.121.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.4.180-94.121.1.s390x", "product": { "name": "kernel-vanilla-base-4.4.180-94.121.1.s390x", "product_id": "kernel-vanilla-base-4.4.180-94.121.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.4.180-94.121.1.s390x", "product": { "name": "kernel-vanilla-devel-4.4.180-94.121.1.s390x", "product_id": "kernel-vanilla-devel-4.4.180-94.121.1.s390x" } }, { "category": "product_version", "name": "kernel-zfcpdump-4.4.180-94.121.1.s390x", "product": { "name": "kernel-zfcpdump-4.4.180-94.121.1.s390x", "product_id": "kernel-zfcpdump-4.4.180-94.121.1.s390x" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.4.180-94.121.1.s390x", "product": { "name": "kselftests-kmp-default-4.4.180-94.121.1.s390x", "product_id": "kselftests-kmp-default-4.4.180-94.121.1.s390x" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.4.180-94.121.1.s390x", "product": { "name": "ocfs2-kmp-default-4.4.180-94.121.1.s390x", "product_id": "ocfs2-kmp-default-4.4.180-94.121.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-default-4.4.180-94.121.1.x86_64", "product": { "name": "kernel-default-4.4.180-94.121.1.x86_64", "product_id": "kernel-default-4.4.180-94.121.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-4.4.180-94.121.1.x86_64", "product": { "name": "kernel-default-base-4.4.180-94.121.1.x86_64", "product_id": "kernel-default-base-4.4.180-94.121.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-4.4.180-94.121.1.x86_64", "product": { "name": "kernel-default-devel-4.4.180-94.121.1.x86_64", "product_id": "kernel-default-devel-4.4.180-94.121.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.4.180-94.121.1.x86_64", "product": { "name": "kernel-default-kgraft-4.4.180-94.121.1.x86_64", "product_id": "kernel-default-kgraft-4.4.180-94.121.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-4.4.180-94.121.1.x86_64", "product": { "name": "kernel-syms-4.4.180-94.121.1.x86_64", "product_id": "kernel-syms-4.4.180-94.121.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-4_4_180-94_121-default-1-4.5.1.x86_64", "product": { "name": "kgraft-patch-4_4_180-94_121-default-1-4.5.1.x86_64", "product_id": "kgraft-patch-4_4_180-94_121-default-1-4.5.1.x86_64" } }, { "category": "product_version", "name": "cluster-md-kmp-debug-4.4.180-94.121.1.x86_64", "product": { "name": "cluster-md-kmp-debug-4.4.180-94.121.1.x86_64", "product_id": "cluster-md-kmp-debug-4.4.180-94.121.1.x86_64" } }, { "category": "product_version", "name": "cluster-md-kmp-default-4.4.180-94.121.1.x86_64", "product": { "name": "cluster-md-kmp-default-4.4.180-94.121.1.x86_64", "product_id": "cluster-md-kmp-default-4.4.180-94.121.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-debug-4.4.180-94.121.1.x86_64", "product": { "name": "dlm-kmp-debug-4.4.180-94.121.1.x86_64", "product_id": "dlm-kmp-debug-4.4.180-94.121.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-default-4.4.180-94.121.1.x86_64", "product": { "name": "dlm-kmp-default-4.4.180-94.121.1.x86_64", "product_id": "dlm-kmp-default-4.4.180-94.121.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-debug-4.4.180-94.121.1.x86_64", "product": { "name": "gfs2-kmp-debug-4.4.180-94.121.1.x86_64", "product_id": "gfs2-kmp-debug-4.4.180-94.121.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.4.180-94.121.1.x86_64", "product": { "name": "gfs2-kmp-default-4.4.180-94.121.1.x86_64", "product_id": "gfs2-kmp-default-4.4.180-94.121.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-4.4.180-94.121.1.x86_64", "product": { "name": "kernel-debug-4.4.180-94.121.1.x86_64", "product_id": "kernel-debug-4.4.180-94.121.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-base-4.4.180-94.121.1.x86_64", "product": { "name": "kernel-debug-base-4.4.180-94.121.1.x86_64", "product_id": "kernel-debug-base-4.4.180-94.121.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-devel-4.4.180-94.121.1.x86_64", "product": { "name": "kernel-debug-devel-4.4.180-94.121.1.x86_64", "product_id": "kernel-debug-devel-4.4.180-94.121.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-extra-4.4.180-94.121.1.x86_64", "product": { "name": "kernel-debug-extra-4.4.180-94.121.1.x86_64", "product_id": "kernel-debug-extra-4.4.180-94.121.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-kgraft-4.4.180-94.121.1.x86_64", "product": { "name": "kernel-debug-kgraft-4.4.180-94.121.1.x86_64", "product_id": "kernel-debug-kgraft-4.4.180-94.121.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-extra-4.4.180-94.121.1.x86_64", "product": { "name": "kernel-default-extra-4.4.180-94.121.1.x86_64", "product_id": "kernel-default-extra-4.4.180-94.121.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-build-4.4.180-94.121.1.x86_64", "product": { "name": "kernel-obs-build-4.4.180-94.121.1.x86_64", "product_id": "kernel-obs-build-4.4.180-94.121.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-qa-4.4.180-94.121.1.x86_64", "product": { "name": "kernel-obs-qa-4.4.180-94.121.1.x86_64", "product_id": "kernel-obs-qa-4.4.180-94.121.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-4.4.180-94.121.1.x86_64", "product": { "name": "kernel-vanilla-4.4.180-94.121.1.x86_64", "product_id": "kernel-vanilla-4.4.180-94.121.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.4.180-94.121.1.x86_64", "product": { "name": "kernel-vanilla-base-4.4.180-94.121.1.x86_64", "product_id": "kernel-vanilla-base-4.4.180-94.121.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.4.180-94.121.1.x86_64", "product": { "name": "kernel-vanilla-devel-4.4.180-94.121.1.x86_64", "product_id": "kernel-vanilla-devel-4.4.180-94.121.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-debug-4.4.180-94.121.1.x86_64", "product": { "name": "kselftests-kmp-debug-4.4.180-94.121.1.x86_64", "product_id": "kselftests-kmp-debug-4.4.180-94.121.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.4.180-94.121.1.x86_64", "product": { "name": "kselftests-kmp-default-4.4.180-94.121.1.x86_64", "product_id": "kselftests-kmp-default-4.4.180-94.121.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-debug-4.4.180-94.121.1.x86_64", "product": { "name": "ocfs2-kmp-debug-4.4.180-94.121.1.x86_64", "product_id": "ocfs2-kmp-debug-4.4.180-94.121.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.4.180-94.121.1.x86_64", "product": { "name": "ocfs2-kmp-default-4.4.180-94.121.1.x86_64", "product_id": "ocfs2-kmp-default-4.4.180-94.121.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "HPE Helion OpenStack 8", "product": { "name": "HPE Helion OpenStack 8", "product_id": "HPE Helion OpenStack 8", "product_identification_helper": { "cpe": "cpe:/o:suse:hpe-helion-openstack:8" } } }, { "category": "product_name", "name": "SUSE OpenStack Cloud 8", "product": { "name": "SUSE OpenStack Cloud 8", "product_id": "SUSE OpenStack Cloud 8", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-openstack-cloud:8" } } }, { "category": "product_name", "name": "SUSE OpenStack Cloud Crowbar 8", "product": { "name": "SUSE OpenStack Cloud Crowbar 8", "product_id": "SUSE OpenStack Cloud Crowbar 8", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-openstack-cloud-crowbar:8" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Availability Extension 12 SP3", "product": { "name": "SUSE Linux Enterprise High Availability Extension 12 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-ha:12:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP3-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP3-BCL", "product": { "name": "SUSE Linux Enterprise Server 12 SP3-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP3-BCL", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-bcl:12:sp3" } } }, { "category": "product_name", "name": "SUSE Enterprise Storage 5", "product": { "name": "SUSE Enterprise Storage 5", "product_id": "SUSE Enterprise Storage 5", "product_identification_helper": { "cpe": "cpe:/o:suse:ses:5" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.180-94.121.1.x86_64 as component of HPE Helion OpenStack 8", "product_id": "HPE Helion OpenStack 8:kernel-default-4.4.180-94.121.1.x86_64" }, "product_reference": "kernel-default-4.4.180-94.121.1.x86_64", "relates_to_product_reference": "HPE Helion OpenStack 8" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.180-94.121.1.x86_64 as component of HPE Helion OpenStack 8", "product_id": "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.121.1.x86_64" }, "product_reference": "kernel-default-base-4.4.180-94.121.1.x86_64", "relates_to_product_reference": "HPE Helion OpenStack 8" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.180-94.121.1.x86_64 as component of HPE Helion OpenStack 8", "product_id": "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.121.1.x86_64" }, "product_reference": "kernel-default-devel-4.4.180-94.121.1.x86_64", "relates_to_product_reference": "HPE Helion OpenStack 8" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-kgraft-4.4.180-94.121.1.x86_64 as component of HPE Helion OpenStack 8", "product_id": "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.121.1.x86_64" }, "product_reference": "kernel-default-kgraft-4.4.180-94.121.1.x86_64", "relates_to_product_reference": "HPE Helion OpenStack 8" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.4.180-94.121.1.noarch as component of HPE Helion OpenStack 8", "product_id": "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.121.1.noarch" }, "product_reference": "kernel-devel-4.4.180-94.121.1.noarch", "relates_to_product_reference": "HPE Helion OpenStack 8" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.4.180-94.121.1.noarch as component of HPE Helion OpenStack 8", "product_id": "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.121.1.noarch" }, "product_reference": "kernel-macros-4.4.180-94.121.1.noarch", "relates_to_product_reference": "HPE Helion OpenStack 8" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.4.180-94.121.1.noarch as component of HPE Helion OpenStack 8", "product_id": "HPE Helion OpenStack 8:kernel-source-4.4.180-94.121.1.noarch" }, "product_reference": "kernel-source-4.4.180-94.121.1.noarch", "relates_to_product_reference": "HPE Helion OpenStack 8" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.180-94.121.1.x86_64 as component of HPE Helion OpenStack 8", "product_id": "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.121.1.x86_64" }, "product_reference": "kernel-syms-4.4.180-94.121.1.x86_64", "relates_to_product_reference": "HPE Helion OpenStack 8" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_180-94_121-default-1-4.5.1.x86_64 as component of HPE Helion OpenStack 8", "product_id": "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_121-default-1-4.5.1.x86_64" }, "product_reference": "kgraft-patch-4_4_180-94_121-default-1-4.5.1.x86_64", "relates_to_product_reference": "HPE Helion OpenStack 8" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.180-94.121.1.x86_64 as component of SUSE OpenStack Cloud 8", "product_id": "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.121.1.x86_64" }, "product_reference": "kernel-default-4.4.180-94.121.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 8" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.180-94.121.1.x86_64 as component of SUSE OpenStack Cloud 8", "product_id": "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.121.1.x86_64" }, "product_reference": "kernel-default-base-4.4.180-94.121.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 8" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.180-94.121.1.x86_64 as component of SUSE OpenStack Cloud 8", "product_id": "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.121.1.x86_64" }, "product_reference": "kernel-default-devel-4.4.180-94.121.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 8" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-kgraft-4.4.180-94.121.1.x86_64 as component of SUSE OpenStack Cloud 8", "product_id": "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.121.1.x86_64" }, "product_reference": "kernel-default-kgraft-4.4.180-94.121.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 8" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.4.180-94.121.1.noarch as component of SUSE OpenStack Cloud 8", "product_id": "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.121.1.noarch" }, "product_reference": "kernel-devel-4.4.180-94.121.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud 8" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.4.180-94.121.1.noarch as component of SUSE OpenStack Cloud 8", "product_id": "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.121.1.noarch" }, "product_reference": "kernel-macros-4.4.180-94.121.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud 8" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.4.180-94.121.1.noarch as component of SUSE OpenStack Cloud 8", "product_id": "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.121.1.noarch" }, "product_reference": "kernel-source-4.4.180-94.121.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud 8" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.180-94.121.1.x86_64 as component of SUSE OpenStack Cloud 8", "product_id": "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.121.1.x86_64" }, "product_reference": "kernel-syms-4.4.180-94.121.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 8" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_180-94_121-default-1-4.5.1.x86_64 as component of SUSE OpenStack Cloud 8", "product_id": "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_121-default-1-4.5.1.x86_64" }, "product_reference": "kgraft-patch-4_4_180-94_121-default-1-4.5.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 8" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.180-94.121.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 8", "product_id": "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.121.1.x86_64" }, "product_reference": "kernel-default-4.4.180-94.121.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.180-94.121.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 8", "product_id": "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.121.1.x86_64" }, "product_reference": "kernel-default-base-4.4.180-94.121.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.180-94.121.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 8", "product_id": "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.121.1.x86_64" }, "product_reference": "kernel-default-devel-4.4.180-94.121.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-kgraft-4.4.180-94.121.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 8", "product_id": "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.121.1.x86_64" }, "product_reference": "kernel-default-kgraft-4.4.180-94.121.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.4.180-94.121.1.noarch as component of SUSE OpenStack Cloud Crowbar 8", "product_id": "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.121.1.noarch" }, "product_reference": "kernel-devel-4.4.180-94.121.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.4.180-94.121.1.noarch as component of SUSE OpenStack Cloud Crowbar 8", "product_id": "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.121.1.noarch" }, "product_reference": "kernel-macros-4.4.180-94.121.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.4.180-94.121.1.noarch as component of SUSE OpenStack Cloud Crowbar 8", "product_id": "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.121.1.noarch" }, "product_reference": "kernel-source-4.4.180-94.121.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.180-94.121.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 8", "product_id": "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.121.1.x86_64" }, "product_reference": "kernel-syms-4.4.180-94.121.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_180-94_121-default-1-4.5.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 8", "product_id": "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_121-default-1-4.5.1.x86_64" }, "product_reference": "kgraft-patch-4_4_180-94_121-default-1-4.5.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.4.180-94.121.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.121.1.ppc64le" }, "product_reference": "cluster-md-kmp-default-4.4.180-94.121.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.4.180-94.121.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.121.1.s390x" }, "product_reference": "cluster-md-kmp-default-4.4.180-94.121.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.4.180-94.121.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.121.1.x86_64" }, "product_reference": "cluster-md-kmp-default-4.4.180-94.121.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.4.180-94.121.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.121.1.ppc64le" }, "product_reference": "dlm-kmp-default-4.4.180-94.121.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.4.180-94.121.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.121.1.s390x" }, "product_reference": "dlm-kmp-default-4.4.180-94.121.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.4.180-94.121.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.121.1.x86_64" }, "product_reference": "dlm-kmp-default-4.4.180-94.121.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.4.180-94.121.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.121.1.ppc64le" }, "product_reference": "gfs2-kmp-default-4.4.180-94.121.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.4.180-94.121.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.121.1.s390x" }, "product_reference": "gfs2-kmp-default-4.4.180-94.121.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.4.180-94.121.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.121.1.x86_64" }, "product_reference": "gfs2-kmp-default-4.4.180-94.121.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.4.180-94.121.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.121.1.ppc64le" }, "product_reference": "ocfs2-kmp-default-4.4.180-94.121.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.4.180-94.121.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.121.1.s390x" }, "product_reference": "ocfs2-kmp-default-4.4.180-94.121.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.4.180-94.121.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.121.1.x86_64" }, "product_reference": "ocfs2-kmp-default-4.4.180-94.121.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.180-94.121.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.121.1.ppc64le" }, "product_reference": "kernel-default-4.4.180-94.121.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.180-94.121.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.121.1.x86_64" }, "product_reference": "kernel-default-4.4.180-94.121.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.180-94.121.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.121.1.ppc64le" }, "product_reference": "kernel-default-base-4.4.180-94.121.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.180-94.121.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.121.1.x86_64" }, "product_reference": "kernel-default-base-4.4.180-94.121.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.180-94.121.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.121.1.ppc64le" }, "product_reference": "kernel-default-devel-4.4.180-94.121.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.180-94.121.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.121.1.x86_64" }, "product_reference": "kernel-default-devel-4.4.180-94.121.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-kgraft-4.4.180-94.121.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.121.1.ppc64le" }, "product_reference": "kernel-default-kgraft-4.4.180-94.121.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-kgraft-4.4.180-94.121.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.121.1.x86_64" }, "product_reference": "kernel-default-kgraft-4.4.180-94.121.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.4.180-94.121.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.121.1.noarch" }, "product_reference": "kernel-devel-4.4.180-94.121.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.4.180-94.121.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.121.1.noarch" }, "product_reference": "kernel-macros-4.4.180-94.121.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.4.180-94.121.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.121.1.noarch" }, "product_reference": "kernel-source-4.4.180-94.121.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.180-94.121.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.121.1.ppc64le" }, "product_reference": "kernel-syms-4.4.180-94.121.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.180-94.121.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.121.1.x86_64" }, "product_reference": "kernel-syms-4.4.180-94.121.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_180-94_121-default-1-4.5.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_121-default-1-4.5.1.ppc64le" }, "product_reference": "kgraft-patch-4_4_180-94_121-default-1-4.5.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_180-94_121-default-1-4.5.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_121-default-1-4.5.1.x86_64" }, "product_reference": "kgraft-patch-4_4_180-94_121-default-1-4.5.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.180-94.121.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.121.1.aarch64" }, "product_reference": "kernel-default-4.4.180-94.121.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.180-94.121.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.121.1.ppc64le" }, "product_reference": "kernel-default-4.4.180-94.121.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.180-94.121.1.s390x as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.121.1.s390x" }, "product_reference": "kernel-default-4.4.180-94.121.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.180-94.121.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.121.1.x86_64" }, "product_reference": "kernel-default-4.4.180-94.121.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.180-94.121.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.121.1.aarch64" }, "product_reference": "kernel-default-base-4.4.180-94.121.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.180-94.121.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.121.1.ppc64le" }, "product_reference": "kernel-default-base-4.4.180-94.121.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.180-94.121.1.s390x as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.121.1.s390x" }, "product_reference": "kernel-default-base-4.4.180-94.121.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.180-94.121.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.121.1.x86_64" }, "product_reference": "kernel-default-base-4.4.180-94.121.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.180-94.121.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.121.1.aarch64" }, "product_reference": "kernel-default-devel-4.4.180-94.121.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.180-94.121.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.121.1.ppc64le" }, "product_reference": "kernel-default-devel-4.4.180-94.121.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.180-94.121.1.s390x as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.121.1.s390x" }, "product_reference": "kernel-default-devel-4.4.180-94.121.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.180-94.121.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.121.1.x86_64" }, "product_reference": "kernel-default-devel-4.4.180-94.121.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-kgraft-4.4.180-94.121.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.121.1.ppc64le" }, "product_reference": "kernel-default-kgraft-4.4.180-94.121.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-kgraft-4.4.180-94.121.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.121.1.x86_64" }, "product_reference": "kernel-default-kgraft-4.4.180-94.121.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-4.4.180-94.121.1.s390x as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.121.1.s390x" }, "product_reference": "kernel-default-man-4.4.180-94.121.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.4.180-94.121.1.noarch as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.121.1.noarch" }, "product_reference": "kernel-devel-4.4.180-94.121.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.4.180-94.121.1.noarch as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.121.1.noarch" }, "product_reference": "kernel-macros-4.4.180-94.121.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.4.180-94.121.1.noarch as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.121.1.noarch" }, "product_reference": "kernel-source-4.4.180-94.121.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.180-94.121.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.121.1.aarch64" }, "product_reference": "kernel-syms-4.4.180-94.121.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.180-94.121.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.121.1.ppc64le" }, "product_reference": "kernel-syms-4.4.180-94.121.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.180-94.121.1.s390x as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.121.1.s390x" }, "product_reference": "kernel-syms-4.4.180-94.121.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.180-94.121.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.121.1.x86_64" }, "product_reference": "kernel-syms-4.4.180-94.121.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_180-94_121-default-1-4.5.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_121-default-1-4.5.1.ppc64le" }, "product_reference": "kgraft-patch-4_4_180-94_121-default-1-4.5.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_180-94_121-default-1-4.5.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_121-default-1-4.5.1.x86_64" }, "product_reference": "kgraft-patch-4_4_180-94_121-default-1-4.5.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.180-94.121.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.121.1.x86_64" }, "product_reference": "kernel-default-4.4.180-94.121.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.180-94.121.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.121.1.x86_64" }, "product_reference": "kernel-default-base-4.4.180-94.121.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.180-94.121.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.121.1.x86_64" }, "product_reference": "kernel-default-devel-4.4.180-94.121.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.4.180-94.121.1.noarch as component of SUSE Linux Enterprise Server 12 SP3-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.121.1.noarch" }, "product_reference": "kernel-devel-4.4.180-94.121.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.4.180-94.121.1.noarch as component of SUSE Linux Enterprise Server 12 SP3-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.121.1.noarch" }, "product_reference": "kernel-macros-4.4.180-94.121.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.4.180-94.121.1.noarch as component of SUSE Linux Enterprise Server 12 SP3-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.121.1.noarch" }, "product_reference": "kernel-source-4.4.180-94.121.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.180-94.121.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.121.1.x86_64" }, "product_reference": "kernel-syms-4.4.180-94.121.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.180-94.121.1.aarch64 as component of SUSE Enterprise Storage 5", "product_id": "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.121.1.aarch64" }, "product_reference": "kernel-default-4.4.180-94.121.1.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.180-94.121.1.x86_64 as component of SUSE Enterprise Storage 5", "product_id": "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.121.1.x86_64" }, "product_reference": "kernel-default-4.4.180-94.121.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.180-94.121.1.aarch64 as component of SUSE Enterprise Storage 5", "product_id": "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.121.1.aarch64" }, "product_reference": "kernel-default-base-4.4.180-94.121.1.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.180-94.121.1.x86_64 as component of SUSE Enterprise Storage 5", "product_id": "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.121.1.x86_64" }, "product_reference": "kernel-default-base-4.4.180-94.121.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.180-94.121.1.aarch64 as component of SUSE Enterprise Storage 5", "product_id": "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.121.1.aarch64" }, "product_reference": "kernel-default-devel-4.4.180-94.121.1.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.180-94.121.1.x86_64 as component of SUSE Enterprise Storage 5", "product_id": "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.121.1.x86_64" }, "product_reference": "kernel-default-devel-4.4.180-94.121.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-kgraft-4.4.180-94.121.1.x86_64 as component of SUSE Enterprise Storage 5", "product_id": "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.121.1.x86_64" }, "product_reference": "kernel-default-kgraft-4.4.180-94.121.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.4.180-94.121.1.noarch as component of SUSE Enterprise Storage 5", "product_id": "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.121.1.noarch" }, "product_reference": "kernel-devel-4.4.180-94.121.1.noarch", "relates_to_product_reference": "SUSE Enterprise Storage 5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.4.180-94.121.1.noarch as component of SUSE Enterprise Storage 5", "product_id": "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.121.1.noarch" }, "product_reference": "kernel-macros-4.4.180-94.121.1.noarch", "relates_to_product_reference": "SUSE Enterprise Storage 5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.4.180-94.121.1.noarch as component of SUSE Enterprise Storage 5", "product_id": "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.121.1.noarch" }, "product_reference": "kernel-source-4.4.180-94.121.1.noarch", "relates_to_product_reference": "SUSE Enterprise Storage 5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.180-94.121.1.aarch64 as component of SUSE Enterprise Storage 5", "product_id": "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.121.1.aarch64" }, "product_reference": "kernel-syms-4.4.180-94.121.1.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.180-94.121.1.x86_64 as component of SUSE Enterprise Storage 5", "product_id": "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.121.1.x86_64" }, "product_reference": "kernel-syms-4.4.180-94.121.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_180-94_121-default-1-4.5.1.x86_64 as component of SUSE Enterprise Storage 5", "product_id": "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_121-default-1-4.5.1.x86_64" }, "product_reference": "kgraft-patch-4_4_180-94_121-default-1-4.5.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 5" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-0543", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-0543" } ], "notes": [ { "category": "general", "text": "Incomplete cleanup from specific special register read operations in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.121.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.121.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.121.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.121.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.121.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.121.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.121.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.121.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_121-default-1-4.5.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.121.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.121.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.121.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.121.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.121.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.121.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.121.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.121.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.121.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.121.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.121.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.121.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_121-default-1-4.5.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.121.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.121.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.121.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.121.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.121.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.121.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.121.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.121.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.121.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.121.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.121.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.121.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.121.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.121.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.121.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.121.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.121.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.121.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.121.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_121-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_121-default-1-4.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.121.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.121.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.121.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_121-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_121-default-1-4.5.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.121.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.121.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.121.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_121-default-1-4.5.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.121.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.121.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.121.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_121-default-1-4.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-0543", "url": "https://www.suse.com/security/cve/CVE-2020-0543" }, { "category": "external", "summary": "SUSE Bug 1154824 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1154824" }, { "category": "external", "summary": "SUSE Bug 1172205 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172205" }, { "category": "external", "summary": "SUSE Bug 1172206 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172206" }, { "category": "external", "summary": "SUSE Bug 1172207 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172207" }, { "category": "external", "summary": "SUSE Bug 1172770 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172770" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.121.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.121.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.121.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.121.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.121.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.121.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.121.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.121.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_121-default-1-4.5.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.121.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.121.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.121.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.121.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.121.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.121.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.121.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.121.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.121.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.121.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.121.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.121.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_121-default-1-4.5.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.121.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.121.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.121.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.121.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.121.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.121.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.121.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.121.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.121.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.121.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.121.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.121.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.121.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.121.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.121.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.121.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.121.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.121.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.121.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_121-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_121-default-1-4.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.121.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.121.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.121.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_121-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_121-default-1-4.5.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.121.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.121.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.121.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_121-default-1-4.5.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.121.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.121.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.121.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_121-default-1-4.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.121.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.121.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.121.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.121.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.121.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.121.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.121.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.121.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_121-default-1-4.5.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.121.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.121.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.121.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.121.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.121.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.121.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.121.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.121.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.121.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.121.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.121.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.121.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_121-default-1-4.5.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.121.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.121.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.121.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.121.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.121.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.121.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.121.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.121.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.121.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.121.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.121.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.121.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.121.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.121.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.121.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.121.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.121.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.121.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.121.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_121-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_121-default-1-4.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.121.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.121.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.121.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_121-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_121-default-1-4.5.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.121.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.121.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.121.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_121-default-1-4.5.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.121.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.121.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.121.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_121-default-1-4.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-10T08:30:18Z", "details": "moderate" } ], "title": "CVE-2020-0543" }, { "cve": "CVE-2020-10757", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10757" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux Kernel in versions after 4.5-rc1 in the way mremap handled DAX Huge Pages. This flaw allows a local attacker with access to a DAX enabled storage to escalate their privileges on the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.121.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.121.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.121.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.121.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.121.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.121.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.121.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.121.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_121-default-1-4.5.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.121.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.121.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.121.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.121.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.121.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.121.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.121.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.121.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.121.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.121.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.121.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.121.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_121-default-1-4.5.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.121.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.121.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.121.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.121.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.121.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.121.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.121.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.121.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.121.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.121.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.121.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.121.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.121.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.121.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.121.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.121.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.121.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.121.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.121.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_121-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_121-default-1-4.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.121.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.121.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.121.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_121-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_121-default-1-4.5.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.121.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.121.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.121.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_121-default-1-4.5.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.121.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.121.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.121.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_121-default-1-4.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10757", "url": "https://www.suse.com/security/cve/CVE-2020-10757" }, { "category": "external", "summary": "SUSE Bug 1159281 for CVE-2020-10757", "url": "https://bugzilla.suse.com/1159281" }, { "category": "external", "summary": "SUSE Bug 1172317 for CVE-2020-10757", "url": "https://bugzilla.suse.com/1172317" }, { "category": "external", "summary": "SUSE Bug 1172437 for CVE-2020-10757", "url": "https://bugzilla.suse.com/1172437" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.121.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.121.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.121.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.121.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.121.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.121.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.121.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.121.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_121-default-1-4.5.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.121.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.121.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.121.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.121.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.121.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.121.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.121.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.121.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.121.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.121.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.121.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.121.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_121-default-1-4.5.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.121.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.121.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.121.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.121.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.121.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.121.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.121.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.121.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.121.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.121.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.121.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.121.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.121.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.121.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.121.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.121.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.121.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.121.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.121.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_121-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_121-default-1-4.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.121.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.121.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.121.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_121-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_121-default-1-4.5.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.121.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.121.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.121.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_121-default-1-4.5.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.121.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.121.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.121.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_121-default-1-4.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.121.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.121.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.121.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.121.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.121.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.121.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.121.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.121.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_121-default-1-4.5.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.121.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.121.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.121.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.121.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.121.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.121.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.121.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.121.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.121.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.121.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.121.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.121.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_121-default-1-4.5.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.121.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.121.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.121.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.121.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.121.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.121.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.121.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.121.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.121.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.121.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.121.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.121.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.121.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.121.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.121.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.121.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.121.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.121.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.121.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_121-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_121-default-1-4.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.121.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.121.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.121.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_121-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_121-default-1-4.5.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.121.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.121.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.121.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_121-default-1-4.5.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.121.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.121.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.121.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_121-default-1-4.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-10T08:30:18Z", "details": "important" } ], "title": "CVE-2020-10757" }, { "cve": "CVE-2020-12114", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12114" } ], "notes": [ { "category": "general", "text": "A pivot_root race condition in fs/namespace.c in the Linux kernel 4.4.x before 4.4.221, 4.9.x before 4.9.221, 4.14.x before 4.14.178, 4.19.x before 4.19.119, and 5.x before 5.3 allows local users to cause a denial of service (panic) by corrupting a mountpoint reference counter.", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.121.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.121.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.121.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.121.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.121.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.121.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.121.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.121.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_121-default-1-4.5.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.121.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.121.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.121.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.121.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.121.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.121.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.121.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.121.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.121.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.121.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.121.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.121.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_121-default-1-4.5.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.121.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.121.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.121.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.121.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.121.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.121.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.121.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.121.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.121.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.121.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.121.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.121.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.121.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.121.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.121.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.121.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.121.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.121.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.121.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_121-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_121-default-1-4.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.121.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.121.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.121.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_121-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_121-default-1-4.5.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.121.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.121.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.121.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_121-default-1-4.5.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.121.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.121.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.121.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_121-default-1-4.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12114", "url": "https://www.suse.com/security/cve/CVE-2020-12114" }, { "category": "external", "summary": "SUSE Bug 1171098 for CVE-2020-12114", "url": "https://bugzilla.suse.com/1171098" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.121.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.121.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.121.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.121.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.121.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.121.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.121.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.121.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_121-default-1-4.5.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.121.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.121.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.121.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.121.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.121.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.121.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.121.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.121.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.121.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.121.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.121.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.121.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_121-default-1-4.5.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.121.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.121.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.121.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.121.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.121.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.121.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.121.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.121.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.121.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.121.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.121.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.121.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.121.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.121.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.121.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.121.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.121.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.121.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.121.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_121-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_121-default-1-4.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.121.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.121.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.121.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_121-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_121-default-1-4.5.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.121.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.121.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.121.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_121-default-1-4.5.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.121.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.121.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.121.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_121-default-1-4.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.121.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.121.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.121.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.121.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.121.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.121.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.121.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.121.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_121-default-1-4.5.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.121.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.121.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.121.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.121.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.121.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.121.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.121.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.121.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.121.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.121.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.121.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.121.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_121-default-1-4.5.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.121.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.121.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.121.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.121.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.121.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.121.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.121.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.121.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.121.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.121.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.121.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.121.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.121.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.121.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.121.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.121.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.121.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.121.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.121.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_121-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_121-default-1-4.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.121.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.121.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.121.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_121-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_121-default-1-4.5.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.121.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.121.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.121.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_121-default-1-4.5.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.121.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.121.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.121.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_121-default-1-4.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-10T08:30:18Z", "details": "moderate" } ], "title": "CVE-2020-12114" }, { "cve": "CVE-2020-12652", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12652" } ], "notes": [ { "category": "general", "text": "The __mptctl_ioctl function in drivers/message/fusion/mptctl.c in the Linux kernel before 5.4.14 allows local users to hold an incorrect lock during the ioctl operation and trigger a race condition, i.e., a \"double fetch\" vulnerability, aka CID-28d76df18f0a. NOTE: the vendor states \"The security impact of this bug is not as bad as it could have been because these operations are all privileged and root already has enormous destructive power.\"", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.121.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.121.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.121.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.121.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.121.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.121.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.121.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.121.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_121-default-1-4.5.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.121.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.121.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.121.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.121.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.121.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.121.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.121.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.121.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.121.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.121.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.121.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.121.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_121-default-1-4.5.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.121.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.121.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.121.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.121.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.121.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.121.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.121.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.121.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.121.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.121.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.121.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.121.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.121.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.121.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.121.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.121.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.121.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.121.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.121.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_121-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_121-default-1-4.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.121.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.121.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.121.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_121-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_121-default-1-4.5.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.121.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.121.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.121.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_121-default-1-4.5.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.121.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.121.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.121.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_121-default-1-4.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12652", "url": "https://www.suse.com/security/cve/CVE-2020-12652" }, { "category": "external", "summary": "SUSE Bug 1171218 for CVE-2020-12652", "url": "https://bugzilla.suse.com/1171218" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.121.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.121.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.121.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.121.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.121.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.121.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.121.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.121.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_121-default-1-4.5.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.121.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.121.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.121.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.121.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.121.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.121.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.121.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.121.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.121.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.121.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.121.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.121.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_121-default-1-4.5.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.121.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.121.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.121.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.121.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.121.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.121.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.121.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.121.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.121.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.121.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.121.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.121.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.121.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.121.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.121.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.121.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.121.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.121.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.121.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_121-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_121-default-1-4.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.121.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.121.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.121.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_121-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_121-default-1-4.5.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.121.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.121.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.121.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_121-default-1-4.5.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.121.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.121.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.121.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_121-default-1-4.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.121.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.121.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.121.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.121.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.121.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.121.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.121.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.121.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_121-default-1-4.5.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.121.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.121.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.121.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.121.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.121.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.121.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.121.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.121.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.121.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.121.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.121.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.121.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_121-default-1-4.5.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.121.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.121.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.121.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.121.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.121.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.121.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.121.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.121.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.121.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.121.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.121.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.121.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.121.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.121.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.121.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.121.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.121.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.121.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.121.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_121-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_121-default-1-4.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.121.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.121.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.121.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_121-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_121-default-1-4.5.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.121.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.121.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.121.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_121-default-1-4.5.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.121.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.121.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.121.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_121-default-1-4.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-10T08:30:18Z", "details": "moderate" } ], "title": "CVE-2020-12652" }, { "cve": "CVE-2020-12653", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12653" } ], "notes": [ { "category": "general", "text": "An issue was found in Linux kernel before 5.5.4. The mwifiex_cmd_append_vsie_tlv() function in drivers/net/wireless/marvell/mwifiex/scan.c allows local users to gain privileges or cause a denial of service because of an incorrect memcpy and buffer overflow, aka CID-b70261a288ea.", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.121.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.121.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.121.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.121.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.121.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.121.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.121.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.121.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_121-default-1-4.5.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.121.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.121.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.121.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.121.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.121.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.121.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.121.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.121.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.121.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.121.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.121.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.121.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_121-default-1-4.5.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.121.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.121.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.121.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.121.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.121.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.121.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.121.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.121.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.121.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.121.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.121.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.121.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.121.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.121.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.121.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.121.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.121.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.121.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.121.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_121-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_121-default-1-4.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.121.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.121.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.121.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_121-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_121-default-1-4.5.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.121.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.121.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.121.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_121-default-1-4.5.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.121.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.121.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.121.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_121-default-1-4.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12653", "url": "https://www.suse.com/security/cve/CVE-2020-12653" }, { "category": "external", "summary": "SUSE Bug 1159281 for CVE-2020-12653", "url": "https://bugzilla.suse.com/1159281" }, { "category": "external", "summary": "SUSE Bug 1171195 for CVE-2020-12653", "url": "https://bugzilla.suse.com/1171195" }, { "category": "external", "summary": "SUSE Bug 1171254 for CVE-2020-12653", "url": "https://bugzilla.suse.com/1171254" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.121.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.121.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.121.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.121.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.121.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.121.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.121.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.121.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_121-default-1-4.5.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.121.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.121.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.121.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.121.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.121.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.121.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.121.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.121.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.121.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.121.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.121.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.121.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_121-default-1-4.5.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.121.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.121.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.121.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.121.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.121.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.121.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.121.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.121.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.121.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.121.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.121.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.121.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.121.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.121.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.121.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.121.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.121.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.121.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.121.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_121-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_121-default-1-4.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.121.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.121.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.121.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_121-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_121-default-1-4.5.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.121.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.121.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.121.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_121-default-1-4.5.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.121.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.121.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.121.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_121-default-1-4.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.121.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.121.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.121.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.121.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.121.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.121.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.121.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.121.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_121-default-1-4.5.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.121.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.121.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.121.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.121.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.121.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.121.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.121.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.121.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.121.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.121.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.121.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.121.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_121-default-1-4.5.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.121.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.121.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.121.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.121.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.121.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.121.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.121.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.121.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.121.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.121.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.121.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.121.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.121.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.121.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.121.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.121.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.121.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.121.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.121.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_121-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_121-default-1-4.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.121.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.121.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.121.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_121-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_121-default-1-4.5.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.121.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.121.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.121.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_121-default-1-4.5.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.121.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.121.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.121.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_121-default-1-4.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-10T08:30:18Z", "details": "important" } ], "title": "CVE-2020-12653" }, { "cve": "CVE-2020-12654", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12654" } ], "notes": [ { "category": "general", "text": "An issue was found in Linux kernel before 5.5.4. mwifiex_ret_wmm_get_status() in drivers/net/wireless/marvell/mwifiex/wmm.c allows a remote AP to trigger a heap-based buffer overflow because of an incorrect memcpy, aka CID-3a9b153c5591.", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.121.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.121.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.121.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.121.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.121.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.121.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.121.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.121.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_121-default-1-4.5.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.121.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.121.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.121.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.121.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.121.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.121.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.121.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.121.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.121.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.121.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.121.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.121.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_121-default-1-4.5.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.121.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.121.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.121.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.121.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.121.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.121.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.121.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.121.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.121.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.121.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.121.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.121.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.121.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.121.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.121.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.121.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.121.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.121.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.121.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_121-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_121-default-1-4.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.121.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.121.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.121.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_121-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_121-default-1-4.5.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.121.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.121.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.121.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_121-default-1-4.5.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.121.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.121.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.121.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_121-default-1-4.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12654", "url": "https://www.suse.com/security/cve/CVE-2020-12654" }, { "category": "external", "summary": "SUSE Bug 1159281 for CVE-2020-12654", "url": "https://bugzilla.suse.com/1159281" }, { "category": "external", "summary": "SUSE Bug 1171202 for CVE-2020-12654", "url": "https://bugzilla.suse.com/1171202" }, { "category": "external", "summary": "SUSE Bug 1171252 for CVE-2020-12654", "url": "https://bugzilla.suse.com/1171252" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.121.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.121.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.121.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.121.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.121.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.121.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.121.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.121.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_121-default-1-4.5.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.121.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.121.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.121.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.121.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.121.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.121.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.121.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.121.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.121.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.121.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.121.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.121.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_121-default-1-4.5.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.121.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.121.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.121.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.121.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.121.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.121.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.121.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.121.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.121.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.121.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.121.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.121.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.121.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.121.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.121.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.121.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.121.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.121.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.121.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_121-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_121-default-1-4.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.121.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.121.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.121.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_121-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_121-default-1-4.5.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.121.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.121.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.121.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_121-default-1-4.5.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.121.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.121.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.121.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_121-default-1-4.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.121.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.121.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.121.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.121.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.121.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.121.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.121.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.121.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_121-default-1-4.5.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.121.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.121.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.121.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.121.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.121.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.121.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.121.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.121.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.121.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.121.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.121.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.121.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_121-default-1-4.5.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.121.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.121.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.121.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.121.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.121.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.121.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.121.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.121.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.121.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.121.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.121.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.121.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.121.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.121.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.121.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.121.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.121.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.121.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.121.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_121-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_121-default-1-4.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.121.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.121.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.121.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_121-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_121-default-1-4.5.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.121.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.121.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.121.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_121-default-1-4.5.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.121.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.121.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.121.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_121-default-1-4.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-10T08:30:18Z", "details": "important" } ], "title": "CVE-2020-12654" }, { "cve": "CVE-2020-12656", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12656" } ], "notes": [ { "category": "general", "text": "gss_mech_free in net/sunrpc/auth_gss/gss_mech_switch.c in the rpcsec_gss_krb5 implementation in the Linux kernel through 5.6.10 lacks certain domain_release calls, leading to a memory leak. Note: This was disputed with the assertion that the issue does not grant any access not already available. It is a problem that on unloading a specific kernel module some memory is leaked, but loading kernel modules is a privileged operation. A user could also write a kernel module to consume any amount of memory they like and load that replicating the effect of this bug", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.121.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.121.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.121.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.121.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.121.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.121.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.121.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.121.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_121-default-1-4.5.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.121.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.121.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.121.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.121.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.121.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.121.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.121.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.121.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.121.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.121.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.121.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.121.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_121-default-1-4.5.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.121.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.121.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.121.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.121.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.121.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.121.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.121.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.121.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.121.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.121.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.121.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.121.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.121.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.121.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.121.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.121.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.121.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.121.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.121.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_121-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_121-default-1-4.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.121.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.121.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.121.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_121-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_121-default-1-4.5.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.121.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.121.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.121.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_121-default-1-4.5.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.121.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.121.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.121.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_121-default-1-4.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12656", "url": "https://www.suse.com/security/cve/CVE-2020-12656" }, { "category": "external", "summary": "SUSE Bug 1171219 for CVE-2020-12656", "url": "https://bugzilla.suse.com/1171219" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.121.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.121.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.121.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.121.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.121.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.121.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.121.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.121.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_121-default-1-4.5.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.121.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.121.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.121.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.121.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.121.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.121.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.121.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.121.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.121.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.121.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.121.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.121.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_121-default-1-4.5.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.121.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.121.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.121.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.121.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.121.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.121.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.121.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.121.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.121.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.121.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.121.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.121.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.121.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.121.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.121.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.121.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.121.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.121.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.121.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_121-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_121-default-1-4.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.121.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.121.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.121.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_121-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_121-default-1-4.5.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.121.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.121.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.121.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_121-default-1-4.5.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.121.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.121.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.121.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_121-default-1-4.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.9, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.121.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.121.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.121.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.121.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.121.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.121.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.121.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.121.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_121-default-1-4.5.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.121.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.121.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.121.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.121.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.121.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.121.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.121.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.121.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.121.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.121.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.121.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.121.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_121-default-1-4.5.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.121.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.121.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.121.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.121.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.121.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.121.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.121.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.121.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.121.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.121.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.121.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.121.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.121.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.121.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.121.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.121.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.121.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.121.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.121.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_121-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_121-default-1-4.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.121.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.121.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.121.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.121.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_121-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_121-default-1-4.5.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.121.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.121.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.121.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_121-default-1-4.5.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.121.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.121.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.121.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.121.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_121-default-1-4.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-10T08:30:18Z", "details": "low" } ], "title": "CVE-2020-12656" } ] }
suse-su-2020:1609-1
Vulnerability from csaf_suse
Published
2020-06-11 13:16
Modified
2020-06-11 13:16
Summary
Security update for xen
Notes
Title of the patch
Security update for xen
Description of the patch
This update for xen to version 4.12.3 fixes the following issues:
- CVE-2020-0543: Fixed a side channel attack against special registers which could have resulted in leaking of read values to cores other than the one which called it.
This attack is known as Special Register Buffer Data Sampling (SRBDS) or 'CrossTalk' (bsc#1172205).
- Added support for new 64bit libxl memory API (bsc#1167007 and bsc#1157490).
Patchnames
SUSE-2020-1609,SUSE-SLE-Module-Basesystem-15-SP1-2020-1609,SUSE-SLE-Module-Server-Applications-15-SP1-2020-1609
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for xen", "title": "Title of the patch" }, { "category": "description", "text": "This update for xen to version 4.12.3 fixes the following issues:\n\t \n- CVE-2020-0543: Fixed a side channel attack against special registers which could have resulted in leaking of read values to cores other than the one which called it.\n This attack is known as Special Register Buffer Data Sampling (SRBDS) or \u0027CrossTalk\u0027 (bsc#1172205).\n- Added support for new 64bit libxl memory API (bsc#1167007 and bsc#1157490).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2020-1609,SUSE-SLE-Module-Basesystem-15-SP1-2020-1609,SUSE-SLE-Module-Server-Applications-15-SP1-2020-1609", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2020_1609-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2020:1609-1", "url": "https://www.suse.com/support/update/announcement/2020/suse-su-20201609-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2020:1609-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-June/006935.html" }, { "category": "self", "summary": "SUSE Bug 1027519", "url": "https://bugzilla.suse.com/1027519" }, { "category": "self", "summary": "SUSE Bug 1157490", "url": "https://bugzilla.suse.com/1157490" }, { "category": "self", "summary": "SUSE Bug 1167007", "url": "https://bugzilla.suse.com/1167007" }, { "category": "self", "summary": "SUSE Bug 1172205", "url": "https://bugzilla.suse.com/1172205" }, { "category": "self", "summary": "SUSE CVE CVE-2020-0543 page", "url": "https://www.suse.com/security/cve/CVE-2020-0543/" } ], "title": "Security update for xen", "tracking": { "current_release_date": "2020-06-11T13:16:46Z", "generator": { "date": "2020-06-11T13:16:46Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2020:1609-1", "initial_release_date": "2020-06-11T13:16:46Z", "revision_history": [ { "date": "2020-06-11T13:16:46Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "xen-4.12.3_02-3.18.1.aarch64", "product": { "name": "xen-4.12.3_02-3.18.1.aarch64", "product_id": "xen-4.12.3_02-3.18.1.aarch64" } }, { "category": "product_version", "name": "xen-devel-4.12.3_02-3.18.1.aarch64", "product": { "name": "xen-devel-4.12.3_02-3.18.1.aarch64", "product_id": "xen-devel-4.12.3_02-3.18.1.aarch64" } }, { "category": "product_version", "name": "xen-doc-html-4.12.3_02-3.18.1.aarch64", "product": { "name": "xen-doc-html-4.12.3_02-3.18.1.aarch64", "product_id": "xen-doc-html-4.12.3_02-3.18.1.aarch64" } }, { "category": "product_version", "name": "xen-libs-4.12.3_02-3.18.1.aarch64", "product": { "name": "xen-libs-4.12.3_02-3.18.1.aarch64", "product_id": "xen-libs-4.12.3_02-3.18.1.aarch64" } }, { "category": "product_version", "name": "xen-tools-4.12.3_02-3.18.1.aarch64", "product": { "name": "xen-tools-4.12.3_02-3.18.1.aarch64", "product_id": "xen-tools-4.12.3_02-3.18.1.aarch64" } }, { "category": "product_version", "name": "xen-tools-domU-4.12.3_02-3.18.1.aarch64", "product": { "name": "xen-tools-domU-4.12.3_02-3.18.1.aarch64", "product_id": "xen-tools-domU-4.12.3_02-3.18.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "xen-libs-64bit-4.12.3_02-3.18.1.aarch64_ilp32", "product": { "name": "xen-libs-64bit-4.12.3_02-3.18.1.aarch64_ilp32", "product_id": "xen-libs-64bit-4.12.3_02-3.18.1.aarch64_ilp32" } } ], "category": "architecture", "name": "aarch64_ilp32" }, { "branches": [ { "category": "product_version", "name": "xen-devel-4.12.3_02-3.18.1.i586", "product": { "name": "xen-devel-4.12.3_02-3.18.1.i586", "product_id": "xen-devel-4.12.3_02-3.18.1.i586" } }, { "category": "product_version", "name": "xen-libs-4.12.3_02-3.18.1.i586", "product": { "name": "xen-libs-4.12.3_02-3.18.1.i586", "product_id": "xen-libs-4.12.3_02-3.18.1.i586" } }, { "category": "product_version", "name": "xen-tools-domU-4.12.3_02-3.18.1.i586", "product": { "name": "xen-tools-domU-4.12.3_02-3.18.1.i586", "product_id": "xen-tools-domU-4.12.3_02-3.18.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "xen-4.12.3_02-3.18.1.x86_64", "product": { "name": "xen-4.12.3_02-3.18.1.x86_64", "product_id": "xen-4.12.3_02-3.18.1.x86_64" } }, { "category": "product_version", "name": "xen-devel-4.12.3_02-3.18.1.x86_64", "product": { "name": "xen-devel-4.12.3_02-3.18.1.x86_64", "product_id": "xen-devel-4.12.3_02-3.18.1.x86_64" } }, { "category": "product_version", "name": "xen-doc-html-4.12.3_02-3.18.1.x86_64", "product": { "name": "xen-doc-html-4.12.3_02-3.18.1.x86_64", "product_id": "xen-doc-html-4.12.3_02-3.18.1.x86_64" } }, { "category": "product_version", "name": "xen-libs-4.12.3_02-3.18.1.x86_64", "product": { "name": "xen-libs-4.12.3_02-3.18.1.x86_64", "product_id": "xen-libs-4.12.3_02-3.18.1.x86_64" } }, { "category": "product_version", "name": "xen-libs-32bit-4.12.3_02-3.18.1.x86_64", "product": { "name": "xen-libs-32bit-4.12.3_02-3.18.1.x86_64", "product_id": "xen-libs-32bit-4.12.3_02-3.18.1.x86_64" } }, { "category": "product_version", "name": "xen-tools-4.12.3_02-3.18.1.x86_64", "product": { "name": "xen-tools-4.12.3_02-3.18.1.x86_64", "product_id": "xen-tools-4.12.3_02-3.18.1.x86_64" } }, { "category": "product_version", "name": "xen-tools-domU-4.12.3_02-3.18.1.x86_64", "product": { "name": "xen-tools-domU-4.12.3_02-3.18.1.x86_64", "product_id": "xen-tools-domU-4.12.3_02-3.18.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Module for Basesystem 15 SP1", "product": { "name": "SUSE Linux Enterprise Module for Basesystem 15 SP1", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-basesystem:15:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Module for Server Applications 15 SP1", "product": { "name": "SUSE Linux Enterprise Module for Server Applications 15 SP1", "product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-server-applications:15:sp1" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.12.3_02-3.18.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:xen-libs-4.12.3_02-3.18.1.x86_64" }, "product_reference": "xen-libs-4.12.3_02-3.18.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.12.3_02-3.18.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:xen-tools-domU-4.12.3_02-3.18.1.x86_64" }, "product_reference": "xen-tools-domU-4.12.3_02-3.18.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "xen-4.12.3_02-3.18.1.x86_64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP1", "product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP1:xen-4.12.3_02-3.18.1.x86_64" }, "product_reference": "xen-4.12.3_02-3.18.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "xen-devel-4.12.3_02-3.18.1.x86_64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP1", "product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP1:xen-devel-4.12.3_02-3.18.1.x86_64" }, "product_reference": "xen-devel-4.12.3_02-3.18.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.12.3_02-3.18.1.x86_64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP1", "product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP1:xen-tools-4.12.3_02-3.18.1.x86_64" }, "product_reference": "xen-tools-4.12.3_02-3.18.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP1" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-0543", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-0543" } ], "notes": [ { "category": "general", "text": "Incomplete cleanup from specific special register read operations in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:xen-libs-4.12.3_02-3.18.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:xen-tools-domU-4.12.3_02-3.18.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:xen-4.12.3_02-3.18.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:xen-devel-4.12.3_02-3.18.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:xen-tools-4.12.3_02-3.18.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-0543", "url": "https://www.suse.com/security/cve/CVE-2020-0543" }, { "category": "external", "summary": "SUSE Bug 1154824 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1154824" }, { "category": "external", "summary": "SUSE Bug 1172205 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172205" }, { "category": "external", "summary": "SUSE Bug 1172206 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172206" }, { "category": "external", "summary": "SUSE Bug 1172207 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172207" }, { "category": "external", "summary": "SUSE Bug 1172770 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172770" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:xen-libs-4.12.3_02-3.18.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:xen-tools-domU-4.12.3_02-3.18.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:xen-4.12.3_02-3.18.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:xen-devel-4.12.3_02-3.18.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:xen-tools-4.12.3_02-3.18.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:xen-libs-4.12.3_02-3.18.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:xen-tools-domU-4.12.3_02-3.18.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:xen-4.12.3_02-3.18.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:xen-devel-4.12.3_02-3.18.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:xen-tools-4.12.3_02-3.18.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-11T13:16:46Z", "details": "moderate" } ], "title": "CVE-2020-0543" } ] }
suse-su-2020:14393-1
Vulnerability from csaf_suse
Published
2020-06-09 17:11
Modified
2020-06-09 17:11
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2020-0543: Fixed a side channel attack against special registers which could have resulted in leaking of read values to cores other than the one which called it.
This attack is known as Special Register Buffer Data Sampling (SRBDS) or 'CrossTalk' (bsc#1154824).
- CVE-2020-12652: Fixed an issue which could have allowed local users to hold an incorrect lock during the ioctl operation and trigger a race condition (bsc#1171218).
- CVE-2020-12653: Fixed an issue in the wifi driver which could have allowed local users to gain privileges or cause a denial of service (bsc#1171195).
- CVE-2020-12654: Fixed an issue in he wifi driver which could have allowed a remote AP to trigger a heap-based buffer overflow (bsc#1171202).
- CVE-2020-10690: Fixed the race between the release of ptp_clock and cdev (bsc#1170056).
The following non-security bugs were fixed:
- nfsd4: clean up open owners on OPEN failure (bsc#1154290).
- random: always use batched entropy for get_random_u{32,64} (bsc#1164871).
Patchnames
slessp4-kernel-source-14393,slexsp3-kernel-source-14393
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2020-0543: Fixed a side channel attack against special registers which could have resulted in leaking of read values to cores other than the one which called it. \n This attack is known as Special Register Buffer Data Sampling (SRBDS) or \u0027CrossTalk\u0027 (bsc#1154824).\n- CVE-2020-12652: Fixed an issue which could have allowed local users to hold an incorrect lock during the ioctl operation and trigger a race condition (bsc#1171218).\n- CVE-2020-12653: Fixed an issue in the wifi driver which could have allowed local users to gain privileges or cause a denial of service (bsc#1171195).\n- CVE-2020-12654: Fixed an issue in he wifi driver which could have allowed a remote AP to trigger a heap-based buffer overflow (bsc#1171202).\n- CVE-2020-10690: Fixed the race between the release of ptp_clock and cdev (bsc#1170056).\n\nThe following non-security bugs were fixed:\n\n- nfsd4: clean up open owners on OPEN failure (bsc#1154290).\n- random: always use batched entropy for get_random_u{32,64} (bsc#1164871).\n", "title": "Description of the patch" }, { "category": "details", "text": "slessp4-kernel-source-14393,slexsp3-kernel-source-14393", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2020_14393-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2020:14393-1", "url": "https://www.suse.com/support/update/announcement/2020/suse-su-202014393-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2020:14393-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-June/006913.html" }, { "category": "self", "summary": "SUSE Bug 1154290", "url": "https://bugzilla.suse.com/1154290" }, { "category": "self", "summary": "SUSE Bug 1154824", "url": "https://bugzilla.suse.com/1154824" }, { "category": "self", "summary": "SUSE Bug 1164871", "url": "https://bugzilla.suse.com/1164871" }, { "category": "self", "summary": "SUSE Bug 1170056", "url": "https://bugzilla.suse.com/1170056" }, { "category": "self", "summary": "SUSE Bug 1171195", "url": "https://bugzilla.suse.com/1171195" }, { "category": "self", "summary": "SUSE Bug 1171202", "url": "https://bugzilla.suse.com/1171202" }, { "category": "self", "summary": "SUSE Bug 1171218", "url": "https://bugzilla.suse.com/1171218" }, { "category": "self", "summary": "SUSE CVE CVE-2020-0543 page", "url": "https://www.suse.com/security/cve/CVE-2020-0543/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10690 page", "url": "https://www.suse.com/security/cve/CVE-2020-10690/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12652 page", "url": "https://www.suse.com/security/cve/CVE-2020-12652/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12653 page", "url": "https://www.suse.com/security/cve/CVE-2020-12653/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12654 page", "url": "https://www.suse.com/security/cve/CVE-2020-12654/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2020-06-09T17:11:40Z", "generator": { "date": "2020-06-09T17:11:40Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2020:14393-1", "initial_release_date": "2020-06-09T17:11:40Z", "revision_history": [ { "date": "2020-06-09T17:11:40Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-default-3.0.101-108.114.1.i586", "product": { "name": "kernel-default-3.0.101-108.114.1.i586", "product_id": "kernel-default-3.0.101-108.114.1.i586" } }, { "category": "product_version", "name": "kernel-default-base-3.0.101-108.114.1.i586", "product": { "name": "kernel-default-base-3.0.101-108.114.1.i586", "product_id": "kernel-default-base-3.0.101-108.114.1.i586" } }, { "category": "product_version", "name": "kernel-default-devel-3.0.101-108.114.1.i586", "product": { "name": "kernel-default-devel-3.0.101-108.114.1.i586", "product_id": "kernel-default-devel-3.0.101-108.114.1.i586" } }, { "category": "product_version", "name": "kernel-ec2-3.0.101-108.114.1.i586", "product": { "name": "kernel-ec2-3.0.101-108.114.1.i586", "product_id": "kernel-ec2-3.0.101-108.114.1.i586" } }, { "category": "product_version", "name": "kernel-ec2-base-3.0.101-108.114.1.i586", "product": { "name": "kernel-ec2-base-3.0.101-108.114.1.i586", "product_id": "kernel-ec2-base-3.0.101-108.114.1.i586" } }, { "category": "product_version", "name": "kernel-ec2-devel-3.0.101-108.114.1.i586", "product": { "name": "kernel-ec2-devel-3.0.101-108.114.1.i586", "product_id": "kernel-ec2-devel-3.0.101-108.114.1.i586" } }, { "category": "product_version", "name": "kernel-pae-3.0.101-108.114.1.i586", "product": { "name": "kernel-pae-3.0.101-108.114.1.i586", "product_id": "kernel-pae-3.0.101-108.114.1.i586" } }, { "category": "product_version", "name": "kernel-pae-base-3.0.101-108.114.1.i586", "product": { "name": "kernel-pae-base-3.0.101-108.114.1.i586", "product_id": "kernel-pae-base-3.0.101-108.114.1.i586" } }, { "category": "product_version", "name": "kernel-pae-devel-3.0.101-108.114.1.i586", "product": { "name": "kernel-pae-devel-3.0.101-108.114.1.i586", "product_id": "kernel-pae-devel-3.0.101-108.114.1.i586" } }, { "category": "product_version", "name": "kernel-source-3.0.101-108.114.1.i586", "product": { "name": "kernel-source-3.0.101-108.114.1.i586", "product_id": "kernel-source-3.0.101-108.114.1.i586" } }, { "category": "product_version", "name": "kernel-syms-3.0.101-108.114.1.i586", "product": { "name": "kernel-syms-3.0.101-108.114.1.i586", "product_id": "kernel-syms-3.0.101-108.114.1.i586" } }, { "category": "product_version", "name": "kernel-trace-3.0.101-108.114.1.i586", "product": { "name": "kernel-trace-3.0.101-108.114.1.i586", "product_id": "kernel-trace-3.0.101-108.114.1.i586" } }, { "category": "product_version", "name": "kernel-trace-base-3.0.101-108.114.1.i586", "product": { "name": "kernel-trace-base-3.0.101-108.114.1.i586", "product_id": "kernel-trace-base-3.0.101-108.114.1.i586" } }, { "category": "product_version", "name": "kernel-trace-devel-3.0.101-108.114.1.i586", "product": { "name": "kernel-trace-devel-3.0.101-108.114.1.i586", "product_id": "kernel-trace-devel-3.0.101-108.114.1.i586" } }, { "category": "product_version", "name": "kernel-xen-3.0.101-108.114.1.i586", "product": { "name": "kernel-xen-3.0.101-108.114.1.i586", "product_id": "kernel-xen-3.0.101-108.114.1.i586" } }, { "category": "product_version", "name": "kernel-xen-base-3.0.101-108.114.1.i586", "product": { "name": "kernel-xen-base-3.0.101-108.114.1.i586", "product_id": "kernel-xen-base-3.0.101-108.114.1.i586" } }, { "category": "product_version", "name": "kernel-xen-devel-3.0.101-108.114.1.i586", "product": { "name": "kernel-xen-devel-3.0.101-108.114.1.i586", "product_id": "kernel-xen-devel-3.0.101-108.114.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "kernel-bigmem-3.0.101-108.114.1.ppc64", "product": { "name": "kernel-bigmem-3.0.101-108.114.1.ppc64", "product_id": "kernel-bigmem-3.0.101-108.114.1.ppc64" } }, { "category": "product_version", "name": "kernel-bigmem-base-3.0.101-108.114.1.ppc64", "product": { "name": "kernel-bigmem-base-3.0.101-108.114.1.ppc64", "product_id": "kernel-bigmem-base-3.0.101-108.114.1.ppc64" } }, { "category": "product_version", "name": "kernel-bigmem-devel-3.0.101-108.114.1.ppc64", "product": { "name": "kernel-bigmem-devel-3.0.101-108.114.1.ppc64", "product_id": "kernel-bigmem-devel-3.0.101-108.114.1.ppc64" } }, { "category": "product_version", "name": "kernel-default-3.0.101-108.114.1.ppc64", "product": { "name": "kernel-default-3.0.101-108.114.1.ppc64", "product_id": "kernel-default-3.0.101-108.114.1.ppc64" } }, { "category": "product_version", "name": "kernel-default-base-3.0.101-108.114.1.ppc64", "product": { "name": "kernel-default-base-3.0.101-108.114.1.ppc64", "product_id": "kernel-default-base-3.0.101-108.114.1.ppc64" } }, { "category": "product_version", "name": "kernel-default-devel-3.0.101-108.114.1.ppc64", "product": { "name": "kernel-default-devel-3.0.101-108.114.1.ppc64", "product_id": "kernel-default-devel-3.0.101-108.114.1.ppc64" } }, { "category": "product_version", "name": "kernel-ppc64-3.0.101-108.114.1.ppc64", "product": { "name": "kernel-ppc64-3.0.101-108.114.1.ppc64", "product_id": "kernel-ppc64-3.0.101-108.114.1.ppc64" } }, { "category": "product_version", "name": "kernel-ppc64-base-3.0.101-108.114.1.ppc64", "product": { "name": "kernel-ppc64-base-3.0.101-108.114.1.ppc64", "product_id": "kernel-ppc64-base-3.0.101-108.114.1.ppc64" } }, { "category": "product_version", "name": "kernel-ppc64-devel-3.0.101-108.114.1.ppc64", "product": { "name": "kernel-ppc64-devel-3.0.101-108.114.1.ppc64", "product_id": "kernel-ppc64-devel-3.0.101-108.114.1.ppc64" } }, { "category": "product_version", "name": "kernel-source-3.0.101-108.114.1.ppc64", "product": { "name": "kernel-source-3.0.101-108.114.1.ppc64", "product_id": "kernel-source-3.0.101-108.114.1.ppc64" } }, { "category": "product_version", "name": "kernel-syms-3.0.101-108.114.1.ppc64", "product": { "name": "kernel-syms-3.0.101-108.114.1.ppc64", "product_id": "kernel-syms-3.0.101-108.114.1.ppc64" } }, { "category": "product_version", "name": "kernel-trace-3.0.101-108.114.1.ppc64", "product": { "name": "kernel-trace-3.0.101-108.114.1.ppc64", "product_id": "kernel-trace-3.0.101-108.114.1.ppc64" } }, { "category": "product_version", "name": "kernel-trace-base-3.0.101-108.114.1.ppc64", "product": { "name": "kernel-trace-base-3.0.101-108.114.1.ppc64", "product_id": "kernel-trace-base-3.0.101-108.114.1.ppc64" } }, { "category": "product_version", "name": "kernel-trace-devel-3.0.101-108.114.1.ppc64", "product": { "name": "kernel-trace-devel-3.0.101-108.114.1.ppc64", "product_id": "kernel-trace-devel-3.0.101-108.114.1.ppc64" } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "kernel-default-3.0.101-108.114.1.s390x", "product": { "name": "kernel-default-3.0.101-108.114.1.s390x", "product_id": "kernel-default-3.0.101-108.114.1.s390x" } }, { "category": "product_version", "name": "kernel-default-base-3.0.101-108.114.1.s390x", "product": { "name": "kernel-default-base-3.0.101-108.114.1.s390x", "product_id": "kernel-default-base-3.0.101-108.114.1.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-3.0.101-108.114.1.s390x", "product": { "name": "kernel-default-devel-3.0.101-108.114.1.s390x", "product_id": "kernel-default-devel-3.0.101-108.114.1.s390x" } }, { "category": "product_version", "name": "kernel-default-man-3.0.101-108.114.1.s390x", "product": { "name": "kernel-default-man-3.0.101-108.114.1.s390x", "product_id": "kernel-default-man-3.0.101-108.114.1.s390x" } }, { "category": "product_version", "name": "kernel-source-3.0.101-108.114.1.s390x", "product": { "name": "kernel-source-3.0.101-108.114.1.s390x", "product_id": "kernel-source-3.0.101-108.114.1.s390x" } }, { "category": "product_version", "name": "kernel-syms-3.0.101-108.114.1.s390x", "product": { "name": "kernel-syms-3.0.101-108.114.1.s390x", "product_id": "kernel-syms-3.0.101-108.114.1.s390x" } }, { "category": "product_version", "name": "kernel-trace-3.0.101-108.114.1.s390x", "product": { "name": "kernel-trace-3.0.101-108.114.1.s390x", "product_id": "kernel-trace-3.0.101-108.114.1.s390x" } }, { "category": "product_version", "name": "kernel-trace-base-3.0.101-108.114.1.s390x", "product": { "name": "kernel-trace-base-3.0.101-108.114.1.s390x", "product_id": "kernel-trace-base-3.0.101-108.114.1.s390x" } }, { "category": "product_version", "name": "kernel-trace-devel-3.0.101-108.114.1.s390x", "product": { "name": "kernel-trace-devel-3.0.101-108.114.1.s390x", "product_id": "kernel-trace-devel-3.0.101-108.114.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-default-3.0.101-108.114.1.x86_64", "product": { "name": "kernel-default-3.0.101-108.114.1.x86_64", "product_id": "kernel-default-3.0.101-108.114.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-3.0.101-108.114.1.x86_64", "product": { "name": "kernel-default-base-3.0.101-108.114.1.x86_64", "product_id": "kernel-default-base-3.0.101-108.114.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-3.0.101-108.114.1.x86_64", "product": { "name": "kernel-default-devel-3.0.101-108.114.1.x86_64", "product_id": "kernel-default-devel-3.0.101-108.114.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-3.0.101-108.114.1.x86_64", "product": { "name": "kernel-ec2-3.0.101-108.114.1.x86_64", "product_id": "kernel-ec2-3.0.101-108.114.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-base-3.0.101-108.114.1.x86_64", "product": { "name": "kernel-ec2-base-3.0.101-108.114.1.x86_64", "product_id": "kernel-ec2-base-3.0.101-108.114.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-devel-3.0.101-108.114.1.x86_64", "product": { "name": "kernel-ec2-devel-3.0.101-108.114.1.x86_64", "product_id": "kernel-ec2-devel-3.0.101-108.114.1.x86_64" } }, { "category": "product_version", "name": "kernel-source-3.0.101-108.114.1.x86_64", "product": { "name": "kernel-source-3.0.101-108.114.1.x86_64", "product_id": "kernel-source-3.0.101-108.114.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-3.0.101-108.114.1.x86_64", "product": { "name": "kernel-syms-3.0.101-108.114.1.x86_64", "product_id": "kernel-syms-3.0.101-108.114.1.x86_64" } }, { "category": "product_version", "name": "kernel-trace-3.0.101-108.114.1.x86_64", "product": { "name": "kernel-trace-3.0.101-108.114.1.x86_64", "product_id": "kernel-trace-3.0.101-108.114.1.x86_64" } }, { "category": "product_version", "name": "kernel-trace-base-3.0.101-108.114.1.x86_64", "product": { "name": "kernel-trace-base-3.0.101-108.114.1.x86_64", "product_id": "kernel-trace-base-3.0.101-108.114.1.x86_64" } }, { "category": "product_version", "name": "kernel-trace-devel-3.0.101-108.114.1.x86_64", "product": { "name": "kernel-trace-devel-3.0.101-108.114.1.x86_64", "product_id": "kernel-trace-devel-3.0.101-108.114.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-3.0.101-108.114.1.x86_64", "product": { "name": "kernel-xen-3.0.101-108.114.1.x86_64", "product_id": "kernel-xen-3.0.101-108.114.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-base-3.0.101-108.114.1.x86_64", "product": { "name": "kernel-xen-base-3.0.101-108.114.1.x86_64", "product_id": "kernel-xen-base-3.0.101-108.114.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-devel-3.0.101-108.114.1.x86_64", "product": { "name": "kernel-xen-devel-3.0.101-108.114.1.x86_64", "product_id": "kernel-xen-devel-3.0.101-108.114.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server 11 SP4-LTSS", "product": { "name": "SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_sles:11:sp4" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-bigmem-3.0.101-108.114.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.114.1.ppc64" }, "product_reference": "kernel-bigmem-3.0.101-108.114.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bigmem-base-3.0.101-108.114.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.114.1.ppc64" }, "product_reference": "kernel-bigmem-base-3.0.101-108.114.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bigmem-devel-3.0.101-108.114.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.114.1.ppc64" }, "product_reference": "kernel-bigmem-devel-3.0.101-108.114.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-108.114.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.114.1.i586" }, "product_reference": "kernel-default-3.0.101-108.114.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-108.114.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.114.1.ppc64" }, "product_reference": "kernel-default-3.0.101-108.114.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-108.114.1.s390x as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.114.1.s390x" }, "product_reference": "kernel-default-3.0.101-108.114.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-108.114.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.114.1.x86_64" }, "product_reference": "kernel-default-3.0.101-108.114.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-108.114.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.114.1.i586" }, "product_reference": "kernel-default-base-3.0.101-108.114.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-108.114.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.114.1.ppc64" }, "product_reference": "kernel-default-base-3.0.101-108.114.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-108.114.1.s390x as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.114.1.s390x" }, "product_reference": "kernel-default-base-3.0.101-108.114.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-108.114.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.114.1.x86_64" }, "product_reference": "kernel-default-base-3.0.101-108.114.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-108.114.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.114.1.i586" }, "product_reference": "kernel-default-devel-3.0.101-108.114.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-108.114.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.114.1.ppc64" }, "product_reference": "kernel-default-devel-3.0.101-108.114.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-108.114.1.s390x as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.114.1.s390x" }, "product_reference": "kernel-default-devel-3.0.101-108.114.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-108.114.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.114.1.x86_64" }, "product_reference": "kernel-default-devel-3.0.101-108.114.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-3.0.101-108.114.1.s390x as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.114.1.s390x" }, "product_reference": "kernel-default-man-3.0.101-108.114.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-3.0.101-108.114.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.114.1.i586" }, "product_reference": "kernel-ec2-3.0.101-108.114.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-3.0.101-108.114.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.114.1.x86_64" }, "product_reference": "kernel-ec2-3.0.101-108.114.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-base-3.0.101-108.114.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.114.1.i586" }, "product_reference": "kernel-ec2-base-3.0.101-108.114.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-base-3.0.101-108.114.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.114.1.x86_64" }, "product_reference": "kernel-ec2-base-3.0.101-108.114.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-devel-3.0.101-108.114.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.114.1.i586" }, "product_reference": "kernel-ec2-devel-3.0.101-108.114.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-devel-3.0.101-108.114.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.114.1.x86_64" }, "product_reference": "kernel-ec2-devel-3.0.101-108.114.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-3.0.101-108.114.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.114.1.i586" }, "product_reference": "kernel-pae-3.0.101-108.114.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-base-3.0.101-108.114.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.114.1.i586" }, "product_reference": "kernel-pae-base-3.0.101-108.114.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-devel-3.0.101-108.114.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.114.1.i586" }, "product_reference": "kernel-pae-devel-3.0.101-108.114.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ppc64-3.0.101-108.114.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.114.1.ppc64" }, "product_reference": "kernel-ppc64-3.0.101-108.114.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ppc64-base-3.0.101-108.114.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.114.1.ppc64" }, "product_reference": "kernel-ppc64-base-3.0.101-108.114.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ppc64-devel-3.0.101-108.114.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.114.1.ppc64" }, "product_reference": "kernel-ppc64-devel-3.0.101-108.114.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-108.114.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.114.1.i586" }, "product_reference": "kernel-source-3.0.101-108.114.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-108.114.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.114.1.ppc64" }, "product_reference": "kernel-source-3.0.101-108.114.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-108.114.1.s390x as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.114.1.s390x" }, "product_reference": "kernel-source-3.0.101-108.114.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-108.114.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.114.1.x86_64" }, "product_reference": "kernel-source-3.0.101-108.114.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-108.114.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.114.1.i586" }, "product_reference": "kernel-syms-3.0.101-108.114.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-108.114.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.114.1.ppc64" }, "product_reference": "kernel-syms-3.0.101-108.114.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-108.114.1.s390x as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.114.1.s390x" }, "product_reference": "kernel-syms-3.0.101-108.114.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-108.114.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.114.1.x86_64" }, "product_reference": "kernel-syms-3.0.101-108.114.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-108.114.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.114.1.i586" }, "product_reference": "kernel-trace-3.0.101-108.114.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-108.114.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.114.1.ppc64" }, "product_reference": "kernel-trace-3.0.101-108.114.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-108.114.1.s390x as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.114.1.s390x" }, "product_reference": "kernel-trace-3.0.101-108.114.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-108.114.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.114.1.x86_64" }, "product_reference": "kernel-trace-3.0.101-108.114.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-108.114.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.114.1.i586" }, "product_reference": "kernel-trace-base-3.0.101-108.114.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-108.114.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.114.1.ppc64" }, "product_reference": "kernel-trace-base-3.0.101-108.114.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-108.114.1.s390x as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.114.1.s390x" }, "product_reference": "kernel-trace-base-3.0.101-108.114.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-108.114.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.114.1.x86_64" }, "product_reference": "kernel-trace-base-3.0.101-108.114.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-108.114.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.114.1.i586" }, "product_reference": "kernel-trace-devel-3.0.101-108.114.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-108.114.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.114.1.ppc64" }, "product_reference": "kernel-trace-devel-3.0.101-108.114.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-108.114.1.s390x as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.114.1.s390x" }, "product_reference": "kernel-trace-devel-3.0.101-108.114.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-108.114.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.114.1.x86_64" }, "product_reference": "kernel-trace-devel-3.0.101-108.114.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.0.101-108.114.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.114.1.i586" }, "product_reference": "kernel-xen-3.0.101-108.114.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.0.101-108.114.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.114.1.x86_64" }, "product_reference": "kernel-xen-3.0.101-108.114.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.0.101-108.114.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.114.1.i586" }, "product_reference": "kernel-xen-base-3.0.101-108.114.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.0.101-108.114.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.114.1.x86_64" }, "product_reference": "kernel-xen-base-3.0.101-108.114.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.0.101-108.114.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.114.1.i586" }, "product_reference": "kernel-xen-devel-3.0.101-108.114.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.0.101-108.114.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.114.1.x86_64" }, "product_reference": "kernel-xen-devel-3.0.101-108.114.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-0543", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-0543" } ], "notes": [ { "category": "general", "text": "Incomplete cleanup from specific special register read operations in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.114.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.114.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.114.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.114.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.114.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.114.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.114.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.114.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.114.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.114.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.114.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.114.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.114.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.114.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.114.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.114.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.114.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.114.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.114.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.114.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.114.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.114.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.114.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-0543", "url": "https://www.suse.com/security/cve/CVE-2020-0543" }, { "category": "external", "summary": "SUSE Bug 1154824 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1154824" }, { "category": "external", "summary": "SUSE Bug 1172205 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172205" }, { "category": "external", "summary": "SUSE Bug 1172206 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172206" }, { "category": "external", "summary": "SUSE Bug 1172207 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172207" }, { "category": "external", "summary": "SUSE Bug 1172770 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172770" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.114.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.114.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.114.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.114.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.114.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.114.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.114.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.114.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.114.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.114.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.114.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.114.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.114.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.114.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.114.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.114.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.114.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.114.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.114.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.114.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.114.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.114.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.114.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.114.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.114.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.114.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.114.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.114.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.114.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.114.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.114.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.114.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.114.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.114.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.114.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.114.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.114.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.114.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.114.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.114.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.114.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.114.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.114.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.114.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.114.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.114.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-09T17:11:40Z", "details": "moderate" } ], "title": "CVE-2020-0543" }, { "cve": "CVE-2020-10690", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10690" } ], "notes": [ { "category": "general", "text": "There is a use-after-free in kernel versions before 5.5 due to a race condition between the release of ptp_clock and cdev while resource deallocation. When a (high privileged) process allocates a ptp device file (like /dev/ptpX) and voluntarily goes to sleep. During this time if the underlying device is removed, it can cause an exploitable condition as the process wakes up to terminate and clean all attached files. The system crashes due to the cdev structure being invalid (as already freed) which is pointed to by the inode.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.114.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.114.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.114.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.114.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.114.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.114.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.114.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.114.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.114.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.114.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.114.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.114.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.114.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.114.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.114.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.114.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.114.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.114.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.114.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.114.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.114.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.114.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.114.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10690", "url": "https://www.suse.com/security/cve/CVE-2020-10690" }, { "category": "external", "summary": "SUSE Bug 1170056 for CVE-2020-10690", "url": "https://bugzilla.suse.com/1170056" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.114.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.114.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.114.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.114.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.114.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.114.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.114.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.114.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.114.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.114.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.114.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.114.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.114.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.114.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.114.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.114.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.114.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.114.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.114.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.114.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.114.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.114.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.114.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.114.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.114.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.114.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.114.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.114.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.114.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.114.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.114.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.114.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.114.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.114.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.114.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.114.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.114.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.114.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.114.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.114.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.114.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.114.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.114.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.114.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.114.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.114.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-09T17:11:40Z", "details": "moderate" } ], "title": "CVE-2020-10690" }, { "cve": "CVE-2020-12652", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12652" } ], "notes": [ { "category": "general", "text": "The __mptctl_ioctl function in drivers/message/fusion/mptctl.c in the Linux kernel before 5.4.14 allows local users to hold an incorrect lock during the ioctl operation and trigger a race condition, i.e., a \"double fetch\" vulnerability, aka CID-28d76df18f0a. NOTE: the vendor states \"The security impact of this bug is not as bad as it could have been because these operations are all privileged and root already has enormous destructive power.\"", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.114.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.114.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.114.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.114.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.114.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.114.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.114.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.114.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.114.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.114.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.114.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.114.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.114.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.114.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.114.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.114.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.114.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.114.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.114.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.114.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.114.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.114.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.114.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12652", "url": "https://www.suse.com/security/cve/CVE-2020-12652" }, { "category": "external", "summary": "SUSE Bug 1171218 for CVE-2020-12652", "url": "https://bugzilla.suse.com/1171218" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.114.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.114.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.114.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.114.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.114.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.114.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.114.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.114.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.114.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.114.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.114.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.114.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.114.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.114.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.114.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.114.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.114.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.114.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.114.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.114.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.114.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.114.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.114.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.114.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.114.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.114.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.114.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.114.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.114.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.114.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.114.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.114.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.114.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.114.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.114.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.114.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.114.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.114.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.114.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.114.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.114.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.114.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.114.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.114.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.114.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.114.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-09T17:11:40Z", "details": "moderate" } ], "title": "CVE-2020-12652" }, { "cve": "CVE-2020-12653", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12653" } ], "notes": [ { "category": "general", "text": "An issue was found in Linux kernel before 5.5.4. The mwifiex_cmd_append_vsie_tlv() function in drivers/net/wireless/marvell/mwifiex/scan.c allows local users to gain privileges or cause a denial of service because of an incorrect memcpy and buffer overflow, aka CID-b70261a288ea.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.114.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.114.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.114.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.114.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.114.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.114.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.114.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.114.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.114.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.114.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.114.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.114.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.114.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.114.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.114.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.114.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.114.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.114.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.114.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.114.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.114.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.114.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.114.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12653", "url": "https://www.suse.com/security/cve/CVE-2020-12653" }, { "category": "external", "summary": "SUSE Bug 1159281 for CVE-2020-12653", "url": "https://bugzilla.suse.com/1159281" }, { "category": "external", "summary": "SUSE Bug 1171195 for CVE-2020-12653", "url": "https://bugzilla.suse.com/1171195" }, { "category": "external", "summary": "SUSE Bug 1171254 for CVE-2020-12653", "url": "https://bugzilla.suse.com/1171254" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.114.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.114.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.114.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.114.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.114.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.114.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.114.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.114.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.114.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.114.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.114.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.114.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.114.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.114.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.114.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.114.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.114.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.114.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.114.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.114.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.114.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.114.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.114.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.114.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.114.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.114.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.114.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.114.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.114.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.114.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.114.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.114.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.114.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.114.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.114.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.114.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.114.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.114.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.114.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.114.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.114.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.114.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.114.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.114.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.114.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.114.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-09T17:11:40Z", "details": "important" } ], "title": "CVE-2020-12653" }, { "cve": "CVE-2020-12654", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12654" } ], "notes": [ { "category": "general", "text": "An issue was found in Linux kernel before 5.5.4. mwifiex_ret_wmm_get_status() in drivers/net/wireless/marvell/mwifiex/wmm.c allows a remote AP to trigger a heap-based buffer overflow because of an incorrect memcpy, aka CID-3a9b153c5591.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.114.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.114.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.114.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.114.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.114.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.114.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.114.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.114.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.114.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.114.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.114.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.114.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.114.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.114.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.114.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.114.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.114.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.114.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.114.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.114.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.114.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.114.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.114.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12654", "url": "https://www.suse.com/security/cve/CVE-2020-12654" }, { "category": "external", "summary": "SUSE Bug 1159281 for CVE-2020-12654", "url": "https://bugzilla.suse.com/1159281" }, { "category": "external", "summary": "SUSE Bug 1171202 for CVE-2020-12654", "url": "https://bugzilla.suse.com/1171202" }, { "category": "external", "summary": "SUSE Bug 1171252 for CVE-2020-12654", "url": "https://bugzilla.suse.com/1171252" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.114.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.114.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.114.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.114.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.114.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.114.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.114.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.114.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.114.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.114.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.114.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.114.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.114.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.114.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.114.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.114.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.114.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.114.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.114.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.114.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.114.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.114.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.114.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.114.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.114.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.114.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.114.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.114.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.114.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.114.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.114.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.114.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.114.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.114.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.114.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.114.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.114.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.114.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.114.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.114.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.114.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.114.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.114.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.114.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.114.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.114.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.114.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.114.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-09T17:11:40Z", "details": "important" } ], "title": "CVE-2020-12654" } ] }
suse-su-2020:1605-1
Vulnerability from csaf_suse
Published
2020-06-10 13:58
Modified
2020-06-10 13:58
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 12 SP4 kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2020-0543: Fixed a side channel attack against special registers which could have resulted in leaking of read values to cores other than the one which called it.
This attack is known as Special Register Buffer Data Sampling (SRBDS) or 'CrossTalk' (bsc#1154824).
- CVE-2020-13143: Fixed an out-of-bounds read in gadget_dev_desc_UDC_store in drivers/usb/gadget/configfs.c (bsc#1171982).
- CVE-2020-12769: Fixed an issue which could have allowed attackers to cause a panic via concurrent calls to dw_spi_irq and dw_spi_transfer_one (bsc#1171983).
- CVE-2020-12768: Fixed a memory leak in svm_cpu_uninit in arch/x86/kvm/svm.c (bsc#1171736).
- CVE-2020-12657: An a use-after-free in block/bfq-iosched.c (bsc#1171205).
- CVE-2020-12656: Fixed an improper handling of certain domain_release calls leadingch could have led to a memory leak (bsc#1171219).
- CVE-2020-12655: Fixed an issue which could have allowed attackers to trigger a sync of excessive duration via an XFS v5 image with crafted metadata (bsc#1171217).
- CVE-2020-12654: Fixed an issue in he wifi driver which could have allowed a remote AP to trigger a heap-based buffer overflow (bsc#1171202).
- CVE-2020-12653: Fixed an issue in the wifi driver which could have allowed local users to gain privileges or cause a denial of service (bsc#1171195).
- CVE-2020-12652: Fixed an issue which could have allowed local users to hold an incorrect lock during the ioctl operation and trigger a race condition (bsc#1171218).
- CVE-2020-12464: Fixed a use-after-free due to a transfer without a reference (bsc#1170901).
- CVE-2020-12114: Fixed a pivot_root race condition which could have allowed local users to cause a denial of service (panic) by corrupting a mountpoint reference counter (bsc#1171098).
- CVE-2020-10757: Fixed an issue where remaping hugepage DAX to anon mmap could have caused user PTE access (bsc#1172317).
- CVE-2020-10751: Fixed an improper implementation in SELinux LSM hook where it was assumed that an skb would only contain a single netlink message (bsc#1171189).
- CVE-2020-10732: Fixed kernel data leak in userspace coredumps due to uninitialized data (bsc#1171220).
- CVE-2020-10720: Fixed a use-after-free read in napi_gro_frags() (bsc#1170778).
- CVE-2020-10711: Fixed a null pointer dereference in SELinux subsystem which could have allowed a remote network user to crash the kernel resulting in a denial of service (bsc#1171191).
- CVE-2020-10690: Fixed the race between the release of ptp_clock and cdev (bsc#1170056).
- CVE-2019-9455: Fixed a pointer leak due to a WARN_ON statement in a video driver. This could lead to local information disclosure with System execution privileges needed (bsc#1170345).
- CVE-2019-20812: Fixed an issue in prb_calc_retire_blk_tmo() which could have resulted in a denial of service (bsc#1172453).
- CVE-2019-20806: Fixed a null pointer dereference which may had lead to denial of service (bsc#1172199).
- CVE-2019-19462: Fixed an issue which could have allowed local user to cause denial of service (bsc#1158265).
- CVE-2018-1000199: Fixed a potential local code execution via ptrace (bsc#1089895).
The following non-security bugs were fixed:
- ACPI: CPPC: Fix reference count leak in acpi_cppc_processor_probe() (bsc#1051510).
- ACPI: sysfs: Fix reference count leak in acpi_sysfs_add_hotplug_profile() (bsc#1051510).
- acpi/x86: ignore unspecified bit positions in the ACPI global lock field (bsc#1051510).
- Add commit for git-fix that's not a fix This commit cleans up debug code but does not fix anything, and it relies on a new kernel function that isn't yet in this version of SLE.
- agp/intel: Reinforce the barrier after GTT updates (bsc#1051510).
- ALSA: ctxfi: Remove unnecessary cast in kfree (bsc#1051510).
- ALSA: dummy: Fix PCM format loop in proc output (bsc#1111666).
- ALSA: hda: Do not release card at firmware loading error (bsc#1051510).
- ALSA: hda/hdmi: fix race in monitor detection during probe (bsc#1051510).
- ALSA: hda/hdmi: fix without unlocked before return (bsc#1051510).
- ALSA: hda: Keep the controller initialization even if no codecs found (bsc#1051510).
- ALSA: hda/realtek - Add more fixup entries for Clevo machines (git-fixes).
- ALSA: hda/realtek - Add new codec supported for ALC245 (bsc#1051510).
- ALSA: hda/realtek - Add new codec supported for ALC287 (git-fixes).
- ALSA: hda/realtek - Fix S3 pop noise on Dell Wyse (git-fixes).
- ALSA: hda/realtek - Fix unexpected init_amp override (bsc#1051510).
- ALSA: hda/realtek - Limit int mic boost for Thinkpad T530 (git-fixes bsc#1171293).
- ALSA: hda/realtek - Two front mics on a Lenovo ThinkCenter (bsc#1051510).
- ALSA: hwdep: fix a left shifting 1 by 31 UB bug (git-fixes).
- ALSA: iec1712: Initialize STDSP24 properly when using the model=staudio option (git-fixes).
- ALSA: opti9xx: shut up gcc-10 range warning (bsc#1051510).
- ALSA: pcm: fix incorrect hw_base increase (git-fixes).
- ALSA: pcm: oss: Place the plugin buffer overflow checks correctly (bsc#1170522).
- ALSA-pcm-oss-Place-the-plugin-buffer-overflow-checks.patch
- ALSA: rawmidi: Fix racy buffer resize under concurrent accesses (git-fixes).
- ALSA: usb-audio: Add control message quirk delay for Kingston HyperX headset (git-fixes).
- ALSA: usb-audio: Correct a typo of NuPrime DAC-10 USB ID (bsc#1051510).
- ALSA: usb-audio: Do not override ignore_ctl_error value from the map (bsc#1051510).
- ALSA: usb-audio: Fix usb audio refcnt leak when getting spdif (bsc#1051510).
- ALSA: usb-audio: mixer: volume quirk for ESS Technology Asus USB DAC (git-fixes).
- ALSA: usx2y: Fix potential NULL dereference (bsc#1051510).
- ASoC: codecs: hdac_hdmi: Fix incorrect use of list_for_each_entry (bsc#1051510).
- ASoC: dapm: connect virtual mux with default value (bsc#1051510).
- ASoC: dapm: fixup dapm kcontrol widget (bsc#1051510).
- ASoC: dpcm: allow start or stop during pause for backend (bsc#1051510).
- ASoC: fix regwmask (bsc#1051510).
- ASoC: msm8916-wcd-digital: Reset RX interpolation path after use (bsc#1051510).
- ASoC: samsung: Prevent clk_get_rate() calls in atomic context (bsc#1111666).
- ASoC: topology: Check return value of pcm_new_ver (bsc#1051510).
- ASoC: topology: use name_prefix for new kcontrol (bsc#1051510).
- b43legacy: Fix case where channel status is corrupted (bsc#1051510).
- batman-adv: fix batadv_nc_random_weight_tq (git-fixes).
- batman-adv: Fix refcnt leak in batadv_show_throughput_override (git-fixes).
- batman-adv: Fix refcnt leak in batadv_store_throughput_override (git-fixes).
- batman-adv: Fix refcnt leak in batadv_v_ogm_process (git-fixes).
- bcache: avoid unnecessary btree nodes flushing in btree_flush_write() (git fixes (block drivers)).
- bcache: fix incorrect data type usage in btree_flush_write() (git fixes (block drivers)).
- bcache: Revert 'bcache: shrink btree node cache after bch_btree_check()' (git fixes (block drivers)).
- block/drbd: delete invalid function drbd_md_mark_dirty_ (bsc#1171527).
- block: drbd: remove a stray unlock in __drbd_send_protocol() (bsc#1171599).
- block: fix busy device checking in blk_drop_partitions again (bsc#1171948).
- block: fix busy device checking in blk_drop_partitions (bsc#1171948).
- block: fix memleak of bio integrity data (git fixes (block drivers)).
- block: remove the bd_openers checks in blk_drop_partitions (bsc#1171948).
- bnxt_en: fix memory leaks in bnxt_dcbnl_ieee_getets() (networking-stable-20_03_28).
- bnxt_en: reinitialize IRQs when MTU is modified (networking-stable-20_03_14).
- bonding/alb: make sure arp header is pulled before accessing it (networking-stable-20_03_14).
- brcmfmac: abort and release host after error (bsc#1051510).
- Btrfs: fix deadlock with memory reclaim during scrub (bsc#1172127).
- btrfs: fix log context list corruption after rename whiteout error (bsc#1172342).
- btrfs: fix partial loss of prealloc extent past i_size after fsync (bsc#1172343).
- btrfs: move the dio_sem higher up the callchain (bsc#1171761).
- btrfs: reloc: clear DEAD_RELOC_TREE bit for orphan roots to prevent runaway balance (bsc#1171417 bsc#1160947 bsc#1172366).
- btrfs: reloc: fix reloc root leak and NULL pointer dereference (bsc#1171417 bsc#1160947 bsc#1172366).
- btrfs: setup a nofs context for memory allocation at btrfs_create_tree() (bsc#1172127).
- btrfs: setup a nofs context for memory allocation at __btrfs_set_acl (bsc#1172127).
- btrfs: use nofs context when initializing security xattrs to avoid deadlock (bsc#1172127).
- can: add missing attribute validation for termination (networking-stable-20_03_14).
- cdc-acm: close race betrween suspend() and acm_softint (git-fixes).
- cdc-acm: introduce a cool down (git-fixes).
- ceph: fix double unlock in handle_cap_export() (bsc#1171694).
- ceph: fix endianness bug when handling MDS session feature bits (bsc#1171695).
- cgroup, netclassid: periodically release file_lock on classid updating (networking-stable-20_03_14).
- CIFS: Allocate crypto structures on the fly for calculating signatures of incoming packets (bsc#1144333).
- CIFS: Allocate encryption header through kmalloc (bsc#1144333).
- CIFS: allow unlock flock and OFD lock across fork (bsc#1144333).
- CIFS: check new file size when extending file by fallocate (bsc#1144333).
- CIFS: cifspdu.h: Replace zero-length array with flexible-array member (bsc#1144333).
- CIFS: clear PF_MEMALLOC before exiting demultiplex thread (bsc#1144333).
- CIFS: do not share tcons with DFS (bsc#1144333).
- CIFS: dump the session id and keys also for SMB2 sessions (bsc#1144333).
- CIFS: ensure correct super block for DFS reconnect (bsc#1144333).
- CIFS: Fix bug which the return value by asynchronous read is error (bsc#1144333).
- CIFS: fix uninitialised lease_key in open_shroot() (bsc#1144333).
- CIFS: improve read performance for page size 64KB & cache=strict & vers=2.1+ (bsc#1144333).
- CIFS: Increment num_remote_opens stats counter even in case of smb2_query_dir_first (bsc#1144333).
- CIFS: minor update to comments around the cifs_tcp_ses_lock mutex (bsc#1144333).
- CIFS: protect updating server->dstaddr with a spinlock (bsc#1144333).
- CIFS: smb2pdu.h: Replace zero-length array with flexible-array member (bsc#1144333).
- CIFS: smbd: Calculate the correct maximum packet size for segmented SMBDirect send/receive (bsc#1144333).
- CIFS: smbd: Check and extend sender credits in interrupt context (bsc#1144333).
- CIFS: smbd: Check send queue size before posting a send (bsc#1144333).
- CIFS: smbd: Do not schedule work to send immediate packet on every receive (bsc#1144333).
- CIFS: smbd: Merge code to track pending packets (bsc#1144333).
- CIFS: smbd: Properly process errors on ib_post_send (bsc#1144333).
- CIFS: smbd: Update receive credits before sending and deal with credits roll back on failure before sending (bsc#1144333).
- CIFS: Warn less noisily on default mount (bsc#1144333).
- clk: Add clk_hw_unregister_composite helper function definition (bsc#1051510).
- clk: imx6ull: use OSC clock during AXI rate change (bsc#1051510).
- clk: imx: make mux parent strings const (bsc#1051510).
- clk: mediatek: correct the clocks for MT2701 HDMI PHY module (bsc#1051510).
- clk: sunxi-ng: a64: Fix gate bit of DSI DPHY (bsc#1051510).
- clocksource/drivers/hyper-v: Set TSC clocksource as default w/ InvariantTSC (bsc#1170620).
- clocksource: dw_apb_timer_of: Fix missing clockevent timers (bsc#1051510).
- component: Silence bind error on -EPROBE_DEFER (bsc#1051510).
- coresight: do not use the BIT() macro in the UAPI header (git fixes (block drivers)).
- cpufreq: s3c64xx: Remove pointless NULL check in s3c64xx_cpufreq_driver_init (bsc#1051510).
- crypto: ccp - AES CFB mode is a stream cipher (git-fixes).
- crypto: ccp - Clean up and exit correctly on allocation failure (git-fixes).
- crypto: ccp - Cleanup misc_dev on sev_exit() (bsc#1114279).
- crypto: ccp - Cleanup sp_dev_master in psp_dev_destroy() (bsc#1114279).
- debugfs: Add debugfs_create_xul() for hexadecimal unsigned long (git-fixes).
- dmaengine: dmatest: Fix iteration non-stop logic (bsc#1051510).
- dm mpath: switch paths in dm_blk_ioctl() code path (bsc#1167574).
- dm writecache: fix data corruption when reloading the target (git fixes (block drivers)).
- dm writecache: fix incorrect flush sequence when doing SSD mode commit (git fixes (block drivers)).
- dm writecache: verify watermark during resume (git fixes (block drivers)).
- dm zoned: fix invalid memory access (git fixes (block drivers)).
- dm zoned: reduce overhead of backing device checks (git fixes (block drivers)).
- dm zoned: remove duplicate nr_rnd_zones increase in dmz_init_zone() (git fixes (block drivers)).
- dm zoned: support zone sizes smaller than 128MiB (git fixes (block drivers)).
- dp83640: reverse arguments to list_add_tail (git-fixes).
- drivers: hv: Add a module description line to the hv_vmbus driver (bsc#1172253).
- Drivers: HV: Send one page worth of kmsg dump over Hyper-V during panic (bsc#1170618).
- Drivers: hv: vmbus: Fix the issue with freeing up hv_ctl_table_hdr (bsc#1170618).
- Drivers: hv: vmbus: Get rid of MSR access from vmbus_drv.c (bsc#1170618).
- Drivers: hv: vmus: Fix the check for return value from kmsg get dump buffer (bsc#1170618).
- drivers/net/ibmvnic: Update VNIC protocol version reporting (bsc#1065729).
- drm: amd/acp: fix broken menu structure (bsc#1114279) * context changes
- drm/crc: Actually allow to change the crc source (bsc#1114279) * offset changes
- drm/dp_mst: Fix clearing payload state on topology disable (bsc#1051510).
- drm/dp_mst: Reformat drm_dp_check_act_status() a bit (bsc#1051510).
- drm/edid: Fix off-by-one in DispID DTD pixel clock (bsc#1114279)
- drm/i915/gvt: Init DPLL/DDI vreg for virtual display instead of (bsc#1114279)
- drm/i915: properly sanity check batch_start_offset (bsc#1114279) * renamed display/intel_fbc.c -> intel_fb.c * renamed gt/intel_rc6.c -> intel_pm.c * context changes
- drm/meson: Delete an error message in meson_dw_hdmi_bind() (bsc#1051510).
- drm: NULL pointer dereference [null-pointer-deref] (CWE 476) problem (bsc#1114279)
- drm/qxl: qxl_release leak in qxl_draw_dirty_fb() (bsc#1051510).
- drm/qxl: qxl_release leak in qxl_hw_surface_alloc() (bsc#1051510).
- drm/qxl: qxl_release use after free (bsc#1051510).
- drm: Remove PageReserved manipulation from drm_pci_alloc (bsc#1114279) * offset changes
- dump_stack: avoid the livelock of the dump_lock (git fixes (block drivers)).
- EDAC, sb_edac: Add support for systems with segmented PCI buses (bsc#1169525).
- ext4: do not zeroout extents beyond i_disksize (bsc#1167851).
- ext4: fix extent_status fragmentation for plain files (bsc#1171949).
- ext4: use non-movable memory for superblock readahead (bsc#1171952).
- fanotify: fix merging marks masks with FAN_ONDIR (bsc#1171679).
- fbcon: fix null-ptr-deref in fbcon_switch (bsc#1114279) * rename drivers/video/fbdev/core to drivers/video/console * context changes
- fib: add missing attribute validation for tun_id (networking-stable-20_03_14).
- firmware: qcom: scm: fix compilation error when disabled (bsc#1051510).
- fs/cifs: fix gcc warning in sid_to_id (bsc#1144333).
- fs/seq_file.c: simplify seq_file iteration code and interface (bsc#1170125).
- gpio: tegra: mask GPIO IRQs during IRQ shutdown (bsc#1051510).
- gre: fix uninit-value in __iptunnel_pull_header (networking-stable-20_03_14).
- HID: hid-input: clear unmapped usages (git-fixes).
- HID: hyperv: Add a module description line (bsc#1172253).
- HID: i2c-hid: add Trekstor Primebook C11B to descriptor override (git-fixes).
- HID: i2c-hid: override HID descriptors for certain devices (git-fixes).
- HID: multitouch: add eGalaxTouch P80H84 support (bsc#1051510).
- HID: wacom: Read HID_DG_CONTACTMAX directly for non-generic devices (git-fixes).
- hrtimer: Annotate lockless access to timer->state (git fixes (block drivers)).
- hsr: add restart routine into hsr_get_node_list() (networking-stable-20_03_28).
- hsr: check protocol version in hsr_newlink() (networking-stable-20_04_17).
- hsr: fix general protection fault in hsr_addr_is_self() (networking-stable-20_03_28).
- hsr: set .netnsok flag (networking-stable-20_03_28).
- hsr: use rcu_read_lock() in hsr_get_node_{list/status}() (networking-stable-20_03_28).
- i2c: acpi: Force bus speed to 400KHz if a Silead touchscreen is present (git-fixes).
- i2c: acpi: put device when verifying client fails (git-fixes).
- i2c: brcmstb: remove unused struct member (git-fixes).
- i2c: core: Allow empty id_table in ACPI case as well (git-fixes).
- i2c: core: decrease reference count of device node in i2c_unregister_device (git-fixes).
- i2c: dev: Fix the race between the release of i2c_dev and cdev (bsc#1051510).
- i2c: fix missing pm_runtime_put_sync in i2c_device_probe (git-fixes).
- i2c-hid: properly terminate i2c_hid_dmi_desc_override_table array (git-fixes).
- i2c: i801: Do not add ICH_RES_IO_SMI for the iTCO_wdt device (git-fixes).
- i2c: iproc: Stop advertising support of SMBUS quick cmd (git-fixes).
- i2c: isch: Remove unnecessary acpi.h include (git-fixes).
- i2c: mux: demux-pinctrl: Fix an error handling path in 'i2c_demux_pinctrl_probe()' (bsc#1051510).
- i2c: st: fix missing struct parameter description (bsc#1051510).
- IB/ipoib: Add child to parent list only if device initialized (bsc#1168503).
- IB/ipoib: Consolidate checking of the proposed child interface (bsc#1168503).
- IB/ipoib: Do not remove child devices from within the ndo_uninit (bsc#1168503).
- IB/ipoib: Get rid of IPOIB_FLAG_GOING_DOWN (bsc#1168503).
- IB/ipoib: Get rid of the sysfs_mutex (bsc#1168503).
- IB/ipoib: Maintain the child_intfs list from ndo_init/uninit (bsc#1168503).
- IB/ipoib: Move all uninit code into ndo_uninit (bsc#1168503).
- IB/ipoib: Move init code to ndo_init (bsc#1168503).
- IB/ipoib: Replace printk with pr_warn (bsc#1168503).
- IB/ipoib: Use cancel_delayed_work_sync for neigh-clean task (bsc#1168503).
- IB/ipoib: Warn when one port fails to initialize (bsc#1168503).
- ibmvnic: Skip fatal error reset after passive init (bsc#1171078 ltc#184239).
- iio:ad7797: Use correct attribute_group (bsc#1051510).
- iio: adc: stm32-adc: fix device used to request dma (bsc#1051510).
- iio: adc: stm32-adc: fix sleep in atomic context (git-fixes).
- iio: adc: stm32-adc: Use dma_request_chan() instead dma_request_slave_channel() (bsc#1051510).
- iio: dac: vf610: Fix an error handling path in 'vf610_dac_probe()' (bsc#1051510).
- iio: sca3000: Remove an erroneous 'get_device()' (bsc#1051510).
- iio: xilinx-xadc: Fix ADC-B powerdown (bsc#1051510).
- iio: xilinx-xadc: Fix clearing interrupt when enabling trigger (bsc#1051510).
- iio: xilinx-xadc: Fix sequencer configuration for aux channels in simultaneous mode (bsc#1051510).
- ima: Fix return value of ima_write_policy() (git-fixes).
- Input: evdev - call input_flush_device() on release(), not flush() (bsc#1051510).
- Input: hyperv-keyboard - add module description (bsc#1172253).
- Input: i8042 - add Acer Aspire 5738z to nomux list (bsc#1051510).
- Input: i8042 - add ThinkPad S230u to i8042 reset list (bsc#1051510).
- Input: raydium_i2c_ts - use true and false for boolean values (bsc#1051510).
- Input: synaptics-rmi4 - fix error return code in rmi_driver_probe() (bsc#1051510).
- Input: synaptics-rmi4 - really fix attn_data use-after-free (git-fixes).
- Input: usbtouchscreen - add support for BonXeon TP (bsc#1051510).
- Input: xpad - add custom init packet for Xbox One S controllers (bsc#1051510).
- iommu/amd: Call domain_flush_complete() in update_domain() (bsc#1172096).
- iommu/amd: Do not flush Device Table in iommu_map_page() (bsc#1172097).
- iommu/amd: Do not loop forever when trying to increase address space (bsc#1172098).
- iommu/amd: Fix legacy interrupt remapping for x2APIC-enabled system (bsc#1172099).
- iommu/amd: Fix over-read of ACPI UID from IVRS table (bsc#1172101).
- iommu/amd: Fix race in increase_address_space()/fetch_pte() (bsc#1172102).
- iommu/amd: Update Device Table in increase_address_space() (bsc#1172103).
- iommu: Fix reference count leak in iommu_group_alloc (bsc#1172397).
- ipmi: fix hung processes in __get_guid() (git-fixes).
- ipv4: fix a RCU-list lock in fib_triestat_seq_show (networking-stable-20_04_02).
- ipv6/addrconf: call ipv6_mc_up() for non-Ethernet interface (networking-stable-20_03_14).
- ipv6: do not auto-add link-local address to lag ports (networking-stable-20_04_09).
- ipv6: Fix nlmsg_flags when splitting a multipath route (networking-stable-20_03_01).
- ipv6: Fix route replacement with dev-only route (networking-stable-20_03_01).
- ipvlan: add cond_resched_rcu() while processing muticast backlog (networking-stable-20_03_14).
- ipvlan: do not deref eth hdr before checking it's set (networking-stable-20_03_14).
- ipvlan: do not use cond_resched_rcu() in ipvlan_process_multicast() (networking-stable-20_03_14).
- iwlwifi: pcie: actually release queue memory in TVQM (bsc#1051510).
- kabi fix for early XHCI debug (git-fixes).
- kabi for for md: improve handling of bio with REQ_PREFLUSH in md_flush_request() (git-fixes).
- kabi, protect struct ib_device (bsc#1168503).
- kabi/severities: Do not track KVM internal symbols.
- kabi/severities: Ingnore get_dev_data() The function is internal to the AMD IOMMU driver and must not be called by any third party.
- kabi workaround for snd_rawmidi buffer_ref field addition (git-fixes).
- KEYS: reaching the keys quotas correctly (bsc#1051510).
- KVM: arm64: Change hyp_panic()s dependency on tpidr_el2 (bsc#1133021).
- KVM: arm64: Stop save/restoring host tpidr_el1 on VHE (bsc#1133021).
- KVM: Check validity of resolved slot when searching memslots (bsc#1172104).
- KVM: s390: vsie: Fix delivery of addressing exceptions (git-fixes).
- KVM: s390: vsie: Fix possible race when shadowing region 3 tables (git-fixes).
- KVM: s390: vsie: Fix region 1 ASCE sanity shadow address checks (git-fixes).
- KVM: SVM: Fix potential memory leak in svm_cpu_init() (bsc#1171736).
- KVM x86: Extend AMD specific guest behavior to Hygon virtual CPUs (bsc#1152489).
- l2tp: Allow management of tunnels and session in user namespace (networking-stable-20_04_17).
- libata: Remove extra scsi_host_put() in ata_scsi_add_hosts() (bsc#1051510).
- libata: Return correct status in sata_pmp_eh_recover_pm() when ATA_DFLAG_DETACH is set (bsc#1051510).
- lib: raid6: fix awk build warnings (git fixes (block drivers)).
- lib/raid6/test: fix build on distros whose /bin/sh is not bash (git fixes (block drivers)).
- lib/stackdepot.c: fix global out-of-bounds in stack_slabs (git fixes (block drivers)).
- locks: print unsigned ino in /proc/locks (bsc#1171951).
- mac80211: add ieee80211_is_any_nullfunc() (bsc#1051510).
- mac80211_hwsim: Use kstrndup() in place of kasprintf() (bsc#1051510).
- mac80211: mesh: fix discovery timer re-arming issue / crash (bsc#1051510).
- macsec: avoid to set wrong mtu (bsc#1051510).
- macsec: restrict to ethernet devices (networking-stable-20_03_28).
- macvlan: add cond_resched() during multicast processing (networking-stable-20_03_14).
- macvlan: fix null dereference in macvlan_device_event() (bsc#1051510).
- md: improve handling of bio with REQ_PREFLUSH in md_flush_request() (git-fixes).
- md/raid0: Fix an error message in raid0_make_request() (git fixes (block drivers)).
- md/raid10: prevent access of uninitialized resync_pages offset (git-fixes).
- media: dvb: return -EREMOTEIO on i2c transfer failure (bsc#1051510).
- media: platform: fcp: Set appropriate DMA parameters (bsc#1051510).
- media: ti-vpe: cal: fix disable_irqs to only the intended target (git-fixes).
- mei: release me_cl object reference (bsc#1051510).
- mlxsw: Fix some IS_ERR() vs NULL bugs (networking-stable-20_04_27).
- mlxsw: spectrum_flower: Do not stop at FLOW_ACTION_VLAN_MANGLE (networking-stable-20_04_09).
- mmc: atmel-mci: Fix debugfs on 64-bit platforms (git-fixes).
- mmc: dw_mmc: Fix debugfs on 64-bit platforms (git-fixes).
- mmc: meson-gx: make sure the descriptor is stopped on errors (git-fixes).
- mmc: meson-gx: simplify interrupt handler (git-fixes).
- mmc: renesas_sdhi: limit block count to 16 bit for old revisions (git-fixes).
- mmc: sdhci-esdhc-imx: fix the mask for tuning start point (bsc#1051510).
- mmc: sdhci-msm: Clear tuning done flag while hs400 tuning (bsc#1051510).
- mmc: sdhci-of-at91: fix memleak on clk_get failure (git-fixes).
- mmc: sdhci-pci: Fix eMMC driver strength for BYT-based controllers (bsc#1051510).
- mmc: sdhci-xenon: fix annoying 1.8V regulator warning (bsc#1051510).
- mmc: sdio: Fix potential NULL pointer error in mmc_sdio_init_card() (bsc#1051510).
- mmc: tmio: fix access width of Block Count Register (git-fixes).
- mm: thp: handle page cache THP correctly in PageTransCompoundMap (git fixes (block drivers)).
- mtd: cfi: fix deadloop in cfi_cmdset_0002.c do_write_buffer (bsc#1051510).
- mtd: spi-nor: cadence-quadspi: add a delay in write sequence (git-fixes).
- mtd: spi-nor: enable 4B opcodes for mx66l51235l (git-fixes).
- mtd: spi-nor: fsl-quadspi: Do not let -EINVAL on the bus (git-fixes).
- mwifiex: avoid -Wstringop-overflow warning (bsc#1051510).
- mwifiex: Fix memory corruption in dump_station (bsc#1051510).
- net: bcmgenet: correct per TX/RX ring statistics (networking-stable-20_04_27).
- net: dsa: b53: Fix ARL register definitions (networking-stable-20_04_27).
- net: dsa: b53: Rework ARL bin logic (networking-stable-20_04_27).
- net: dsa: bcm_sf2: Do not register slave MDIO bus with OF (networking-stable-20_04_09).
- net: dsa: bcm_sf2: Ensure correct sub-node is parsed (networking-stable-20_04_09).
- net: dsa: bcm_sf2: Fix overflow checks (git-fixes).
- net: dsa: Fix duplicate frames flooded by learning (networking-stable-20_03_28).
- net: dsa: mv88e6xxx: fix lockup on warm boot (networking-stable-20_03_14).
- net: fec: validate the new settings in fec_enet_set_coalesce() (networking-stable-20_03_14).
- net: fib_rules: Correctly set table field when table number exceeds 8 bits (networking-stable-20_03_01).
- net: fix race condition in __inet_lookup_established() (bsc#1151794).
- net: fq: add missing attribute validation for orphan mask (networking-stable-20_03_14).
- net, ip_tunnel: fix interface lookup with no key (networking-stable-20_04_02).
- net: ipv4: devinet: Fix crash when add/del multicast IP with autojoin (networking-stable-20_04_17).
- net: ipv6: do not consider routes via gateways for anycast address check (networking-stable-20_04_17).
- netlink: Use netlink header as base to calculate bad attribute offset (networking-stable-20_03_14).
- net: macsec: update SCI upon MAC address change (networking-stable-20_03_14).
- net: memcg: fix lockdep splat in inet_csk_accept() (networking-stable-20_03_14).
- net: memcg: late association of sock to memcg (networking-stable-20_03_14).
- net/mlx4_en: avoid indirect call in TX completion (networking-stable-20_04_27).
- net/mlx5: Add new fields to Port Type and Speed register (bsc#1171118).
- net/mlx5: Add RoCE RX ICRC encapsulated counter (bsc#1171118).
- net/mlx5e: Fix ethtool self test: link speed (bsc#1171118).
- net/mlx5e: Move port speed code from en_ethtool.c to en/port.c (bsc#1171118).
- net/mlx5: Expose link speed directly (bsc#1171118).
- net/mlx5: Expose port speed when possible (bsc#1171118).
- net: mvneta: Fix the case where the last poll did not process all rx (networking-stable-20_03_28).
- net: netrom: Fix potential nr_neigh refcnt leak in nr_add_node (networking-stable-20_04_27).
- net/packet: tpacket_rcv: do not increment ring index on drop (networking-stable-20_03_14).
- net: phy: restore mdio regs in the iproc mdio driver (networking-stable-20_03_01).
- net: qmi_wwan: add support for ASKEY WWHC050 (networking-stable-20_03_28).
- net: revert default NAPI poll timeout to 2 jiffies (networking-stable-20_04_17).
- net_sched: cls_route: remove the right filter from hashtable (networking-stable-20_03_28).
- net/x25: Fix x25_neigh refcnt leak when receiving frame (networking-stable-20_04_27).
- nfc: add missing attribute validation for SE API (networking-stable-20_03_14).
- nfc: add missing attribute validation for vendor subcommand (networking-stable-20_03_14).
- nfc: pn544: Fix occasional HW initialization failure (networking-stable-20_03_01).
- NFC: st21nfca: add missed kfree_skb() in an error path (bsc#1051510).
- nfsd4: fix up replay_matches_cache() (git-fixes).
- nfsd: Ensure CLONE persists data and metadata changes to the target file (git-fixes).
- nfsd: fix delay timer on 32-bit architectures (git-fixes).
- nfsd: fix jiffies/time_t mixup in LRU list (git-fixes).
- NFS: Directory page cache pages need to be locked when read (git-fixes).
- nfsd: memory corruption in nfsd4_lock() (git-fixes).
- NFS: Do not call generic_error_remove_page() while holding locks (bsc#1170457).
- NFS: Fix memory leaks and corruption in readdir (git-fixes).
- NFS: Fix O_DIRECT accounting of number of bytes read/written (git-fixes).
- NFS: Fix potential posix_acl refcnt leak in nfs3_set_acl (git-fixes).
- NFS: fix racey wait in nfs_set_open_stateid_locked (bsc#1170592).
- NFS/flexfiles: Use the correct TCP timeout for flexfiles I/O (git-fixes).
- NFS/pnfs: Fix pnfs_generic_prepare_to_resend_writes() (git-fixes).
- NFS: Revalidate the file size on a fatal write error (git-fixes).
- NFSv4.0: nfs4_do_fsinfo() should not do implicit lease renewals (git-fixes).
- NFSv4: Do not allow a cached open with a revoked delegation (git-fixes).
- NFSv4: Fix leak of clp->cl_acceptor string (git-fixes).
- NFSv4/pnfs: Return valid stateids in nfs_layout_find_inode_by_stateid() (git-fixes).
- NFSv4: try lease recovery on NFS4ERR_EXPIRED (git-fixes).
- NFSv4.x: Drop the slot if nfs4_delegreturn_prepare waits for layoutreturn (git-fixes).
- nl802154: add missing attribute validation for dev_type (networking-stable-20_03_14).
- nl802154: add missing attribute validation (networking-stable-20_03_14).
- nvme-fc: print proper nvme-fc devloss_tmo value (bsc#1172391).
- objtool: Fix stack offset tracking for indirect CFAs (bsc#1169514).
- objtool: Fix switch table detection in .text.unlikely (bsc#1169514).
- objtool: Make BP scratch register warning more robust (bsc#1169514).
- padata: Remove broken queue flushing (git-fixes).
- Partially revert 'kfifo: fix kfifo_alloc() and kfifo_init()' (git fixes (block drivers)).
- pinctrl: baytrail: Enable pin configuration setting for GPIO chip (git-fixes).
- pinctrl: cherryview: Add missing spinlock usage in chv_gpio_irq_handler (git-fixes).
- platform/x86: asus-nb-wmi: Do not load on Asus T100TA and T200TA (bsc#1051510).
- pNFS: Ensure we do clear the return-on-close layout stateid on fatal errors (git-fixes).
- powerpc: Add attributes for setjmp/longjmp (bsc#1065729).
- powerpc/pci/of: Parse unassigned resources (bsc#1065729).
- powerpc/setup_64: Set cache-line-size based on cache-block-size (bsc#1065729).
- powerpc/sstep: Fix DS operand in ld encoding to appropriate value (bsc#1065729).
- qede: Fix race between rdma destroy workqueue and link change event (networking-stable-20_03_01).
- r8152: check disconnect status after long sleep (networking-stable-20_03_14).
- raid6/ppc: Fix build for clang (git fixes (block drivers)).
- rcu: locking and unlocking need to always be at least barriers (git fixes (block drivers)).
- RDMA/ipoib: Fix use of sizeof() (bsc#1168503).
- RDMA/netdev: Fix netlink support in IPoIB (bsc#1168503).
- RDMA/netdev: Hoist alloc_netdev_mqs out of the driver (bsc#1168503).
- RDMA/netdev: Use priv_destructor for netdev cleanup (bsc#1168503).
- Remove 2 git-fixes that cause build issues. (bsc#1171691)
- Revert 'ALSA: hda/realtek: Fix pop noise on ALC225' (git-fixes).
- Revert 'drm/panel: simple: Add support for Sharp LQ150X1LG11 panels' (bsc#1114279) * offset changes
- Revert 'HID: i2c-hid: add Trekstor Primebook C11B to descriptor override' Depends on 9b5c747685982d22efffeafc5ec601bd28f6d78b, which was also reverted.
- Revert 'HID: i2c-hid: override HID descriptors for certain devices' This broke i2c-hid.ko's build, there is no way around it without a big file rename or renaming the kernel module.
- Revert 'i2c-hid: properly terminate i2c_hid_dmi_desc_override_table' Fixed 9b5c747685982d22efffeafc5ec601bd28f6d78b, which was also reverted.
- Revert 'ipc,sem: remove uneeded sem_undo_list lock usage in exit_sem()' (bsc#1172221).
- rtlwifi: Fix a double free in _rtl_usb_tx_urb_setup() (bsc#1051510).
- s390/cio: avoid duplicated 'ADD' uevents (git-fixes).
- s390/cio: generate delayed uevent for vfio-ccw subchannels (git-fixes).
- s390/cpuinfo: fix wrong output when CPU0 is offline (git-fixes).
- s390/diag: fix display of diagnose call statistics (git-fixes).
- s390/ftrace: fix potential crashes when switching tracers (git-fixes).
- s390/gmap: return proper error code on ksm unsharing (git-fixes).
- s390/ism: fix error return code in ism_probe() (git-fixes).
- s390/pci: Fix possible deadlock in recover_store() (bsc#1165183 LTC#184103).
- s390/pci: Recover handle in clp_set_pci_fn() (bsc#1165183 LTC#184103).
- s390/qeth: cancel RX reclaim work earlier (git-fixes).
- s390/qeth: do not return -ENOTSUPP to userspace (git-fixes).
- s390/qeth: do not warn for napi with 0 budget (git-fixes).
- s390/qeth: fix off-by-one in RX copybreak check (git-fixes).
- s390/qeth: fix promiscuous mode after reset (git-fixes).
- s390/qeth: fix qdio teardown after early init error (git-fixes).
- s390/qeth: handle error due to unsupported transport mode (git-fixes).
- s390/qeth: handle error when backing RX buffer (git-fixes).
- s390/qeth: lock the card while changing its hsuid (git-fixes).
- s390/qeth: support net namespaces for L3 devices (git-fixes).
- s390/time: Fix clk type in get_tod_clock (git-fixes).
- scripts/decodecode: fix trapping instruction formatting (bsc#1065729).
- scripts/dtc: Remove redundant YYLOC global declaration (bsc#1160388).
- scsi: bnx2i: fix potential use after free (bsc#1171600).
- scsi: core: Handle drivers which set sg_tablesize to zero (bsc#1171601) This commit also required: > scsi: core: avoid preallocating big SGL for data
- scsi: core: save/restore command resid for error handling (bsc#1171602).
- scsi: core: scsi_trace: Use get_unaligned_be*() (bsc#1171604).
- scsi: core: try to get module before removing device (bsc#1171605).
- scsi: csiostor: Adjust indentation in csio_device_reset (bsc#1171606).
- scsi: csiostor: Do not enable IRQs too early (bsc#1171607).
- scsi: esas2r: unlock on error in esas2r_nvram_read_direct() (bsc#1171608).
- scsi: fnic: fix invalid stack access (bsc#1171609).
- scsi: fnic: fix msix interrupt allocation (bsc#1171610).
- scsi: ibmvscsi: Fix WARN_ON during event pool release (bsc#1170791 ltc#185128).
- scsi: iscsi: Avoid potential deadlock in iscsi_if_rx func (bsc#1171611).
- scsi: iscsi: Fix a potential deadlock in the timeout handler (bsc#1171612).
- scsi: iscsi: qla4xxx: fix double free in probe (bsc#1171613).
- scsi: lpfc: fix: Coverity: lpfc_cmpl_els_rsp(): Null pointer dereferences (bsc#1171614).
- scsi: lpfc: Fix crash in target side cable pulls hitting WAIT_FOR_UNREG (bsc#1171615).
- scsi: megaraid_sas: Do not initiate OCR if controller is not in ready state (bsc#1171616).
- scsi: qla2xxx: add ring buffer for tracing debug logs (bsc#1157169).
- scsi: qla2xxx: check UNLOADING before posting async work (bsc#1157169).
- scsi: qla2xxx: Delete all sessions before unregister local nvme port (bsc#1157169).
- scsi: qla2xxx: Do not log message when reading port speed via sysfs (bsc#1157169).
- scsi: qla2xxx: Fix hang when issuing nvme disconnect-all in NPIV (bsc#1157169).
- scsi: qla2xxx: Fix regression warnings (bsc#1157169).
- scsi: qla2xxx: Remove non functional code (bsc#1157169).
- scsi: qla2xxx: set UNLOADING before waiting for session deletion (bsc#1157169).
- scsi: qla4xxx: Adjust indentation in qla4xxx_mem_free (bsc#1171617).
- scsi: qla4xxx: fix double free bug (bsc#1171618).
- scsi: sd: Clear sdkp->protection_type if disk is reformatted without PI (bsc#1171619).
- scsi: sg: add sg_remove_request in sg_common_write (bsc#1171620).
- scsi: tracing: Fix handling of TRANSFER LENGTH == 0 for READ(6) and WRITE(6) (bsc#1171621).
- scsi: ufs: change msleep to usleep_range (bsc#1171622).
- scsi: ufs: Clean up ufshcd_scale_clks() and clock scaling error out path (bsc#1171623).
- scsi: ufs: Fix ufshcd_hold() caused scheduling while atomic (bsc#1171624).
- scsi: ufs: Fix ufshcd_probe_hba() reture value in case ufshcd_scsi_add_wlus() fails (bsc#1171625).
- scsi: ufs: Recheck bkops level if bkops is disabled (bsc#1171626).
- scsi: zfcp: fix missing erp_lock in port recovery trigger for point-to-point (git-fixes).
- sctp: fix possibly using a bad saddr with a given dst (networking-stable-20_04_02).
- sctp: fix refcount bug in sctp_wfree (networking-stable-20_04_02).
- sctp: move the format error check out of __sctp_sf_do_9_1_abort (networking-stable-20_03_01).
- seq_file: fix problem when seeking mid-record (bsc#1170125).
- serial: uartps: Move the spinlock after the read of the tx empty (git-fixes).
- sfc: detach from cb_page in efx_copy_channel() (networking-stable-20_03_14).
- signal/pid_namespace: Fix reboot_pid_ns to use send_sig not force_sig (bsc#1172185).
- slcan: not call free_netdev before rtnl_unlock in slcan_open (networking-stable-20_03_28).
- slip: make slhc_compress() more robust against malicious packets (networking-stable-20_03_14).
- smb3: Additional compression structures (bsc#1144333).
- smb3: Add new compression flags (bsc#1144333).
- smb3: change noisy error message to FYI (bsc#1144333).
- smb3: enable swap on SMB3 mounts (bsc#1144333).
- smb3: Minor cleanup of protocol definitions (bsc#1144333).
- smb3: remove overly noisy debug line in signing errors (bsc#1144333).
- smb3: smbdirect support can be configured by default (bsc#1144333).
- smb3: use SMB2_SIGNATURE_SIZE define (bsc#1144333).
- spi: bcm2835: Fix 3-wire mode if DMA is enabled (git-fixes).
- spi: bcm63xx-hsspi: Really keep pll clk enabled (bsc#1051510).
- spi: bcm-qspi: when tx/rx buffer is NULL set to 0 (bsc#1051510).
- spi: dw: Add SPI Rx-done wait method to DMA-based transfer (bsc#1051510).
- spi: dw: Add SPI Tx-done wait method to DMA-based transfer (bsc#1051510).
- spi: dw: Zero DMA Tx and Rx configurations on stack (bsc#1051510).
- spi: fsl: do not map irq during probe (git-fixes).
- spi: fsl: use platform_get_irq() instead of of_irq_to_resource() (git-fixes).
- spi: pxa2xx: Add CS control clock quirk (bsc#1051510).
- spi: qup: call spi_qup_pm_resume_runtime before suspending (bsc#1051510).
- spi: spi-fsl-dspi: Replace interruptible wait queue with a simple completion (git-fixes).
- spi: spi-s3c64xx: Fix system resume support (git-fixes).
- spi/zynqmp: remove entry that causes a cs glitch (bsc#1051510).
- staging: comedi: dt2815: fix writing hi byte of analog output (bsc#1051510).
- staging: comedi: Fix comedi_device refcnt leak in comedi_open (bsc#1051510).
- staging: iio: ad2s1210: Fix SPI reading (bsc#1051510).
- staging: vt6656: Do not set RCR_MULTICAST or RCR_BROADCAST by default (git-fixes).
- staging: vt6656: Fix drivers TBTT timing counter (git-fixes).
- staging: vt6656: Fix pairwise key entry save (git-fixes).
- sunrpc: expiry_time should be seconds not timeval (git-fixes).
- SUNRPC: Fix a potential buffer overflow in 'svc_print_xprts()' (git-fixes).
- supported.conf: Add br_netfilter to base (bsc#1169020).
- svcrdma: Fix leak of transport addresses (git-fixes).
- taskstats: fix data-race (bsc#1172188).
- tcp: cache line align MAX_TCP_HEADER (networking-stable-20_04_27).
- tcp: repair: fix TCP_QUEUE_SEQ implementation (networking-stable-20_03_28).
- team: add missing attribute validation for array index (networking-stable-20_03_14).
- team: add missing attribute validation for port ifindex (networking-stable-20_03_14).
- team: fix hang in team_mode_get() (networking-stable-20_04_27).
- tools lib traceevent: Remove unneeded qsort and uses memmove instead (git-fixes).
- tpm: ibmvtpm: retry on H_CLOSED in tpm_ibmvtpm_send() (bsc#1065729).
- tpm/tpm_tis: Free IRQ if probing fails (bsc#1082555).
- tpm/tpm_tis: Free IRQ if probing fails (git-fixes).
- tracing: Add a vmalloc_sync_mappings() for safe measure (git-fixes).
- tracing: Disable trace_printk() on post poned tests (git-fixes).
- tracing: Fix the race between registering 'snapshot' event trigger and triggering 'snapshot' operation (git-fixes).
- tty: rocket, avoid OOB access (git-fixes).
- UAS: fix deadlock in error handling and PM flushing work (git-fixes).
- UAS: no use logging any details in case of ENODEV (git-fixes).
- USB: Add USB_QUIRK_DELAY_CTRL_MSG and USB_QUIRK_DELAY_INIT for Corsair K70 RGB RAPIDFIRE (git-fixes).
- USB: cdc-acm: restore capability check order (git-fixes).
- USB: core: Fix misleading driver bug report (bsc#1051510).
- USB: dwc3: do not set gadget->is_otg flag (git-fixes).
- USB: dwc3: gadget: Do link recovery for SS and SSP (git-fixes).
- USB: early: Handle AMD's spec-compliant identifiers, too (git-fixes).
- USB: f_fs: Clear OS Extended descriptor counts to zero in ffs_data_reset() (git-fixes).
- USB: gadget: audio: Fix a missing error return value in audio_bind() (git-fixes).
- USB: gadget: composite: Inform controller driver of self-powered (git-fixes).
- USB: gadget: legacy: fix error return code in cdc_bind() (git-fixes).
- USB: gadget: legacy: fix error return code in gncm_bind() (git-fixes).
- USB: gadget: legacy: fix redundant initialization warnings (bsc#1051510).
- USB: gadget: net2272: Fix a memory leak in an error handling path in 'net2272_plat_probe()' (git-fixes).
- USB: gadget: udc: atmel: Fix vbus disconnect handling (git-fixes).
- USB: gadget: udc: atmel: Make some symbols static (git-fixes).
- USB: gadget: udc: bdc: Remove unnecessary NULL checks in bdc_req_complete (git-fixes).
- USB: host: xhci-plat: keep runtime active when removing host (git-fixes).
- USB: hub: Fix handling of connect changes during sleep (git-fixes).
- usbnet: silence an unnecessary warning (bsc#1170770).
- USB: serial: garmin_gps: add sanity checking for data length (git-fixes).
- USB: serial: option: add BroadMobi BM806U (git-fixes).
- USB: serial: option: add support for ASKEY WWHC050 (git-fixes).
- USB: serial: option: add Wistron Neweb D19Q1 (git-fixes).
- USB: serial: qcserial: Add DW5816e support (git-fixes).
- USB: sisusbvga: Change port variable from signed to unsigned (git-fixes).
- usb-storage: Add unusual_devs entry for JMicron JMS566 (git-fixes).
- USB: uas: add quirk for LaCie 2Big Quadra (git-fixes).
- USB: xhci: Fix NULL pointer dereference when enqueuing trbs from urb sg list (git-fixes).
- video: fbdev: sis: Remove unnecessary parentheses and commented code (bsc#1114279)
- video: fbdev: w100fb: Fix a potential double free (bsc#1051510).
- vrf: Check skb for XFRM_TRANSFORMED flag (networking-stable-20_04_27).
- vt: ioctl, switch VT_IS_IN_USE and VT_BUSY to inlines (git-fixes).
- vt: selection, introduce vc_is_sel (git-fixes).
- vt: vt_ioctl: fix race in VT_RESIZEX (git-fixes).
- vt: vt_ioctl: fix use-after-free in vt_in_use() (git-fixes).
- vt: vt_ioctl: fix VT_DISALLOCATE freeing in-use virtual console (git-fixes).
- vxlan: check return value of gro_cells_init() (networking-stable-20_03_28).
- watchdog: reset last_hw_keepalive time at start (git-fixes).
- wcn36xx: Fix error handling path in 'wcn36xx_probe()' (bsc#1051510).
- wil6210: remove reset file from debugfs (git-fixes).
- wimax/i2400m: Fix potential urb refcnt leak (bsc#1051510).
- workqueue: do not use wq_select_unbound_cpu() for bound works (bsc#1172130).
- x86/entry/64: Fix unwind hints in kernel exit path (bsc#1058115).
- x86/entry/64: Fix unwind hints in register clearing code (bsc#1058115).
- x86/entry/64: Fix unwind hints in rewind_stack_do_exit() (bsc#1058115).
- x86/entry/64: Fix unwind hints in __switch_to_asm() (bsc#1058115).
- x86/Hyper-V: Allow guests to enable InvariantTSC (bsc#1170620).
- x86/Hyper-V: Free hv_panic_page when fail to register kmsg dump (bsc#1170618).
- x86/Hyper-V: Report crash data in die() when panic_on_oops is set (bsc#1170618).
- x86/Hyper-V: Report crash register data or kmsg before running crash kernel (bsc#1170618).
- x86/Hyper-V: Report crash register data when sysctl_record_panic_msg is not set (bsc#1170618).
- x86:Hyper-V: report value of misc_features (git-fixes).
- x86/Hyper-V: Trigger crash enlightenment only once during system crash (bsc#1170618).
- x86/Hyper-V: Unload vmbus channel in hv panic callback (bsc#1170618).
- x86/kprobes: Avoid kretprobe recursion bug (bsc#1114279).
- x86/resctrl: Fix invalid attempt at removing the default resource group (git-fixes).
- x86/resctrl: Preserve CDP enable over CPU hotplug (bsc#1114279).
- x86/unwind/orc: Do not skip the first frame for inactive tasks (bsc#1058115).
- x86/unwind/orc: Fix error handling in __unwind_start() (bsc#1058115).
- x86/unwind/orc: Fix error path for bad ORC entry type (bsc#1058115).
- x86/unwind/orc: Fix unwind_get_return_address_ptr() for inactive tasks (bsc#1058115).
- x86/unwind/orc: Prevent unwinding before ORC initialization (bsc#1058115).
- x86/unwind: Prevent false warnings for non-current tasks (bsc#1058115).
- x86/xen: fix booting 32-bit pv guest (bsc#1071995).
- x86/xen: Make the boot CPU idle task reliable (bsc#1071995).
- x86/xen: Make the secondary CPU idle tasks reliable (bsc#1071995).
- xen/pci: reserve MCFG areas earlier (bsc#1170145).
- xfrm: Always set XFRM_TRANSFORMED in xfrm{4,6}_output_finish (networking-stable-20_04_27).
- xfs: Correctly invert xfs_buftarg LRU isolation logic (git-fixes).
- xfs: do not ever return a stale pointer from __xfs_dir3_free_read (git-fixes).
- xprtrdma: Fix completion wait during device removal (git-fixes).
Patchnames
SUSE-2020-1605,SUSE-SLE-HA-12-SP4-2020-1605,SUSE-SLE-Live-Patching-12-SP4-2020-1605,SUSE-SLE-SDK-12-SP4-2020-1605,SUSE-SLE-SERVER-12-SP4-2020-1605,SUSE-SLE-WE-12-SP4-2020-1605
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "The SUSE Linux Enterprise 12 SP4 kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2020-0543: Fixed a side channel attack against special registers which could have resulted in leaking of read values to cores other than the one which called it.\n This attack is known as Special Register Buffer Data Sampling (SRBDS) or \u0027CrossTalk\u0027 (bsc#1154824).\n- CVE-2020-13143: Fixed an out-of-bounds read in gadget_dev_desc_UDC_store in drivers/usb/gadget/configfs.c (bsc#1171982).\n- CVE-2020-12769: Fixed an issue which could have allowed attackers to cause a panic via concurrent calls to dw_spi_irq and dw_spi_transfer_one (bsc#1171983).\n- CVE-2020-12768: Fixed a memory leak in svm_cpu_uninit in arch/x86/kvm/svm.c (bsc#1171736).\n- CVE-2020-12657: An a use-after-free in block/bfq-iosched.c (bsc#1171205).\n- CVE-2020-12656: Fixed an improper handling of certain domain_release calls leadingch could have led to a memory leak (bsc#1171219).\n- CVE-2020-12655: Fixed an issue which could have allowed attackers to trigger a sync of excessive duration via an XFS v5 image with crafted metadata (bsc#1171217).\n- CVE-2020-12654: Fixed an issue in he wifi driver which could have allowed a remote AP to trigger a heap-based buffer overflow (bsc#1171202).\n- CVE-2020-12653: Fixed an issue in the wifi driver which could have allowed local users to gain privileges or cause a denial of service (bsc#1171195).\n- CVE-2020-12652: Fixed an issue which could have allowed local users to hold an incorrect lock during the ioctl operation and trigger a race condition (bsc#1171218).\n- CVE-2020-12464: Fixed a use-after-free due to a transfer without a reference (bsc#1170901).\n- CVE-2020-12114: Fixed a pivot_root race condition which could have allowed local users to cause a denial of service (panic) by corrupting a mountpoint reference counter (bsc#1171098).\n- CVE-2020-10757: Fixed an issue where remaping hugepage DAX to anon mmap could have caused user PTE access (bsc#1172317).\n- CVE-2020-10751: Fixed an improper implementation in SELinux LSM hook where it was assumed that an skb would only contain a single netlink message (bsc#1171189).\n- CVE-2020-10732: Fixed kernel data leak in userspace coredumps due to uninitialized data (bsc#1171220).\n- CVE-2020-10720: Fixed a use-after-free read in napi_gro_frags() (bsc#1170778).\n- CVE-2020-10711: Fixed a null pointer dereference in SELinux subsystem which could have allowed a remote network user to crash the kernel resulting in a denial of service (bsc#1171191).\n- CVE-2020-10690: Fixed the race between the release of ptp_clock and cdev (bsc#1170056).\n- CVE-2019-9455: Fixed a pointer leak due to a WARN_ON statement in a video driver. This could lead to local information disclosure with System execution privileges needed (bsc#1170345).\n- CVE-2019-20812: Fixed an issue in prb_calc_retire_blk_tmo() which could have resulted in a denial of service (bsc#1172453).\n- CVE-2019-20806: Fixed a null pointer dereference which may had lead to denial of service (bsc#1172199).\n- CVE-2019-19462: Fixed an issue which could have allowed local user to cause denial of service (bsc#1158265).\n- CVE-2018-1000199: Fixed a potential local code execution via ptrace (bsc#1089895).\n\nThe following non-security bugs were fixed:\n\n- ACPI: CPPC: Fix reference count leak in acpi_cppc_processor_probe() (bsc#1051510).\n- ACPI: sysfs: Fix reference count leak in acpi_sysfs_add_hotplug_profile() (bsc#1051510).\n- acpi/x86: ignore unspecified bit positions in the ACPI global lock field (bsc#1051510).\n- Add commit for git-fix that\u0027s not a fix This commit cleans up debug code but does not fix anything, and it relies on a new kernel function that isn\u0027t yet in this version of SLE.\n- agp/intel: Reinforce the barrier after GTT updates (bsc#1051510).\n- ALSA: ctxfi: Remove unnecessary cast in kfree (bsc#1051510).\n- ALSA: dummy: Fix PCM format loop in proc output (bsc#1111666).\n- ALSA: hda: Do not release card at firmware loading error (bsc#1051510).\n- ALSA: hda/hdmi: fix race in monitor detection during probe (bsc#1051510).\n- ALSA: hda/hdmi: fix without unlocked before return (bsc#1051510).\n- ALSA: hda: Keep the controller initialization even if no codecs found (bsc#1051510).\n- ALSA: hda/realtek - Add more fixup entries for Clevo machines (git-fixes).\n- ALSA: hda/realtek - Add new codec supported for ALC245 (bsc#1051510).\n- ALSA: hda/realtek - Add new codec supported for ALC287 (git-fixes).\n- ALSA: hda/realtek - Fix S3 pop noise on Dell Wyse (git-fixes).\n- ALSA: hda/realtek - Fix unexpected init_amp override (bsc#1051510).\n- ALSA: hda/realtek - Limit int mic boost for Thinkpad T530 (git-fixes bsc#1171293).\n- ALSA: hda/realtek - Two front mics on a Lenovo ThinkCenter (bsc#1051510).\n- ALSA: hwdep: fix a left shifting 1 by 31 UB bug (git-fixes).\n- ALSA: iec1712: Initialize STDSP24 properly when using the model=staudio option (git-fixes).\n- ALSA: opti9xx: shut up gcc-10 range warning (bsc#1051510).\n- ALSA: pcm: fix incorrect hw_base increase (git-fixes).\n- ALSA: pcm: oss: Place the plugin buffer overflow checks correctly (bsc#1170522).\n- ALSA-pcm-oss-Place-the-plugin-buffer-overflow-checks.patch\n- ALSA: rawmidi: Fix racy buffer resize under concurrent accesses (git-fixes).\n- ALSA: usb-audio: Add control message quirk delay for Kingston HyperX headset (git-fixes).\n- ALSA: usb-audio: Correct a typo of NuPrime DAC-10 USB ID (bsc#1051510).\n- ALSA: usb-audio: Do not override ignore_ctl_error value from the map (bsc#1051510).\n- ALSA: usb-audio: Fix usb audio refcnt leak when getting spdif (bsc#1051510).\n- ALSA: usb-audio: mixer: volume quirk for ESS Technology Asus USB DAC (git-fixes).\n- ALSA: usx2y: Fix potential NULL dereference (bsc#1051510).\n- ASoC: codecs: hdac_hdmi: Fix incorrect use of list_for_each_entry (bsc#1051510).\n- ASoC: dapm: connect virtual mux with default value (bsc#1051510).\n- ASoC: dapm: fixup dapm kcontrol widget (bsc#1051510).\n- ASoC: dpcm: allow start or stop during pause for backend (bsc#1051510).\n- ASoC: fix regwmask (bsc#1051510).\n- ASoC: msm8916-wcd-digital: Reset RX interpolation path after use (bsc#1051510).\n- ASoC: samsung: Prevent clk_get_rate() calls in atomic context (bsc#1111666).\n- ASoC: topology: Check return value of pcm_new_ver (bsc#1051510).\n- ASoC: topology: use name_prefix for new kcontrol (bsc#1051510).\n- b43legacy: Fix case where channel status is corrupted (bsc#1051510).\n- batman-adv: fix batadv_nc_random_weight_tq (git-fixes).\n- batman-adv: Fix refcnt leak in batadv_show_throughput_override (git-fixes).\n- batman-adv: Fix refcnt leak in batadv_store_throughput_override (git-fixes).\n- batman-adv: Fix refcnt leak in batadv_v_ogm_process (git-fixes).\n- bcache: avoid unnecessary btree nodes flushing in btree_flush_write() (git fixes (block drivers)).\n- bcache: fix incorrect data type usage in btree_flush_write() (git fixes (block drivers)).\n- bcache: Revert \u0027bcache: shrink btree node cache after bch_btree_check()\u0027 (git fixes (block drivers)).\n- block/drbd: delete invalid function drbd_md_mark_dirty_ (bsc#1171527).\n- block: drbd: remove a stray unlock in __drbd_send_protocol() (bsc#1171599).\n- block: fix busy device checking in blk_drop_partitions again (bsc#1171948).\n- block: fix busy device checking in blk_drop_partitions (bsc#1171948).\n- block: fix memleak of bio integrity data (git fixes (block drivers)).\n- block: remove the bd_openers checks in blk_drop_partitions (bsc#1171948).\n- bnxt_en: fix memory leaks in bnxt_dcbnl_ieee_getets() (networking-stable-20_03_28).\n- bnxt_en: reinitialize IRQs when MTU is modified (networking-stable-20_03_14).\n- bonding/alb: make sure arp header is pulled before accessing it (networking-stable-20_03_14).\n- brcmfmac: abort and release host after error (bsc#1051510).\n- Btrfs: fix deadlock with memory reclaim during scrub (bsc#1172127).\n- btrfs: fix log context list corruption after rename whiteout error (bsc#1172342).\n- btrfs: fix partial loss of prealloc extent past i_size after fsync (bsc#1172343).\n- btrfs: move the dio_sem higher up the callchain (bsc#1171761).\n- btrfs: reloc: clear DEAD_RELOC_TREE bit for orphan roots to prevent runaway balance (bsc#1171417 bsc#1160947 bsc#1172366).\n- btrfs: reloc: fix reloc root leak and NULL pointer dereference (bsc#1171417 bsc#1160947 bsc#1172366).\n- btrfs: setup a nofs context for memory allocation at btrfs_create_tree() (bsc#1172127).\n- btrfs: setup a nofs context for memory allocation at __btrfs_set_acl (bsc#1172127).\n- btrfs: use nofs context when initializing security xattrs to avoid deadlock (bsc#1172127).\n- can: add missing attribute validation for termination (networking-stable-20_03_14).\n- cdc-acm: close race betrween suspend() and acm_softint (git-fixes).\n- cdc-acm: introduce a cool down (git-fixes).\n- ceph: fix double unlock in handle_cap_export() (bsc#1171694).\n- ceph: fix endianness bug when handling MDS session feature bits (bsc#1171695).\n- cgroup, netclassid: periodically release file_lock on classid updating (networking-stable-20_03_14).\n- CIFS: Allocate crypto structures on the fly for calculating signatures of incoming packets (bsc#1144333).\n- CIFS: Allocate encryption header through kmalloc (bsc#1144333).\n- CIFS: allow unlock flock and OFD lock across fork (bsc#1144333).\n- CIFS: check new file size when extending file by fallocate (bsc#1144333).\n- CIFS: cifspdu.h: Replace zero-length array with flexible-array member (bsc#1144333).\n- CIFS: clear PF_MEMALLOC before exiting demultiplex thread (bsc#1144333).\n- CIFS: do not share tcons with DFS (bsc#1144333).\n- CIFS: dump the session id and keys also for SMB2 sessions (bsc#1144333).\n- CIFS: ensure correct super block for DFS reconnect (bsc#1144333).\n- CIFS: Fix bug which the return value by asynchronous read is error (bsc#1144333).\n- CIFS: fix uninitialised lease_key in open_shroot() (bsc#1144333).\n- CIFS: improve read performance for page size 64KB \u0026 cache=strict \u0026 vers=2.1+ (bsc#1144333).\n- CIFS: Increment num_remote_opens stats counter even in case of smb2_query_dir_first (bsc#1144333).\n- CIFS: minor update to comments around the cifs_tcp_ses_lock mutex (bsc#1144333).\n- CIFS: protect updating server-\u003edstaddr with a spinlock (bsc#1144333).\n- CIFS: smb2pdu.h: Replace zero-length array with flexible-array member (bsc#1144333).\n- CIFS: smbd: Calculate the correct maximum packet size for segmented SMBDirect send/receive (bsc#1144333).\n- CIFS: smbd: Check and extend sender credits in interrupt context (bsc#1144333).\n- CIFS: smbd: Check send queue size before posting a send (bsc#1144333).\n- CIFS: smbd: Do not schedule work to send immediate packet on every receive (bsc#1144333).\n- CIFS: smbd: Merge code to track pending packets (bsc#1144333).\n- CIFS: smbd: Properly process errors on ib_post_send (bsc#1144333).\n- CIFS: smbd: Update receive credits before sending and deal with credits roll back on failure before sending (bsc#1144333).\n- CIFS: Warn less noisily on default mount (bsc#1144333).\n- clk: Add clk_hw_unregister_composite helper function definition (bsc#1051510).\n- clk: imx6ull: use OSC clock during AXI rate change (bsc#1051510).\n- clk: imx: make mux parent strings const (bsc#1051510).\n- clk: mediatek: correct the clocks for MT2701 HDMI PHY module (bsc#1051510).\n- clk: sunxi-ng: a64: Fix gate bit of DSI DPHY (bsc#1051510).\n- clocksource/drivers/hyper-v: Set TSC clocksource as default w/ InvariantTSC (bsc#1170620).\n- clocksource: dw_apb_timer_of: Fix missing clockevent timers (bsc#1051510).\n- component: Silence bind error on -EPROBE_DEFER (bsc#1051510).\n- coresight: do not use the BIT() macro in the UAPI header (git fixes (block drivers)).\n- cpufreq: s3c64xx: Remove pointless NULL check in s3c64xx_cpufreq_driver_init (bsc#1051510).\n- crypto: ccp - AES CFB mode is a stream cipher (git-fixes).\n- crypto: ccp - Clean up and exit correctly on allocation failure (git-fixes).\n- crypto: ccp - Cleanup misc_dev on sev_exit() (bsc#1114279).\n- crypto: ccp - Cleanup sp_dev_master in psp_dev_destroy() (bsc#1114279).\n- debugfs: Add debugfs_create_xul() for hexadecimal unsigned long (git-fixes).\n- dmaengine: dmatest: Fix iteration non-stop logic (bsc#1051510).\n- dm mpath: switch paths in dm_blk_ioctl() code path (bsc#1167574).\n- dm writecache: fix data corruption when reloading the target (git fixes (block drivers)).\n- dm writecache: fix incorrect flush sequence when doing SSD mode commit (git fixes (block drivers)).\n- dm writecache: verify watermark during resume (git fixes (block drivers)).\n- dm zoned: fix invalid memory access (git fixes (block drivers)).\n- dm zoned: reduce overhead of backing device checks (git fixes (block drivers)).\n- dm zoned: remove duplicate nr_rnd_zones increase in dmz_init_zone() (git fixes (block drivers)).\n- dm zoned: support zone sizes smaller than 128MiB (git fixes (block drivers)).\n- dp83640: reverse arguments to list_add_tail (git-fixes).\n- drivers: hv: Add a module description line to the hv_vmbus driver (bsc#1172253).\n- Drivers: HV: Send one page worth of kmsg dump over Hyper-V during panic (bsc#1170618).\n- Drivers: hv: vmbus: Fix the issue with freeing up hv_ctl_table_hdr (bsc#1170618).\n- Drivers: hv: vmbus: Get rid of MSR access from vmbus_drv.c (bsc#1170618).\n- Drivers: hv: vmus: Fix the check for return value from kmsg get dump buffer (bsc#1170618).\n- drivers/net/ibmvnic: Update VNIC protocol version reporting (bsc#1065729).\n- drm: amd/acp: fix broken menu structure (bsc#1114279) \t* context changes\n- drm/crc: Actually allow to change the crc source (bsc#1114279) \t* offset changes\n- drm/dp_mst: Fix clearing payload state on topology disable (bsc#1051510).\n- drm/dp_mst: Reformat drm_dp_check_act_status() a bit (bsc#1051510).\n- drm/edid: Fix off-by-one in DispID DTD pixel clock (bsc#1114279)\n- drm/i915/gvt: Init DPLL/DDI vreg for virtual display instead of (bsc#1114279)\n- drm/i915: properly sanity check batch_start_offset (bsc#1114279) \t* renamed display/intel_fbc.c -\u003e intel_fb.c \t* renamed gt/intel_rc6.c -\u003e intel_pm.c \t* context changes\n- drm/meson: Delete an error message in meson_dw_hdmi_bind() (bsc#1051510).\n- drm: NULL pointer dereference [null-pointer-deref] (CWE 476) problem (bsc#1114279)\n- drm/qxl: qxl_release leak in qxl_draw_dirty_fb() (bsc#1051510).\n- drm/qxl: qxl_release leak in qxl_hw_surface_alloc() (bsc#1051510).\n- drm/qxl: qxl_release use after free (bsc#1051510).\n- drm: Remove PageReserved manipulation from drm_pci_alloc (bsc#1114279) \t* offset changes\n- dump_stack: avoid the livelock of the dump_lock (git fixes (block drivers)).\n- EDAC, sb_edac: Add support for systems with segmented PCI buses (bsc#1169525).\n- ext4: do not zeroout extents beyond i_disksize (bsc#1167851).\n- ext4: fix extent_status fragmentation for plain files (bsc#1171949).\n- ext4: use non-movable memory for superblock readahead (bsc#1171952).\n- fanotify: fix merging marks masks with FAN_ONDIR (bsc#1171679).\n- fbcon: fix null-ptr-deref in fbcon_switch (bsc#1114279) \t* rename drivers/video/fbdev/core to drivers/video/console \t* context changes\n- fib: add missing attribute validation for tun_id (networking-stable-20_03_14).\n- firmware: qcom: scm: fix compilation error when disabled (bsc#1051510).\n- fs/cifs: fix gcc warning in sid_to_id (bsc#1144333).\n- fs/seq_file.c: simplify seq_file iteration code and interface (bsc#1170125).\n- gpio: tegra: mask GPIO IRQs during IRQ shutdown (bsc#1051510).\n- gre: fix uninit-value in __iptunnel_pull_header (networking-stable-20_03_14).\n- HID: hid-input: clear unmapped usages (git-fixes).\n- HID: hyperv: Add a module description line (bsc#1172253).\n- HID: i2c-hid: add Trekstor Primebook C11B to descriptor override (git-fixes).\n- HID: i2c-hid: override HID descriptors for certain devices (git-fixes).\n- HID: multitouch: add eGalaxTouch P80H84 support (bsc#1051510).\n- HID: wacom: Read HID_DG_CONTACTMAX directly for non-generic devices (git-fixes).\n- hrtimer: Annotate lockless access to timer-\u003estate (git fixes (block drivers)).\n- hsr: add restart routine into hsr_get_node_list() (networking-stable-20_03_28).\n- hsr: check protocol version in hsr_newlink() (networking-stable-20_04_17).\n- hsr: fix general protection fault in hsr_addr_is_self() (networking-stable-20_03_28).\n- hsr: set .netnsok flag (networking-stable-20_03_28).\n- hsr: use rcu_read_lock() in hsr_get_node_{list/status}() (networking-stable-20_03_28).\n- i2c: acpi: Force bus speed to 400KHz if a Silead touchscreen is present (git-fixes).\n- i2c: acpi: put device when verifying client fails (git-fixes).\n- i2c: brcmstb: remove unused struct member (git-fixes).\n- i2c: core: Allow empty id_table in ACPI case as well (git-fixes).\n- i2c: core: decrease reference count of device node in i2c_unregister_device (git-fixes).\n- i2c: dev: Fix the race between the release of i2c_dev and cdev (bsc#1051510).\n- i2c: fix missing pm_runtime_put_sync in i2c_device_probe (git-fixes).\n- i2c-hid: properly terminate i2c_hid_dmi_desc_override_table array (git-fixes).\n- i2c: i801: Do not add ICH_RES_IO_SMI for the iTCO_wdt device (git-fixes).\n- i2c: iproc: Stop advertising support of SMBUS quick cmd (git-fixes).\n- i2c: isch: Remove unnecessary acpi.h include (git-fixes).\n- i2c: mux: demux-pinctrl: Fix an error handling path in \u0027i2c_demux_pinctrl_probe()\u0027 (bsc#1051510).\n- i2c: st: fix missing struct parameter description (bsc#1051510).\n- IB/ipoib: Add child to parent list only if device initialized (bsc#1168503).\n- IB/ipoib: Consolidate checking of the proposed child interface (bsc#1168503).\n- IB/ipoib: Do not remove child devices from within the ndo_uninit (bsc#1168503).\n- IB/ipoib: Get rid of IPOIB_FLAG_GOING_DOWN (bsc#1168503).\n- IB/ipoib: Get rid of the sysfs_mutex (bsc#1168503).\n- IB/ipoib: Maintain the child_intfs list from ndo_init/uninit (bsc#1168503).\n- IB/ipoib: Move all uninit code into ndo_uninit (bsc#1168503).\n- IB/ipoib: Move init code to ndo_init (bsc#1168503).\n- IB/ipoib: Replace printk with pr_warn (bsc#1168503).\n- IB/ipoib: Use cancel_delayed_work_sync for neigh-clean task (bsc#1168503).\n- IB/ipoib: Warn when one port fails to initialize (bsc#1168503).\n- ibmvnic: Skip fatal error reset after passive init (bsc#1171078 ltc#184239).\n- iio:ad7797: Use correct attribute_group (bsc#1051510).\n- iio: adc: stm32-adc: fix device used to request dma (bsc#1051510).\n- iio: adc: stm32-adc: fix sleep in atomic context (git-fixes).\n- iio: adc: stm32-adc: Use dma_request_chan() instead dma_request_slave_channel() (bsc#1051510).\n- iio: dac: vf610: Fix an error handling path in \u0027vf610_dac_probe()\u0027 (bsc#1051510).\n- iio: sca3000: Remove an erroneous \u0027get_device()\u0027 (bsc#1051510).\n- iio: xilinx-xadc: Fix ADC-B powerdown (bsc#1051510).\n- iio: xilinx-xadc: Fix clearing interrupt when enabling trigger (bsc#1051510).\n- iio: xilinx-xadc: Fix sequencer configuration for aux channels in simultaneous mode (bsc#1051510).\n- ima: Fix return value of ima_write_policy() (git-fixes).\n- Input: evdev - call input_flush_device() on release(), not flush() (bsc#1051510).\n- Input: hyperv-keyboard - add module description (bsc#1172253).\n- Input: i8042 - add Acer Aspire 5738z to nomux list (bsc#1051510).\n- Input: i8042 - add ThinkPad S230u to i8042 reset list (bsc#1051510).\n- Input: raydium_i2c_ts - use true and false for boolean values (bsc#1051510).\n- Input: synaptics-rmi4 - fix error return code in rmi_driver_probe() (bsc#1051510).\n- Input: synaptics-rmi4 - really fix attn_data use-after-free (git-fixes).\n- Input: usbtouchscreen - add support for BonXeon TP (bsc#1051510).\n- Input: xpad - add custom init packet for Xbox One S controllers (bsc#1051510).\n- iommu/amd: Call domain_flush_complete() in update_domain() (bsc#1172096).\n- iommu/amd: Do not flush Device Table in iommu_map_page() (bsc#1172097).\n- iommu/amd: Do not loop forever when trying to increase address space (bsc#1172098).\n- iommu/amd: Fix legacy interrupt remapping for x2APIC-enabled system (bsc#1172099).\n- iommu/amd: Fix over-read of ACPI UID from IVRS table (bsc#1172101).\n- iommu/amd: Fix race in increase_address_space()/fetch_pte() (bsc#1172102).\n- iommu/amd: Update Device Table in increase_address_space() (bsc#1172103).\n- iommu: Fix reference count leak in iommu_group_alloc (bsc#1172397).\n- ipmi: fix hung processes in __get_guid() (git-fixes).\n- ipv4: fix a RCU-list lock in fib_triestat_seq_show (networking-stable-20_04_02).\n- ipv6/addrconf: call ipv6_mc_up() for non-Ethernet interface (networking-stable-20_03_14).\n- ipv6: do not auto-add link-local address to lag ports (networking-stable-20_04_09).\n- ipv6: Fix nlmsg_flags when splitting a multipath route (networking-stable-20_03_01).\n- ipv6: Fix route replacement with dev-only route (networking-stable-20_03_01).\n- ipvlan: add cond_resched_rcu() while processing muticast backlog (networking-stable-20_03_14).\n- ipvlan: do not deref eth hdr before checking it\u0027s set (networking-stable-20_03_14).\n- ipvlan: do not use cond_resched_rcu() in ipvlan_process_multicast() (networking-stable-20_03_14).\n- iwlwifi: pcie: actually release queue memory in TVQM (bsc#1051510).\n- kabi fix for early XHCI debug (git-fixes).\n- kabi for for md: improve handling of bio with REQ_PREFLUSH in md_flush_request() (git-fixes).\n- kabi, protect struct ib_device (bsc#1168503).\n- kabi/severities: Do not track KVM internal symbols.\n- kabi/severities: Ingnore get_dev_data() The function is internal to the AMD IOMMU driver and must not be called by any third party.\n- kabi workaround for snd_rawmidi buffer_ref field addition (git-fixes).\n- KEYS: reaching the keys quotas correctly (bsc#1051510).\n- KVM: arm64: Change hyp_panic()s dependency on tpidr_el2 (bsc#1133021).\n- KVM: arm64: Stop save/restoring host tpidr_el1 on VHE (bsc#1133021).\n- KVM: Check validity of resolved slot when searching memslots (bsc#1172104).\n- KVM: s390: vsie: Fix delivery of addressing exceptions (git-fixes).\n- KVM: s390: vsie: Fix possible race when shadowing region 3 tables (git-fixes).\n- KVM: s390: vsie: Fix region 1 ASCE sanity shadow address checks (git-fixes).\n- KVM: SVM: Fix potential memory leak in svm_cpu_init() (bsc#1171736).\n- KVM x86: Extend AMD specific guest behavior to Hygon virtual CPUs (bsc#1152489).\n- l2tp: Allow management of tunnels and session in user namespace (networking-stable-20_04_17).\n- libata: Remove extra scsi_host_put() in ata_scsi_add_hosts() (bsc#1051510).\n- libata: Return correct status in sata_pmp_eh_recover_pm() when ATA_DFLAG_DETACH is set (bsc#1051510).\n- lib: raid6: fix awk build warnings (git fixes (block drivers)).\n- lib/raid6/test: fix build on distros whose /bin/sh is not bash (git fixes (block drivers)).\n- lib/stackdepot.c: fix global out-of-bounds in stack_slabs (git fixes (block drivers)).\n- locks: print unsigned ino in /proc/locks (bsc#1171951). \n- mac80211: add ieee80211_is_any_nullfunc() (bsc#1051510).\n- mac80211_hwsim: Use kstrndup() in place of kasprintf() (bsc#1051510).\n- mac80211: mesh: fix discovery timer re-arming issue / crash (bsc#1051510).\n- macsec: avoid to set wrong mtu (bsc#1051510).\n- macsec: restrict to ethernet devices (networking-stable-20_03_28).\n- macvlan: add cond_resched() during multicast processing (networking-stable-20_03_14).\n- macvlan: fix null dereference in macvlan_device_event() (bsc#1051510).\n- md: improve handling of bio with REQ_PREFLUSH in md_flush_request() (git-fixes).\n- md/raid0: Fix an error message in raid0_make_request() (git fixes (block drivers)).\n- md/raid10: prevent access of uninitialized resync_pages offset (git-fixes).\n- media: dvb: return -EREMOTEIO on i2c transfer failure (bsc#1051510).\n- media: platform: fcp: Set appropriate DMA parameters (bsc#1051510).\n- media: ti-vpe: cal: fix disable_irqs to only the intended target (git-fixes).\n- mei: release me_cl object reference (bsc#1051510).\n- mlxsw: Fix some IS_ERR() vs NULL bugs (networking-stable-20_04_27).\n- mlxsw: spectrum_flower: Do not stop at FLOW_ACTION_VLAN_MANGLE (networking-stable-20_04_09).\n- mmc: atmel-mci: Fix debugfs on 64-bit platforms (git-fixes).\n- mmc: dw_mmc: Fix debugfs on 64-bit platforms (git-fixes).\n- mmc: meson-gx: make sure the descriptor is stopped on errors (git-fixes).\n- mmc: meson-gx: simplify interrupt handler (git-fixes).\n- mmc: renesas_sdhi: limit block count to 16 bit for old revisions (git-fixes).\n- mmc: sdhci-esdhc-imx: fix the mask for tuning start point (bsc#1051510).\n- mmc: sdhci-msm: Clear tuning done flag while hs400 tuning (bsc#1051510).\n- mmc: sdhci-of-at91: fix memleak on clk_get failure (git-fixes).\n- mmc: sdhci-pci: Fix eMMC driver strength for BYT-based controllers (bsc#1051510).\n- mmc: sdhci-xenon: fix annoying 1.8V regulator warning (bsc#1051510).\n- mmc: sdio: Fix potential NULL pointer error in mmc_sdio_init_card() (bsc#1051510).\n- mmc: tmio: fix access width of Block Count Register (git-fixes).\n- mm: thp: handle page cache THP correctly in PageTransCompoundMap (git fixes (block drivers)).\n- mtd: cfi: fix deadloop in cfi_cmdset_0002.c do_write_buffer (bsc#1051510).\n- mtd: spi-nor: cadence-quadspi: add a delay in write sequence (git-fixes).\n- mtd: spi-nor: enable 4B opcodes for mx66l51235l (git-fixes).\n- mtd: spi-nor: fsl-quadspi: Do not let -EINVAL on the bus (git-fixes).\n- mwifiex: avoid -Wstringop-overflow warning (bsc#1051510).\n- mwifiex: Fix memory corruption in dump_station (bsc#1051510).\n- net: bcmgenet: correct per TX/RX ring statistics (networking-stable-20_04_27).\n- net: dsa: b53: Fix ARL register definitions (networking-stable-20_04_27).\n- net: dsa: b53: Rework ARL bin logic (networking-stable-20_04_27).\n- net: dsa: bcm_sf2: Do not register slave MDIO bus with OF (networking-stable-20_04_09).\n- net: dsa: bcm_sf2: Ensure correct sub-node is parsed (networking-stable-20_04_09).\n- net: dsa: bcm_sf2: Fix overflow checks (git-fixes).\n- net: dsa: Fix duplicate frames flooded by learning (networking-stable-20_03_28).\n- net: dsa: mv88e6xxx: fix lockup on warm boot (networking-stable-20_03_14).\n- net: fec: validate the new settings in fec_enet_set_coalesce() (networking-stable-20_03_14).\n- net: fib_rules: Correctly set table field when table number exceeds 8 bits (networking-stable-20_03_01).\n- net: fix race condition in __inet_lookup_established() (bsc#1151794).\n- net: fq: add missing attribute validation for orphan mask (networking-stable-20_03_14).\n- net, ip_tunnel: fix interface lookup with no key (networking-stable-20_04_02).\n- net: ipv4: devinet: Fix crash when add/del multicast IP with autojoin (networking-stable-20_04_17).\n- net: ipv6: do not consider routes via gateways for anycast address check (networking-stable-20_04_17).\n- netlink: Use netlink header as base to calculate bad attribute offset (networking-stable-20_03_14).\n- net: macsec: update SCI upon MAC address change (networking-stable-20_03_14).\n- net: memcg: fix lockdep splat in inet_csk_accept() (networking-stable-20_03_14).\n- net: memcg: late association of sock to memcg (networking-stable-20_03_14).\n- net/mlx4_en: avoid indirect call in TX completion (networking-stable-20_04_27).\n- net/mlx5: Add new fields to Port Type and Speed register (bsc#1171118).\n- net/mlx5: Add RoCE RX ICRC encapsulated counter (bsc#1171118).\n- net/mlx5e: Fix ethtool self test: link speed (bsc#1171118).\n- net/mlx5e: Move port speed code from en_ethtool.c to en/port.c (bsc#1171118).\n- net/mlx5: Expose link speed directly (bsc#1171118).\n- net/mlx5: Expose port speed when possible (bsc#1171118).\n- net: mvneta: Fix the case where the last poll did not process all rx (networking-stable-20_03_28).\n- net: netrom: Fix potential nr_neigh refcnt leak in nr_add_node (networking-stable-20_04_27).\n- net/packet: tpacket_rcv: do not increment ring index on drop (networking-stable-20_03_14).\n- net: phy: restore mdio regs in the iproc mdio driver (networking-stable-20_03_01).\n- net: qmi_wwan: add support for ASKEY WWHC050 (networking-stable-20_03_28).\n- net: revert default NAPI poll timeout to 2 jiffies (networking-stable-20_04_17).\n- net_sched: cls_route: remove the right filter from hashtable (networking-stable-20_03_28).\n- net/x25: Fix x25_neigh refcnt leak when receiving frame (networking-stable-20_04_27).\n- nfc: add missing attribute validation for SE API (networking-stable-20_03_14).\n- nfc: add missing attribute validation for vendor subcommand (networking-stable-20_03_14).\n- nfc: pn544: Fix occasional HW initialization failure (networking-stable-20_03_01).\n- NFC: st21nfca: add missed kfree_skb() in an error path (bsc#1051510).\n- nfsd4: fix up replay_matches_cache() (git-fixes).\n- nfsd: Ensure CLONE persists data and metadata changes to the target file (git-fixes).\n- nfsd: fix delay timer on 32-bit architectures (git-fixes).\n- nfsd: fix jiffies/time_t mixup in LRU list (git-fixes).\n- NFS: Directory page cache pages need to be locked when read (git-fixes).\n- nfsd: memory corruption in nfsd4_lock() (git-fixes).\n- NFS: Do not call generic_error_remove_page() while holding locks (bsc#1170457).\n- NFS: Fix memory leaks and corruption in readdir (git-fixes).\n- NFS: Fix O_DIRECT accounting of number of bytes read/written (git-fixes).\n- NFS: Fix potential posix_acl refcnt leak in nfs3_set_acl (git-fixes).\n- NFS: fix racey wait in nfs_set_open_stateid_locked (bsc#1170592).\n- NFS/flexfiles: Use the correct TCP timeout for flexfiles I/O (git-fixes).\n- NFS/pnfs: Fix pnfs_generic_prepare_to_resend_writes() (git-fixes).\n- NFS: Revalidate the file size on a fatal write error (git-fixes).\n- NFSv4.0: nfs4_do_fsinfo() should not do implicit lease renewals (git-fixes).\n- NFSv4: Do not allow a cached open with a revoked delegation (git-fixes).\n- NFSv4: Fix leak of clp-\u003ecl_acceptor string (git-fixes).\n- NFSv4/pnfs: Return valid stateids in nfs_layout_find_inode_by_stateid() (git-fixes).\n- NFSv4: try lease recovery on NFS4ERR_EXPIRED (git-fixes).\n- NFSv4.x: Drop the slot if nfs4_delegreturn_prepare waits for layoutreturn (git-fixes).\n- nl802154: add missing attribute validation for dev_type (networking-stable-20_03_14).\n- nl802154: add missing attribute validation (networking-stable-20_03_14).\n- nvme-fc: print proper nvme-fc devloss_tmo value (bsc#1172391).\n- objtool: Fix stack offset tracking for indirect CFAs (bsc#1169514).\n- objtool: Fix switch table detection in .text.unlikely (bsc#1169514).\n- objtool: Make BP scratch register warning more robust (bsc#1169514).\n- padata: Remove broken queue flushing (git-fixes).\n- Partially revert \u0027kfifo: fix kfifo_alloc() and kfifo_init()\u0027 (git fixes (block drivers)).\n- pinctrl: baytrail: Enable pin configuration setting for GPIO chip (git-fixes).\n- pinctrl: cherryview: Add missing spinlock usage in chv_gpio_irq_handler (git-fixes).\n- platform/x86: asus-nb-wmi: Do not load on Asus T100TA and T200TA (bsc#1051510).\n- pNFS: Ensure we do clear the return-on-close layout stateid on fatal errors (git-fixes).\n- powerpc: Add attributes for setjmp/longjmp (bsc#1065729).\n- powerpc/pci/of: Parse unassigned resources (bsc#1065729).\n- powerpc/setup_64: Set cache-line-size based on cache-block-size (bsc#1065729).\n- powerpc/sstep: Fix DS operand in ld encoding to appropriate value (bsc#1065729).\n- qede: Fix race between rdma destroy workqueue and link change event (networking-stable-20_03_01).\n- r8152: check disconnect status after long sleep (networking-stable-20_03_14).\n- raid6/ppc: Fix build for clang (git fixes (block drivers)).\n- rcu: locking and unlocking need to always be at least barriers (git fixes (block drivers)).\n- RDMA/ipoib: Fix use of sizeof() (bsc#1168503).\n- RDMA/netdev: Fix netlink support in IPoIB (bsc#1168503).\n- RDMA/netdev: Hoist alloc_netdev_mqs out of the driver (bsc#1168503).\n- RDMA/netdev: Use priv_destructor for netdev cleanup (bsc#1168503).\n- Remove 2 git-fixes that cause build issues. (bsc#1171691) \n- Revert \u0027ALSA: hda/realtek: Fix pop noise on ALC225\u0027 (git-fixes).\n- Revert \u0027drm/panel: simple: Add support for Sharp LQ150X1LG11 panels\u0027 (bsc#1114279) \t* offset changes\n- Revert \u0027HID: i2c-hid: add Trekstor Primebook C11B to descriptor override\u0027 Depends on 9b5c747685982d22efffeafc5ec601bd28f6d78b, which was also reverted.\n- Revert \u0027HID: i2c-hid: override HID descriptors for certain devices\u0027 This broke i2c-hid.ko\u0027s build, there is no way around it without a big file rename or renaming the kernel module.\n- Revert \u0027i2c-hid: properly terminate i2c_hid_dmi_desc_override_table\u0027 Fixed 9b5c747685982d22efffeafc5ec601bd28f6d78b, which was also reverted.\n- Revert \u0027ipc,sem: remove uneeded sem_undo_list lock usage in exit_sem()\u0027 (bsc#1172221).\n- rtlwifi: Fix a double free in _rtl_usb_tx_urb_setup() (bsc#1051510).\n- s390/cio: avoid duplicated \u0027ADD\u0027 uevents (git-fixes).\n- s390/cio: generate delayed uevent for vfio-ccw subchannels (git-fixes).\n- s390/cpuinfo: fix wrong output when CPU0 is offline (git-fixes).\n- s390/diag: fix display of diagnose call statistics (git-fixes).\n- s390/ftrace: fix potential crashes when switching tracers (git-fixes).\n- s390/gmap: return proper error code on ksm unsharing (git-fixes).\n- s390/ism: fix error return code in ism_probe() (git-fixes).\n- s390/pci: Fix possible deadlock in recover_store() (bsc#1165183 LTC#184103).\n- s390/pci: Recover handle in clp_set_pci_fn() (bsc#1165183 LTC#184103).\n- s390/qeth: cancel RX reclaim work earlier (git-fixes).\n- s390/qeth: do not return -ENOTSUPP to userspace (git-fixes).\n- s390/qeth: do not warn for napi with 0 budget (git-fixes).\n- s390/qeth: fix off-by-one in RX copybreak check (git-fixes).\n- s390/qeth: fix promiscuous mode after reset (git-fixes).\n- s390/qeth: fix qdio teardown after early init error (git-fixes).\n- s390/qeth: handle error due to unsupported transport mode (git-fixes).\n- s390/qeth: handle error when backing RX buffer (git-fixes).\n- s390/qeth: lock the card while changing its hsuid (git-fixes).\n- s390/qeth: support net namespaces for L3 devices (git-fixes).\n- s390/time: Fix clk type in get_tod_clock (git-fixes).\n- scripts/decodecode: fix trapping instruction formatting (bsc#1065729).\n- scripts/dtc: Remove redundant YYLOC global declaration (bsc#1160388).\n- scsi: bnx2i: fix potential use after free (bsc#1171600).\n- scsi: core: Handle drivers which set sg_tablesize to zero (bsc#1171601) This commit also required: \u003e scsi: core: avoid preallocating big SGL for data\n- scsi: core: save/restore command resid for error handling (bsc#1171602).\n- scsi: core: scsi_trace: Use get_unaligned_be*() (bsc#1171604).\n- scsi: core: try to get module before removing device (bsc#1171605).\n- scsi: csiostor: Adjust indentation in csio_device_reset (bsc#1171606).\n- scsi: csiostor: Do not enable IRQs too early (bsc#1171607).\n- scsi: esas2r: unlock on error in esas2r_nvram_read_direct() (bsc#1171608).\n- scsi: fnic: fix invalid stack access (bsc#1171609).\n- scsi: fnic: fix msix interrupt allocation (bsc#1171610).\n- scsi: ibmvscsi: Fix WARN_ON during event pool release (bsc#1170791 ltc#185128).\n- scsi: iscsi: Avoid potential deadlock in iscsi_if_rx func (bsc#1171611).\n- scsi: iscsi: Fix a potential deadlock in the timeout handler (bsc#1171612).\n- scsi: iscsi: qla4xxx: fix double free in probe (bsc#1171613).\n- scsi: lpfc: fix: Coverity: lpfc_cmpl_els_rsp(): Null pointer dereferences (bsc#1171614).\n- scsi: lpfc: Fix crash in target side cable pulls hitting WAIT_FOR_UNREG (bsc#1171615).\n- scsi: megaraid_sas: Do not initiate OCR if controller is not in ready state (bsc#1171616).\n- scsi: qla2xxx: add ring buffer for tracing debug logs (bsc#1157169).\n- scsi: qla2xxx: check UNLOADING before posting async work (bsc#1157169).\n- scsi: qla2xxx: Delete all sessions before unregister local nvme port (bsc#1157169).\n- scsi: qla2xxx: Do not log message when reading port speed via sysfs (bsc#1157169).\n- scsi: qla2xxx: Fix hang when issuing nvme disconnect-all in NPIV (bsc#1157169).\n- scsi: qla2xxx: Fix regression warnings (bsc#1157169).\n- scsi: qla2xxx: Remove non functional code (bsc#1157169).\n- scsi: qla2xxx: set UNLOADING before waiting for session deletion (bsc#1157169).\n- scsi: qla4xxx: Adjust indentation in qla4xxx_mem_free (bsc#1171617).\n- scsi: qla4xxx: fix double free bug (bsc#1171618).\n- scsi: sd: Clear sdkp-\u003eprotection_type if disk is reformatted without PI (bsc#1171619).\n- scsi: sg: add sg_remove_request in sg_common_write (bsc#1171620).\n- scsi: tracing: Fix handling of TRANSFER LENGTH == 0 for READ(6) and WRITE(6) (bsc#1171621).\n- scsi: ufs: change msleep to usleep_range (bsc#1171622).\n- scsi: ufs: Clean up ufshcd_scale_clks() and clock scaling error out path (bsc#1171623).\n- scsi: ufs: Fix ufshcd_hold() caused scheduling while atomic (bsc#1171624).\n- scsi: ufs: Fix ufshcd_probe_hba() reture value in case ufshcd_scsi_add_wlus() fails (bsc#1171625).\n- scsi: ufs: Recheck bkops level if bkops is disabled (bsc#1171626).\n- scsi: zfcp: fix missing erp_lock in port recovery trigger for point-to-point (git-fixes).\n- sctp: fix possibly using a bad saddr with a given dst (networking-stable-20_04_02).\n- sctp: fix refcount bug in sctp_wfree (networking-stable-20_04_02).\n- sctp: move the format error check out of __sctp_sf_do_9_1_abort (networking-stable-20_03_01).\n- seq_file: fix problem when seeking mid-record (bsc#1170125).\n- serial: uartps: Move the spinlock after the read of the tx empty (git-fixes).\n- sfc: detach from cb_page in efx_copy_channel() (networking-stable-20_03_14).\n- signal/pid_namespace: Fix reboot_pid_ns to use send_sig not force_sig (bsc#1172185).\n- slcan: not call free_netdev before rtnl_unlock in slcan_open (networking-stable-20_03_28).\n- slip: make slhc_compress() more robust against malicious packets (networking-stable-20_03_14).\n- smb3: Additional compression structures (bsc#1144333).\n- smb3: Add new compression flags (bsc#1144333).\n- smb3: change noisy error message to FYI (bsc#1144333).\n- smb3: enable swap on SMB3 mounts (bsc#1144333).\n- smb3: Minor cleanup of protocol definitions (bsc#1144333).\n- smb3: remove overly noisy debug line in signing errors (bsc#1144333).\n- smb3: smbdirect support can be configured by default (bsc#1144333).\n- smb3: use SMB2_SIGNATURE_SIZE define (bsc#1144333).\n- spi: bcm2835: Fix 3-wire mode if DMA is enabled (git-fixes).\n- spi: bcm63xx-hsspi: Really keep pll clk enabled (bsc#1051510).\n- spi: bcm-qspi: when tx/rx buffer is NULL set to 0 (bsc#1051510).\n- spi: dw: Add SPI Rx-done wait method to DMA-based transfer (bsc#1051510).\n- spi: dw: Add SPI Tx-done wait method to DMA-based transfer (bsc#1051510).\n- spi: dw: Zero DMA Tx and Rx configurations on stack (bsc#1051510).\n- spi: fsl: do not map irq during probe (git-fixes).\n- spi: fsl: use platform_get_irq() instead of of_irq_to_resource() (git-fixes).\n- spi: pxa2xx: Add CS control clock quirk (bsc#1051510).\n- spi: qup: call spi_qup_pm_resume_runtime before suspending (bsc#1051510).\n- spi: spi-fsl-dspi: Replace interruptible wait queue with a simple completion (git-fixes).\n- spi: spi-s3c64xx: Fix system resume support (git-fixes).\n- spi/zynqmp: remove entry that causes a cs glitch (bsc#1051510).\n- staging: comedi: dt2815: fix writing hi byte of analog output (bsc#1051510).\n- staging: comedi: Fix comedi_device refcnt leak in comedi_open (bsc#1051510).\n- staging: iio: ad2s1210: Fix SPI reading (bsc#1051510).\n- staging: vt6656: Do not set RCR_MULTICAST or RCR_BROADCAST by default (git-fixes).\n- staging: vt6656: Fix drivers TBTT timing counter (git-fixes).\n- staging: vt6656: Fix pairwise key entry save (git-fixes).\n- sunrpc: expiry_time should be seconds not timeval (git-fixes).\n- SUNRPC: Fix a potential buffer overflow in \u0027svc_print_xprts()\u0027 (git-fixes).\n- supported.conf: Add br_netfilter to base (bsc#1169020).\n- svcrdma: Fix leak of transport addresses (git-fixes).\n- taskstats: fix data-race (bsc#1172188).\n- tcp: cache line align MAX_TCP_HEADER (networking-stable-20_04_27).\n- tcp: repair: fix TCP_QUEUE_SEQ implementation (networking-stable-20_03_28).\n- team: add missing attribute validation for array index (networking-stable-20_03_14).\n- team: add missing attribute validation for port ifindex (networking-stable-20_03_14).\n- team: fix hang in team_mode_get() (networking-stable-20_04_27).\n- tools lib traceevent: Remove unneeded qsort and uses memmove instead (git-fixes).\n- tpm: ibmvtpm: retry on H_CLOSED in tpm_ibmvtpm_send() (bsc#1065729).\n- tpm/tpm_tis: Free IRQ if probing fails (bsc#1082555).\n- tpm/tpm_tis: Free IRQ if probing fails (git-fixes).\n- tracing: Add a vmalloc_sync_mappings() for safe measure (git-fixes).\n- tracing: Disable trace_printk() on post poned tests (git-fixes).\n- tracing: Fix the race between registering \u0027snapshot\u0027 event trigger and triggering \u0027snapshot\u0027 operation (git-fixes).\n- tty: rocket, avoid OOB access (git-fixes).\n- UAS: fix deadlock in error handling and PM flushing work (git-fixes).\n- UAS: no use logging any details in case of ENODEV (git-fixes).\n- USB: Add USB_QUIRK_DELAY_CTRL_MSG and USB_QUIRK_DELAY_INIT for Corsair K70 RGB RAPIDFIRE (git-fixes).\n- USB: cdc-acm: restore capability check order (git-fixes).\n- USB: core: Fix misleading driver bug report (bsc#1051510).\n- USB: dwc3: do not set gadget-\u003eis_otg flag (git-fixes).\n- USB: dwc3: gadget: Do link recovery for SS and SSP (git-fixes).\n- USB: early: Handle AMD\u0027s spec-compliant identifiers, too (git-fixes).\n- USB: f_fs: Clear OS Extended descriptor counts to zero in ffs_data_reset() (git-fixes).\n- USB: gadget: audio: Fix a missing error return value in audio_bind() (git-fixes).\n- USB: gadget: composite: Inform controller driver of self-powered (git-fixes).\n- USB: gadget: legacy: fix error return code in cdc_bind() (git-fixes).\n- USB: gadget: legacy: fix error return code in gncm_bind() (git-fixes).\n- USB: gadget: legacy: fix redundant initialization warnings (bsc#1051510).\n- USB: gadget: net2272: Fix a memory leak in an error handling path in \u0027net2272_plat_probe()\u0027 (git-fixes).\n- USB: gadget: udc: atmel: Fix vbus disconnect handling (git-fixes).\n- USB: gadget: udc: atmel: Make some symbols static (git-fixes).\n- USB: gadget: udc: bdc: Remove unnecessary NULL checks in bdc_req_complete (git-fixes).\n- USB: host: xhci-plat: keep runtime active when removing host (git-fixes).\n- USB: hub: Fix handling of connect changes during sleep (git-fixes).\n- usbnet: silence an unnecessary warning (bsc#1170770).\n- USB: serial: garmin_gps: add sanity checking for data length (git-fixes).\n- USB: serial: option: add BroadMobi BM806U (git-fixes).\n- USB: serial: option: add support for ASKEY WWHC050 (git-fixes).\n- USB: serial: option: add Wistron Neweb D19Q1 (git-fixes).\n- USB: serial: qcserial: Add DW5816e support (git-fixes).\n- USB: sisusbvga: Change port variable from signed to unsigned (git-fixes).\n- usb-storage: Add unusual_devs entry for JMicron JMS566 (git-fixes).\n- USB: uas: add quirk for LaCie 2Big Quadra (git-fixes).\n- USB: xhci: Fix NULL pointer dereference when enqueuing trbs from urb sg list (git-fixes).\n- video: fbdev: sis: Remove unnecessary parentheses and commented code (bsc#1114279)\n- video: fbdev: w100fb: Fix a potential double free (bsc#1051510).\n- vrf: Check skb for XFRM_TRANSFORMED flag (networking-stable-20_04_27).\n- vt: ioctl, switch VT_IS_IN_USE and VT_BUSY to inlines (git-fixes).\n- vt: selection, introduce vc_is_sel (git-fixes).\n- vt: vt_ioctl: fix race in VT_RESIZEX (git-fixes).\n- vt: vt_ioctl: fix use-after-free in vt_in_use() (git-fixes).\n- vt: vt_ioctl: fix VT_DISALLOCATE freeing in-use virtual console (git-fixes).\n- vxlan: check return value of gro_cells_init() (networking-stable-20_03_28).\n- watchdog: reset last_hw_keepalive time at start (git-fixes).\n- wcn36xx: Fix error handling path in \u0027wcn36xx_probe()\u0027 (bsc#1051510).\n- wil6210: remove reset file from debugfs (git-fixes).\n- wimax/i2400m: Fix potential urb refcnt leak (bsc#1051510).\n- workqueue: do not use wq_select_unbound_cpu() for bound works (bsc#1172130).\n- x86/entry/64: Fix unwind hints in kernel exit path (bsc#1058115).\n- x86/entry/64: Fix unwind hints in register clearing code (bsc#1058115).\n- x86/entry/64: Fix unwind hints in rewind_stack_do_exit() (bsc#1058115).\n- x86/entry/64: Fix unwind hints in __switch_to_asm() (bsc#1058115).\n- x86/Hyper-V: Allow guests to enable InvariantTSC (bsc#1170620).\n- x86/Hyper-V: Free hv_panic_page when fail to register kmsg dump (bsc#1170618).\n- x86/Hyper-V: Report crash data in die() when panic_on_oops is set (bsc#1170618).\n- x86/Hyper-V: Report crash register data or kmsg before running crash kernel (bsc#1170618).\n- x86/Hyper-V: Report crash register data when sysctl_record_panic_msg is not set (bsc#1170618).\n- x86:Hyper-V: report value of misc_features (git-fixes).\n- x86/Hyper-V: Trigger crash enlightenment only once during system crash (bsc#1170618).\n- x86/Hyper-V: Unload vmbus channel in hv panic callback (bsc#1170618).\n- x86/kprobes: Avoid kretprobe recursion bug (bsc#1114279).\n- x86/resctrl: Fix invalid attempt at removing the default resource group (git-fixes).\n- x86/resctrl: Preserve CDP enable over CPU hotplug (bsc#1114279).\n- x86/unwind/orc: Do not skip the first frame for inactive tasks (bsc#1058115).\n- x86/unwind/orc: Fix error handling in __unwind_start() (bsc#1058115).\n- x86/unwind/orc: Fix error path for bad ORC entry type (bsc#1058115).\n- x86/unwind/orc: Fix unwind_get_return_address_ptr() for inactive tasks (bsc#1058115).\n- x86/unwind/orc: Prevent unwinding before ORC initialization (bsc#1058115).\n- x86/unwind: Prevent false warnings for non-current tasks (bsc#1058115).\n- x86/xen: fix booting 32-bit pv guest (bsc#1071995).\n- x86/xen: Make the boot CPU idle task reliable (bsc#1071995).\n- x86/xen: Make the secondary CPU idle tasks reliable (bsc#1071995).\n- xen/pci: reserve MCFG areas earlier (bsc#1170145).\n- xfrm: Always set XFRM_TRANSFORMED in xfrm{4,6}_output_finish (networking-stable-20_04_27).\n- xfs: Correctly invert xfs_buftarg LRU isolation logic (git-fixes).\n- xfs: do not ever return a stale pointer from __xfs_dir3_free_read (git-fixes).\n- xprtrdma: Fix completion wait during device removal (git-fixes).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2020-1605,SUSE-SLE-HA-12-SP4-2020-1605,SUSE-SLE-Live-Patching-12-SP4-2020-1605,SUSE-SLE-SDK-12-SP4-2020-1605,SUSE-SLE-SERVER-12-SP4-2020-1605,SUSE-SLE-WE-12-SP4-2020-1605", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2020_1605-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2020:1605-1", "url": "https://www.suse.com/support/update/announcement/2020/suse-su-20201605-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2020:1605-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-June/006929.html" }, { "category": "self", "summary": "SUSE Bug 1051510", "url": "https://bugzilla.suse.com/1051510" }, { "category": "self", "summary": "SUSE Bug 1058115", "url": "https://bugzilla.suse.com/1058115" }, { "category": "self", "summary": "SUSE Bug 1065729", "url": "https://bugzilla.suse.com/1065729" }, { "category": "self", "summary": "SUSE Bug 1071995", "url": "https://bugzilla.suse.com/1071995" }, { "category": "self", "summary": "SUSE Bug 1082555", "url": "https://bugzilla.suse.com/1082555" }, { "category": "self", "summary": "SUSE Bug 1089895", "url": "https://bugzilla.suse.com/1089895" }, { "category": "self", "summary": "SUSE Bug 1111666", "url": "https://bugzilla.suse.com/1111666" }, { "category": "self", "summary": "SUSE Bug 1114279", "url": "https://bugzilla.suse.com/1114279" }, { "category": "self", "summary": "SUSE Bug 1133021", "url": "https://bugzilla.suse.com/1133021" }, { "category": "self", "summary": "SUSE Bug 1144333", "url": "https://bugzilla.suse.com/1144333" }, { "category": "self", "summary": "SUSE Bug 1151794", "url": "https://bugzilla.suse.com/1151794" }, { "category": "self", "summary": "SUSE Bug 1152489", "url": "https://bugzilla.suse.com/1152489" }, { "category": "self", "summary": "SUSE Bug 1154824", "url": "https://bugzilla.suse.com/1154824" }, { "category": "self", "summary": "SUSE Bug 1157169", "url": "https://bugzilla.suse.com/1157169" }, { "category": "self", "summary": "SUSE Bug 1158265", "url": "https://bugzilla.suse.com/1158265" }, { "category": "self", "summary": "SUSE Bug 1160388", "url": "https://bugzilla.suse.com/1160388" }, { "category": "self", "summary": "SUSE Bug 1160947", "url": "https://bugzilla.suse.com/1160947" }, { "category": "self", "summary": "SUSE Bug 1165183", "url": "https://bugzilla.suse.com/1165183" }, { "category": "self", "summary": "SUSE Bug 1165741", "url": "https://bugzilla.suse.com/1165741" }, { "category": "self", "summary": "SUSE Bug 1166969", "url": "https://bugzilla.suse.com/1166969" }, { "category": "self", "summary": "SUSE Bug 1167574", "url": "https://bugzilla.suse.com/1167574" }, { "category": "self", "summary": "SUSE Bug 1167851", "url": "https://bugzilla.suse.com/1167851" }, { "category": "self", "summary": "SUSE Bug 1168503", "url": "https://bugzilla.suse.com/1168503" }, { "category": "self", "summary": "SUSE Bug 1168670", "url": "https://bugzilla.suse.com/1168670" }, { "category": "self", "summary": "SUSE Bug 1169020", "url": "https://bugzilla.suse.com/1169020" }, { "category": "self", "summary": "SUSE Bug 1169514", "url": "https://bugzilla.suse.com/1169514" }, { "category": "self", "summary": "SUSE Bug 1169525", "url": "https://bugzilla.suse.com/1169525" }, { "category": "self", "summary": "SUSE Bug 1170056", "url": "https://bugzilla.suse.com/1170056" }, { "category": "self", "summary": "SUSE Bug 1170125", "url": "https://bugzilla.suse.com/1170125" }, { "category": "self", "summary": "SUSE Bug 1170145", "url": "https://bugzilla.suse.com/1170145" }, { "category": "self", "summary": "SUSE Bug 1170345", "url": "https://bugzilla.suse.com/1170345" }, { "category": "self", "summary": "SUSE Bug 1170457", "url": "https://bugzilla.suse.com/1170457" }, { "category": "self", "summary": "SUSE Bug 1170522", "url": "https://bugzilla.suse.com/1170522" }, { "category": "self", "summary": "SUSE Bug 1170592", "url": "https://bugzilla.suse.com/1170592" }, { "category": "self", "summary": "SUSE Bug 1170618", "url": "https://bugzilla.suse.com/1170618" }, { "category": "self", "summary": "SUSE Bug 1170620", "url": "https://bugzilla.suse.com/1170620" }, { "category": "self", "summary": "SUSE Bug 1170770", "url": "https://bugzilla.suse.com/1170770" }, { "category": "self", "summary": "SUSE Bug 1170778", "url": "https://bugzilla.suse.com/1170778" }, { "category": "self", "summary": "SUSE Bug 1170791", "url": "https://bugzilla.suse.com/1170791" }, { "category": "self", "summary": "SUSE Bug 1170901", "url": "https://bugzilla.suse.com/1170901" }, { "category": "self", "summary": "SUSE Bug 1171078", "url": "https://bugzilla.suse.com/1171078" }, { "category": "self", "summary": "SUSE Bug 1171098", "url": "https://bugzilla.suse.com/1171098" }, { "category": "self", "summary": "SUSE Bug 1171118", "url": "https://bugzilla.suse.com/1171118" }, { "category": "self", "summary": "SUSE Bug 1171189", "url": "https://bugzilla.suse.com/1171189" }, { "category": "self", "summary": "SUSE Bug 1171191", "url": "https://bugzilla.suse.com/1171191" }, { "category": "self", "summary": "SUSE Bug 1171195", "url": "https://bugzilla.suse.com/1171195" }, { "category": "self", "summary": "SUSE Bug 1171202", "url": "https://bugzilla.suse.com/1171202" }, { "category": "self", "summary": "SUSE Bug 1171205", "url": "https://bugzilla.suse.com/1171205" }, { "category": "self", "summary": "SUSE Bug 1171217", "url": "https://bugzilla.suse.com/1171217" }, { "category": "self", "summary": "SUSE Bug 1171218", "url": "https://bugzilla.suse.com/1171218" }, { "category": "self", "summary": "SUSE Bug 1171219", "url": "https://bugzilla.suse.com/1171219" }, { "category": "self", "summary": "SUSE Bug 1171220", "url": "https://bugzilla.suse.com/1171220" }, { "category": "self", "summary": "SUSE Bug 1171293", "url": "https://bugzilla.suse.com/1171293" }, { "category": "self", "summary": "SUSE Bug 1171417", "url": "https://bugzilla.suse.com/1171417" }, { "category": "self", "summary": "SUSE Bug 1171527", "url": "https://bugzilla.suse.com/1171527" }, { "category": "self", "summary": "SUSE Bug 1171599", "url": "https://bugzilla.suse.com/1171599" }, { "category": "self", "summary": "SUSE Bug 1171600", "url": "https://bugzilla.suse.com/1171600" }, { "category": "self", "summary": "SUSE Bug 1171601", "url": "https://bugzilla.suse.com/1171601" }, { "category": "self", "summary": "SUSE Bug 1171602", "url": "https://bugzilla.suse.com/1171602" }, { "category": "self", "summary": "SUSE Bug 1171604", "url": "https://bugzilla.suse.com/1171604" }, { "category": "self", "summary": "SUSE Bug 1171605", "url": "https://bugzilla.suse.com/1171605" }, { "category": "self", "summary": "SUSE Bug 1171606", "url": "https://bugzilla.suse.com/1171606" }, { "category": "self", "summary": "SUSE Bug 1171607", "url": "https://bugzilla.suse.com/1171607" }, { "category": "self", "summary": "SUSE Bug 1171608", "url": "https://bugzilla.suse.com/1171608" }, { "category": "self", "summary": "SUSE Bug 1171609", "url": "https://bugzilla.suse.com/1171609" }, { "category": "self", "summary": "SUSE Bug 1171610", "url": "https://bugzilla.suse.com/1171610" }, { "category": "self", "summary": "SUSE Bug 1171611", "url": "https://bugzilla.suse.com/1171611" }, { "category": "self", "summary": "SUSE Bug 1171612", "url": "https://bugzilla.suse.com/1171612" }, { "category": "self", "summary": "SUSE Bug 1171613", "url": "https://bugzilla.suse.com/1171613" }, { "category": "self", "summary": "SUSE Bug 1171614", "url": "https://bugzilla.suse.com/1171614" }, { "category": "self", "summary": "SUSE Bug 1171615", "url": "https://bugzilla.suse.com/1171615" }, { "category": "self", "summary": "SUSE Bug 1171616", "url": "https://bugzilla.suse.com/1171616" }, { "category": "self", "summary": "SUSE Bug 1171617", "url": "https://bugzilla.suse.com/1171617" }, { "category": "self", "summary": "SUSE Bug 1171618", "url": "https://bugzilla.suse.com/1171618" }, { "category": "self", "summary": "SUSE Bug 1171619", "url": "https://bugzilla.suse.com/1171619" }, { "category": "self", "summary": "SUSE Bug 1171620", "url": "https://bugzilla.suse.com/1171620" }, { "category": "self", "summary": "SUSE Bug 1171621", "url": "https://bugzilla.suse.com/1171621" }, { "category": "self", "summary": "SUSE Bug 1171622", "url": "https://bugzilla.suse.com/1171622" }, { "category": "self", "summary": "SUSE Bug 1171623", "url": "https://bugzilla.suse.com/1171623" }, { "category": "self", "summary": "SUSE Bug 1171624", "url": "https://bugzilla.suse.com/1171624" }, { "category": "self", "summary": "SUSE Bug 1171625", "url": "https://bugzilla.suse.com/1171625" }, { "category": "self", "summary": "SUSE Bug 1171626", "url": "https://bugzilla.suse.com/1171626" }, { "category": "self", "summary": "SUSE Bug 1171679", "url": "https://bugzilla.suse.com/1171679" }, { "category": "self", "summary": "SUSE Bug 1171691", "url": "https://bugzilla.suse.com/1171691" }, { "category": "self", "summary": "SUSE Bug 1171694", "url": "https://bugzilla.suse.com/1171694" }, { "category": "self", "summary": "SUSE Bug 1171695", "url": "https://bugzilla.suse.com/1171695" }, { "category": "self", "summary": "SUSE Bug 1171736", "url": "https://bugzilla.suse.com/1171736" }, { "category": "self", "summary": "SUSE Bug 1171761", "url": "https://bugzilla.suse.com/1171761" }, { "category": "self", "summary": "SUSE Bug 1171948", "url": "https://bugzilla.suse.com/1171948" }, { "category": "self", "summary": "SUSE Bug 1171949", "url": "https://bugzilla.suse.com/1171949" }, { "category": "self", "summary": "SUSE Bug 1171951", "url": "https://bugzilla.suse.com/1171951" }, { "category": "self", "summary": "SUSE Bug 1171952", "url": "https://bugzilla.suse.com/1171952" }, { "category": "self", "summary": "SUSE Bug 1171982", "url": "https://bugzilla.suse.com/1171982" }, { "category": "self", "summary": "SUSE Bug 1171983", "url": "https://bugzilla.suse.com/1171983" }, { "category": "self", "summary": "SUSE Bug 1172096", "url": "https://bugzilla.suse.com/1172096" }, { "category": "self", "summary": "SUSE Bug 1172097", "url": "https://bugzilla.suse.com/1172097" }, { "category": "self", "summary": "SUSE Bug 1172098", "url": "https://bugzilla.suse.com/1172098" }, { "category": "self", "summary": "SUSE Bug 1172099", "url": "https://bugzilla.suse.com/1172099" }, { "category": "self", "summary": "SUSE Bug 1172101", "url": "https://bugzilla.suse.com/1172101" }, { "category": "self", "summary": "SUSE Bug 1172102", "url": "https://bugzilla.suse.com/1172102" }, { "category": "self", "summary": "SUSE Bug 1172103", "url": "https://bugzilla.suse.com/1172103" }, { "category": "self", "summary": "SUSE Bug 1172104", "url": "https://bugzilla.suse.com/1172104" }, { "category": "self", "summary": "SUSE Bug 1172127", "url": "https://bugzilla.suse.com/1172127" }, { "category": "self", "summary": "SUSE Bug 1172130", "url": "https://bugzilla.suse.com/1172130" }, { "category": "self", "summary": "SUSE Bug 1172185", "url": "https://bugzilla.suse.com/1172185" }, { "category": "self", "summary": "SUSE Bug 1172188", "url": "https://bugzilla.suse.com/1172188" }, { "category": "self", "summary": "SUSE Bug 1172199", "url": "https://bugzilla.suse.com/1172199" }, { "category": "self", "summary": "SUSE Bug 1172221", "url": "https://bugzilla.suse.com/1172221" }, { "category": "self", "summary": "SUSE Bug 1172253", "url": "https://bugzilla.suse.com/1172253" }, { "category": "self", "summary": "SUSE Bug 1172317", "url": "https://bugzilla.suse.com/1172317" }, { "category": "self", "summary": "SUSE Bug 1172342", "url": "https://bugzilla.suse.com/1172342" }, { "category": "self", "summary": "SUSE Bug 1172343", "url": "https://bugzilla.suse.com/1172343" }, { "category": "self", "summary": "SUSE Bug 1172344", "url": "https://bugzilla.suse.com/1172344" }, { "category": "self", "summary": "SUSE Bug 1172366", "url": "https://bugzilla.suse.com/1172366" }, { "category": "self", "summary": "SUSE Bug 1172391", "url": "https://bugzilla.suse.com/1172391" }, { "category": "self", "summary": "SUSE Bug 1172397", "url": "https://bugzilla.suse.com/1172397" }, { "category": "self", "summary": "SUSE Bug 1172453", "url": "https://bugzilla.suse.com/1172453" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1000199 page", "url": "https://www.suse.com/security/cve/CVE-2018-1000199/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-19462 page", "url": "https://www.suse.com/security/cve/CVE-2019-19462/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-20806 page", "url": "https://www.suse.com/security/cve/CVE-2019-20806/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-20812 page", "url": "https://www.suse.com/security/cve/CVE-2019-20812/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9455 page", "url": "https://www.suse.com/security/cve/CVE-2019-9455/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-0543 page", "url": "https://www.suse.com/security/cve/CVE-2020-0543/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10690 page", "url": "https://www.suse.com/security/cve/CVE-2020-10690/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10711 page", "url": "https://www.suse.com/security/cve/CVE-2020-10711/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10720 page", "url": "https://www.suse.com/security/cve/CVE-2020-10720/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10732 page", "url": "https://www.suse.com/security/cve/CVE-2020-10732/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10751 page", "url": "https://www.suse.com/security/cve/CVE-2020-10751/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10757 page", "url": "https://www.suse.com/security/cve/CVE-2020-10757/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12114 page", "url": "https://www.suse.com/security/cve/CVE-2020-12114/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12464 page", "url": "https://www.suse.com/security/cve/CVE-2020-12464/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12652 page", "url": "https://www.suse.com/security/cve/CVE-2020-12652/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12653 page", "url": "https://www.suse.com/security/cve/CVE-2020-12653/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12654 page", "url": "https://www.suse.com/security/cve/CVE-2020-12654/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12655 page", "url": "https://www.suse.com/security/cve/CVE-2020-12655/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12656 page", "url": "https://www.suse.com/security/cve/CVE-2020-12656/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12657 page", "url": "https://www.suse.com/security/cve/CVE-2020-12657/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12768 page", "url": "https://www.suse.com/security/cve/CVE-2020-12768/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12769 page", "url": "https://www.suse.com/security/cve/CVE-2020-12769/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-13143 page", "url": "https://www.suse.com/security/cve/CVE-2020-13143/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2020-06-10T13:58:29Z", "generator": { "date": "2020-06-10T13:58:29Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2020:1605-1", "initial_release_date": "2020-06-10T13:58:29Z", "revision_history": [ { "date": "2020-06-10T13:58:29Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-95.54.1.aarch64", "product": { "name": "cluster-md-kmp-default-4.12.14-95.54.1.aarch64", "product_id": "cluster-md-kmp-default-4.12.14-95.54.1.aarch64" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-95.54.1.aarch64", "product": { "name": "dlm-kmp-default-4.12.14-95.54.1.aarch64", "product_id": "dlm-kmp-default-4.12.14-95.54.1.aarch64" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-95.54.1.aarch64", "product": { "name": "gfs2-kmp-default-4.12.14-95.54.1.aarch64", "product_id": "gfs2-kmp-default-4.12.14-95.54.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-4.12.14-95.54.1.aarch64", "product": { "name": "kernel-default-4.12.14-95.54.1.aarch64", "product_id": "kernel-default-4.12.14-95.54.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-95.54.1.aarch64", "product": { "name": "kernel-default-base-4.12.14-95.54.1.aarch64", "product_id": "kernel-default-base-4.12.14-95.54.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-95.54.1.aarch64", "product": { "name": "kernel-default-devel-4.12.14-95.54.1.aarch64", "product_id": "kernel-default-devel-4.12.14-95.54.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-95.54.1.aarch64", "product": { "name": "kernel-default-extra-4.12.14-95.54.1.aarch64", "product_id": "kernel-default-extra-4.12.14-95.54.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.12.14-95.54.1.aarch64", "product": { "name": "kernel-default-kgraft-4.12.14-95.54.1.aarch64", "product_id": "kernel-default-kgraft-4.12.14-95.54.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-kgraft-devel-4.12.14-95.54.1.aarch64", "product": { "name": "kernel-default-kgraft-devel-4.12.14-95.54.1.aarch64", "product_id": "kernel-default-kgraft-devel-4.12.14-95.54.1.aarch64" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-95.54.1.aarch64", "product": { "name": "kernel-obs-build-4.12.14-95.54.1.aarch64", "product_id": "kernel-obs-build-4.12.14-95.54.1.aarch64" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-95.54.1.aarch64", "product": { "name": "kernel-obs-qa-4.12.14-95.54.1.aarch64", "product_id": "kernel-obs-qa-4.12.14-95.54.1.aarch64" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-95.54.1.aarch64", "product": { "name": "kernel-syms-4.12.14-95.54.1.aarch64", "product_id": "kernel-syms-4.12.14-95.54.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-95.54.1.aarch64", "product": { "name": "kernel-vanilla-4.12.14-95.54.1.aarch64", "product_id": "kernel-vanilla-4.12.14-95.54.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-95.54.1.aarch64", "product": { "name": "kernel-vanilla-base-4.12.14-95.54.1.aarch64", "product_id": "kernel-vanilla-base-4.12.14-95.54.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-95.54.1.aarch64", "product": { "name": "kernel-vanilla-devel-4.12.14-95.54.1.aarch64", "product_id": "kernel-vanilla-devel-4.12.14-95.54.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-kgraft-devel-4.12.14-95.54.1.aarch64", "product": { "name": "kernel-vanilla-kgraft-devel-4.12.14-95.54.1.aarch64", "product_id": "kernel-vanilla-kgraft-devel-4.12.14-95.54.1.aarch64" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-95.54.1.aarch64", "product": { "name": "kselftests-kmp-default-4.12.14-95.54.1.aarch64", "product_id": "kselftests-kmp-default-4.12.14-95.54.1.aarch64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-95.54.1.aarch64", "product": { "name": "ocfs2-kmp-default-4.12.14-95.54.1.aarch64", "product_id": "ocfs2-kmp-default-4.12.14-95.54.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-4.12.14-95.54.1.noarch", "product": { "name": "kernel-devel-4.12.14-95.54.1.noarch", "product_id": "kernel-devel-4.12.14-95.54.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-4.12.14-95.54.1.noarch", "product": { "name": "kernel-docs-4.12.14-95.54.1.noarch", "product_id": "kernel-docs-4.12.14-95.54.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-html-4.12.14-95.54.1.noarch", "product": { "name": "kernel-docs-html-4.12.14-95.54.1.noarch", "product_id": "kernel-docs-html-4.12.14-95.54.1.noarch" } }, { "category": "product_version", "name": "kernel-macros-4.12.14-95.54.1.noarch", "product": { "name": "kernel-macros-4.12.14-95.54.1.noarch", "product_id": "kernel-macros-4.12.14-95.54.1.noarch" } }, { "category": "product_version", "name": "kernel-source-4.12.14-95.54.1.noarch", "product": { "name": "kernel-source-4.12.14-95.54.1.noarch", "product_id": "kernel-source-4.12.14-95.54.1.noarch" } }, { "category": "product_version", "name": "kernel-source-vanilla-4.12.14-95.54.1.noarch", "product": { "name": "kernel-source-vanilla-4.12.14-95.54.1.noarch", "product_id": "kernel-source-vanilla-4.12.14-95.54.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-95.54.1.ppc64le", "product": { "name": "cluster-md-kmp-default-4.12.14-95.54.1.ppc64le", "product_id": "cluster-md-kmp-default-4.12.14-95.54.1.ppc64le" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-95.54.1.ppc64le", "product": { "name": "dlm-kmp-default-4.12.14-95.54.1.ppc64le", "product_id": "dlm-kmp-default-4.12.14-95.54.1.ppc64le" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-95.54.1.ppc64le", "product": { "name": "gfs2-kmp-default-4.12.14-95.54.1.ppc64le", "product_id": "gfs2-kmp-default-4.12.14-95.54.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-4.12.14-95.54.1.ppc64le", "product": { "name": "kernel-debug-4.12.14-95.54.1.ppc64le", "product_id": "kernel-debug-4.12.14-95.54.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-base-4.12.14-95.54.1.ppc64le", "product": { "name": "kernel-debug-base-4.12.14-95.54.1.ppc64le", "product_id": "kernel-debug-base-4.12.14-95.54.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-devel-4.12.14-95.54.1.ppc64le", "product": { "name": "kernel-debug-devel-4.12.14-95.54.1.ppc64le", "product_id": "kernel-debug-devel-4.12.14-95.54.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-kgraft-devel-4.12.14-95.54.1.ppc64le", "product": { "name": "kernel-debug-kgraft-devel-4.12.14-95.54.1.ppc64le", "product_id": "kernel-debug-kgraft-devel-4.12.14-95.54.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-4.12.14-95.54.1.ppc64le", "product": { "name": "kernel-default-4.12.14-95.54.1.ppc64le", "product_id": "kernel-default-4.12.14-95.54.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-95.54.1.ppc64le", "product": { "name": "kernel-default-base-4.12.14-95.54.1.ppc64le", "product_id": "kernel-default-base-4.12.14-95.54.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-95.54.1.ppc64le", "product": { "name": "kernel-default-devel-4.12.14-95.54.1.ppc64le", "product_id": "kernel-default-devel-4.12.14-95.54.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-95.54.1.ppc64le", "product": { "name": "kernel-default-extra-4.12.14-95.54.1.ppc64le", "product_id": "kernel-default-extra-4.12.14-95.54.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.12.14-95.54.1.ppc64le", "product": { "name": "kernel-default-kgraft-4.12.14-95.54.1.ppc64le", "product_id": "kernel-default-kgraft-4.12.14-95.54.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-kgraft-devel-4.12.14-95.54.1.ppc64le", "product": { "name": "kernel-default-kgraft-devel-4.12.14-95.54.1.ppc64le", "product_id": "kernel-default-kgraft-devel-4.12.14-95.54.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-95.54.1.ppc64le", "product": { "name": "kernel-obs-build-4.12.14-95.54.1.ppc64le", "product_id": "kernel-obs-build-4.12.14-95.54.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-95.54.1.ppc64le", "product": { "name": "kernel-obs-qa-4.12.14-95.54.1.ppc64le", "product_id": "kernel-obs-qa-4.12.14-95.54.1.ppc64le" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-95.54.1.ppc64le", "product": { "name": "kernel-syms-4.12.14-95.54.1.ppc64le", "product_id": "kernel-syms-4.12.14-95.54.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-95.54.1.ppc64le", "product": { "name": "kernel-vanilla-4.12.14-95.54.1.ppc64le", "product_id": "kernel-vanilla-4.12.14-95.54.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-95.54.1.ppc64le", "product": { "name": "kernel-vanilla-base-4.12.14-95.54.1.ppc64le", "product_id": "kernel-vanilla-base-4.12.14-95.54.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-95.54.1.ppc64le", "product": { "name": "kernel-vanilla-devel-4.12.14-95.54.1.ppc64le", "product_id": "kernel-vanilla-devel-4.12.14-95.54.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-kgraft-devel-4.12.14-95.54.1.ppc64le", "product": { "name": "kernel-vanilla-kgraft-devel-4.12.14-95.54.1.ppc64le", "product_id": "kernel-vanilla-kgraft-devel-4.12.14-95.54.1.ppc64le" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-95_54-default-1-6.3.1.ppc64le", "product": { "name": "kgraft-patch-4_12_14-95_54-default-1-6.3.1.ppc64le", "product_id": "kgraft-patch-4_12_14-95_54-default-1-6.3.1.ppc64le" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-95.54.1.ppc64le", "product": { "name": "kselftests-kmp-default-4.12.14-95.54.1.ppc64le", "product_id": "kselftests-kmp-default-4.12.14-95.54.1.ppc64le" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-95.54.1.ppc64le", "product": { "name": "ocfs2-kmp-default-4.12.14-95.54.1.ppc64le", "product_id": "ocfs2-kmp-default-4.12.14-95.54.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-95.54.1.s390x", "product": { "name": "cluster-md-kmp-default-4.12.14-95.54.1.s390x", "product_id": "cluster-md-kmp-default-4.12.14-95.54.1.s390x" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-95.54.1.s390x", "product": { "name": "dlm-kmp-default-4.12.14-95.54.1.s390x", "product_id": "dlm-kmp-default-4.12.14-95.54.1.s390x" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-95.54.1.s390x", "product": { "name": "gfs2-kmp-default-4.12.14-95.54.1.s390x", "product_id": "gfs2-kmp-default-4.12.14-95.54.1.s390x" } }, { "category": "product_version", "name": "kernel-default-4.12.14-95.54.1.s390x", "product": { "name": "kernel-default-4.12.14-95.54.1.s390x", "product_id": "kernel-default-4.12.14-95.54.1.s390x" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-95.54.1.s390x", "product": { "name": "kernel-default-base-4.12.14-95.54.1.s390x", "product_id": "kernel-default-base-4.12.14-95.54.1.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-95.54.1.s390x", "product": { "name": "kernel-default-devel-4.12.14-95.54.1.s390x", "product_id": "kernel-default-devel-4.12.14-95.54.1.s390x" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-95.54.1.s390x", "product": { "name": "kernel-default-extra-4.12.14-95.54.1.s390x", "product_id": "kernel-default-extra-4.12.14-95.54.1.s390x" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.12.14-95.54.1.s390x", "product": { "name": "kernel-default-kgraft-4.12.14-95.54.1.s390x", "product_id": "kernel-default-kgraft-4.12.14-95.54.1.s390x" } }, { "category": "product_version", "name": "kernel-default-kgraft-devel-4.12.14-95.54.1.s390x", "product": { "name": "kernel-default-kgraft-devel-4.12.14-95.54.1.s390x", "product_id": "kernel-default-kgraft-devel-4.12.14-95.54.1.s390x" } }, { "category": "product_version", "name": "kernel-default-man-4.12.14-95.54.1.s390x", "product": { "name": "kernel-default-man-4.12.14-95.54.1.s390x", "product_id": "kernel-default-man-4.12.14-95.54.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-95.54.1.s390x", "product": { "name": "kernel-obs-build-4.12.14-95.54.1.s390x", "product_id": "kernel-obs-build-4.12.14-95.54.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-95.54.1.s390x", "product": { "name": "kernel-obs-qa-4.12.14-95.54.1.s390x", "product_id": "kernel-obs-qa-4.12.14-95.54.1.s390x" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-95.54.1.s390x", "product": { "name": "kernel-syms-4.12.14-95.54.1.s390x", "product_id": "kernel-syms-4.12.14-95.54.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-95.54.1.s390x", "product": { "name": "kernel-vanilla-4.12.14-95.54.1.s390x", "product_id": "kernel-vanilla-4.12.14-95.54.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-95.54.1.s390x", "product": { "name": "kernel-vanilla-base-4.12.14-95.54.1.s390x", "product_id": "kernel-vanilla-base-4.12.14-95.54.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-95.54.1.s390x", "product": { "name": "kernel-vanilla-devel-4.12.14-95.54.1.s390x", "product_id": "kernel-vanilla-devel-4.12.14-95.54.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-kgraft-devel-4.12.14-95.54.1.s390x", "product": { "name": "kernel-vanilla-kgraft-devel-4.12.14-95.54.1.s390x", "product_id": "kernel-vanilla-kgraft-devel-4.12.14-95.54.1.s390x" } }, { "category": "product_version", "name": "kernel-zfcpdump-4.12.14-95.54.1.s390x", "product": { "name": "kernel-zfcpdump-4.12.14-95.54.1.s390x", "product_id": "kernel-zfcpdump-4.12.14-95.54.1.s390x" } }, { "category": "product_version", "name": "kernel-zfcpdump-man-4.12.14-95.54.1.s390x", "product": { "name": "kernel-zfcpdump-man-4.12.14-95.54.1.s390x", "product_id": "kernel-zfcpdump-man-4.12.14-95.54.1.s390x" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-95_54-default-1-6.3.1.s390x", "product": { "name": "kgraft-patch-4_12_14-95_54-default-1-6.3.1.s390x", "product_id": "kgraft-patch-4_12_14-95_54-default-1-6.3.1.s390x" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-95.54.1.s390x", "product": { "name": "kselftests-kmp-default-4.12.14-95.54.1.s390x", "product_id": "kselftests-kmp-default-4.12.14-95.54.1.s390x" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-95.54.1.s390x", "product": { "name": "ocfs2-kmp-default-4.12.14-95.54.1.s390x", "product_id": "ocfs2-kmp-default-4.12.14-95.54.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-95.54.1.x86_64", "product": { "name": "cluster-md-kmp-default-4.12.14-95.54.1.x86_64", "product_id": "cluster-md-kmp-default-4.12.14-95.54.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-95.54.1.x86_64", "product": { "name": "dlm-kmp-default-4.12.14-95.54.1.x86_64", "product_id": "dlm-kmp-default-4.12.14-95.54.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-95.54.1.x86_64", "product": { "name": "gfs2-kmp-default-4.12.14-95.54.1.x86_64", "product_id": "gfs2-kmp-default-4.12.14-95.54.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-4.12.14-95.54.1.x86_64", "product": { "name": "kernel-debug-4.12.14-95.54.1.x86_64", "product_id": "kernel-debug-4.12.14-95.54.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-base-4.12.14-95.54.1.x86_64", "product": { "name": "kernel-debug-base-4.12.14-95.54.1.x86_64", "product_id": "kernel-debug-base-4.12.14-95.54.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-devel-4.12.14-95.54.1.x86_64", "product": { "name": "kernel-debug-devel-4.12.14-95.54.1.x86_64", "product_id": "kernel-debug-devel-4.12.14-95.54.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-kgraft-devel-4.12.14-95.54.1.x86_64", "product": { "name": "kernel-debug-kgraft-devel-4.12.14-95.54.1.x86_64", "product_id": "kernel-debug-kgraft-devel-4.12.14-95.54.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-4.12.14-95.54.1.x86_64", "product": { "name": "kernel-default-4.12.14-95.54.1.x86_64", "product_id": "kernel-default-4.12.14-95.54.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-95.54.1.x86_64", "product": { "name": "kernel-default-base-4.12.14-95.54.1.x86_64", "product_id": "kernel-default-base-4.12.14-95.54.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-95.54.1.x86_64", "product": { "name": "kernel-default-devel-4.12.14-95.54.1.x86_64", "product_id": "kernel-default-devel-4.12.14-95.54.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-95.54.1.x86_64", "product": { "name": "kernel-default-extra-4.12.14-95.54.1.x86_64", "product_id": "kernel-default-extra-4.12.14-95.54.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.12.14-95.54.1.x86_64", "product": { "name": "kernel-default-kgraft-4.12.14-95.54.1.x86_64", "product_id": "kernel-default-kgraft-4.12.14-95.54.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-kgraft-devel-4.12.14-95.54.1.x86_64", "product": { "name": "kernel-default-kgraft-devel-4.12.14-95.54.1.x86_64", "product_id": "kernel-default-kgraft-devel-4.12.14-95.54.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-4.12.14-95.54.1.x86_64", "product": { "name": "kernel-kvmsmall-4.12.14-95.54.1.x86_64", "product_id": "kernel-kvmsmall-4.12.14-95.54.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-base-4.12.14-95.54.1.x86_64", "product": { "name": "kernel-kvmsmall-base-4.12.14-95.54.1.x86_64", "product_id": "kernel-kvmsmall-base-4.12.14-95.54.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-devel-4.12.14-95.54.1.x86_64", "product": { "name": "kernel-kvmsmall-devel-4.12.14-95.54.1.x86_64", "product_id": "kernel-kvmsmall-devel-4.12.14-95.54.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-kgraft-devel-4.12.14-95.54.1.x86_64", "product": { "name": "kernel-kvmsmall-kgraft-devel-4.12.14-95.54.1.x86_64", "product_id": "kernel-kvmsmall-kgraft-devel-4.12.14-95.54.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-95.54.1.x86_64", "product": { "name": "kernel-obs-build-4.12.14-95.54.1.x86_64", "product_id": "kernel-obs-build-4.12.14-95.54.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-95.54.1.x86_64", "product": { "name": "kernel-obs-qa-4.12.14-95.54.1.x86_64", "product_id": "kernel-obs-qa-4.12.14-95.54.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-95.54.1.x86_64", "product": { "name": "kernel-syms-4.12.14-95.54.1.x86_64", "product_id": "kernel-syms-4.12.14-95.54.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-95.54.1.x86_64", "product": { "name": "kernel-vanilla-4.12.14-95.54.1.x86_64", "product_id": "kernel-vanilla-4.12.14-95.54.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-95.54.1.x86_64", "product": { "name": "kernel-vanilla-base-4.12.14-95.54.1.x86_64", "product_id": "kernel-vanilla-base-4.12.14-95.54.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-95.54.1.x86_64", "product": { "name": "kernel-vanilla-devel-4.12.14-95.54.1.x86_64", "product_id": "kernel-vanilla-devel-4.12.14-95.54.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-kgraft-devel-4.12.14-95.54.1.x86_64", "product": { "name": "kernel-vanilla-kgraft-devel-4.12.14-95.54.1.x86_64", "product_id": "kernel-vanilla-kgraft-devel-4.12.14-95.54.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-95_54-default-1-6.3.1.x86_64", "product": { "name": "kgraft-patch-4_12_14-95_54-default-1-6.3.1.x86_64", "product_id": "kgraft-patch-4_12_14-95_54-default-1-6.3.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-95.54.1.x86_64", "product": { "name": "kselftests-kmp-default-4.12.14-95.54.1.x86_64", "product_id": "kselftests-kmp-default-4.12.14-95.54.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-95.54.1.x86_64", "product": { "name": "ocfs2-kmp-default-4.12.14-95.54.1.x86_64", "product_id": "ocfs2-kmp-default-4.12.14-95.54.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise High Availability Extension 12 SP4", "product": { "name": "SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-ha:12:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12 SP4", "product": { "name": "SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Software Development Kit 12 SP4", "product": { "name": "SUSE Linux Enterprise Software Development Kit 12 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-sdk:12:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP4", "product": { "name": "SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sles:12:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Workstation Extension 12 SP4", "product": { "name": "SUSE Linux Enterprise Workstation Extension 12 SP4", "product_id": "SUSE Linux Enterprise Workstation Extension 12 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-we:12:sp4" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-95.54.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.ppc64le" }, "product_reference": "cluster-md-kmp-default-4.12.14-95.54.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-95.54.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.s390x" }, "product_reference": "cluster-md-kmp-default-4.12.14-95.54.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-95.54.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.x86_64" }, "product_reference": "cluster-md-kmp-default-4.12.14-95.54.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-95.54.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.ppc64le" }, "product_reference": "dlm-kmp-default-4.12.14-95.54.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-95.54.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.s390x" }, "product_reference": "dlm-kmp-default-4.12.14-95.54.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-95.54.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.x86_64" }, "product_reference": "dlm-kmp-default-4.12.14-95.54.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-95.54.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.ppc64le" }, "product_reference": "gfs2-kmp-default-4.12.14-95.54.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-95.54.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.s390x" }, "product_reference": "gfs2-kmp-default-4.12.14-95.54.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-95.54.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.x86_64" }, "product_reference": "gfs2-kmp-default-4.12.14-95.54.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-95.54.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.ppc64le" }, "product_reference": "ocfs2-kmp-default-4.12.14-95.54.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-95.54.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.s390x" }, "product_reference": "ocfs2-kmp-default-4.12.14-95.54.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-95.54.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.x86_64" }, "product_reference": "ocfs2-kmp-default-4.12.14-95.54.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-kgraft-4.12.14-95.54.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.ppc64le" }, "product_reference": "kernel-default-kgraft-4.12.14-95.54.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-kgraft-4.12.14-95.54.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.s390x" }, "product_reference": "kernel-default-kgraft-4.12.14-95.54.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-kgraft-4.12.14-95.54.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.x86_64" }, "product_reference": "kernel-default-kgraft-4.12.14-95.54.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-kgraft-devel-4.12.14-95.54.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.ppc64le" }, "product_reference": "kernel-default-kgraft-devel-4.12.14-95.54.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-kgraft-devel-4.12.14-95.54.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.s390x" }, "product_reference": "kernel-default-kgraft-devel-4.12.14-95.54.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-kgraft-devel-4.12.14-95.54.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.x86_64" }, "product_reference": "kernel-default-kgraft-devel-4.12.14-95.54.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_54-default-1-6.3.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-95_54-default-1-6.3.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_54-default-1-6.3.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-95_54-default-1-6.3.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_54-default-1-6.3.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-95_54-default-1-6.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-4.12.14-95.54.1.noarch as component of SUSE Linux Enterprise Software Development Kit 12 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.54.1.noarch" }, "product_reference": "kernel-docs-4.12.14-95.54.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-95.54.1.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.aarch64" }, "product_reference": "kernel-obs-build-4.12.14-95.54.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-95.54.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.ppc64le" }, "product_reference": "kernel-obs-build-4.12.14-95.54.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-95.54.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.s390x" }, "product_reference": "kernel-obs-build-4.12.14-95.54.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-95.54.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.x86_64" }, "product_reference": "kernel-obs-build-4.12.14-95.54.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-95.54.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.aarch64" }, "product_reference": "kernel-default-4.12.14-95.54.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-95.54.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.ppc64le" }, "product_reference": "kernel-default-4.12.14-95.54.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-95.54.1.s390x as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.s390x" }, "product_reference": "kernel-default-4.12.14-95.54.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-95.54.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.x86_64" }, "product_reference": "kernel-default-4.12.14-95.54.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-95.54.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.aarch64" }, "product_reference": "kernel-default-base-4.12.14-95.54.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-95.54.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.ppc64le" }, "product_reference": "kernel-default-base-4.12.14-95.54.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-95.54.1.s390x as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.s390x" }, "product_reference": "kernel-default-base-4.12.14-95.54.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-95.54.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.x86_64" }, "product_reference": "kernel-default-base-4.12.14-95.54.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-95.54.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.aarch64" }, "product_reference": "kernel-default-devel-4.12.14-95.54.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-95.54.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.ppc64le" }, "product_reference": "kernel-default-devel-4.12.14-95.54.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-95.54.1.s390x as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.s390x" }, "product_reference": "kernel-default-devel-4.12.14-95.54.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-95.54.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.x86_64" }, "product_reference": "kernel-default-devel-4.12.14-95.54.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-4.12.14-95.54.1.s390x as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.54.1.s390x" }, "product_reference": "kernel-default-man-4.12.14-95.54.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.12.14-95.54.1.noarch as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.54.1.noarch" }, "product_reference": "kernel-devel-4.12.14-95.54.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.12.14-95.54.1.noarch as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.54.1.noarch" }, "product_reference": "kernel-macros-4.12.14-95.54.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.12.14-95.54.1.noarch as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.54.1.noarch" }, "product_reference": "kernel-source-4.12.14-95.54.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-95.54.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.aarch64" }, "product_reference": "kernel-syms-4.12.14-95.54.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-95.54.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.ppc64le" }, "product_reference": "kernel-syms-4.12.14-95.54.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-95.54.1.s390x as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.s390x" }, "product_reference": "kernel-syms-4.12.14-95.54.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-95.54.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.x86_64" }, "product_reference": "kernel-syms-4.12.14-95.54.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-95.54.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.aarch64" }, "product_reference": "kernel-default-4.12.14-95.54.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-95.54.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.ppc64le" }, "product_reference": "kernel-default-4.12.14-95.54.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-95.54.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.s390x" }, "product_reference": "kernel-default-4.12.14-95.54.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-95.54.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.x86_64" }, "product_reference": "kernel-default-4.12.14-95.54.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-95.54.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.aarch64" }, "product_reference": "kernel-default-base-4.12.14-95.54.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-95.54.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.ppc64le" }, "product_reference": "kernel-default-base-4.12.14-95.54.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-95.54.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.s390x" }, "product_reference": "kernel-default-base-4.12.14-95.54.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-95.54.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.x86_64" }, "product_reference": "kernel-default-base-4.12.14-95.54.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-95.54.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.aarch64" }, "product_reference": "kernel-default-devel-4.12.14-95.54.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-95.54.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.ppc64le" }, "product_reference": "kernel-default-devel-4.12.14-95.54.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-95.54.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.s390x" }, "product_reference": "kernel-default-devel-4.12.14-95.54.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-95.54.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.x86_64" }, "product_reference": "kernel-default-devel-4.12.14-95.54.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-4.12.14-95.54.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.54.1.s390x" }, "product_reference": "kernel-default-man-4.12.14-95.54.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.12.14-95.54.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.54.1.noarch" }, "product_reference": "kernel-devel-4.12.14-95.54.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.12.14-95.54.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.54.1.noarch" }, "product_reference": "kernel-macros-4.12.14-95.54.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.12.14-95.54.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.54.1.noarch" }, "product_reference": "kernel-source-4.12.14-95.54.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-95.54.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.aarch64" }, "product_reference": "kernel-syms-4.12.14-95.54.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-95.54.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.ppc64le" }, "product_reference": "kernel-syms-4.12.14-95.54.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-95.54.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.s390x" }, "product_reference": "kernel-syms-4.12.14-95.54.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-95.54.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.x86_64" }, "product_reference": "kernel-syms-4.12.14-95.54.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-extra-4.12.14-95.54.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 12 SP4", "product_id": "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.54.1.x86_64" }, "product_reference": "kernel-default-extra-4.12.14-95.54.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 12 SP4" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-1000199", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1000199" } ], "notes": [ { "category": "general", "text": "The Linux Kernel version 3.18 contains a dangerous feature vulnerability in modify_user_hw_breakpoint() that can result in crash and possibly memory corruption. This attack appear to be exploitable via local code execution and the ability to use ptrace. This vulnerability appears to have been fixed in git commit f67b15037a7a50c57f72e69a6d59941ad90a0f0f.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.54.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1000199", "url": "https://www.suse.com/security/cve/CVE-2018-1000199" }, { "category": "external", "summary": "SUSE Bug 1089895 for CVE-2018-1000199", "url": "https://bugzilla.suse.com/1089895" }, { "category": "external", "summary": "SUSE Bug 1090036 for CVE-2018-1000199", "url": "https://bugzilla.suse.com/1090036" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.54.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.54.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-10T13:58:29Z", "details": "important" } ], "title": "CVE-2018-1000199" }, { "cve": "CVE-2019-19462", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-19462" } ], "notes": [ { "category": "general", "text": "relay_open in kernel/relay.c in the Linux kernel through 5.4.1 allows local users to cause a denial of service (such as relay blockage) by triggering a NULL alloc_percpu result.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.54.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-19462", "url": "https://www.suse.com/security/cve/CVE-2019-19462" }, { "category": "external", "summary": "SUSE Bug 1158265 for CVE-2019-19462", "url": "https://bugzilla.suse.com/1158265" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.54.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.54.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-10T13:58:29Z", "details": "low" } ], "title": "CVE-2019-19462" }, { "cve": "CVE-2019-20806", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-20806" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.2. There is a NULL pointer dereference in tw5864_handle_frame() in drivers/media/pci/tw5864/tw5864-video.c, which may cause denial of service, aka CID-2e7682ebfc75.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.54.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-20806", "url": "https://www.suse.com/security/cve/CVE-2019-20806" }, { "category": "external", "summary": "SUSE Bug 1172199 for CVE-2019-20806", "url": "https://bugzilla.suse.com/1172199" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.54.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.9, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.54.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-10T13:58:29Z", "details": "low" } ], "title": "CVE-2019-20806" }, { "cve": "CVE-2019-20812", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-20812" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.4.7. The prb_calc_retire_blk_tmo() function in net/packet/af_packet.c can result in a denial of service (CPU consumption and soft lockup) in a certain failure case involving TPACKET_V3, aka CID-b43d1f9f7067.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.54.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-20812", "url": "https://www.suse.com/security/cve/CVE-2019-20812" }, { "category": "external", "summary": "SUSE Bug 1172453 for CVE-2019-20812", "url": "https://bugzilla.suse.com/1172453" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.54.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.54.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-10T13:58:29Z", "details": "moderate" } ], "title": "CVE-2019-20812" }, { "cve": "CVE-2019-9455", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9455" } ], "notes": [ { "category": "general", "text": "In the Android kernel in the video driver there is a kernel pointer leak due to a WARN_ON statement. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.54.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9455", "url": "https://www.suse.com/security/cve/CVE-2019-9455" }, { "category": "external", "summary": "SUSE Bug 1170345 for CVE-2019-9455", "url": "https://bugzilla.suse.com/1170345" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.54.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.54.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-10T13:58:29Z", "details": "moderate" } ], "title": "CVE-2019-9455" }, { "cve": "CVE-2020-0543", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-0543" } ], "notes": [ { "category": "general", "text": "Incomplete cleanup from specific special register read operations in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.54.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-0543", "url": "https://www.suse.com/security/cve/CVE-2020-0543" }, { "category": "external", "summary": "SUSE Bug 1154824 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1154824" }, { "category": "external", "summary": "SUSE Bug 1172205 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172205" }, { "category": "external", "summary": "SUSE Bug 1172206 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172206" }, { "category": "external", "summary": "SUSE Bug 1172207 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172207" }, { "category": "external", "summary": "SUSE Bug 1172770 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172770" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.54.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.54.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-10T13:58:29Z", "details": "moderate" } ], "title": "CVE-2020-0543" }, { "cve": "CVE-2020-10690", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10690" } ], "notes": [ { "category": "general", "text": "There is a use-after-free in kernel versions before 5.5 due to a race condition between the release of ptp_clock and cdev while resource deallocation. When a (high privileged) process allocates a ptp device file (like /dev/ptpX) and voluntarily goes to sleep. During this time if the underlying device is removed, it can cause an exploitable condition as the process wakes up to terminate and clean all attached files. The system crashes due to the cdev structure being invalid (as already freed) which is pointed to by the inode.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.54.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10690", "url": "https://www.suse.com/security/cve/CVE-2020-10690" }, { "category": "external", "summary": "SUSE Bug 1170056 for CVE-2020-10690", "url": "https://bugzilla.suse.com/1170056" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.54.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.54.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-10T13:58:29Z", "details": "moderate" } ], "title": "CVE-2020-10690" }, { "cve": "CVE-2020-10711", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10711" } ], "notes": [ { "category": "general", "text": "A NULL pointer dereference flaw was found in the Linux kernel\u0027s SELinux subsystem in versions before 5.7. This flaw occurs while importing the Commercial IP Security Option (CIPSO) protocol\u0027s category bitmap into the SELinux extensible bitmap via the\u0027 ebitmap_netlbl_import\u0027 routine. While processing the CIPSO restricted bitmap tag in the \u0027cipso_v4_parsetag_rbm\u0027 routine, it sets the security attribute to indicate that the category bitmap is present, even if it has not been allocated. This issue leads to a NULL pointer dereference issue while importing the same category bitmap into SELinux. This flaw allows a remote network user to crash the system kernel, resulting in a denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.54.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10711", "url": "https://www.suse.com/security/cve/CVE-2020-10711" }, { "category": "external", "summary": "SUSE Bug 1171191 for CVE-2020-10711", "url": "https://bugzilla.suse.com/1171191" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.54.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.54.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-10T13:58:29Z", "details": "moderate" } ], "title": "CVE-2020-10711" }, { "cve": "CVE-2020-10720", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10720" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s implementation of GRO in versions before 5.2. This flaw allows an attacker with local access to crash the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.54.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10720", "url": "https://www.suse.com/security/cve/CVE-2020-10720" }, { "category": "external", "summary": "SUSE Bug 1170778 for CVE-2020-10720", "url": "https://bugzilla.suse.com/1170778" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.54.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.54.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-10T13:58:29Z", "details": "moderate" } ], "title": "CVE-2020-10720" }, { "cve": "CVE-2020-10732", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10732" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s implementation of Userspace core dumps. This flaw allows an attacker with a local account to crash a trivial program and exfiltrate private kernel data.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.54.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10732", "url": "https://www.suse.com/security/cve/CVE-2020-10732" }, { "category": "external", "summary": "SUSE Bug 1171220 for CVE-2020-10732", "url": "https://bugzilla.suse.com/1171220" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.54.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.54.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-10T13:58:29Z", "details": "low" } ], "title": "CVE-2020-10732" }, { "cve": "CVE-2020-10751", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10751" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernels SELinux LSM hook implementation before version 5.7, where it incorrectly assumed that an skb would only contain a single netlink message. The hook would incorrectly only validate the first netlink message in the skb and allow or deny the rest of the messages within the skb with the granted permission without further processing.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.54.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10751", "url": "https://www.suse.com/security/cve/CVE-2020-10751" }, { "category": "external", "summary": "SUSE Bug 1171189 for CVE-2020-10751", "url": "https://bugzilla.suse.com/1171189" }, { "category": "external", "summary": "SUSE Bug 1174963 for CVE-2020-10751", "url": "https://bugzilla.suse.com/1174963" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.54.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.54.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-10T13:58:29Z", "details": "moderate" } ], "title": "CVE-2020-10751" }, { "cve": "CVE-2020-10757", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10757" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux Kernel in versions after 4.5-rc1 in the way mremap handled DAX Huge Pages. This flaw allows a local attacker with access to a DAX enabled storage to escalate their privileges on the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.54.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10757", "url": "https://www.suse.com/security/cve/CVE-2020-10757" }, { "category": "external", "summary": "SUSE Bug 1159281 for CVE-2020-10757", "url": "https://bugzilla.suse.com/1159281" }, { "category": "external", "summary": "SUSE Bug 1172317 for CVE-2020-10757", "url": "https://bugzilla.suse.com/1172317" }, { "category": "external", "summary": "SUSE Bug 1172437 for CVE-2020-10757", "url": "https://bugzilla.suse.com/1172437" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.54.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.54.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-10T13:58:29Z", "details": "important" } ], "title": "CVE-2020-10757" }, { "cve": "CVE-2020-12114", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12114" } ], "notes": [ { "category": "general", "text": "A pivot_root race condition in fs/namespace.c in the Linux kernel 4.4.x before 4.4.221, 4.9.x before 4.9.221, 4.14.x before 4.14.178, 4.19.x before 4.19.119, and 5.x before 5.3 allows local users to cause a denial of service (panic) by corrupting a mountpoint reference counter.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.54.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12114", "url": "https://www.suse.com/security/cve/CVE-2020-12114" }, { "category": "external", "summary": "SUSE Bug 1171098 for CVE-2020-12114", "url": "https://bugzilla.suse.com/1171098" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.54.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.54.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-10T13:58:29Z", "details": "moderate" } ], "title": "CVE-2020-12114" }, { "cve": "CVE-2020-12464", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12464" } ], "notes": [ { "category": "general", "text": "usb_sg_cancel in drivers/usb/core/message.c in the Linux kernel before 5.6.8 has a use-after-free because a transfer occurs without a reference, aka CID-056ad39ee925.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.54.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12464", "url": "https://www.suse.com/security/cve/CVE-2020-12464" }, { "category": "external", "summary": "SUSE Bug 1170901 for CVE-2020-12464", "url": "https://bugzilla.suse.com/1170901" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.54.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 1.8, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.54.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-10T13:58:29Z", "details": "low" } ], "title": "CVE-2020-12464" }, { "cve": "CVE-2020-12652", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12652" } ], "notes": [ { "category": "general", "text": "The __mptctl_ioctl function in drivers/message/fusion/mptctl.c in the Linux kernel before 5.4.14 allows local users to hold an incorrect lock during the ioctl operation and trigger a race condition, i.e., a \"double fetch\" vulnerability, aka CID-28d76df18f0a. NOTE: the vendor states \"The security impact of this bug is not as bad as it could have been because these operations are all privileged and root already has enormous destructive power.\"", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.54.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12652", "url": "https://www.suse.com/security/cve/CVE-2020-12652" }, { "category": "external", "summary": "SUSE Bug 1171218 for CVE-2020-12652", "url": "https://bugzilla.suse.com/1171218" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.54.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.54.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-10T13:58:29Z", "details": "moderate" } ], "title": "CVE-2020-12652" }, { "cve": "CVE-2020-12653", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12653" } ], "notes": [ { "category": "general", "text": "An issue was found in Linux kernel before 5.5.4. The mwifiex_cmd_append_vsie_tlv() function in drivers/net/wireless/marvell/mwifiex/scan.c allows local users to gain privileges or cause a denial of service because of an incorrect memcpy and buffer overflow, aka CID-b70261a288ea.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.54.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12653", "url": "https://www.suse.com/security/cve/CVE-2020-12653" }, { "category": "external", "summary": "SUSE Bug 1159281 for CVE-2020-12653", "url": "https://bugzilla.suse.com/1159281" }, { "category": "external", "summary": "SUSE Bug 1171195 for CVE-2020-12653", "url": "https://bugzilla.suse.com/1171195" }, { "category": "external", "summary": "SUSE Bug 1171254 for CVE-2020-12653", "url": "https://bugzilla.suse.com/1171254" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.54.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.54.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-10T13:58:29Z", "details": "important" } ], "title": "CVE-2020-12653" }, { "cve": "CVE-2020-12654", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12654" } ], "notes": [ { "category": "general", "text": "An issue was found in Linux kernel before 5.5.4. mwifiex_ret_wmm_get_status() in drivers/net/wireless/marvell/mwifiex/wmm.c allows a remote AP to trigger a heap-based buffer overflow because of an incorrect memcpy, aka CID-3a9b153c5591.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.54.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12654", "url": "https://www.suse.com/security/cve/CVE-2020-12654" }, { "category": "external", "summary": "SUSE Bug 1159281 for CVE-2020-12654", "url": "https://bugzilla.suse.com/1159281" }, { "category": "external", "summary": "SUSE Bug 1171202 for CVE-2020-12654", "url": "https://bugzilla.suse.com/1171202" }, { "category": "external", "summary": "SUSE Bug 1171252 for CVE-2020-12654", "url": "https://bugzilla.suse.com/1171252" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.54.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.54.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-10T13:58:29Z", "details": "important" } ], "title": "CVE-2020-12654" }, { "cve": "CVE-2020-12655", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12655" } ], "notes": [ { "category": "general", "text": "An issue was discovered in xfs_agf_verify in fs/xfs/libxfs/xfs_alloc.c in the Linux kernel through 5.6.10. Attackers may trigger a sync of excessive duration via an XFS v5 image with crafted metadata, aka CID-d0c7feaf8767.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.54.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12655", "url": "https://www.suse.com/security/cve/CVE-2020-12655" }, { "category": "external", "summary": "SUSE Bug 1171217 for CVE-2020-12655", "url": "https://bugzilla.suse.com/1171217" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.54.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.8, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.54.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-10T13:58:29Z", "details": "moderate" } ], "title": "CVE-2020-12655" }, { "cve": "CVE-2020-12656", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12656" } ], "notes": [ { "category": "general", "text": "gss_mech_free in net/sunrpc/auth_gss/gss_mech_switch.c in the rpcsec_gss_krb5 implementation in the Linux kernel through 5.6.10 lacks certain domain_release calls, leading to a memory leak. Note: This was disputed with the assertion that the issue does not grant any access not already available. It is a problem that on unloading a specific kernel module some memory is leaked, but loading kernel modules is a privileged operation. A user could also write a kernel module to consume any amount of memory they like and load that replicating the effect of this bug", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.54.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12656", "url": "https://www.suse.com/security/cve/CVE-2020-12656" }, { "category": "external", "summary": "SUSE Bug 1171219 for CVE-2020-12656", "url": "https://bugzilla.suse.com/1171219" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.54.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.9, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.54.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-10T13:58:29Z", "details": "low" } ], "title": "CVE-2020-12656" }, { "cve": "CVE-2020-12657", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12657" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.6.5. There is a use-after-free in block/bfq-iosched.c related to bfq_idle_slice_timer_body.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.54.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12657", "url": "https://www.suse.com/security/cve/CVE-2020-12657" }, { "category": "external", "summary": "SUSE Bug 1171205 for CVE-2020-12657", "url": "https://bugzilla.suse.com/1171205" }, { "category": "external", "summary": "SUSE Bug 1201585 for CVE-2020-12657", "url": "https://bugzilla.suse.com/1201585" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.54.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.54.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-10T13:58:29Z", "details": "important" } ], "title": "CVE-2020-12657" }, { "cve": "CVE-2020-12768", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12768" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.6. svm_cpu_uninit in arch/x86/kvm/svm.c has a memory leak, aka CID-d80b64ff297e. NOTE: third parties dispute this issue because it\u0027s a one-time leak at the boot, the size is negligible, and it can\u0027t be triggered at will", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.54.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12768", "url": "https://www.suse.com/security/cve/CVE-2020-12768" }, { "category": "external", "summary": "SUSE Bug 1171736 for CVE-2020-12768", "url": "https://bugzilla.suse.com/1171736" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.54.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.54.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-10T13:58:29Z", "details": "moderate" } ], "title": "CVE-2020-12768" }, { "cve": "CVE-2020-12769", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12769" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.4.17. drivers/spi/spi-dw.c allows attackers to cause a panic via concurrent calls to dw_spi_irq and dw_spi_transfer_one, aka CID-19b61392c5a8.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.54.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12769", "url": "https://www.suse.com/security/cve/CVE-2020-12769" }, { "category": "external", "summary": "SUSE Bug 1171983 for CVE-2020-12769", "url": "https://bugzilla.suse.com/1171983" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.54.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.54.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-10T13:58:29Z", "details": "moderate" } ], "title": "CVE-2020-12769" }, { "cve": "CVE-2020-13143", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-13143" } ], "notes": [ { "category": "general", "text": "gadget_dev_desc_UDC_store in drivers/usb/gadget/configfs.c in the Linux kernel 3.16 through 5.6.13 relies on kstrdup without considering the possibility of an internal \u0027\\0\u0027 value, which allows attackers to trigger an out-of-bounds read, aka CID-15753588bcd4.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.54.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-13143", "url": "https://www.suse.com/security/cve/CVE-2020-13143" }, { "category": "external", "summary": "SUSE Bug 1171982 for CVE-2020-13143", "url": "https://bugzilla.suse.com/1171982" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.54.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.54.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.54.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.54.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-10T13:58:29Z", "details": "moderate" } ], "title": "CVE-2020-13143" } ] }
suse-su-2020:1889-1
Vulnerability from csaf_suse
Published
2020-07-10 13:51
Modified
2020-07-10 13:51
Summary
Security update for xen
Notes
Title of the patch
Security update for xen
Description of the patch
This update for xen fixes the following issues:
- CVE-2020-15563: Fixed inverted code paths in x86 dirty VRAM tracking (bsc#1173377).
- CVE-2020-15565: Fixed insufficient cache write-back under VT-d (bsc#1173378).
- CVE-2020-15566: Fixed incorrect error handling in event channel port allocation (bsc#1173376).
- CVE-2020-15567: Fixed non-atomic modification of live EPT PTE (bsc#1173380).
- CVE-2020-0543: Special Register Buffer Data Sampling (SRBDS) aka 'CrossTalk' (bsc#1172205).
Additional upstream bug fixes (bsc#1027519)
Patchnames
SUSE-2020-1889,SUSE-SLE-Module-Basesystem-15-SP1-2020-1889,SUSE-SLE-Module-Server-Applications-15-SP1-2020-1889
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for xen", "title": "Title of the patch" }, { "category": "description", "text": "This update for xen fixes the following issues:\n\n- CVE-2020-15563: Fixed inverted code paths in x86 dirty VRAM tracking (bsc#1173377).\n- CVE-2020-15565: Fixed insufficient cache write-back under VT-d (bsc#1173378).\n- CVE-2020-15566: Fixed incorrect error handling in event channel port allocation (bsc#1173376).\n- CVE-2020-15567: Fixed non-atomic modification of live EPT PTE (bsc#1173380).\n- CVE-2020-0543: Special Register Buffer Data Sampling (SRBDS) aka \u0027CrossTalk\u0027 (bsc#1172205).\n\nAdditional upstream bug fixes (bsc#1027519)\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2020-1889,SUSE-SLE-Module-Basesystem-15-SP1-2020-1889,SUSE-SLE-Module-Server-Applications-15-SP1-2020-1889", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2020_1889-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2020:1889-1", "url": "https://www.suse.com/support/update/announcement/2020/suse-su-20201889-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2020:1889-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-July/007118.html" }, { "category": "self", "summary": "SUSE Bug 1027519", "url": "https://bugzilla.suse.com/1027519" }, { "category": "self", "summary": "SUSE Bug 1172205", "url": "https://bugzilla.suse.com/1172205" }, { "category": "self", "summary": "SUSE Bug 1173376", "url": "https://bugzilla.suse.com/1173376" }, { "category": "self", "summary": "SUSE Bug 1173377", "url": "https://bugzilla.suse.com/1173377" }, { "category": "self", "summary": "SUSE Bug 1173378", "url": "https://bugzilla.suse.com/1173378" }, { "category": "self", "summary": "SUSE Bug 1173380", "url": "https://bugzilla.suse.com/1173380" }, { "category": "self", "summary": "SUSE CVE CVE-2020-0543 page", "url": "https://www.suse.com/security/cve/CVE-2020-0543/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-15563 page", "url": "https://www.suse.com/security/cve/CVE-2020-15563/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-15565 page", "url": "https://www.suse.com/security/cve/CVE-2020-15565/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-15566 page", "url": "https://www.suse.com/security/cve/CVE-2020-15566/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-15567 page", "url": "https://www.suse.com/security/cve/CVE-2020-15567/" } ], "title": "Security update for xen", "tracking": { "current_release_date": "2020-07-10T13:51:30Z", "generator": { "date": "2020-07-10T13:51:30Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2020:1889-1", "initial_release_date": "2020-07-10T13:51:30Z", "revision_history": [ { "date": "2020-07-10T13:51:30Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "xen-4.12.3_04-3.22.1.aarch64", "product": { "name": "xen-4.12.3_04-3.22.1.aarch64", "product_id": "xen-4.12.3_04-3.22.1.aarch64" } }, { "category": "product_version", "name": "xen-devel-4.12.3_04-3.22.1.aarch64", "product": { "name": "xen-devel-4.12.3_04-3.22.1.aarch64", "product_id": "xen-devel-4.12.3_04-3.22.1.aarch64" } }, { "category": "product_version", "name": "xen-doc-html-4.12.3_04-3.22.1.aarch64", "product": { "name": "xen-doc-html-4.12.3_04-3.22.1.aarch64", "product_id": "xen-doc-html-4.12.3_04-3.22.1.aarch64" } }, { "category": "product_version", "name": "xen-libs-4.12.3_04-3.22.1.aarch64", "product": { "name": "xen-libs-4.12.3_04-3.22.1.aarch64", "product_id": "xen-libs-4.12.3_04-3.22.1.aarch64" } }, { "category": "product_version", "name": "xen-tools-4.12.3_04-3.22.1.aarch64", "product": { "name": "xen-tools-4.12.3_04-3.22.1.aarch64", "product_id": "xen-tools-4.12.3_04-3.22.1.aarch64" } }, { "category": "product_version", "name": "xen-tools-domU-4.12.3_04-3.22.1.aarch64", "product": { "name": "xen-tools-domU-4.12.3_04-3.22.1.aarch64", "product_id": "xen-tools-domU-4.12.3_04-3.22.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "xen-libs-64bit-4.12.3_04-3.22.1.aarch64_ilp32", "product": { "name": "xen-libs-64bit-4.12.3_04-3.22.1.aarch64_ilp32", "product_id": "xen-libs-64bit-4.12.3_04-3.22.1.aarch64_ilp32" } } ], "category": "architecture", "name": "aarch64_ilp32" }, { "branches": [ { "category": "product_version", "name": "xen-devel-4.12.3_04-3.22.1.i586", "product": { "name": "xen-devel-4.12.3_04-3.22.1.i586", "product_id": "xen-devel-4.12.3_04-3.22.1.i586" } }, { "category": "product_version", "name": "xen-libs-4.12.3_04-3.22.1.i586", "product": { "name": "xen-libs-4.12.3_04-3.22.1.i586", "product_id": "xen-libs-4.12.3_04-3.22.1.i586" } }, { "category": "product_version", "name": "xen-tools-domU-4.12.3_04-3.22.1.i586", "product": { "name": "xen-tools-domU-4.12.3_04-3.22.1.i586", "product_id": "xen-tools-domU-4.12.3_04-3.22.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "xen-4.12.3_04-3.22.1.x86_64", "product": { "name": "xen-4.12.3_04-3.22.1.x86_64", "product_id": "xen-4.12.3_04-3.22.1.x86_64" } }, { "category": "product_version", "name": "xen-devel-4.12.3_04-3.22.1.x86_64", "product": { "name": "xen-devel-4.12.3_04-3.22.1.x86_64", "product_id": "xen-devel-4.12.3_04-3.22.1.x86_64" } }, { "category": "product_version", "name": "xen-doc-html-4.12.3_04-3.22.1.x86_64", "product": { "name": "xen-doc-html-4.12.3_04-3.22.1.x86_64", "product_id": "xen-doc-html-4.12.3_04-3.22.1.x86_64" } }, { "category": "product_version", "name": "xen-libs-4.12.3_04-3.22.1.x86_64", "product": { "name": "xen-libs-4.12.3_04-3.22.1.x86_64", "product_id": "xen-libs-4.12.3_04-3.22.1.x86_64" } }, { "category": "product_version", "name": "xen-libs-32bit-4.12.3_04-3.22.1.x86_64", "product": { "name": "xen-libs-32bit-4.12.3_04-3.22.1.x86_64", "product_id": "xen-libs-32bit-4.12.3_04-3.22.1.x86_64" } }, { "category": "product_version", "name": "xen-tools-4.12.3_04-3.22.1.x86_64", "product": { "name": "xen-tools-4.12.3_04-3.22.1.x86_64", "product_id": "xen-tools-4.12.3_04-3.22.1.x86_64" } }, { "category": "product_version", "name": "xen-tools-domU-4.12.3_04-3.22.1.x86_64", "product": { "name": "xen-tools-domU-4.12.3_04-3.22.1.x86_64", "product_id": "xen-tools-domU-4.12.3_04-3.22.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Module for Basesystem 15 SP1", "product": { "name": "SUSE Linux Enterprise Module for Basesystem 15 SP1", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-basesystem:15:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Module for Server Applications 15 SP1", "product": { "name": "SUSE Linux Enterprise Module for Server Applications 15 SP1", "product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-server-applications:15:sp1" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.12.3_04-3.22.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:xen-libs-4.12.3_04-3.22.1.x86_64" }, "product_reference": "xen-libs-4.12.3_04-3.22.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.12.3_04-3.22.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:xen-tools-domU-4.12.3_04-3.22.1.x86_64" }, "product_reference": "xen-tools-domU-4.12.3_04-3.22.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "xen-4.12.3_04-3.22.1.x86_64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP1", "product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP1:xen-4.12.3_04-3.22.1.x86_64" }, "product_reference": "xen-4.12.3_04-3.22.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "xen-devel-4.12.3_04-3.22.1.x86_64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP1", "product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP1:xen-devel-4.12.3_04-3.22.1.x86_64" }, "product_reference": "xen-devel-4.12.3_04-3.22.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.12.3_04-3.22.1.x86_64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP1", "product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP1:xen-tools-4.12.3_04-3.22.1.x86_64" }, "product_reference": "xen-tools-4.12.3_04-3.22.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP1" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-0543", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-0543" } ], "notes": [ { "category": "general", "text": "Incomplete cleanup from specific special register read operations in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:xen-libs-4.12.3_04-3.22.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:xen-tools-domU-4.12.3_04-3.22.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:xen-4.12.3_04-3.22.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:xen-devel-4.12.3_04-3.22.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:xen-tools-4.12.3_04-3.22.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-0543", "url": "https://www.suse.com/security/cve/CVE-2020-0543" }, { "category": "external", "summary": "SUSE Bug 1154824 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1154824" }, { "category": "external", "summary": "SUSE Bug 1172205 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172205" }, { "category": "external", "summary": "SUSE Bug 1172206 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172206" }, { "category": "external", "summary": "SUSE Bug 1172207 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172207" }, { "category": "external", "summary": "SUSE Bug 1172770 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172770" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:xen-libs-4.12.3_04-3.22.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:xen-tools-domU-4.12.3_04-3.22.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:xen-4.12.3_04-3.22.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:xen-devel-4.12.3_04-3.22.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:xen-tools-4.12.3_04-3.22.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:xen-libs-4.12.3_04-3.22.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:xen-tools-domU-4.12.3_04-3.22.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:xen-4.12.3_04-3.22.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:xen-devel-4.12.3_04-3.22.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:xen-tools-4.12.3_04-3.22.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-07-10T13:51:30Z", "details": "moderate" } ], "title": "CVE-2020-0543" }, { "cve": "CVE-2020-15563", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-15563" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.13.x, allowing x86 HVM guest OS users to cause a hypervisor crash. An inverted conditional in x86 HVM guests\u0027 dirty video RAM tracking code allows such guests to make Xen de-reference a pointer guaranteed to point at unmapped space. A malicious or buggy HVM guest may cause the hypervisor to crash, resulting in Denial of Service (DoS) affecting the entire host. Xen versions from 4.8 onwards are affected. Xen versions 4.7 and earlier are not affected. Only x86 systems are affected. Arm systems are not affected. Only x86 HVM guests using shadow paging can leverage the vulnerability. In addition, there needs to be an entity actively monitoring a guest\u0027s video frame buffer (typically for display purposes) in order for such a guest to be able to leverage the vulnerability. x86 PV guests, as well as x86 HVM guests using hardware assisted paging (HAP), cannot leverage the vulnerability.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:xen-libs-4.12.3_04-3.22.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:xen-tools-domU-4.12.3_04-3.22.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:xen-4.12.3_04-3.22.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:xen-devel-4.12.3_04-3.22.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:xen-tools-4.12.3_04-3.22.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-15563", "url": "https://www.suse.com/security/cve/CVE-2020-15563" }, { "category": "external", "summary": "SUSE Bug 1173377 for CVE-2020-15563", "url": "https://bugzilla.suse.com/1173377" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:xen-libs-4.12.3_04-3.22.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:xen-tools-domU-4.12.3_04-3.22.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:xen-4.12.3_04-3.22.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:xen-devel-4.12.3_04-3.22.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:xen-tools-4.12.3_04-3.22.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:xen-libs-4.12.3_04-3.22.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:xen-tools-domU-4.12.3_04-3.22.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:xen-4.12.3_04-3.22.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:xen-devel-4.12.3_04-3.22.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:xen-tools-4.12.3_04-3.22.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-07-10T13:51:30Z", "details": "moderate" } ], "title": "CVE-2020-15563" }, { "cve": "CVE-2020-15565", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-15565" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.13.x, allowing x86 Intel HVM guest OS users to cause a host OS denial of service or possibly gain privileges because of insufficient cache write-back under VT-d. When page tables are shared between IOMMU and CPU, changes to them require flushing of both TLBs. Furthermore, IOMMUs may be non-coherent, and hence prior to flushing IOMMU TLBs, a CPU cache also needs writing back to memory after changes were made. Such writing back of cached data was missing in particular when splitting large page mappings into smaller granularity ones. A malicious guest may be able to retain read/write DMA access to frames returned to Xen\u0027s free pool, and later reused for another purpose. Host crashes (leading to a Denial of Service) and privilege escalation cannot be ruled out. Xen versions from at least 3.2 onwards are affected. Only x86 Intel systems are affected. x86 AMD as well as Arm systems are not affected. Only x86 HVM guests using hardware assisted paging (HAP), having a passed through PCI device assigned, and having page table sharing enabled can leverage the vulnerability. Note that page table sharing will be enabled (by default) only if Xen considers IOMMU and CPU large page size support compatible.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:xen-libs-4.12.3_04-3.22.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:xen-tools-domU-4.12.3_04-3.22.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:xen-4.12.3_04-3.22.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:xen-devel-4.12.3_04-3.22.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:xen-tools-4.12.3_04-3.22.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-15565", "url": "https://www.suse.com/security/cve/CVE-2020-15565" }, { "category": "external", "summary": "SUSE Bug 1173378 for CVE-2020-15565", "url": "https://bugzilla.suse.com/1173378" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:xen-libs-4.12.3_04-3.22.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:xen-tools-domU-4.12.3_04-3.22.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:xen-4.12.3_04-3.22.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:xen-devel-4.12.3_04-3.22.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:xen-tools-4.12.3_04-3.22.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.9, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:xen-libs-4.12.3_04-3.22.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:xen-tools-domU-4.12.3_04-3.22.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:xen-4.12.3_04-3.22.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:xen-devel-4.12.3_04-3.22.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:xen-tools-4.12.3_04-3.22.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-07-10T13:51:30Z", "details": "important" } ], "title": "CVE-2020-15565" }, { "cve": "CVE-2020-15566", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-15566" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.13.x, allowing guest OS users to cause a host OS crash because of incorrect error handling in event-channel port allocation. The allocation of an event-channel port may fail for multiple reasons: (1) port is already in use, (2) the memory allocation failed, or (3) the port we try to allocate is higher than what is supported by the ABI (e.g., 2L or FIFO) used by the guest or the limit set by an administrator (max_event_channels in xl cfg). Due to the missing error checks, only (1) will be considered an error. All the other cases will provide a valid port and will result in a crash when trying to access the event channel. When the administrator configured a guest to allow more than 1023 event channels, that guest may be able to crash the host. When Xen is out-of-memory, allocation of new event channels will result in crashing the host rather than reporting an error. Xen versions 4.10 and later are affected. All architectures are affected. The default configuration, when guests are created with xl/libxl, is not vulnerable, because of the default event-channel limit.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:xen-libs-4.12.3_04-3.22.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:xen-tools-domU-4.12.3_04-3.22.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:xen-4.12.3_04-3.22.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:xen-devel-4.12.3_04-3.22.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:xen-tools-4.12.3_04-3.22.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-15566", "url": "https://www.suse.com/security/cve/CVE-2020-15566" }, { "category": "external", "summary": "SUSE Bug 1173376 for CVE-2020-15566", "url": "https://bugzilla.suse.com/1173376" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:xen-libs-4.12.3_04-3.22.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:xen-tools-domU-4.12.3_04-3.22.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:xen-4.12.3_04-3.22.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:xen-devel-4.12.3_04-3.22.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:xen-tools-4.12.3_04-3.22.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:xen-libs-4.12.3_04-3.22.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:xen-tools-domU-4.12.3_04-3.22.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:xen-4.12.3_04-3.22.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:xen-devel-4.12.3_04-3.22.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:xen-tools-4.12.3_04-3.22.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-07-10T13:51:30Z", "details": "moderate" } ], "title": "CVE-2020-15566" }, { "cve": "CVE-2020-15567", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-15567" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.13.x, allowing Intel guest OS users to gain privileges or cause a denial of service because of non-atomic modification of a live EPT PTE. When mapping guest EPT (nested paging) tables, Xen would in some circumstances use a series of non-atomic bitfield writes. Depending on the compiler version and optimisation flags, Xen might expose a dangerous partially written PTE to the hardware, which an attacker might be able to race to exploit. A guest administrator or perhaps even an unprivileged guest user might be able to cause denial of service, data corruption, or privilege escalation. Only systems using Intel CPUs are vulnerable. Systems using AMD CPUs, and Arm systems, are not vulnerable. Only systems using nested paging (hap, aka nested paging, aka in this case Intel EPT) are vulnerable. Only HVM and PVH guests can exploit the vulnerability. The presence and scope of the vulnerability depends on the precise optimisations performed by the compiler used to build Xen. If the compiler generates (a) a single 64-bit write, or (b) a series of read-modify-write operations in the same order as the source code, the hypervisor is not vulnerable. For example, in one test build using GCC 8.3 with normal settings, the compiler generated multiple (unlocked) read-modify-write operations in source-code order, which did not constitute a vulnerability. We have not been able to survey compilers; consequently we cannot say which compiler(s) might produce vulnerable code (with which code-generation options). The source code clearly violates the C rules, and thus should be considered vulnerable.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:xen-libs-4.12.3_04-3.22.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:xen-tools-domU-4.12.3_04-3.22.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:xen-4.12.3_04-3.22.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:xen-devel-4.12.3_04-3.22.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:xen-tools-4.12.3_04-3.22.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-15567", "url": "https://www.suse.com/security/cve/CVE-2020-15567" }, { "category": "external", "summary": "SUSE Bug 1173380 for CVE-2020-15567", "url": "https://bugzilla.suse.com/1173380" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2020-15567", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:xen-libs-4.12.3_04-3.22.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:xen-tools-domU-4.12.3_04-3.22.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:xen-4.12.3_04-3.22.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:xen-devel-4.12.3_04-3.22.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:xen-tools-4.12.3_04-3.22.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:xen-libs-4.12.3_04-3.22.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:xen-tools-domU-4.12.3_04-3.22.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:xen-4.12.3_04-3.22.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:xen-devel-4.12.3_04-3.22.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:xen-tools-4.12.3_04-3.22.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-07-10T13:51:30Z", "details": "moderate" } ], "title": "CVE-2020-15567" } ] }
suse-su-2020:1587-1
Vulnerability from csaf_suse
Published
2020-06-09 17:10
Modified
2020-06-09 17:10
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 12 SP5 Azure kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2020-0543: Fixed a side channel attack against special registers which could have resulted in leaking of read values to cores other than the one which called it.
This attack is known as Special Register Buffer Data Sampling (SRBDS) or 'CrossTalk' (bsc#1154824).
- CVE-2020-13143: Fixed an out-of-bounds read in gadget_dev_desc_UDC_store in drivers/usb/gadget/configfs.c (bsc#1171982).
- CVE-2020-12769: Fixed an issue which could have allowed attackers to cause a panic via concurrent calls to dw_spi_irq and dw_spi_transfer_one (bsc#1171983).
- CVE-2020-12768: Fixed a memory leak in svm_cpu_uninit in arch/x86/kvm/svm.c (bsc#1171736).
- CVE-2020-12659: Fixed an out-of-bounds write (by a user with the CAP_NET_ADMIN capability) due to improper headroom validation (bsc#1171214).
- CVE-2020-12657: An a use-after-free in block/bfq-iosched.c (bsc#1171205).
- CVE-2020-12656: Fixed an improper handling of certain domain_release calls leadingch could have led to a memory leak (bsc#1171219).
- CVE-2020-12655: Fixed an issue which could have allowed attackers to trigger a sync of excessive duration via an XFS v5 image with crafted metadata (bsc#1171217).
- CVE-2020-12654: Fixed an issue in he wifi driver which could have allowed a remote AP to trigger a heap-based buffer overflow (bsc#1171202).
- CVE-2020-12653: Fixed an issue in the wifi driver which could have allowed local users to gain privileges or cause a denial of service (bsc#1171195).
- CVE-2020-12652: Fixed an issue which could have allowed local users to hold an incorrect lock during the ioctl operation and trigger a race condition (bsc#1171218).
- CVE-2020-12464: Fixed a use-after-free due to a transfer without a reference (bsc#1170901).
- CVE-2020-12114: Fixed a pivot_root race condition which could have allowed local users to cause a denial of service (panic) by corrupting a mountpoint reference counter (bsc#1171098).
- CVE-2020-10757: Fixed an issue where remaping hugepage DAX to anon mmap could have caused user PTE access (bsc#1172317).
- CVE-2020-10751: Fixed an improper implementation in SELinux LSM hook where it was assumed that an skb would only contain a single netlink message (bsc#1171189).
- CVE-2020-10732: Fixed kernel data leak in userspace coredumps due to uninitialized data (bsc#1171220).
- CVE-2020-10720: Fixed a use-after-free read in napi_gro_frags() (bsc#1170778).
- CVE-2020-10711: Fixed a null pointer dereference in SELinux subsystem which could have allowed a remote network user to crash the kernel resulting in a denial of service (bsc#1171191).
- CVE-2020-10690: Fixed the race between the release of ptp_clock and cdev (bsc#1170056).
- CVE-2019-9455: Fixed a pointer leak due to a WARN_ON statement in a video driver. This could lead to local information disclosure with System execution privileges needed (bsc#1170345).
- CVE-2019-20812: Fixed an issue in prb_calc_retire_blk_tmo() which could have resulted in a denial of service (bsc#1172453).
- CVE-2019-20806: Fixed a null pointer dereference which may had lead to denial of service (bsc#1172199).
- CVE-2019-19462: Fixed an issue which could have allowed local user to cause denial of service (bsc#1158265).
- CVE-2018-1000199: Fixed a potential local code execution via ptrace (bsc#1089895).
The following non-security bugs were fixed:
- ACPI: CPPC: Fix reference count leak in acpi_cppc_processor_probe() (bsc#1051510).
- ACPI: sysfs: Fix reference count leak in acpi_sysfs_add_hotplug_profile() (bsc#1051510).
- acpi/x86: ignore unspecified bit positions in the ACPI global lock field (bsc#1051510).
- Add br_netfilter to kernel-default-base (bsc#1169020)
- Add commit for git-fix that's not a fix This commit cleans up debug code but does not fix anything, and it relies on a new kernel function that isn't yet in this version of SLE.
- agp/intel: Reinforce the barrier after GTT updates (bsc#1051510).
- ALSA: ctxfi: Remove unnecessary cast in kfree (bsc#1051510).
- ALSA: doc: Document PC Beep Hidden Register on Realtek ALC256 (bsc#1051510).
- ALSA: dummy: Fix PCM format loop in proc output (bsc#1111666).
- ALSA: hda: Add driver blacklist (bsc#1051510).
- ALSA: hda: Always use jackpoll helper for jack update after resume (bsc#1051510).
- ALSA: hda: call runtime_allow() for all hda controllers (bsc#1051510).
- ALSA: hda: Do not release card at firmware loading error (bsc#1051510).
- ALSA: hda: Explicitly permit using autosuspend if runtime PM is supported (bsc#1051510).
- ALSA: hda/hdmi: fix race in monitor detection during probe (bsc#1051510).
- ALSA: hda/hdmi: fix without unlocked before return (bsc#1051510).
- ALSA: hda: Honor PM disablement in PM freeze and thaw_noirq ops (bsc#1051510).
- ALSA: hda: Keep the controller initialization even if no codecs found (bsc#1051510).
- ALSA: hda: Match both PCI ID and SSID for driver blacklist (bsc#1111666).
- ALSA: hda/realtek - Add a model for Thinkpad T570 without DAC workaround (bsc#1172017).
- ALSA: hda/realtek - Add COEF workaround for ASUS ZenBook UX431DA (git-fixes).
- ALSA: hda/realtek - Add HP new mute led supported for ALC236 (git-fixes).
- ALSA: hda/realtek - Add more fixup entries for Clevo machines (git-fixes).
- ALSA: hda/realtek - Add new codec supported for ALC245 (bsc#1051510).
- ALSA: hda/realtek - Add new codec supported for ALC287 (git-fixes).
- ALSA: hda/realtek: Add quirk for Samsung Notebook (git-fixes).
- ALSA: hda/realtek - Add supported new mute Led for HP (git-fixes).
- ALSA: hda/realtek - Enable headset mic of ASUS GL503VM with ALC295 (git-fixes).
- ALSA: hda/realtek - Enable headset mic of ASUS UX550GE with ALC295 (git-fixes).
- ALSA: hda/realtek: Enable headset mic of ASUS UX581LV with ALC295 (git-fixes).
- ALSA: hda/realtek - Enable the headset mic on Asus FX505DT (bsc#1051510).
- ALSA: hda/realtek - Fix S3 pop noise on Dell Wyse (git-fixes).
- ALSA: hda/realtek - Fix silent output on Gigabyte X570 Aorus Xtreme (bsc#1111666).
- ALSA: hda/realtek - Fix unexpected init_amp override (bsc#1051510).
- ALSA: hda/realtek - Limit int mic boost for Thinkpad T530 (git-fixes bsc#1171293).
- ALSA: hda/realtek - Two front mics on a Lenovo ThinkCenter (bsc#1051510).
- ALSA: hda: Release resources at error in delayed probe (bsc#1051510).
- ALSA: hda: Remove ASUS ROG Zenith from the blacklist (bsc#1051510).
- ALSA: hda: Skip controller resume if not needed (bsc#1051510).
- ALSA: hwdep: fix a left shifting 1 by 31 UB bug (git-fixes).
- ALSA: iec1712: Initialize STDSP24 properly when using the model=staudio option (git-fixes).
- ALSA: opti9xx: shut up gcc-10 range warning (bsc#1051510).
- ALSA: pcm: fix incorrect hw_base increase (git-fixes).
- ALSA: pcm: oss: Place the plugin buffer overflow checks correctly (bsc#1170522).
- ALSA: rawmidi: Fix racy buffer resize under concurrent accesses (git-fixes).
- ALSA: usb-audio: Add connector notifier delegation (bsc#1051510).
- ALSA: usb-audio: Add control message quirk delay for Kingston HyperX headset (git-fixes).
- ALSA: usb-audio: add mapping for ASRock TRX40 Creator (git-fixes).
- ALSA: usb-audio: Add mixer workaround for TRX40 and co (bsc#1051510).
- ALSA: usb-audio: Add quirk for Focusrite Scarlett 2i2 (bsc#1051510).
- ALSA: usb-audio: Add static mapping table for ALC1220-VB-based mobos (bsc#1051510).
- ALSA: usb-audio: Apply async workaround for Scarlett 2i4 2nd gen (bsc#1051510).
- ALSA: usb-audio: Check mapping at creating connector controls, too (bsc#1051510).
- ALSA: usb-audio: Correct a typo of NuPrime DAC-10 USB ID (bsc#1051510).
- ALSA: usb-audio: Do not create jack controls for PCM terminals (bsc#1051510).
- ALSA: usb-audio: Do not override ignore_ctl_error value from the map (bsc#1051510).
- ALSA: usb-audio: Filter error from connector kctl ops, too (bsc#1051510).
- ALSA: usb-audio: Fix usb audio refcnt leak when getting spdif (bsc#1051510).
- ALSA: usb-audio: mixer: volume quirk for ESS Technology Asus USB DAC (git-fixes).
- ALSA: usb-audio: Quirks for Gigabyte TRX40 Aorus Master onboard audio (git-fixes).
- ALSA: usx2y: Fix potential NULL dereference (bsc#1051510).
- ASoC: codecs: hdac_hdmi: Fix incorrect use of list_for_each_entry (bsc#1051510).
- ASoC: dapm: connect virtual mux with default value (bsc#1051510).
- ASoC: dapm: fixup dapm kcontrol widget (bsc#1051510).
- ASoC: dpcm: allow start or stop during pause for backend (bsc#1051510).
- ASoC: fix regwmask (bsc#1051510).
- ASoC: msm8916-wcd-digital: Reset RX interpolation path after use (bsc#1051510).
- ASoC: samsung: Prevent clk_get_rate() calls in atomic context (bsc#1111666).
- ASoC: topology: Check return value of pcm_new_ver (bsc#1051510).
- ASoC: topology: use name_prefix for new kcontrol (bsc#1051510).
- b43legacy: Fix case where channel status is corrupted (bsc#1051510).
- batman-adv: fix batadv_nc_random_weight_tq (git-fixes).
- batman-adv: Fix refcnt leak in batadv_show_throughput_override (git-fixes).
- batman-adv: Fix refcnt leak in batadv_store_throughput_override (git-fixes).
- batman-adv: Fix refcnt leak in batadv_v_ogm_process (git-fixes).
- bcache: avoid unnecessary btree nodes flushing in btree_flush_write() (git fixes (block drivers)).
- bcache: fix incorrect data type usage in btree_flush_write() (git fixes (block drivers)).
- bcache: Revert 'bcache: shrink btree node cache after bch_btree_check()' (git fixes (block drivers)).
- blk-mq: honor IO scheduler for multiqueue devices (bsc#1165478).
- blk-mq: simplify blk_mq_make_request() (bsc#1165478).
- block/drbd: delete invalid function drbd_md_mark_dirty_ (bsc#1171527).
- block: drbd: remove a stray unlock in __drbd_send_protocol() (bsc#1171599).
- block: fix busy device checking in blk_drop_partitions again (bsc#1171948).
- block: fix busy device checking in blk_drop_partitions (bsc#1171948).
- block: fix memleak of bio integrity data (git fixes (block drivers)).
- block: remove the bd_openers checks in blk_drop_partitions (bsc#1171948).
- bnxt_en: fix memory leaks in bnxt_dcbnl_ieee_getets() (networking-stable-20_03_28).
- bnxt_en: Reduce BNXT_MSIX_VEC_MAX value to supported CQs per PF (bsc#1104745).
- bnxt_en: reinitialize IRQs when MTU is modified (networking-stable-20_03_14).
- bnxt_en: Return error if bnxt_alloc_ctx_mem() fails (bsc#1104745 ).
- bnxt_en: Return error when allocating zero size context memory (bsc#1104745).
- bonding/alb: make sure arp header is pulled before accessing it (networking-stable-20_03_14).
- bpf: Fix sk_psock refcnt leak when receiving message (bsc#1083647).
- bpf: Forbid XADD on spilled pointers for unprivileged users (bsc#1083647).
- brcmfmac: abort and release host after error (bsc#1051510).
- btrfs: fix deadlock with memory reclaim during scrub (bsc#1172127).
- btrfs: fix log context list corruption after rename whiteout error (bsc#1172342).
- btrfs: fix partial loss of prealloc extent past i_size after fsync (bsc#1172343).
- btrfs: move the dio_sem higher up the callchain (bsc#1171761).
- btrfs: relocation: add error injection points for cancelling balance (bsc#1171417).
- btrfs: relocation: Check cancel request after each data page read (bsc#1171417).
- btrfs: relocation: Check cancel request after each extent found (bsc#1171417).
- btrfs: relocation: Clear the DEAD_RELOC_TREE bit for orphan roots to prevent runaway balance (bsc#1171417).
- btrfs: relocation: Fix reloc root leakage and the NULL pointer reference caused by the leakage (bsc#1171417).
- btrfs: relocation: Work around dead relocation stage loop (bsc#1171417).
- btrfs: reloc: clear DEAD_RELOC_TREE bit for orphan roots to prevent runaway balance (bsc#1171417 bsc#1160947 bsc#1172366).
- btrfs: reloc: fix reloc root leak and NULL pointer dereference (bsc#1171417 bsc#1160947 bsc#1172366).
- btrfs: setup a nofs context for memory allocation at btrfs_create_tree() (bsc#1172127).
- btrfs: setup a nofs context for memory allocation at __btrfs_set_acl (bsc#1172127).
- btrfs: use nofs context when initializing security xattrs to avoid deadlock (bsc#1172127).
- can: add missing attribute validation for termination (networking-stable-20_03_14).
- cdc-acm: close race betrween suspend() and acm_softint (git-fixes).
- cdc-acm: introduce a cool down (git-fixes).
- ceph: check if file lock exists before sending unlock request (bsc#1168789).
- ceph: demote quotarealm lookup warning to a debug message (bsc#1171692).
- ceph: fix double unlock in handle_cap_export() (bsc#1171694).
- ceph: fix double unlock in handle_cap_export() (bsc#1171694).
- ceph: fix endianness bug when handling MDS session feature bits (bsc#1171695).
- ceph: fix endianness bug when handling MDS session feature bits (bsc#1171695).
- cgroup, netclassid: periodically release file_lock on classid updating (networking-stable-20_03_14).
- CIFS: Allocate crypto structures on the fly for calculating signatures of incoming packets (bsc#1144333).
- CIFS: Allocate encryption header through kmalloc (bsc#1144333).
- CIFS: allow unlock flock and OFD lock across fork (bsc#1144333).
- CIFS: check new file size when extending file by fallocate (bsc#1144333).
- CIFS: cifspdu.h: Replace zero-length array with flexible-array member (bsc#1144333).
- CIFS: clear PF_MEMALLOC before exiting demultiplex thread (bsc#1144333).
- CIFS: do not share tcons with DFS (bsc#1144333).
- CIFS: dump the session id and keys also for SMB2 sessions (bsc#1144333).
- CIFS: ensure correct super block for DFS reconnect (bsc#1144333).
- CIFS: Fix bug which the return value by asynchronous read is error (bsc#1144333).
- CIFS: fix uninitialised lease_key in open_shroot() (bsc#1144333).
- CIFS: improve read performance for page size 64KB & cache=strict & vers=2.1+ (bsc#1144333).
- CIFS: Increment num_remote_opens stats counter even in case of smb2_query_dir_first (bsc#1144333).
- CIFS: minor update to comments around the cifs_tcp_ses_lock mutex (bsc#1144333).
- CIFS: protect updating server->dstaddr with a spinlock (bsc#1144333).
- CIFS: smb2pdu.h: Replace zero-length array with flexible-array member (bsc#1144333).
- CIFS: smbd: Calculate the correct maximum packet size for segmented SMBDirect send/receive (bsc#1144333).
- CIFS: smbd: Check and extend sender credits in interrupt context (bsc#1144333).
- CIFS: smbd: Check send queue size before posting a send (bsc#1144333).
- CIFS: smbd: Do not schedule work to send immediate packet on every receive (bsc#1144333).
- CIFS: smbd: Merge code to track pending packets (bsc#1144333).
- CIFS: smbd: Properly process errors on ib_post_send (bsc#1144333).
- CIFS: smbd: Update receive credits before sending and deal with credits roll back on failure before sending (bsc#1144333).
- CIFS: Warn less noisily on default mount (bsc#1144333).
- clk: Add clk_hw_unregister_composite helper function definition (bsc#1051510).
- clk: imx6ull: use OSC clock during AXI rate change (bsc#1051510).
- clk: imx: make mux parent strings const (bsc#1051510).
- clk: mediatek: correct the clocks for MT2701 HDMI PHY module (bsc#1051510).
- clk: sunxi-ng: a64: Fix gate bit of DSI DPHY (bsc#1051510).
- clocksource/drivers/hyper-v: Set TSC clocksource as default w/ InvariantTSC (bsc#1170620).
- clocksource/drivers/hyper-v: Set TSC clocksource as default w/ InvariantTSC (bsc#1170620, bsc#1170621).
- clocksource: dw_apb_timer_of: Fix missing clockevent timers (bsc#1051510).
- component: Silence bind error on -EPROBE_DEFER (bsc#1051510).
- coresight: do not use the BIT() macro in the UAPI header (git fixes (block drivers)).
- cpufreq: s3c64xx: Remove pointless NULL check in s3c64xx_cpufreq_driver_init (bsc#1051510).
- crypto: ccp - AES CFB mode is a stream cipher (git-fixes).
- crypto: ccp - Change a message to reflect status instead of failure (bsc#1172218).
- crypto: ccp - Clean up and exit correctly on allocation failure (git-fixes).
- crypto: ccp - Cleanup misc_dev on sev_exit() (bsc#1114279).
- crypto: ccp - Cleanup sp_dev_master in psp_dev_destroy() (bsc#1114279).
- cxgb4: fix MPS index overwrite when setting MAC address (bsc#1127355).
- cxgb4: fix Txq restart check during backpressure (bsc#1127354 bsc#1127371).
- debugfs: Add debugfs_create_xul() for hexadecimal unsigned long (git-fixes).
- debugfs_lookup(): switch to lookup_one_len_unlocked() (bsc#1171979).
- devlink: fix return value after hitting end in region read (bsc#1109837).
- devlink: validate length of param values (bsc#1109837).
- devlink: validate length of region addr/len (bsc#1109837).
- dmaengine: dmatest: Fix iteration non-stop logic (bsc#1051510).
- dm mpath: switch paths in dm_blk_ioctl() code path (bsc#1167574).
- dm-raid1: fix invalid return value from dm_mirror (bsc#1172378).
- dm writecache: fix data corruption when reloading the target (git fixes (block drivers)).
- dm writecache: fix incorrect flush sequence when doing SSD mode commit (git fixes (block drivers)).
- dm writecache: verify watermark during resume (git fixes (block drivers)).
- dm zoned: fix invalid memory access (git fixes (block drivers)).
- dm zoned: reduce overhead of backing device checks (git fixes (block drivers)).
- dm zoned: remove duplicate nr_rnd_zones increase in dmz_init_zone() (git fixes (block drivers)).
- dm zoned: support zone sizes smaller than 128MiB (git fixes (block drivers)).
- dp83640: reverse arguments to list_add_tail (git-fixes).
- drivers: hv: Add a module description line to the hv_vmbus driver (bsc#1172249, bsc#1172251).
- drivers: hv: Add a module description line to the hv_vmbus driver (bsc#1172253).
- drivers: HV: Send one page worth of kmsg dump over Hyper-V during panic (bsc#1170618).
- drivers: hv: vmbus: Fix the issue with freeing up hv_ctl_table_hdr (bsc#1170618).
- drivers: hv: vmbus: Get rid of MSR access from vmbus_drv.c (bsc#1170618).
- drivers: hv: vmus: Fix the check for return value from kmsg get dump buffer (bsc#1170618).
- drivers/net/ibmvnic: Update VNIC protocol version reporting (bsc#1065729).
- drivers: w1: add hwmon support structures (jsc#SLE-11048).
- drivers: w1: add hwmon temp support for w1_therm (jsc#SLE-11048).
- drivers: w1: refactor w1_slave_show to make the temp reading functionality separate (jsc#SLE-11048).
- drm: amd/acp: fix broken menu structure (bsc#1114279) * context changes
- drm/amdgpu: Correctly initialize thermal controller for GPUs with Powerplay table v0 (e.g Hawaii) (bsc#1111666).
- drm/amdgpu: Fix oops when pp_funcs is unset in ACPI event (bsc#1111666).
- drm/amd/powerplay: force the trim of the mclk dpm_levels if OD is (bsc#1113956)
- drm/atomic: Take the atomic toys away from X (bsc#1112178) * context changes
- drm/crc: Actually allow to change the crc source (bsc#1114279) * offset changes
- drm/dp_mst: Fix clearing payload state on topology disable (bsc#1051510).
- drm/dp_mst: Reformat drm_dp_check_act_status() a bit (bsc#1051510).
- drm/edid: Fix off-by-one in DispID DTD pixel clock (bsc#1114279)
- drm/etnaviv: fix perfmon domain interation (bsc#1113956)
- drm/etnaviv: rework perfmon query infrastructure (bsc#1112178)
- drm/i915: Apply Wa_1406680159:icl,ehl as an engine workaround (bsc#1112178) * rename gt/intel_workarounds.c to intel_workarounds.c * context changes
- drm/i915/gvt: Init DPLL/DDI vreg for virtual display instead of (bsc#1114279)
- drm/i915: HDCP: fix Ri prime check done during link check (bsc#1112178) * rename display/intel_hdmi.c to intel_hdmi.c * context changes
- drm/i915: properly sanity check batch_start_offset (bsc#1114279) * renamed display/intel_fbc.c -> intel_fb.c * renamed gt/intel_rc6.c -> intel_pm.c * context changes
- drm/meson: Delete an error message in meson_dw_hdmi_bind() (bsc#1051510).
- drm: NULL pointer dereference [null-pointer-deref] (CWE 476) problem (bsc#1114279)
- drm/qxl: qxl_release leak in qxl_draw_dirty_fb() (bsc#1051510).
- drm/qxl: qxl_release leak in qxl_hw_surface_alloc() (bsc#1051510).
- drm/qxl: qxl_release use after free (bsc#1051510).
- drm: Remove PageReserved manipulation from drm_pci_alloc (bsc#1114279) * offset changes
- drm/sun4i: dsi: Allow binding the host without a panel (bsc#1113956)
- drm/sun4i: dsi: Avoid hotplug race with DRM driver bind (bsc#1113956)
- drm/sun4i: dsi: Remove incorrect use of runtime PM (bsc#1113956) * context changes
- drm/sun4i: dsi: Remove unused drv from driver context (bsc#1113956) * context changes * keep include of sun4i_drv.h
- dump_stack: avoid the livelock of the dump_lock (git fixes (block drivers)).
- EDAC/amd64: Add family ops for Family 19h Models 00h-0Fh (jsc#SLE-11833).
- EDAC/amd64: Drop some family checks for newer systems (jsc#SLE-11833).
- EDAC/mce_amd: Always load on SMCA systems (jsc#SLE-11833).
- EDAC/mce_amd: Make fam_ops static global (jsc#SLE-11833).
- EDAC, sb_edac: Add support for systems with segmented PCI buses (bsc#1169525).
- ext4: do not zeroout extents beyond i_disksize (bsc#1167851).
- ext4: fix extent_status fragmentation for plain files (bsc#1171949).
- ext4: use non-movable memory for superblock readahead (bsc#1171952).
- fanotify: fix merging marks masks with FAN_ONDIR (bsc#1171679).
- fbcon: fix null-ptr-deref in fbcon_switch (bsc#1114279) * rename drivers/video/fbdev/core to drivers/video/console * context changes
- fib: add missing attribute validation for tun_id (networking-stable-20_03_14).
- firmware: qcom: scm: fix compilation error when disabled (bsc#1051510).
- Fix a backport bug, where btrfs_put_root() -> btrfs_put_fs_root() modification is not needed due to missing dependency
- fs/cifs: fix gcc warning in sid_to_id (bsc#1144333).
- fs/seq_file.c: simplify seq_file iteration code and interface (bsc#1170125).
- gpio: tegra: mask GPIO IRQs during IRQ shutdown (bsc#1051510).
- gre: fix uninit-value in __iptunnel_pull_header (networking-stable-20_03_14).
- HID: hid-input: clear unmapped usages (git-fixes).
- HID: hyperv: Add a module description line (bsc#1172249, bsc#1172251).
- HID: hyperv: Add a module description line (bsc#1172253).
- HID: i2c-hid: add Trekstor Primebook C11B to descriptor override (git-fixes).
- HID: i2c-hid: override HID descriptors for certain devices (git-fixes).
- HID: multitouch: add eGalaxTouch P80H84 support (bsc#1051510).
- HID: wacom: Read HID_DG_CONTACTMAX directly for non-generic devices (git-fixes).
- hrtimer: Annotate lockless access to timer->state (git fixes (block drivers)).
- hsr: add restart routine into hsr_get_node_list() (networking-stable-20_03_28).
- hsr: check protocol version in hsr_newlink() (networking-stable-20_04_17).
- hsr: fix general protection fault in hsr_addr_is_self() (networking-stable-20_03_28).
- hsr: set .netnsok flag (networking-stable-20_03_28).
- hsr: use rcu_read_lock() in hsr_get_node_{list/status}() (networking-stable-20_03_28).
- i2c: acpi: Force bus speed to 400KHz if a Silead touchscreen is present (git-fixes).
- i2c: acpi: put device when verifying client fails (git-fixes).
- i2c: brcmstb: remove unused struct member (git-fixes).
- i2c: core: Allow empty id_table in ACPI case as well (git-fixes).
- i2c: core: decrease reference count of device node in i2c_unregister_device (git-fixes).
- i2c: dev: Fix the race between the release of i2c_dev and cdev (bsc#1051510).
- i2c: fix missing pm_runtime_put_sync in i2c_device_probe (git-fixes).
- i2c-hid: properly terminate i2c_hid_dmi_desc_override_table array (git-fixes).
- i2c: i801: Do not add ICH_RES_IO_SMI for the iTCO_wdt device (git-fixes).
- i2c: iproc: Stop advertising support of SMBUS quick cmd (git-fixes).
- i2c: isch: Remove unnecessary acpi.h include (git-fixes).
- i2c: mux: demux-pinctrl: Fix an error handling path in 'i2c_demux_pinctrl_probe()' (bsc#1051510).
- i2c: st: fix missing struct parameter description (bsc#1051510).
- IB/ipoib: Add child to parent list only if device initialized (bsc#1168503).
- IB/ipoib: Consolidate checking of the proposed child interface (bsc#1168503).
- IB/ipoib: Do not remove child devices from within the ndo_uninit (bsc#1168503).
- IB/ipoib: Get rid of IPOIB_FLAG_GOING_DOWN (bsc#1168503).
- IB/ipoib: Get rid of the sysfs_mutex (bsc#1168503).
- IB/ipoib: Maintain the child_intfs list from ndo_init/uninit (bsc#1168503).
- IB/ipoib: Move all uninit code into ndo_uninit (bsc#1168503).
- IB/ipoib: Move init code to ndo_init (bsc#1168503).
- IB/ipoib: Replace printk with pr_warn (bsc#1168503).
- IB/ipoib: Use cancel_delayed_work_sync for neigh-clean task (bsc#1168503).
- IB/ipoib: Warn when one port fails to initialize (bsc#1168503).
- IB/mlx5: Fix missing congestion control debugfs on rep rdma device (bsc#1103991).
- ibmvnic: Skip fatal error reset after passive init (bsc#1171078 ltc#184239).
- iio:ad7797: Use correct attribute_group (bsc#1051510).
- iio: adc: stm32-adc: fix device used to request dma (bsc#1051510).
- iio: adc: stm32-adc: fix sleep in atomic context (git-fixes).
- iio: adc: stm32-adc: Use dma_request_chan() instead dma_request_slave_channel() (bsc#1051510).
- iio: dac: vf610: Fix an error handling path in 'vf610_dac_probe()' (bsc#1051510).
- iio: sca3000: Remove an erroneous 'get_device()' (bsc#1051510).
- iio: xilinx-xadc: Fix ADC-B powerdown (bsc#1051510).
- iio: xilinx-xadc: Fix clearing interrupt when enabling trigger (bsc#1051510).
- iio: xilinx-xadc: Fix sequencer configuration for aux channels in simultaneous mode (bsc#1051510).
- ima: Fix return value of ima_write_policy() (git-fixes).
- Input: evdev - call input_flush_device() on release(), not flush() (bsc#1051510).
- Input: hyperv-keyboard - add module description (bsc#1172249, bsc#1172251).
- Input: hyperv-keyboard - add module description (bsc#1172253).
- Input: i8042 - add Acer Aspire 5738z to nomux list (bsc#1051510).
- Input: i8042 - add ThinkPad S230u to i8042 reset list (bsc#1051510).
- Input: raydium_i2c_ts - use true and false for boolean values (bsc#1051510).
- Input: synaptics-rmi4 - fix error return code in rmi_driver_probe() (bsc#1051510).
- Input: synaptics-rmi4 - really fix attn_data use-after-free (git-fixes).
- Input: usbtouchscreen - add support for BonXeon TP (bsc#1051510).
- Input: xpad - add custom init packet for Xbox One S controllers (bsc#1051510).
- iommu/amd: Call domain_flush_complete() in update_domain() (bsc#1172096).
- iommu/amd: Do not flush Device Table in iommu_map_page() (bsc#1172097).
- iommu/amd: Do not loop forever when trying to increase address space (bsc#1172098).
- iommu/amd: Fix legacy interrupt remapping for x2APIC-enabled system (bsc#1172099).
- iommu/amd: Fix over-read of ACPI UID from IVRS table (bsc#1172101).
- iommu/amd: Fix race in increase_address_space()/fetch_pte() (bsc#1172102).
- iommu/amd: Update Device Table in increase_address_space() (bsc#1172103).
- iommu: Fix reference count leak in iommu_group_alloc (bsc#1172397).
- ip6_tunnel: Allow rcv/xmit even if remote address is a local address (bsc#1166978).
- ipmi: fix hung processes in __get_guid() (git-fixes).
- ipv4: fix a RCU-list lock in fib_triestat_seq_show (networking-stable-20_04_02).
- ipv6/addrconf: call ipv6_mc_up() for non-Ethernet interface (networking-stable-20_03_14).
- ipv6: do not auto-add link-local address to lag ports (networking-stable-20_04_09).
- ipv6: fix IPV6_ADDRFORM operation logic (bsc#1171662).
- ipv6: Fix nlmsg_flags when splitting a multipath route (networking-stable-20_03_01).
- ipv6: fix restrict IPV6_ADDRFORM operation (bsc#1171662).
- ipv6: Fix route replacement with dev-only route (networking-stable-20_03_01).
- ipvlan: add cond_resched_rcu() while processing muticast backlog (networking-stable-20_03_14).
- ipvlan: do not deref eth hdr before checking it's set (networking-stable-20_03_14).
- ipvlan: do not use cond_resched_rcu() in ipvlan_process_multicast() (networking-stable-20_03_14).
- iwlwifi: pcie: actually release queue memory in TVQM (bsc#1051510).
- ixgbe: do not check firmware errors (bsc#1170284).
- kabi fix for early XHCI debug (git-fixes).
- kabi for for md: improve handling of bio with REQ_PREFLUSH in md_flush_request() (git-fixes).
- kabi, protect struct ib_device (bsc#1168503).
- kabi/severities: Do not track KVM internal symbols.
- kabi/severities: Ingnore get_dev_data() The function is internal to the AMD IOMMU driver and must not be called by any third party.
- kabi workaround for snd_rawmidi buffer_ref field addition (git-fixes).
- KEYS: reaching the keys quotas correctly (bsc#1051510).
- KVM: arm64: Change hyp_panic()s dependency on tpidr_el2 (bsc#1133021).
- KVM: arm64: Stop save/restoring host tpidr_el1 on VHE (bsc#1133021).
- KVM: Check validity of resolved slot when searching memslots (bsc#1172104).
- KVM: s390: vsie: Fix delivery of addressing exceptions (git-fixes).
- KVM: s390: vsie: Fix possible race when shadowing region 3 tables (git-fixes).
- KVM: s390: vsie: Fix region 1 ASCE sanity shadow address checks (git-fixes).
- KVM: SVM: Fix potential memory leak in svm_cpu_init() (bsc#1171736).
- KVM x86: Extend AMD specific guest behavior to Hygon virtual CPUs (bsc#1152489).
- l2tp: Allow management of tunnels and session in user namespace (networking-stable-20_04_17).
- libata: Remove extra scsi_host_put() in ata_scsi_add_hosts() (bsc#1051510).
- libata: Return correct status in sata_pmp_eh_recover_pm() when ATA_DFLAG_DETACH is set (bsc#1051510).
- lib: raid6: fix awk build warnings (git fixes (block drivers)).
- lib/raid6/test: fix build on distros whose /bin/sh is not bash (git fixes (block drivers)).
- lib/stackdepot.c: fix global out-of-bounds in stack_slabs (git fixes (block drivers)).
- locks: print unsigned ino in /proc/locks (bsc#1171951).
- mac80211: add ieee80211_is_any_nullfunc() (bsc#1051510).
- mac80211_hwsim: Use kstrndup() in place of kasprintf() (bsc#1051510).
- mac80211: mesh: fix discovery timer re-arming issue / crash (bsc#1051510).
- macsec: avoid to set wrong mtu (bsc#1051510).
- macsec: restrict to ethernet devices (networking-stable-20_03_28).
- macvlan: add cond_resched() during multicast processing (networking-stable-20_03_14).
- macvlan: fix null dereference in macvlan_device_event() (bsc#1051510).
- make some Fujitsu systems run (bsc#1141558).
- md: improve handling of bio with REQ_PREFLUSH in md_flush_request() (git-fixes).
- md/raid0: Fix an error message in raid0_make_request() (git fixes (block drivers)).
- md/raid10: prevent access of uninitialized resync_pages offset (git-fixes).
- media: dvb: return -EREMOTEIO on i2c transfer failure (bsc#1051510).
- media: platform: fcp: Set appropriate DMA parameters (bsc#1051510).
- media: ti-vpe: cal: fix disable_irqs to only the intended target (git-fixes).
- mei: release me_cl object reference (bsc#1051510).
- mlxsw: Fix some IS_ERR() vs NULL bugs (networking-stable-20_04_27).
- mlxsw: spectrum_flower: Do not stop at FLOW_ACTION_VLAN_MANGLE (networking-stable-20_04_09).
- mlxsw: spectrum_mr: Fix list iteration in error path (bsc#1112374).
- mmc: atmel-mci: Fix debugfs on 64-bit platforms (git-fixes).
- mmc: core: Check request type before completing the request (git-fixes).
- mmc: core: Fix recursive locking issue in CQE recovery path (git-fixes).
- mmc: cqhci: Avoid false 'cqhci: CQE stuck on' by not open-coding timeout loop (git-fixes).
- mmc: dw_mmc: Fix debugfs on 64-bit platforms (git-fixes).
- mmc: meson-gx: make sure the descriptor is stopped on errors (git-fixes).
- mmc: meson-gx: simplify interrupt handler (git-fixes).
- mmc: renesas_sdhi: limit block count to 16 bit for old revisions (git-fixes).
- mmc: sdhci-esdhc-imx: fix the mask for tuning start point (bsc#1051510).
- mmc: sdhci-msm: Clear tuning done flag while hs400 tuning (bsc#1051510).
- mmc: sdhci-of-at91: fix memleak on clk_get failure (git-fixes).
- mmc: sdhci-pci: Fix eMMC driver strength for BYT-based controllers (bsc#1051510).
- mmc: sdhci-xenon: fix annoying 1.8V regulator warning (bsc#1051510).
- mmc: sdio: Fix potential NULL pointer error in mmc_sdio_init_card() (bsc#1051510).
- mmc: tmio: fix access width of Block Count Register (git-fixes).
- mm: limit boost_watermark on small zones (git fixes (mm/pgalloc)).
- mm: thp: handle page cache THP correctly in PageTransCompoundMap (git fixes (block drivers)).
- mtd: cfi: fix deadloop in cfi_cmdset_0002.c do_write_buffer (bsc#1051510).
- mtd: spi-nor: cadence-quadspi: add a delay in write sequence (git-fixes).
- mtd: spi-nor: enable 4B opcodes for mx66l51235l (git-fixes).
- mtd: spi-nor: fsl-quadspi: Do not let -EINVAL on the bus (git-fixes).
- mwifiex: avoid -Wstringop-overflow warning (bsc#1051510).
- mwifiex: Fix memory corruption in dump_station (bsc#1051510).
- net: bcmgenet: correct per TX/RX ring statistics (networking-stable-20_04_27).
- net: dsa: b53: Fix ARL register definitions (networking-stable-20_04_27).
- net: dsa: b53: Rework ARL bin logic (networking-stable-20_04_27).
- net: dsa: bcm_sf2: Do not register slave MDIO bus with OF (networking-stable-20_04_09).
- net: dsa: bcm_sf2: Ensure correct sub-node is parsed (networking-stable-20_04_09).
- net: dsa: bcm_sf2: Fix overflow checks (git-fixes).
- net: dsa: Fix duplicate frames flooded by learning (networking-stable-20_03_28).
- net: dsa: mv88e6xxx: fix lockup on warm boot (networking-stable-20_03_14).
- net/ethernet: add Google GVE driver (jsc#SLE-10538)
- net: fec: add phy_reset_after_clk_enable() support (git-fixes).
- net: fec: validate the new settings in fec_enet_set_coalesce() (networking-stable-20_03_14).
- net: fib_rules: Correctly set table field when table number exceeds 8 bits (networking-stable-20_03_01).
- net: fix race condition in __inet_lookup_established() (bsc#1151794).
- net: fq: add missing attribute validation for orphan mask (networking-stable-20_03_14).
- net: hns3: fix 'tc qdisc del' failed issue (bsc#1109837).
- net, ip_tunnel: fix interface lookup with no key (networking-stable-20_04_02).
- net: ipv4: devinet: Fix crash when add/del multicast IP with autojoin (networking-stable-20_04_17).
- net: ipv6: do not consider routes via gateways for anycast address check (networking-stable-20_04_17).
- netlink: Use netlink header as base to calculate bad attribute offset (networking-stable-20_03_14).
- net: macsec: update SCI upon MAC address change (networking-stable-20_03_14).
- net: memcg: fix lockdep splat in inet_csk_accept() (networking-stable-20_03_14).
- net: memcg: late association of sock to memcg (networking-stable-20_03_14).
- net/mlx4_en: avoid indirect call in TX completion (networking-stable-20_04_27).
- net/mlx5: Add new fields to Port Type and Speed register (bsc#1171118).
- net/mlx5: Add new fields to Port Type and Speed register (bsc#1171118).
- net/mlx5: Add RoCE RX ICRC encapsulated counter (bsc#1171118).
- net/mlx5e: Fix ethtool self test: link speed (bsc#1171118).
- net/mlx5e: Move port speed code from en_ethtool.c to en/port.c (bsc#1171118).
- net/mlx5: Expose link speed directly (bsc#1171118).
- net/mlx5: Expose link speed directly (bsc#1171118).
- net/mlx5: Expose port speed when possible (bsc#1171118).
- net/mlx5: Expose port speed when possible (bsc#1171118).
- net/mlx5: Fix failing fw tracer allocation on s390 (bsc#1103990 ).
- net: mvneta: Fix the case where the last poll did not process all rx (networking-stable-20_03_28).
- net: netrom: Fix potential nr_neigh refcnt leak in nr_add_node (networking-stable-20_04_27).
- net/packet: tpacket_rcv: do not increment ring index on drop (networking-stable-20_03_14).
- net: phy: restore mdio regs in the iproc mdio driver (networking-stable-20_03_01).
- net: qmi_wwan: add support for ASKEY WWHC050 (networking-stable-20_03_28).
- net: revert default NAPI poll timeout to 2 jiffies (networking-stable-20_04_17).
- net_sched: cls_route: remove the right filter from hashtable (networking-stable-20_03_28).
- net_sched: sch_skbprio: add message validation to skbprio_change() (bsc#1109837).
- net/x25: Fix x25_neigh refcnt leak when receiving frame (networking-stable-20_04_27).
- nfc: add missing attribute validation for SE API (networking-stable-20_03_14).
- nfc: add missing attribute validation for vendor subcommand (networking-stable-20_03_14).
- nfc: pn544: Fix occasional HW initialization failure (networking-stable-20_03_01).
- nfc: st21nfca: add missed kfree_skb() in an error path (bsc#1051510).
- nfp: abm: fix a memory leak bug (bsc#1109837).
- nfsd4: fix up replay_matches_cache() (git-fixes).
- nfsd: Ensure CLONE persists data and metadata changes to the target file (git-fixes).
- nfsd: fix delay timer on 32-bit architectures (git-fixes).
- nfsd: fix jiffies/time_t mixup in LRU list (git-fixes).
- nfs: Directory page cache pages need to be locked when read (git-fixes).
- nfsd: memory corruption in nfsd4_lock() (git-fixes).
- nfs: Do not call generic_error_remove_page() while holding locks (bsc#1170457).
- nfs: Fix memory leaks and corruption in readdir (git-fixes).
- nfs: Fix O_DIRECT accounting of number of bytes read/written (git-fixes).
- nfs: Fix potential posix_acl refcnt leak in nfs3_set_acl (git-fixes).
- nfs: fix racey wait in nfs_set_open_stateid_locked (bsc#1170592).
- nfs/flexfiles: Use the correct TCP timeout for flexfiles I/O (git-fixes).
- nfs/pnfs: Fix pnfs_generic_prepare_to_resend_writes() (git-fixes).
- nfs: Revalidate the file size on a fatal write error (git-fixes).
- NFSv4.0: nfs4_do_fsinfo() should not do implicit lease renewals (git-fixes).
- NFSv4: Do not allow a cached open with a revoked delegation (git-fixes).
- NFSv4: Fix leak of clp->cl_acceptor string (git-fixes).
- NFSv4/pnfs: Return valid stateids in nfs_layout_find_inode_by_stateid() (git-fixes).
- NFSv4: try lease recovery on NFS4ERR_EXPIRED (git-fixes).
- NFSv4.x: Drop the slot if nfs4_delegreturn_prepare waits for layoutreturn (git-fixes).
- nl802154: add missing attribute validation for dev_type (networking-stable-20_03_14).
- nl802154: add missing attribute validation (networking-stable-20_03_14).
- nvme-fc: print proper nvme-fc devloss_tmo value (bsc#1172391).
- objtool: Fix stack offset tracking for indirect CFAs (bsc#1169514).
- objtool: Fix switch table detection in .text.unlikely (bsc#1169514).
- objtool: Make BP scratch register warning more robust (bsc#1169514).
- padata: Remove broken queue flushing (git-fixes).
- Partially revert 'kfifo: fix kfifo_alloc() and kfifo_init()' (git fixes (block drivers)).
- PCI: hv: Add support for protocol 1.3 and support PCI_BUS_RELATIONS2 (bsc#1172201, bsc#1172202).
- PCI: hv: Decouple the func definition in hv_dr_state from VSP message (bsc#1172201, bsc#1172202).
- PCI: sanity test on PCI vendor to be sure we do not touch everything (bsc#1141558).
- perf/x86/amd: Add support for Large Increment per Cycle Events (jsc#SLE-11831).
- perf/x86/amd: Constrain Large Increment per Cycle events (jsc#SLE-11831).
- pinctrl: baytrail: Enable pin configuration setting for GPIO chip (git-fixes).
- pinctrl: cherryview: Add missing spinlock usage in chv_gpio_irq_handler (git-fixes).
- pinctrl: sunrisepoint: Fix PAD lock register offset for SPT-H (git-fixes).
- platform/x86: asus-nb-wmi: Do not load on Asus T100TA and T200TA (bsc#1051510).
- pNFS: Ensure we do clear the return-on-close layout stateid on fatal errors (git-fixes).
- powerpc: Add attributes for setjmp/longjmp (bsc#1065729).
- powerpc/pci/of: Parse unassigned resources (bsc#1065729).
- powerpc/setup_64: Set cache-line-size based on cache-block-size (bsc#1065729).
- powerpc/sstep: Fix DS operand in ld encoding to appropriate value (bsc#1065729).
- qede: Fix race between rdma destroy workqueue and link change event (networking-stable-20_03_01).
- r8152: check disconnect status after long sleep (networking-stable-20_03_14).
- raid6/ppc: Fix build for clang (git fixes (block drivers)).
- random: always use batched entropy for get_random_u{32,64} (bsc#1164871).
- rcu: locking and unlocking need to always be at least barriers (git fixes (block drivers)).
- RDMA/ipoib: Fix use of sizeof() (bsc#1168503).
- RDMA/netdev: Fix netlink support in IPoIB (bsc#1168503).
- RDMA/netdev: Hoist alloc_netdev_mqs out of the driver (bsc#1168503).
- RDMA/netdev: Use priv_destructor for netdev cleanup (bsc#1168503).
- Revert 'ALSA: hda/realtek: Fix pop noise on ALC225' (git-fixes).
- Revert 'drm/panel: simple: Add support for Sharp LQ150X1LG11 panels' (bsc#1114279) * offset changes
- Revert 'HID: i2c-hid: add Trekstor Primebook C11B to descriptor override' Depends on 9b5c747685982d22efffeafc5ec601bd28f6d78b, which was also reverted.
- Revert 'HID: i2c-hid: override HID descriptors for certain devices' This broke i2c-hid.ko's build, there is no way around it without a big file rename or renaming the kernel module.
- Revert 'i2c-hid: properly terminate i2c_hid_dmi_desc_override_table' Fixed 9b5c747685982d22efffeafc5ec601bd28f6d78b, which was also reverted.
- Revert 'ipc,sem: remove uneeded sem_undo_list lock usage in exit_sem()' (bsc#1172221).
- Revert 'RDMA/cma: Simplify rdma_resolve_addr() error flow' (bsc#1103992).
- rtlwifi: Fix a double free in _rtl_usb_tx_urb_setup() (bsc#1051510).
- s390/cio: avoid duplicated 'ADD' uevents (git-fixes).
- s390/cio: generate delayed uevent for vfio-ccw subchannels (git-fixes).
- s390/cpuinfo: fix wrong output when CPU0 is offline (git-fixes).
- s390/cpum_cf: Add new extended counters for IBM z15 (bsc#1169762 LTC#185291).
- s390/diag: fix display of diagnose call statistics (git-fixes).
- s390/ftrace: fix potential crashes when switching tracers (git-fixes).
- s390/gmap: return proper error code on ksm unsharing (git-fixes).
- s390/ism: fix error return code in ism_probe() (git-fixes).
- s390/ism: fix error return code in ism_probe() (git-fixes).
- s390/pci: do not set affinity for floating irqs (git-fixes).
- s390/pci: Fix possible deadlock in recover_store() (bsc#1165183 LTC#184103).
- s390/pci: Recover handle in clp_set_pci_fn() (bsc#1165183 LTC#184103).
- s390/qeth: cancel RX reclaim work earlier (git-fixes).
- s390/qeth: do not return -ENOTSUPP to userspace (git-fixes).
- s390/qeth: do not warn for napi with 0 budget (git-fixes).
- s390/qeth: fix off-by-one in RX copybreak check (git-fixes).
- s390/qeth: fix promiscuous mode after reset (git-fixes).
- s390/qeth: fix qdio teardown after early init error (git-fixes).
- s390/qeth: handle error due to unsupported transport mode (git-fixes).
- s390/qeth: handle error when backing RX buffer (git-fixes).
- s390/qeth: lock the card while changing its hsuid (git-fixes).
- s390/qeth: support net namespaces for L3 devices (git-fixes).
- s390/time: Fix clk type in get_tod_clock (git-fixes).
- scripts/decodecode: fix trapping instruction formatting (bsc#1065729).
- scripts/dtc: Remove redundant YYLOC global declaration (bsc#1160388).
- scsi: bnx2i: fix potential use after free (bsc#1171600).
- scsi: core: Handle drivers which set sg_tablesize to zero (bsc#1171601) This commit also required: > scsi: core: avoid preallocating big SGL for data
- scsi: core: save/restore command resid for error handling (bsc#1171602).
- scsi: core: scsi_trace: Use get_unaligned_be*() (bsc#1171604).
- scsi: core: try to get module before removing device (bsc#1171605).
- scsi: csiostor: Adjust indentation in csio_device_reset (bsc#1171606).
- scsi: csiostor: Do not enable IRQs too early (bsc#1171607).
- scsi: esas2r: unlock on error in esas2r_nvram_read_direct() (bsc#1171608).
- scsi: fnic: fix invalid stack access (bsc#1171609).
- scsi: fnic: fix msix interrupt allocation (bsc#1171610).
- scsi: ibmvscsi: Fix WARN_ON during event pool release (bsc#1170791 ltc#185128).
- scsi: iscsi: Avoid potential deadlock in iscsi_if_rx func (bsc#1171611).
- scsi: iscsi: Fix a potential deadlock in the timeout handler (bsc#1171612).
- scsi: iscsi: qla4xxx: fix double free in probe (bsc#1171613).
- scsi: lpfc: Change default queue allocation for reduced memory consumption (bsc#1164780).
- scsi: lpfc: fix: Coverity: lpfc_cmpl_els_rsp(): Null pointer dereferences (bsc#1171614).
- scsi: lpfc: Fix crash in target side cable pulls hitting WAIT_FOR_UNREG (bsc#1171615).
- scsi: lpfc: Fix lpfc_nodelist leak when processing unsolicited event (bsc#1164780).
- scsi: lpfc: Fix MDS Diagnostic Enablement definition (bsc#1164780).
- scsi: lpfc: Fix negation of else clause in lpfc_prep_node_fc4type (bsc#1164780).
- scsi: lpfc: Fix noderef and address space warnings (bsc#1164780).
- scsi: lpfc: Maintain atomic consistency of queue_claimed flag (bsc#1164780).
- scsi: lpfc: remove duplicate unloading checks (bsc#1164780).
- scsi: lpfc: Remove re-binding of nvme rport during registration (bsc#1164780).
- scsi: lpfc: Remove redundant initialization to variable rc (bsc#1164780).
- scsi: lpfc: Remove unnecessary lockdep_assert_held calls (bsc#1164780).
- scsi: lpfc: Update lpfc version to 12.8.0.1 (bsc#1164780).
- scsi: megaraid_sas: Do not initiate OCR if controller is not in ready state (bsc#1171616).
- scsi: qla2xxx: add ring buffer for tracing debug logs (bsc#1157169).
- scsi: qla2xxx: check UNLOADING before posting async work (bsc#1157169).
- scsi: qla2xxx: Delete all sessions before unregister local nvme port (bsc#1157169).
- scsi: qla2xxx: Do not log message when reading port speed via sysfs (bsc#1157169).
- scsi: qla2xxx: Fix hang when issuing nvme disconnect-all in NPIV (bsc#1157169).
- scsi: qla2xxx: Fix regression warnings (bsc#1157169).
- scsi: qla2xxx: Remove non functional code (bsc#1157169).
- scsi: qla2xxx: set UNLOADING before waiting for session deletion (bsc#1157169).
- scsi: qla4xxx: Adjust indentation in qla4xxx_mem_free (bsc#1171617).
- scsi: qla4xxx: fix double free bug (bsc#1171618).
- scsi: sd: Clear sdkp->protection_type if disk is reformatted without PI (bsc#1171619).
- scsi: sg: add sg_remove_request in sg_common_write (bsc#1171620).
- scsi: tracing: Fix handling of TRANSFER LENGTH == 0 for READ(6) and WRITE(6) (bsc#1171621).
- scsi: ufs: change msleep to usleep_range (bsc#1171622).
- scsi: ufs: Clean up ufshcd_scale_clks() and clock scaling error out path (bsc#1171623).
- scsi: ufs: Fix ufshcd_hold() caused scheduling while atomic (bsc#1171624).
- scsi: ufs: Fix ufshcd_probe_hba() reture value in case ufshcd_scsi_add_wlus() fails (bsc#1171625).
- scsi: ufs: Recheck bkops level if bkops is disabled (bsc#1171626).
- scsi: zfcp: fix missing erp_lock in port recovery trigger for point-to-point (git-fixes).
- sctp: fix possibly using a bad saddr with a given dst (networking-stable-20_04_02).
- sctp: fix refcount bug in sctp_wfree (networking-stable-20_04_02).
- sctp: move the format error check out of __sctp_sf_do_9_1_abort (networking-stable-20_03_01).
- selftests/powerpc: Fix build errors in powerpc ptrace selftests (boo#1124278).
- Separate one more kABI fixup from the functional change:
- seq_file: fix problem when seeking mid-record (bsc#1170125).
- serial: uartps: Move the spinlock after the read of the tx empty (git-fixes).
- sfc: detach from cb_page in efx_copy_channel() (networking-stable-20_03_14).
- signal/pid_namespace: Fix reboot_pid_ns to use send_sig not force_sig (bsc#1172185).
- slcan: not call free_netdev before rtnl_unlock in slcan_open (networking-stable-20_03_28).
- slip: make slhc_compress() more robust against malicious packets (networking-stable-20_03_14).
- smb3: Additional compression structures (bsc#1144333).
- smb3: Add new compression flags (bsc#1144333).
- smb3: change noisy error message to FYI (bsc#1144333).
- smb3: enable swap on SMB3 mounts (bsc#1144333).
- smb3: Minor cleanup of protocol definitions (bsc#1144333).
- smb3: remove overly noisy debug line in signing errors (bsc#1144333).
- smb3: smbdirect support can be configured by default (bsc#1144333).
- smb3: use SMB2_SIGNATURE_SIZE define (bsc#1144333).
- spi: bcm2835: Fix 3-wire mode if DMA is enabled (git-fixes).
- spi: bcm63xx-hsspi: Really keep pll clk enabled (bsc#1051510).
- spi: bcm-qspi: when tx/rx buffer is NULL set to 0 (bsc#1051510).
- spi: dw: Add SPI Rx-done wait method to DMA-based transfer (bsc#1051510).
- spi: dw: Add SPI Tx-done wait method to DMA-based transfer (bsc#1051510).
- spi: dw: Zero DMA Tx and Rx configurations on stack (bsc#1051510).
- spi: fsl: do not map irq during probe (git-fixes).
- spi: fsl: use platform_get_irq() instead of of_irq_to_resource() (git-fixes).
- spi: pxa2xx: Add CS control clock quirk (bsc#1051510).
- spi: qup: call spi_qup_pm_resume_runtime before suspending (bsc#1051510).
- spi: spi-fsl-dspi: Replace interruptible wait queue with a simple completion (git-fixes).
- spi: spi-s3c64xx: Fix system resume support (git-fixes).
- spi/zynqmp: remove entry that causes a cs glitch (bsc#1051510).
- staging: comedi: dt2815: fix writing hi byte of analog output (bsc#1051510).
- staging: comedi: Fix comedi_device refcnt leak in comedi_open (bsc#1051510).
- staging: iio: ad2s1210: Fix SPI reading (bsc#1051510).
- staging: vt6656: Do not set RCR_MULTICAST or RCR_BROADCAST by default (git-fixes).
- staging: vt6656: Fix drivers TBTT timing counter (git-fixes).
- staging: vt6656: Fix pairwise key entry save (git-fixes).
- SUNRPC: expiry_time should be seconds not timeval (git-fixes).
- SUNRPC: Fix a potential buffer overflow in 'svc_print_xprts()' (git-fixes).
- supported.conf: Add br_netfilter to base (bsc#1169020).
- supported.conf: support w1 core and thermometer support
- svcrdma: Fix double svc_rdma_send_ctxt_put() in an error path (bsc#1103992).
- svcrdma: Fix leak of transport addresses (git-fixes).
- svcrdma: Fix trace point use-after-free race (bsc#1103992 ).
- taskstats: fix data-race (bsc#1172188).
- tcp: cache line align MAX_TCP_HEADER (networking-stable-20_04_27).
- tcp: repair: fix TCP_QUEUE_SEQ implementation (networking-stable-20_03_28).
- team: add missing attribute validation for array index (networking-stable-20_03_14).
- team: add missing attribute validation for port ifindex (networking-stable-20_03_14).
- team: fix hang in team_mode_get() (networking-stable-20_04_27).
- tools lib traceevent: Remove unneeded qsort and uses memmove instead (git-fixes).
- tpm: ibmvtpm: retry on H_CLOSED in tpm_ibmvtpm_send() (bsc#1065729).
- tpm/tpm_tis: Free IRQ if probing fails (bsc#1082555).
- tpm/tpm_tis: Free IRQ if probing fails (git-fixes).
- tracing: Add a vmalloc_sync_mappings() for safe measure (git-fixes).
- tracing: Disable trace_printk() on post poned tests (git-fixes).
- tracing: Fix the race between registering 'snapshot' event trigger and triggering 'snapshot' operation (git-fixes).
- tty: rocket, avoid OOB access (git-fixes).
- tun: Do not put_page() for all negative return values from XDP program (bsc#1109837).
- UAS: fix deadlock in error handling and PM flushing work (git-fixes).
- UAS: no use logging any details in case of ENODEV (git-fixes).
- Update config files: Build w1 bus on arm64 (jsc#SLE-11048)
- USB: Add USB_QUIRK_DELAY_CTRL_MSG and USB_QUIRK_DELAY_INIT for Corsair K70 RGB RAPIDFIRE (git-fixes).
- USB: cdc-acm: restore capability check order (git-fixes).
- USB: core: Fix misleading driver bug report (bsc#1051510).
- USB: dwc3: do not set gadget->is_otg flag (git-fixes).
- USB: dwc3: gadget: Do link recovery for SS and SSP (git-fixes).
- USB: early: Handle AMD's spec-compliant identifiers, too (git-fixes).
- USB: f_fs: Clear OS Extended descriptor counts to zero in ffs_data_reset() (git-fixes).
- USB: gadget: audio: Fix a missing error return value in audio_bind() (git-fixes).
- USB: gadget: composite: Inform controller driver of self-powered (git-fixes).
- USB: gadget: legacy: fix error return code in cdc_bind() (git-fixes).
- USB: gadget: legacy: fix error return code in gncm_bind() (git-fixes).
- USB: gadget: legacy: fix redundant initialization warnings (bsc#1051510).
- USB: gadget: net2272: Fix a memory leak in an error handling path in 'net2272_plat_probe()' (git-fixes).
- USB: gadget: udc: atmel: Fix vbus disconnect handling (git-fixes).
- USB: gadget: udc: atmel: Make some symbols static (git-fixes).
- USB: gadget: udc: bdc: Remove unnecessary NULL checks in bdc_req_complete (git-fixes).
- USB: host: xhci-plat: keep runtime active when removing host (git-fixes).
- USB: hub: Fix handling of connect changes during sleep (git-fixes).
- usbnet: silence an unnecessary warning (bsc#1170770).
- USB: serial: garmin_gps: add sanity checking for data length (git-fixes).
- USB: serial: option: add BroadMobi BM806U (git-fixes).
- USB: serial: option: add support for ASKEY WWHC050 (git-fixes).
- USB: serial: option: add Wistron Neweb D19Q1 (git-fixes).
- USB: serial: qcserial: Add DW5816e support (git-fixes).
- USB: sisusbvga: Change port variable from signed to unsigned (git-fixes).
- usb-storage: Add unusual_devs entry for JMicron JMS566 (git-fixes).
- USB: uas: add quirk for LaCie 2Big Quadra (git-fixes).
- USB: xhci: Fix NULL pointer dereference when enqueuing trbs from urb sg list (git-fixes).
- video: fbdev: sis: Remove unnecessary parentheses and commented code (bsc#1114279)
- video: fbdev: w100fb: Fix a potential double free (bsc#1051510).
- vrf: Check skb for XFRM_TRANSFORMED flag (networking-stable-20_04_27).
- vt: ioctl, switch VT_IS_IN_USE and VT_BUSY to inlines (git-fixes).
- vt: selection, introduce vc_is_sel (git-fixes).
- vt: vt_ioctl: fix race in VT_RESIZEX (git-fixes).
- vt: vt_ioctl: fix use-after-free in vt_in_use() (git-fixes).
- vt: vt_ioctl: fix VT_DISALLOCATE freeing in-use virtual console (git-fixes).
- vxlan: check return value of gro_cells_init() (networking-stable-20_03_28).
- w1: Add subsystem kernel public interface (jsc#SLE-11048).
- w1: Fix slave count on 1-Wire bus (resend) (jsc#SLE-11048).
- w1: keep balance of mutex locks and refcnts (jsc#SLE-11048).
- w1: use put_device() if device_register() fail (jsc#SLE-11048).
- watchdog: reset last_hw_keepalive time at start (git-fixes).
- wcn36xx: Fix error handling path in 'wcn36xx_probe()' (bsc#1051510).
- wil6210: remove reset file from debugfs (git-fixes).
- wimax/i2400m: Fix potential urb refcnt leak (bsc#1051510).
- workqueue: do not use wq_select_unbound_cpu() for bound works (bsc#1172130).
- x86/amd_nb: Add Family 19h PCI IDs (jsc#SLE-11834).
- x86/entry/64: Fix unwind hints in kernel exit path (bsc#1058115).
- x86/entry/64: Fix unwind hints in register clearing code (bsc#1058115).
- x86/entry/64: Fix unwind hints in rewind_stack_do_exit() (bsc#1058115).
- x86/entry/64: Fix unwind hints in __switch_to_asm() (bsc#1058115).
- x86/Hyper-V: Allow guests to enable InvariantTSC (bsc#1170620).
- x86/Hyper-V: Allow guests to enable InvariantTSC (bsc#1170621, bsc#1170620).
- x86/Hyper-V: Free hv_panic_page when fail to register kmsg dump (bsc#1170617, bsc#1170618).
- x86/Hyper-V: Free hv_panic_page when fail to register kmsg dump (bsc#1170618).
- x86/Hyper-V: Report crash data in die() when panic_on_oops is set (bsc#1170617, bsc#1170618).
- x86/Hyper-V: Report crash data in die() when panic_on_oops is set (bsc#1170618).
- x86/Hyper-V: Report crash register data or kmsg before running crash kernel (bsc#1170617, bsc#1170618).
- x86/Hyper-V: Report crash register data or kmsg before running crash kernel (bsc#1170618).
- x86/Hyper-V: Report crash register data when sysctl_record_panic_msg is not set (bsc#1170617, bsc#1170618).
- x86/Hyper-V: Report crash register data when sysctl_record_panic_msg is not set (bsc#1170618).
- x86:Hyper-V: report value of misc_features (git fixes).
- x86:Hyper-V: report value of misc_features (git-fixes).
- x86/Hyper-V: Trigger crash enlightenment only once during system crash (bsc#1170617, bsc#1170618).
- x86/Hyper-V: Trigger crash enlightenment only once during system crash (bsc#1170618).
- x86/Hyper-V: Unload vmbus channel in hv panic callback (bsc#1170617, bsc#1170618).
- x86/Hyper-V: Unload vmbus channel in hv panic callback (bsc#1170618).
- x86/kprobes: Avoid kretprobe recursion bug (bsc#1114279).
- x86/MCE/AMD: Add a KABI workaround for enum smca_bank_types (jsc#SLE-11833).
- x86/MCE/AMD, EDAC/mce_amd: Add new Load Store unit McaType (jsc#SLE-11833).
- x86/microcode/AMD: Increase microcode PATCH_MAX_SIZE (bsc#1169005).
- x86/resctrl: Fix invalid attempt at removing the default resource group (git-fixes).
- x86/resctrl: Preserve CDP enable over CPU hotplug (bsc#1114279).
- x86/unwind/orc: Do not skip the first frame for inactive tasks (bsc#1058115).
- x86/unwind/orc: Fix error handling in __unwind_start() (bsc#1058115).
- x86/unwind/orc: Fix error path for bad ORC entry type (bsc#1058115).
- x86/unwind/orc: Fix unwind_get_return_address_ptr() for inactive tasks (bsc#1058115).
- x86/unwind/orc: Prevent unwinding before ORC initialization (bsc#1058115).
- x86/unwind: Prevent false warnings for non-current tasks (bsc#1058115).
- x86/xen: fix booting 32-bit pv guest (bsc#1071995).
- x86/xen: Make the boot CPU idle task reliable (bsc#1071995).
- x86/xen: Make the secondary CPU idle tasks reliable (bsc#1071995).
- xen/pci: reserve MCFG areas earlier (bsc#1170145).
- xfrm: Always set XFRM_TRANSFORMED in xfrm{4,6}_output_finish (networking-stable-20_04_27).
- xfs: clear PF_MEMALLOC before exiting xfsaild thread (git-fixes).
- xfs: Correctly invert xfs_buftarg LRU isolation logic (git-fixes).
- xfs: do not ever return a stale pointer from __xfs_dir3_free_read (git-fixes).
- xprtrdma: Fix completion wait during device removal (git-fixes).
Patchnames
SUSE-2020-1587,SUSE-SLE-SERVER-12-SP5-2020-1587
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "The SUSE Linux Enterprise 12 SP5 Azure kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2020-0543: Fixed a side channel attack against special registers which could have resulted in leaking of read values to cores other than the one which called it.\n This attack is known as Special Register Buffer Data Sampling (SRBDS) or \u0027CrossTalk\u0027 (bsc#1154824).\n- CVE-2020-13143: Fixed an out-of-bounds read in gadget_dev_desc_UDC_store in drivers/usb/gadget/configfs.c (bsc#1171982).\n- CVE-2020-12769: Fixed an issue which could have allowed attackers to cause a panic via concurrent calls to dw_spi_irq and dw_spi_transfer_one (bsc#1171983).\n- CVE-2020-12768: Fixed a memory leak in svm_cpu_uninit in arch/x86/kvm/svm.c (bsc#1171736).\n- CVE-2020-12659: Fixed an out-of-bounds write (by a user with the CAP_NET_ADMIN capability) due to improper headroom validation (bsc#1171214).\n- CVE-2020-12657: An a use-after-free in block/bfq-iosched.c (bsc#1171205).\n- CVE-2020-12656: Fixed an improper handling of certain domain_release calls leadingch could have led to a memory leak (bsc#1171219).\n- CVE-2020-12655: Fixed an issue which could have allowed attackers to trigger a sync of excessive duration via an XFS v5 image with crafted metadata (bsc#1171217).\n- CVE-2020-12654: Fixed an issue in he wifi driver which could have allowed a remote AP to trigger a heap-based buffer overflow (bsc#1171202).\n- CVE-2020-12653: Fixed an issue in the wifi driver which could have allowed local users to gain privileges or cause a denial of service (bsc#1171195).\n- CVE-2020-12652: Fixed an issue which could have allowed local users to hold an incorrect lock during the ioctl operation and trigger a race condition (bsc#1171218).\n- CVE-2020-12464: Fixed a use-after-free due to a transfer without a reference (bsc#1170901).\n- CVE-2020-12114: Fixed a pivot_root race condition which could have allowed local users to cause a denial of service (panic) by corrupting a mountpoint reference counter (bsc#1171098).\n- CVE-2020-10757: Fixed an issue where remaping hugepage DAX to anon mmap could have caused user PTE access (bsc#1172317).\n- CVE-2020-10751: Fixed an improper implementation in SELinux LSM hook where it was assumed that an skb would only contain a single netlink message (bsc#1171189).\n- CVE-2020-10732: Fixed kernel data leak in userspace coredumps due to uninitialized data (bsc#1171220).\n- CVE-2020-10720: Fixed a use-after-free read in napi_gro_frags() (bsc#1170778).\n- CVE-2020-10711: Fixed a null pointer dereference in SELinux subsystem which could have allowed a remote network user to crash the kernel resulting in a denial of service (bsc#1171191).\n- CVE-2020-10690: Fixed the race between the release of ptp_clock and cdev (bsc#1170056).\n- CVE-2019-9455: Fixed a pointer leak due to a WARN_ON statement in a video driver. This could lead to local information disclosure with System execution privileges needed (bsc#1170345).\n- CVE-2019-20812: Fixed an issue in prb_calc_retire_blk_tmo() which could have resulted in a denial of service (bsc#1172453).\n- CVE-2019-20806: Fixed a null pointer dereference which may had lead to denial of service (bsc#1172199).\n- CVE-2019-19462: Fixed an issue which could have allowed local user to cause denial of service (bsc#1158265).\n- CVE-2018-1000199: Fixed a potential local code execution via ptrace (bsc#1089895).\n\nThe following non-security bugs were fixed:\n\n- ACPI: CPPC: Fix reference count leak in acpi_cppc_processor_probe() (bsc#1051510).\n- ACPI: sysfs: Fix reference count leak in acpi_sysfs_add_hotplug_profile() (bsc#1051510).\n- acpi/x86: ignore unspecified bit positions in the ACPI global lock field (bsc#1051510).\n- Add br_netfilter to kernel-default-base (bsc#1169020)\n- Add commit for git-fix that\u0027s not a fix This commit cleans up debug code but does not fix anything, and it relies on a new kernel function that isn\u0027t yet in this version of SLE.\n- agp/intel: Reinforce the barrier after GTT updates (bsc#1051510).\n- ALSA: ctxfi: Remove unnecessary cast in kfree (bsc#1051510).\n- ALSA: doc: Document PC Beep Hidden Register on Realtek ALC256 (bsc#1051510).\n- ALSA: dummy: Fix PCM format loop in proc output (bsc#1111666).\n- ALSA: hda: Add driver blacklist (bsc#1051510).\n- ALSA: hda: Always use jackpoll helper for jack update after resume (bsc#1051510).\n- ALSA: hda: call runtime_allow() for all hda controllers (bsc#1051510).\n- ALSA: hda: Do not release card at firmware loading error (bsc#1051510).\n- ALSA: hda: Explicitly permit using autosuspend if runtime PM is supported (bsc#1051510).\n- ALSA: hda/hdmi: fix race in monitor detection during probe (bsc#1051510).\n- ALSA: hda/hdmi: fix without unlocked before return (bsc#1051510).\n- ALSA: hda: Honor PM disablement in PM freeze and thaw_noirq ops (bsc#1051510).\n- ALSA: hda: Keep the controller initialization even if no codecs found (bsc#1051510).\n- ALSA: hda: Match both PCI ID and SSID for driver blacklist (bsc#1111666).\n- ALSA: hda/realtek - Add a model for Thinkpad T570 without DAC workaround (bsc#1172017).\n- ALSA: hda/realtek - Add COEF workaround for ASUS ZenBook UX431DA (git-fixes).\n- ALSA: hda/realtek - Add HP new mute led supported for ALC236 (git-fixes).\n- ALSA: hda/realtek - Add more fixup entries for Clevo machines (git-fixes).\n- ALSA: hda/realtek - Add new codec supported for ALC245 (bsc#1051510).\n- ALSA: hda/realtek - Add new codec supported for ALC287 (git-fixes).\n- ALSA: hda/realtek: Add quirk for Samsung Notebook (git-fixes).\n- ALSA: hda/realtek - Add supported new mute Led for HP (git-fixes).\n- ALSA: hda/realtek - Enable headset mic of ASUS GL503VM with ALC295 (git-fixes).\n- ALSA: hda/realtek - Enable headset mic of ASUS UX550GE with ALC295 (git-fixes).\n- ALSA: hda/realtek: Enable headset mic of ASUS UX581LV with ALC295 (git-fixes).\n- ALSA: hda/realtek - Enable the headset mic on Asus FX505DT (bsc#1051510).\n- ALSA: hda/realtek - Fix S3 pop noise on Dell Wyse (git-fixes).\n- ALSA: hda/realtek - Fix silent output on Gigabyte X570 Aorus Xtreme (bsc#1111666).\n- ALSA: hda/realtek - Fix unexpected init_amp override (bsc#1051510).\n- ALSA: hda/realtek - Limit int mic boost for Thinkpad T530 (git-fixes bsc#1171293).\n- ALSA: hda/realtek - Two front mics on a Lenovo ThinkCenter (bsc#1051510).\n- ALSA: hda: Release resources at error in delayed probe (bsc#1051510).\n- ALSA: hda: Remove ASUS ROG Zenith from the blacklist (bsc#1051510).\n- ALSA: hda: Skip controller resume if not needed (bsc#1051510).\n- ALSA: hwdep: fix a left shifting 1 by 31 UB bug (git-fixes).\n- ALSA: iec1712: Initialize STDSP24 properly when using the model=staudio option (git-fixes).\n- ALSA: opti9xx: shut up gcc-10 range warning (bsc#1051510).\n- ALSA: pcm: fix incorrect hw_base increase (git-fixes).\n- ALSA: pcm: oss: Place the plugin buffer overflow checks correctly (bsc#1170522).\n- ALSA: rawmidi: Fix racy buffer resize under concurrent accesses (git-fixes).\n- ALSA: usb-audio: Add connector notifier delegation (bsc#1051510).\n- ALSA: usb-audio: Add control message quirk delay for Kingston HyperX headset (git-fixes).\n- ALSA: usb-audio: add mapping for ASRock TRX40 Creator (git-fixes).\n- ALSA: usb-audio: Add mixer workaround for TRX40 and co (bsc#1051510).\n- ALSA: usb-audio: Add quirk for Focusrite Scarlett 2i2 (bsc#1051510).\n- ALSA: usb-audio: Add static mapping table for ALC1220-VB-based mobos (bsc#1051510).\n- ALSA: usb-audio: Apply async workaround for Scarlett 2i4 2nd gen (bsc#1051510).\n- ALSA: usb-audio: Check mapping at creating connector controls, too (bsc#1051510).\n- ALSA: usb-audio: Correct a typo of NuPrime DAC-10 USB ID (bsc#1051510).\n- ALSA: usb-audio: Do not create jack controls for PCM terminals (bsc#1051510).\n- ALSA: usb-audio: Do not override ignore_ctl_error value from the map (bsc#1051510).\n- ALSA: usb-audio: Filter error from connector kctl ops, too (bsc#1051510).\n- ALSA: usb-audio: Fix usb audio refcnt leak when getting spdif (bsc#1051510).\n- ALSA: usb-audio: mixer: volume quirk for ESS Technology Asus USB DAC (git-fixes).\n- ALSA: usb-audio: Quirks for Gigabyte TRX40 Aorus Master onboard audio (git-fixes).\n- ALSA: usx2y: Fix potential NULL dereference (bsc#1051510).\n- ASoC: codecs: hdac_hdmi: Fix incorrect use of list_for_each_entry (bsc#1051510).\n- ASoC: dapm: connect virtual mux with default value (bsc#1051510).\n- ASoC: dapm: fixup dapm kcontrol widget (bsc#1051510).\n- ASoC: dpcm: allow start or stop during pause for backend (bsc#1051510).\n- ASoC: fix regwmask (bsc#1051510).\n- ASoC: msm8916-wcd-digital: Reset RX interpolation path after use (bsc#1051510).\n- ASoC: samsung: Prevent clk_get_rate() calls in atomic context (bsc#1111666).\n- ASoC: topology: Check return value of pcm_new_ver (bsc#1051510).\n- ASoC: topology: use name_prefix for new kcontrol (bsc#1051510).\n- b43legacy: Fix case where channel status is corrupted (bsc#1051510).\n- batman-adv: fix batadv_nc_random_weight_tq (git-fixes).\n- batman-adv: Fix refcnt leak in batadv_show_throughput_override (git-fixes).\n- batman-adv: Fix refcnt leak in batadv_store_throughput_override (git-fixes).\n- batman-adv: Fix refcnt leak in batadv_v_ogm_process (git-fixes).\n- bcache: avoid unnecessary btree nodes flushing in btree_flush_write() (git fixes (block drivers)).\n- bcache: fix incorrect data type usage in btree_flush_write() (git fixes (block drivers)).\n- bcache: Revert \u0027bcache: shrink btree node cache after bch_btree_check()\u0027 (git fixes (block drivers)).\n- blk-mq: honor IO scheduler for multiqueue devices (bsc#1165478).\n- blk-mq: simplify blk_mq_make_request() (bsc#1165478).\n- block/drbd: delete invalid function drbd_md_mark_dirty_ (bsc#1171527).\n- block: drbd: remove a stray unlock in __drbd_send_protocol() (bsc#1171599).\n- block: fix busy device checking in blk_drop_partitions again (bsc#1171948).\n- block: fix busy device checking in blk_drop_partitions (bsc#1171948).\n- block: fix memleak of bio integrity data (git fixes (block drivers)).\n- block: remove the bd_openers checks in blk_drop_partitions (bsc#1171948).\n- bnxt_en: fix memory leaks in bnxt_dcbnl_ieee_getets() (networking-stable-20_03_28).\n- bnxt_en: Reduce BNXT_MSIX_VEC_MAX value to supported CQs per PF (bsc#1104745).\n- bnxt_en: reinitialize IRQs when MTU is modified (networking-stable-20_03_14).\n- bnxt_en: Return error if bnxt_alloc_ctx_mem() fails (bsc#1104745 ).\n- bnxt_en: Return error when allocating zero size context memory (bsc#1104745).\n- bonding/alb: make sure arp header is pulled before accessing it (networking-stable-20_03_14).\n- bpf: Fix sk_psock refcnt leak when receiving message (bsc#1083647).\n- bpf: Forbid XADD on spilled pointers for unprivileged users (bsc#1083647).\n- brcmfmac: abort and release host after error (bsc#1051510).\n- btrfs: fix deadlock with memory reclaim during scrub (bsc#1172127).\n- btrfs: fix log context list corruption after rename whiteout error (bsc#1172342).\n- btrfs: fix partial loss of prealloc extent past i_size after fsync (bsc#1172343).\n- btrfs: move the dio_sem higher up the callchain (bsc#1171761).\n- btrfs: relocation: add error injection points for cancelling balance (bsc#1171417).\n- btrfs: relocation: Check cancel request after each data page read (bsc#1171417).\n- btrfs: relocation: Check cancel request after each extent found (bsc#1171417).\n- btrfs: relocation: Clear the DEAD_RELOC_TREE bit for orphan roots to prevent runaway balance (bsc#1171417).\n- btrfs: relocation: Fix reloc root leakage and the NULL pointer reference caused by the leakage (bsc#1171417).\n- btrfs: relocation: Work around dead relocation stage loop (bsc#1171417).\n- btrfs: reloc: clear DEAD_RELOC_TREE bit for orphan roots to prevent runaway balance (bsc#1171417 bsc#1160947 bsc#1172366).\n- btrfs: reloc: fix reloc root leak and NULL pointer dereference (bsc#1171417 bsc#1160947 bsc#1172366).\n- btrfs: setup a nofs context for memory allocation at btrfs_create_tree() (bsc#1172127).\n- btrfs: setup a nofs context for memory allocation at __btrfs_set_acl (bsc#1172127).\n- btrfs: use nofs context when initializing security xattrs to avoid deadlock (bsc#1172127).\n- can: add missing attribute validation for termination (networking-stable-20_03_14).\n- cdc-acm: close race betrween suspend() and acm_softint (git-fixes).\n- cdc-acm: introduce a cool down (git-fixes).\n- ceph: check if file lock exists before sending unlock request (bsc#1168789).\n- ceph: demote quotarealm lookup warning to a debug message (bsc#1171692).\n- ceph: fix double unlock in handle_cap_export() (bsc#1171694).\n- ceph: fix double unlock in handle_cap_export() (bsc#1171694).\n- ceph: fix endianness bug when handling MDS session feature bits (bsc#1171695).\n- ceph: fix endianness bug when handling MDS session feature bits (bsc#1171695).\n- cgroup, netclassid: periodically release file_lock on classid updating (networking-stable-20_03_14).\n- CIFS: Allocate crypto structures on the fly for calculating signatures of incoming packets (bsc#1144333).\n- CIFS: Allocate encryption header through kmalloc (bsc#1144333).\n- CIFS: allow unlock flock and OFD lock across fork (bsc#1144333).\n- CIFS: check new file size when extending file by fallocate (bsc#1144333).\n- CIFS: cifspdu.h: Replace zero-length array with flexible-array member (bsc#1144333).\n- CIFS: clear PF_MEMALLOC before exiting demultiplex thread (bsc#1144333).\n- CIFS: do not share tcons with DFS (bsc#1144333).\n- CIFS: dump the session id and keys also for SMB2 sessions (bsc#1144333).\n- CIFS: ensure correct super block for DFS reconnect (bsc#1144333).\n- CIFS: Fix bug which the return value by asynchronous read is error (bsc#1144333).\n- CIFS: fix uninitialised lease_key in open_shroot() (bsc#1144333).\n- CIFS: improve read performance for page size 64KB \u0026 cache=strict \u0026 vers=2.1+ (bsc#1144333).\n- CIFS: Increment num_remote_opens stats counter even in case of smb2_query_dir_first (bsc#1144333).\n- CIFS: minor update to comments around the cifs_tcp_ses_lock mutex (bsc#1144333).\n- CIFS: protect updating server-\u003edstaddr with a spinlock (bsc#1144333).\n- CIFS: smb2pdu.h: Replace zero-length array with flexible-array member (bsc#1144333).\n- CIFS: smbd: Calculate the correct maximum packet size for segmented SMBDirect send/receive (bsc#1144333).\n- CIFS: smbd: Check and extend sender credits in interrupt context (bsc#1144333).\n- CIFS: smbd: Check send queue size before posting a send (bsc#1144333).\n- CIFS: smbd: Do not schedule work to send immediate packet on every receive (bsc#1144333).\n- CIFS: smbd: Merge code to track pending packets (bsc#1144333).\n- CIFS: smbd: Properly process errors on ib_post_send (bsc#1144333).\n- CIFS: smbd: Update receive credits before sending and deal with credits roll back on failure before sending (bsc#1144333).\n- CIFS: Warn less noisily on default mount (bsc#1144333).\n- clk: Add clk_hw_unregister_composite helper function definition (bsc#1051510).\n- clk: imx6ull: use OSC clock during AXI rate change (bsc#1051510).\n- clk: imx: make mux parent strings const (bsc#1051510).\n- clk: mediatek: correct the clocks for MT2701 HDMI PHY module (bsc#1051510).\n- clk: sunxi-ng: a64: Fix gate bit of DSI DPHY (bsc#1051510).\n- clocksource/drivers/hyper-v: Set TSC clocksource as default w/ InvariantTSC (bsc#1170620).\n- clocksource/drivers/hyper-v: Set TSC clocksource as default w/ InvariantTSC (bsc#1170620, bsc#1170621).\n- clocksource: dw_apb_timer_of: Fix missing clockevent timers (bsc#1051510).\n- component: Silence bind error on -EPROBE_DEFER (bsc#1051510).\n- coresight: do not use the BIT() macro in the UAPI header (git fixes (block drivers)).\n- cpufreq: s3c64xx: Remove pointless NULL check in s3c64xx_cpufreq_driver_init (bsc#1051510).\n- crypto: ccp - AES CFB mode is a stream cipher (git-fixes).\n- crypto: ccp - Change a message to reflect status instead of failure (bsc#1172218).\n- crypto: ccp - Clean up and exit correctly on allocation failure (git-fixes).\n- crypto: ccp - Cleanup misc_dev on sev_exit() (bsc#1114279).\n- crypto: ccp - Cleanup sp_dev_master in psp_dev_destroy() (bsc#1114279).\n- cxgb4: fix MPS index overwrite when setting MAC address (bsc#1127355).\n- cxgb4: fix Txq restart check during backpressure (bsc#1127354 bsc#1127371).\n- debugfs: Add debugfs_create_xul() for hexadecimal unsigned long (git-fixes).\n- debugfs_lookup(): switch to lookup_one_len_unlocked() (bsc#1171979).\n- devlink: fix return value after hitting end in region read (bsc#1109837).\n- devlink: validate length of param values (bsc#1109837).\n- devlink: validate length of region addr/len (bsc#1109837).\n- dmaengine: dmatest: Fix iteration non-stop logic (bsc#1051510).\n- dm mpath: switch paths in dm_blk_ioctl() code path (bsc#1167574).\n- dm-raid1: fix invalid return value from dm_mirror (bsc#1172378).\n- dm writecache: fix data corruption when reloading the target (git fixes (block drivers)).\n- dm writecache: fix incorrect flush sequence when doing SSD mode commit (git fixes (block drivers)).\n- dm writecache: verify watermark during resume (git fixes (block drivers)).\n- dm zoned: fix invalid memory access (git fixes (block drivers)).\n- dm zoned: reduce overhead of backing device checks (git fixes (block drivers)).\n- dm zoned: remove duplicate nr_rnd_zones increase in dmz_init_zone() (git fixes (block drivers)).\n- dm zoned: support zone sizes smaller than 128MiB (git fixes (block drivers)).\n- dp83640: reverse arguments to list_add_tail (git-fixes).\n- drivers: hv: Add a module description line to the hv_vmbus driver (bsc#1172249, bsc#1172251).\n- drivers: hv: Add a module description line to the hv_vmbus driver (bsc#1172253).\n- drivers: HV: Send one page worth of kmsg dump over Hyper-V during panic (bsc#1170618).\n- drivers: hv: vmbus: Fix the issue with freeing up hv_ctl_table_hdr (bsc#1170618).\n- drivers: hv: vmbus: Get rid of MSR access from vmbus_drv.c (bsc#1170618).\n- drivers: hv: vmus: Fix the check for return value from kmsg get dump buffer (bsc#1170618).\n- drivers/net/ibmvnic: Update VNIC protocol version reporting (bsc#1065729).\n- drivers: w1: add hwmon support structures (jsc#SLE-11048).\n- drivers: w1: add hwmon temp support for w1_therm (jsc#SLE-11048).\n- drivers: w1: refactor w1_slave_show to make the temp reading functionality separate (jsc#SLE-11048).\n- drm: amd/acp: fix broken menu structure (bsc#1114279) \t* context changes\n- drm/amdgpu: Correctly initialize thermal controller for GPUs with Powerplay table v0 (e.g Hawaii) (bsc#1111666).\n- drm/amdgpu: Fix oops when pp_funcs is unset in ACPI event (bsc#1111666).\n- drm/amd/powerplay: force the trim of the mclk dpm_levels if OD is (bsc#1113956)\n- drm/atomic: Take the atomic toys away from X (bsc#1112178) \t* context changes\n- drm/crc: Actually allow to change the crc source (bsc#1114279) \t* offset changes\n- drm/dp_mst: Fix clearing payload state on topology disable (bsc#1051510).\n- drm/dp_mst: Reformat drm_dp_check_act_status() a bit (bsc#1051510).\n- drm/edid: Fix off-by-one in DispID DTD pixel clock (bsc#1114279)\n- drm/etnaviv: fix perfmon domain interation (bsc#1113956)\n- drm/etnaviv: rework perfmon query infrastructure (bsc#1112178)\n- drm/i915: Apply Wa_1406680159:icl,ehl as an engine workaround (bsc#1112178) \t* rename gt/intel_workarounds.c to intel_workarounds.c \t* context changes\n- drm/i915/gvt: Init DPLL/DDI vreg for virtual display instead of (bsc#1114279)\n- drm/i915: HDCP: fix Ri prime check done during link check (bsc#1112178) \t* rename display/intel_hdmi.c to intel_hdmi.c \t* context changes\n- drm/i915: properly sanity check batch_start_offset (bsc#1114279) \t* renamed display/intel_fbc.c -\u003e intel_fb.c \t* renamed gt/intel_rc6.c -\u003e intel_pm.c \t* context changes\n- drm/meson: Delete an error message in meson_dw_hdmi_bind() (bsc#1051510).\n- drm: NULL pointer dereference [null-pointer-deref] (CWE 476) problem (bsc#1114279)\n- drm/qxl: qxl_release leak in qxl_draw_dirty_fb() (bsc#1051510).\n- drm/qxl: qxl_release leak in qxl_hw_surface_alloc() (bsc#1051510).\n- drm/qxl: qxl_release use after free (bsc#1051510).\n- drm: Remove PageReserved manipulation from drm_pci_alloc (bsc#1114279) \t* offset changes\n- drm/sun4i: dsi: Allow binding the host without a panel (bsc#1113956)\n- drm/sun4i: dsi: Avoid hotplug race with DRM driver bind (bsc#1113956)\n- drm/sun4i: dsi: Remove incorrect use of runtime PM (bsc#1113956) \t* context changes\n- drm/sun4i: dsi: Remove unused drv from driver context (bsc#1113956) \t* context changes \t* keep include of sun4i_drv.h\n- dump_stack: avoid the livelock of the dump_lock (git fixes (block drivers)).\n- EDAC/amd64: Add family ops for Family 19h Models 00h-0Fh (jsc#SLE-11833).\n- EDAC/amd64: Drop some family checks for newer systems (jsc#SLE-11833).\n- EDAC/mce_amd: Always load on SMCA systems (jsc#SLE-11833).\n- EDAC/mce_amd: Make fam_ops static global (jsc#SLE-11833).\n- EDAC, sb_edac: Add support for systems with segmented PCI buses (bsc#1169525).\n- ext4: do not zeroout extents beyond i_disksize (bsc#1167851).\n- ext4: fix extent_status fragmentation for plain files (bsc#1171949).\n- ext4: use non-movable memory for superblock readahead (bsc#1171952).\n- fanotify: fix merging marks masks with FAN_ONDIR (bsc#1171679).\n- fbcon: fix null-ptr-deref in fbcon_switch (bsc#1114279) \t* rename drivers/video/fbdev/core to drivers/video/console \t* context changes\n- fib: add missing attribute validation for tun_id (networking-stable-20_03_14).\n- firmware: qcom: scm: fix compilation error when disabled (bsc#1051510).\n- Fix a backport bug, where btrfs_put_root() -\u003e btrfs_put_fs_root() modification is not needed due to missing dependency\n- fs/cifs: fix gcc warning in sid_to_id (bsc#1144333).\n- fs/seq_file.c: simplify seq_file iteration code and interface (bsc#1170125).\n- gpio: tegra: mask GPIO IRQs during IRQ shutdown (bsc#1051510).\n- gre: fix uninit-value in __iptunnel_pull_header (networking-stable-20_03_14).\n- HID: hid-input: clear unmapped usages (git-fixes).\n- HID: hyperv: Add a module description line (bsc#1172249, bsc#1172251).\n- HID: hyperv: Add a module description line (bsc#1172253).\n- HID: i2c-hid: add Trekstor Primebook C11B to descriptor override (git-fixes).\n- HID: i2c-hid: override HID descriptors for certain devices (git-fixes).\n- HID: multitouch: add eGalaxTouch P80H84 support (bsc#1051510).\n- HID: wacom: Read HID_DG_CONTACTMAX directly for non-generic devices (git-fixes).\n- hrtimer: Annotate lockless access to timer-\u003estate (git fixes (block drivers)).\n- hsr: add restart routine into hsr_get_node_list() (networking-stable-20_03_28).\n- hsr: check protocol version in hsr_newlink() (networking-stable-20_04_17).\n- hsr: fix general protection fault in hsr_addr_is_self() (networking-stable-20_03_28).\n- hsr: set .netnsok flag (networking-stable-20_03_28).\n- hsr: use rcu_read_lock() in hsr_get_node_{list/status}() (networking-stable-20_03_28).\n- i2c: acpi: Force bus speed to 400KHz if a Silead touchscreen is present (git-fixes).\n- i2c: acpi: put device when verifying client fails (git-fixes).\n- i2c: brcmstb: remove unused struct member (git-fixes).\n- i2c: core: Allow empty id_table in ACPI case as well (git-fixes).\n- i2c: core: decrease reference count of device node in i2c_unregister_device (git-fixes).\n- i2c: dev: Fix the race between the release of i2c_dev and cdev (bsc#1051510).\n- i2c: fix missing pm_runtime_put_sync in i2c_device_probe (git-fixes).\n- i2c-hid: properly terminate i2c_hid_dmi_desc_override_table array (git-fixes).\n- i2c: i801: Do not add ICH_RES_IO_SMI for the iTCO_wdt device (git-fixes).\n- i2c: iproc: Stop advertising support of SMBUS quick cmd (git-fixes).\n- i2c: isch: Remove unnecessary acpi.h include (git-fixes).\n- i2c: mux: demux-pinctrl: Fix an error handling path in \u0027i2c_demux_pinctrl_probe()\u0027 (bsc#1051510).\n- i2c: st: fix missing struct parameter description (bsc#1051510).\n- IB/ipoib: Add child to parent list only if device initialized (bsc#1168503).\n- IB/ipoib: Consolidate checking of the proposed child interface (bsc#1168503).\n- IB/ipoib: Do not remove child devices from within the ndo_uninit (bsc#1168503).\n- IB/ipoib: Get rid of IPOIB_FLAG_GOING_DOWN (bsc#1168503).\n- IB/ipoib: Get rid of the sysfs_mutex (bsc#1168503).\n- IB/ipoib: Maintain the child_intfs list from ndo_init/uninit (bsc#1168503).\n- IB/ipoib: Move all uninit code into ndo_uninit (bsc#1168503).\n- IB/ipoib: Move init code to ndo_init (bsc#1168503).\n- IB/ipoib: Replace printk with pr_warn (bsc#1168503).\n- IB/ipoib: Use cancel_delayed_work_sync for neigh-clean task (bsc#1168503).\n- IB/ipoib: Warn when one port fails to initialize (bsc#1168503).\n- IB/mlx5: Fix missing congestion control debugfs on rep rdma device (bsc#1103991).\n- ibmvnic: Skip fatal error reset after passive init (bsc#1171078 ltc#184239).\n- iio:ad7797: Use correct attribute_group (bsc#1051510).\n- iio: adc: stm32-adc: fix device used to request dma (bsc#1051510).\n- iio: adc: stm32-adc: fix sleep in atomic context (git-fixes).\n- iio: adc: stm32-adc: Use dma_request_chan() instead dma_request_slave_channel() (bsc#1051510).\n- iio: dac: vf610: Fix an error handling path in \u0027vf610_dac_probe()\u0027 (bsc#1051510).\n- iio: sca3000: Remove an erroneous \u0027get_device()\u0027 (bsc#1051510).\n- iio: xilinx-xadc: Fix ADC-B powerdown (bsc#1051510).\n- iio: xilinx-xadc: Fix clearing interrupt when enabling trigger (bsc#1051510).\n- iio: xilinx-xadc: Fix sequencer configuration for aux channels in simultaneous mode (bsc#1051510).\n- ima: Fix return value of ima_write_policy() (git-fixes).\n- Input: evdev - call input_flush_device() on release(), not flush() (bsc#1051510).\n- Input: hyperv-keyboard - add module description (bsc#1172249, bsc#1172251).\n- Input: hyperv-keyboard - add module description (bsc#1172253).\n- Input: i8042 - add Acer Aspire 5738z to nomux list (bsc#1051510).\n- Input: i8042 - add ThinkPad S230u to i8042 reset list (bsc#1051510).\n- Input: raydium_i2c_ts - use true and false for boolean values (bsc#1051510).\n- Input: synaptics-rmi4 - fix error return code in rmi_driver_probe() (bsc#1051510).\n- Input: synaptics-rmi4 - really fix attn_data use-after-free (git-fixes).\n- Input: usbtouchscreen - add support for BonXeon TP (bsc#1051510).\n- Input: xpad - add custom init packet for Xbox One S controllers (bsc#1051510).\n- iommu/amd: Call domain_flush_complete() in update_domain() (bsc#1172096).\n- iommu/amd: Do not flush Device Table in iommu_map_page() (bsc#1172097).\n- iommu/amd: Do not loop forever when trying to increase address space (bsc#1172098).\n- iommu/amd: Fix legacy interrupt remapping for x2APIC-enabled system (bsc#1172099).\n- iommu/amd: Fix over-read of ACPI UID from IVRS table (bsc#1172101).\n- iommu/amd: Fix race in increase_address_space()/fetch_pte() (bsc#1172102).\n- iommu/amd: Update Device Table in increase_address_space() (bsc#1172103).\n- iommu: Fix reference count leak in iommu_group_alloc (bsc#1172397).\n- ip6_tunnel: Allow rcv/xmit even if remote address is a local address (bsc#1166978).\n- ipmi: fix hung processes in __get_guid() (git-fixes).\n- ipv4: fix a RCU-list lock in fib_triestat_seq_show (networking-stable-20_04_02).\n- ipv6/addrconf: call ipv6_mc_up() for non-Ethernet interface (networking-stable-20_03_14).\n- ipv6: do not auto-add link-local address to lag ports (networking-stable-20_04_09).\n- ipv6: fix IPV6_ADDRFORM operation logic (bsc#1171662).\n- ipv6: Fix nlmsg_flags when splitting a multipath route (networking-stable-20_03_01).\n- ipv6: fix restrict IPV6_ADDRFORM operation (bsc#1171662).\n- ipv6: Fix route replacement with dev-only route (networking-stable-20_03_01).\n- ipvlan: add cond_resched_rcu() while processing muticast backlog (networking-stable-20_03_14).\n- ipvlan: do not deref eth hdr before checking it\u0027s set (networking-stable-20_03_14).\n- ipvlan: do not use cond_resched_rcu() in ipvlan_process_multicast() (networking-stable-20_03_14).\n- iwlwifi: pcie: actually release queue memory in TVQM (bsc#1051510).\n- ixgbe: do not check firmware errors (bsc#1170284).\n- kabi fix for early XHCI debug (git-fixes).\n- kabi for for md: improve handling of bio with REQ_PREFLUSH in md_flush_request() (git-fixes).\n- kabi, protect struct ib_device (bsc#1168503).\n- kabi/severities: Do not track KVM internal symbols.\n- kabi/severities: Ingnore get_dev_data() The function is internal to the AMD IOMMU driver and must not be called by any third party.\n- kabi workaround for snd_rawmidi buffer_ref field addition (git-fixes).\n- KEYS: reaching the keys quotas correctly (bsc#1051510).\n- KVM: arm64: Change hyp_panic()s dependency on tpidr_el2 (bsc#1133021).\n- KVM: arm64: Stop save/restoring host tpidr_el1 on VHE (bsc#1133021).\n- KVM: Check validity of resolved slot when searching memslots (bsc#1172104).\n- KVM: s390: vsie: Fix delivery of addressing exceptions (git-fixes).\n- KVM: s390: vsie: Fix possible race when shadowing region 3 tables (git-fixes).\n- KVM: s390: vsie: Fix region 1 ASCE sanity shadow address checks (git-fixes).\n- KVM: SVM: Fix potential memory leak in svm_cpu_init() (bsc#1171736).\n- KVM x86: Extend AMD specific guest behavior to Hygon virtual CPUs (bsc#1152489).\n- l2tp: Allow management of tunnels and session in user namespace (networking-stable-20_04_17).\n- libata: Remove extra scsi_host_put() in ata_scsi_add_hosts() (bsc#1051510).\n- libata: Return correct status in sata_pmp_eh_recover_pm() when ATA_DFLAG_DETACH is set (bsc#1051510).\n- lib: raid6: fix awk build warnings (git fixes (block drivers)).\n- lib/raid6/test: fix build on distros whose /bin/sh is not bash (git fixes (block drivers)).\n- lib/stackdepot.c: fix global out-of-bounds in stack_slabs (git fixes (block drivers)).\n- locks: print unsigned ino in /proc/locks (bsc#1171951). \n- mac80211: add ieee80211_is_any_nullfunc() (bsc#1051510).\n- mac80211_hwsim: Use kstrndup() in place of kasprintf() (bsc#1051510).\n- mac80211: mesh: fix discovery timer re-arming issue / crash (bsc#1051510).\n- macsec: avoid to set wrong mtu (bsc#1051510).\n- macsec: restrict to ethernet devices (networking-stable-20_03_28).\n- macvlan: add cond_resched() during multicast processing (networking-stable-20_03_14).\n- macvlan: fix null dereference in macvlan_device_event() (bsc#1051510).\n- make some Fujitsu systems run (bsc#1141558).\n- md: improve handling of bio with REQ_PREFLUSH in md_flush_request() (git-fixes).\n- md/raid0: Fix an error message in raid0_make_request() (git fixes (block drivers)).\n- md/raid10: prevent access of uninitialized resync_pages offset (git-fixes).\n- media: dvb: return -EREMOTEIO on i2c transfer failure (bsc#1051510).\n- media: platform: fcp: Set appropriate DMA parameters (bsc#1051510).\n- media: ti-vpe: cal: fix disable_irqs to only the intended target (git-fixes).\n- mei: release me_cl object reference (bsc#1051510).\n- mlxsw: Fix some IS_ERR() vs NULL bugs (networking-stable-20_04_27).\n- mlxsw: spectrum_flower: Do not stop at FLOW_ACTION_VLAN_MANGLE (networking-stable-20_04_09).\n- mlxsw: spectrum_mr: Fix list iteration in error path (bsc#1112374).\n- mmc: atmel-mci: Fix debugfs on 64-bit platforms (git-fixes).\n- mmc: core: Check request type before completing the request (git-fixes).\n- mmc: core: Fix recursive locking issue in CQE recovery path (git-fixes).\n- mmc: cqhci: Avoid false \u0027cqhci: CQE stuck on\u0027 by not open-coding timeout loop (git-fixes).\n- mmc: dw_mmc: Fix debugfs on 64-bit platforms (git-fixes).\n- mmc: meson-gx: make sure the descriptor is stopped on errors (git-fixes).\n- mmc: meson-gx: simplify interrupt handler (git-fixes).\n- mmc: renesas_sdhi: limit block count to 16 bit for old revisions (git-fixes).\n- mmc: sdhci-esdhc-imx: fix the mask for tuning start point (bsc#1051510).\n- mmc: sdhci-msm: Clear tuning done flag while hs400 tuning (bsc#1051510).\n- mmc: sdhci-of-at91: fix memleak on clk_get failure (git-fixes).\n- mmc: sdhci-pci: Fix eMMC driver strength for BYT-based controllers (bsc#1051510).\n- mmc: sdhci-xenon: fix annoying 1.8V regulator warning (bsc#1051510).\n- mmc: sdio: Fix potential NULL pointer error in mmc_sdio_init_card() (bsc#1051510).\n- mmc: tmio: fix access width of Block Count Register (git-fixes).\n- mm: limit boost_watermark on small zones (git fixes (mm/pgalloc)).\n- mm: thp: handle page cache THP correctly in PageTransCompoundMap (git fixes (block drivers)).\n- mtd: cfi: fix deadloop in cfi_cmdset_0002.c do_write_buffer (bsc#1051510).\n- mtd: spi-nor: cadence-quadspi: add a delay in write sequence (git-fixes).\n- mtd: spi-nor: enable 4B opcodes for mx66l51235l (git-fixes).\n- mtd: spi-nor: fsl-quadspi: Do not let -EINVAL on the bus (git-fixes).\n- mwifiex: avoid -Wstringop-overflow warning (bsc#1051510).\n- mwifiex: Fix memory corruption in dump_station (bsc#1051510).\n- net: bcmgenet: correct per TX/RX ring statistics (networking-stable-20_04_27).\n- net: dsa: b53: Fix ARL register definitions (networking-stable-20_04_27).\n- net: dsa: b53: Rework ARL bin logic (networking-stable-20_04_27).\n- net: dsa: bcm_sf2: Do not register slave MDIO bus with OF (networking-stable-20_04_09).\n- net: dsa: bcm_sf2: Ensure correct sub-node is parsed (networking-stable-20_04_09).\n- net: dsa: bcm_sf2: Fix overflow checks (git-fixes).\n- net: dsa: Fix duplicate frames flooded by learning (networking-stable-20_03_28).\n- net: dsa: mv88e6xxx: fix lockup on warm boot (networking-stable-20_03_14).\n- net/ethernet: add Google GVE driver (jsc#SLE-10538)\n- net: fec: add phy_reset_after_clk_enable() support (git-fixes).\n- net: fec: validate the new settings in fec_enet_set_coalesce() (networking-stable-20_03_14).\n- net: fib_rules: Correctly set table field when table number exceeds 8 bits (networking-stable-20_03_01).\n- net: fix race condition in __inet_lookup_established() (bsc#1151794).\n- net: fq: add missing attribute validation for orphan mask (networking-stable-20_03_14).\n- net: hns3: fix \u0027tc qdisc del\u0027 failed issue (bsc#1109837).\n- net, ip_tunnel: fix interface lookup with no key (networking-stable-20_04_02).\n- net: ipv4: devinet: Fix crash when add/del multicast IP with autojoin (networking-stable-20_04_17).\n- net: ipv6: do not consider routes via gateways for anycast address check (networking-stable-20_04_17).\n- netlink: Use netlink header as base to calculate bad attribute offset (networking-stable-20_03_14).\n- net: macsec: update SCI upon MAC address change (networking-stable-20_03_14).\n- net: memcg: fix lockdep splat in inet_csk_accept() (networking-stable-20_03_14).\n- net: memcg: late association of sock to memcg (networking-stable-20_03_14).\n- net/mlx4_en: avoid indirect call in TX completion (networking-stable-20_04_27).\n- net/mlx5: Add new fields to Port Type and Speed register (bsc#1171118).\n- net/mlx5: Add new fields to Port Type and Speed register (bsc#1171118).\n- net/mlx5: Add RoCE RX ICRC encapsulated counter (bsc#1171118).\n- net/mlx5e: Fix ethtool self test: link speed (bsc#1171118).\n- net/mlx5e: Move port speed code from en_ethtool.c to en/port.c (bsc#1171118).\n- net/mlx5: Expose link speed directly (bsc#1171118).\n- net/mlx5: Expose link speed directly (bsc#1171118).\n- net/mlx5: Expose port speed when possible (bsc#1171118).\n- net/mlx5: Expose port speed when possible (bsc#1171118).\n- net/mlx5: Fix failing fw tracer allocation on s390 (bsc#1103990 ).\n- net: mvneta: Fix the case where the last poll did not process all rx (networking-stable-20_03_28).\n- net: netrom: Fix potential nr_neigh refcnt leak in nr_add_node (networking-stable-20_04_27).\n- net/packet: tpacket_rcv: do not increment ring index on drop (networking-stable-20_03_14).\n- net: phy: restore mdio regs in the iproc mdio driver (networking-stable-20_03_01).\n- net: qmi_wwan: add support for ASKEY WWHC050 (networking-stable-20_03_28).\n- net: revert default NAPI poll timeout to 2 jiffies (networking-stable-20_04_17).\n- net_sched: cls_route: remove the right filter from hashtable (networking-stable-20_03_28).\n- net_sched: sch_skbprio: add message validation to skbprio_change() (bsc#1109837).\n- net/x25: Fix x25_neigh refcnt leak when receiving frame (networking-stable-20_04_27).\n- nfc: add missing attribute validation for SE API (networking-stable-20_03_14).\n- nfc: add missing attribute validation for vendor subcommand (networking-stable-20_03_14).\n- nfc: pn544: Fix occasional HW initialization failure (networking-stable-20_03_01).\n- nfc: st21nfca: add missed kfree_skb() in an error path (bsc#1051510).\n- nfp: abm: fix a memory leak bug (bsc#1109837).\n- nfsd4: fix up replay_matches_cache() (git-fixes).\n- nfsd: Ensure CLONE persists data and metadata changes to the target file (git-fixes).\n- nfsd: fix delay timer on 32-bit architectures (git-fixes).\n- nfsd: fix jiffies/time_t mixup in LRU list (git-fixes).\n- nfs: Directory page cache pages need to be locked when read (git-fixes).\n- nfsd: memory corruption in nfsd4_lock() (git-fixes).\n- nfs: Do not call generic_error_remove_page() while holding locks (bsc#1170457).\n- nfs: Fix memory leaks and corruption in readdir (git-fixes).\n- nfs: Fix O_DIRECT accounting of number of bytes read/written (git-fixes).\n- nfs: Fix potential posix_acl refcnt leak in nfs3_set_acl (git-fixes).\n- nfs: fix racey wait in nfs_set_open_stateid_locked (bsc#1170592).\n- nfs/flexfiles: Use the correct TCP timeout for flexfiles I/O (git-fixes).\n- nfs/pnfs: Fix pnfs_generic_prepare_to_resend_writes() (git-fixes).\n- nfs: Revalidate the file size on a fatal write error (git-fixes).\n- NFSv4.0: nfs4_do_fsinfo() should not do implicit lease renewals (git-fixes).\n- NFSv4: Do not allow a cached open with a revoked delegation (git-fixes).\n- NFSv4: Fix leak of clp-\u003ecl_acceptor string (git-fixes).\n- NFSv4/pnfs: Return valid stateids in nfs_layout_find_inode_by_stateid() (git-fixes).\n- NFSv4: try lease recovery on NFS4ERR_EXPIRED (git-fixes).\n- NFSv4.x: Drop the slot if nfs4_delegreturn_prepare waits for layoutreturn (git-fixes).\n- nl802154: add missing attribute validation for dev_type (networking-stable-20_03_14).\n- nl802154: add missing attribute validation (networking-stable-20_03_14).\n- nvme-fc: print proper nvme-fc devloss_tmo value (bsc#1172391).\n- objtool: Fix stack offset tracking for indirect CFAs (bsc#1169514).\n- objtool: Fix switch table detection in .text.unlikely (bsc#1169514).\n- objtool: Make BP scratch register warning more robust (bsc#1169514).\n- padata: Remove broken queue flushing (git-fixes).\n- Partially revert \u0027kfifo: fix kfifo_alloc() and kfifo_init()\u0027 (git fixes (block drivers)).\n- PCI: hv: Add support for protocol 1.3 and support PCI_BUS_RELATIONS2 (bsc#1172201, bsc#1172202).\n- PCI: hv: Decouple the func definition in hv_dr_state from VSP message (bsc#1172201, bsc#1172202).\n- PCI: sanity test on PCI vendor to be sure we do not touch everything (bsc#1141558).\n- perf/x86/amd: Add support for Large Increment per Cycle Events (jsc#SLE-11831).\n- perf/x86/amd: Constrain Large Increment per Cycle events (jsc#SLE-11831).\n- pinctrl: baytrail: Enable pin configuration setting for GPIO chip (git-fixes).\n- pinctrl: cherryview: Add missing spinlock usage in chv_gpio_irq_handler (git-fixes).\n- pinctrl: sunrisepoint: Fix PAD lock register offset for SPT-H (git-fixes).\n- platform/x86: asus-nb-wmi: Do not load on Asus T100TA and T200TA (bsc#1051510).\n- pNFS: Ensure we do clear the return-on-close layout stateid on fatal errors (git-fixes).\n- powerpc: Add attributes for setjmp/longjmp (bsc#1065729).\n- powerpc/pci/of: Parse unassigned resources (bsc#1065729).\n- powerpc/setup_64: Set cache-line-size based on cache-block-size (bsc#1065729).\n- powerpc/sstep: Fix DS operand in ld encoding to appropriate value (bsc#1065729).\n- qede: Fix race between rdma destroy workqueue and link change event (networking-stable-20_03_01).\n- r8152: check disconnect status after long sleep (networking-stable-20_03_14).\n- raid6/ppc: Fix build for clang (git fixes (block drivers)).\n- random: always use batched entropy for get_random_u{32,64} (bsc#1164871).\n- rcu: locking and unlocking need to always be at least barriers (git fixes (block drivers)).\n- RDMA/ipoib: Fix use of sizeof() (bsc#1168503).\n- RDMA/netdev: Fix netlink support in IPoIB (bsc#1168503).\n- RDMA/netdev: Hoist alloc_netdev_mqs out of the driver (bsc#1168503).\n- RDMA/netdev: Use priv_destructor for netdev cleanup (bsc#1168503).\n- Revert \u0027ALSA: hda/realtek: Fix pop noise on ALC225\u0027 (git-fixes).\n- Revert \u0027drm/panel: simple: Add support for Sharp LQ150X1LG11 panels\u0027 (bsc#1114279) \t* offset changes\n- Revert \u0027HID: i2c-hid: add Trekstor Primebook C11B to descriptor override\u0027 Depends on 9b5c747685982d22efffeafc5ec601bd28f6d78b, which was also reverted.\n- Revert \u0027HID: i2c-hid: override HID descriptors for certain devices\u0027 This broke i2c-hid.ko\u0027s build, there is no way around it without a big file rename or renaming the kernel module.\n- Revert \u0027i2c-hid: properly terminate i2c_hid_dmi_desc_override_table\u0027 Fixed 9b5c747685982d22efffeafc5ec601bd28f6d78b, which was also reverted.\n- Revert \u0027ipc,sem: remove uneeded sem_undo_list lock usage in exit_sem()\u0027 (bsc#1172221).\n- Revert \u0027RDMA/cma: Simplify rdma_resolve_addr() error flow\u0027 (bsc#1103992).\n- rtlwifi: Fix a double free in _rtl_usb_tx_urb_setup() (bsc#1051510).\n- s390/cio: avoid duplicated \u0027ADD\u0027 uevents (git-fixes).\n- s390/cio: generate delayed uevent for vfio-ccw subchannels (git-fixes).\n- s390/cpuinfo: fix wrong output when CPU0 is offline (git-fixes).\n- s390/cpum_cf: Add new extended counters for IBM z15 (bsc#1169762 LTC#185291).\n- s390/diag: fix display of diagnose call statistics (git-fixes).\n- s390/ftrace: fix potential crashes when switching tracers (git-fixes).\n- s390/gmap: return proper error code on ksm unsharing (git-fixes).\n- s390/ism: fix error return code in ism_probe() (git-fixes).\n- s390/ism: fix error return code in ism_probe() (git-fixes).\n- s390/pci: do not set affinity for floating irqs (git-fixes).\n- s390/pci: Fix possible deadlock in recover_store() (bsc#1165183 LTC#184103).\n- s390/pci: Recover handle in clp_set_pci_fn() (bsc#1165183 LTC#184103).\n- s390/qeth: cancel RX reclaim work earlier (git-fixes).\n- s390/qeth: do not return -ENOTSUPP to userspace (git-fixes).\n- s390/qeth: do not warn for napi with 0 budget (git-fixes).\n- s390/qeth: fix off-by-one in RX copybreak check (git-fixes).\n- s390/qeth: fix promiscuous mode after reset (git-fixes).\n- s390/qeth: fix qdio teardown after early init error (git-fixes).\n- s390/qeth: handle error due to unsupported transport mode (git-fixes).\n- s390/qeth: handle error when backing RX buffer (git-fixes).\n- s390/qeth: lock the card while changing its hsuid (git-fixes).\n- s390/qeth: support net namespaces for L3 devices (git-fixes).\n- s390/time: Fix clk type in get_tod_clock (git-fixes).\n- scripts/decodecode: fix trapping instruction formatting (bsc#1065729).\n- scripts/dtc: Remove redundant YYLOC global declaration (bsc#1160388).\n- scsi: bnx2i: fix potential use after free (bsc#1171600).\n- scsi: core: Handle drivers which set sg_tablesize to zero (bsc#1171601) This commit also required: \u003e scsi: core: avoid preallocating big SGL for data\n- scsi: core: save/restore command resid for error handling (bsc#1171602).\n- scsi: core: scsi_trace: Use get_unaligned_be*() (bsc#1171604).\n- scsi: core: try to get module before removing device (bsc#1171605).\n- scsi: csiostor: Adjust indentation in csio_device_reset (bsc#1171606).\n- scsi: csiostor: Do not enable IRQs too early (bsc#1171607).\n- scsi: esas2r: unlock on error in esas2r_nvram_read_direct() (bsc#1171608).\n- scsi: fnic: fix invalid stack access (bsc#1171609).\n- scsi: fnic: fix msix interrupt allocation (bsc#1171610).\n- scsi: ibmvscsi: Fix WARN_ON during event pool release (bsc#1170791 ltc#185128).\n- scsi: iscsi: Avoid potential deadlock in iscsi_if_rx func (bsc#1171611).\n- scsi: iscsi: Fix a potential deadlock in the timeout handler (bsc#1171612).\n- scsi: iscsi: qla4xxx: fix double free in probe (bsc#1171613).\n- scsi: lpfc: Change default queue allocation for reduced memory consumption (bsc#1164780).\n- scsi: lpfc: fix: Coverity: lpfc_cmpl_els_rsp(): Null pointer dereferences (bsc#1171614).\n- scsi: lpfc: Fix crash in target side cable pulls hitting WAIT_FOR_UNREG (bsc#1171615).\n- scsi: lpfc: Fix lpfc_nodelist leak when processing unsolicited event (bsc#1164780).\n- scsi: lpfc: Fix MDS Diagnostic Enablement definition (bsc#1164780).\n- scsi: lpfc: Fix negation of else clause in lpfc_prep_node_fc4type (bsc#1164780).\n- scsi: lpfc: Fix noderef and address space warnings (bsc#1164780).\n- scsi: lpfc: Maintain atomic consistency of queue_claimed flag (bsc#1164780).\n- scsi: lpfc: remove duplicate unloading checks (bsc#1164780).\n- scsi: lpfc: Remove re-binding of nvme rport during registration (bsc#1164780).\n- scsi: lpfc: Remove redundant initialization to variable rc (bsc#1164780).\n- scsi: lpfc: Remove unnecessary lockdep_assert_held calls (bsc#1164780).\n- scsi: lpfc: Update lpfc version to 12.8.0.1 (bsc#1164780).\n- scsi: megaraid_sas: Do not initiate OCR if controller is not in ready state (bsc#1171616).\n- scsi: qla2xxx: add ring buffer for tracing debug logs (bsc#1157169).\n- scsi: qla2xxx: check UNLOADING before posting async work (bsc#1157169).\n- scsi: qla2xxx: Delete all sessions before unregister local nvme port (bsc#1157169).\n- scsi: qla2xxx: Do not log message when reading port speed via sysfs (bsc#1157169).\n- scsi: qla2xxx: Fix hang when issuing nvme disconnect-all in NPIV (bsc#1157169).\n- scsi: qla2xxx: Fix regression warnings (bsc#1157169).\n- scsi: qla2xxx: Remove non functional code (bsc#1157169).\n- scsi: qla2xxx: set UNLOADING before waiting for session deletion (bsc#1157169).\n- scsi: qla4xxx: Adjust indentation in qla4xxx_mem_free (bsc#1171617).\n- scsi: qla4xxx: fix double free bug (bsc#1171618).\n- scsi: sd: Clear sdkp-\u003eprotection_type if disk is reformatted without PI (bsc#1171619).\n- scsi: sg: add sg_remove_request in sg_common_write (bsc#1171620).\n- scsi: tracing: Fix handling of TRANSFER LENGTH == 0 for READ(6) and WRITE(6) (bsc#1171621).\n- scsi: ufs: change msleep to usleep_range (bsc#1171622).\n- scsi: ufs: Clean up ufshcd_scale_clks() and clock scaling error out path (bsc#1171623).\n- scsi: ufs: Fix ufshcd_hold() caused scheduling while atomic (bsc#1171624).\n- scsi: ufs: Fix ufshcd_probe_hba() reture value in case ufshcd_scsi_add_wlus() fails (bsc#1171625).\n- scsi: ufs: Recheck bkops level if bkops is disabled (bsc#1171626).\n- scsi: zfcp: fix missing erp_lock in port recovery trigger for point-to-point (git-fixes).\n- sctp: fix possibly using a bad saddr with a given dst (networking-stable-20_04_02).\n- sctp: fix refcount bug in sctp_wfree (networking-stable-20_04_02).\n- sctp: move the format error check out of __sctp_sf_do_9_1_abort (networking-stable-20_03_01).\n- selftests/powerpc: Fix build errors in powerpc ptrace selftests (boo#1124278).\n- Separate one more kABI fixup from the functional change:\n- seq_file: fix problem when seeking mid-record (bsc#1170125).\n- serial: uartps: Move the spinlock after the read of the tx empty (git-fixes).\n- sfc: detach from cb_page in efx_copy_channel() (networking-stable-20_03_14).\n- signal/pid_namespace: Fix reboot_pid_ns to use send_sig not force_sig (bsc#1172185).\n- slcan: not call free_netdev before rtnl_unlock in slcan_open (networking-stable-20_03_28).\n- slip: make slhc_compress() more robust against malicious packets (networking-stable-20_03_14).\n- smb3: Additional compression structures (bsc#1144333).\n- smb3: Add new compression flags (bsc#1144333).\n- smb3: change noisy error message to FYI (bsc#1144333).\n- smb3: enable swap on SMB3 mounts (bsc#1144333).\n- smb3: Minor cleanup of protocol definitions (bsc#1144333).\n- smb3: remove overly noisy debug line in signing errors (bsc#1144333).\n- smb3: smbdirect support can be configured by default (bsc#1144333).\n- smb3: use SMB2_SIGNATURE_SIZE define (bsc#1144333).\n- spi: bcm2835: Fix 3-wire mode if DMA is enabled (git-fixes).\n- spi: bcm63xx-hsspi: Really keep pll clk enabled (bsc#1051510).\n- spi: bcm-qspi: when tx/rx buffer is NULL set to 0 (bsc#1051510).\n- spi: dw: Add SPI Rx-done wait method to DMA-based transfer (bsc#1051510).\n- spi: dw: Add SPI Tx-done wait method to DMA-based transfer (bsc#1051510).\n- spi: dw: Zero DMA Tx and Rx configurations on stack (bsc#1051510).\n- spi: fsl: do not map irq during probe (git-fixes).\n- spi: fsl: use platform_get_irq() instead of of_irq_to_resource() (git-fixes).\n- spi: pxa2xx: Add CS control clock quirk (bsc#1051510).\n- spi: qup: call spi_qup_pm_resume_runtime before suspending (bsc#1051510).\n- spi: spi-fsl-dspi: Replace interruptible wait queue with a simple completion (git-fixes).\n- spi: spi-s3c64xx: Fix system resume support (git-fixes).\n- spi/zynqmp: remove entry that causes a cs glitch (bsc#1051510).\n- staging: comedi: dt2815: fix writing hi byte of analog output (bsc#1051510).\n- staging: comedi: Fix comedi_device refcnt leak in comedi_open (bsc#1051510).\n- staging: iio: ad2s1210: Fix SPI reading (bsc#1051510).\n- staging: vt6656: Do not set RCR_MULTICAST or RCR_BROADCAST by default (git-fixes).\n- staging: vt6656: Fix drivers TBTT timing counter (git-fixes).\n- staging: vt6656: Fix pairwise key entry save (git-fixes).\n- SUNRPC: expiry_time should be seconds not timeval (git-fixes).\n- SUNRPC: Fix a potential buffer overflow in \u0027svc_print_xprts()\u0027 (git-fixes).\n- supported.conf: Add br_netfilter to base (bsc#1169020).\n- supported.conf: support w1 core and thermometer support\n- svcrdma: Fix double svc_rdma_send_ctxt_put() in an error path (bsc#1103992).\n- svcrdma: Fix leak of transport addresses (git-fixes).\n- svcrdma: Fix trace point use-after-free race (bsc#1103992 ).\n- taskstats: fix data-race (bsc#1172188).\n- tcp: cache line align MAX_TCP_HEADER (networking-stable-20_04_27).\n- tcp: repair: fix TCP_QUEUE_SEQ implementation (networking-stable-20_03_28).\n- team: add missing attribute validation for array index (networking-stable-20_03_14).\n- team: add missing attribute validation for port ifindex (networking-stable-20_03_14).\n- team: fix hang in team_mode_get() (networking-stable-20_04_27).\n- tools lib traceevent: Remove unneeded qsort and uses memmove instead (git-fixes).\n- tpm: ibmvtpm: retry on H_CLOSED in tpm_ibmvtpm_send() (bsc#1065729).\n- tpm/tpm_tis: Free IRQ if probing fails (bsc#1082555).\n- tpm/tpm_tis: Free IRQ if probing fails (git-fixes).\n- tracing: Add a vmalloc_sync_mappings() for safe measure (git-fixes).\n- tracing: Disable trace_printk() on post poned tests (git-fixes).\n- tracing: Fix the race between registering \u0027snapshot\u0027 event trigger and triggering \u0027snapshot\u0027 operation (git-fixes).\n- tty: rocket, avoid OOB access (git-fixes).\n- tun: Do not put_page() for all negative return values from XDP program (bsc#1109837).\n- UAS: fix deadlock in error handling and PM flushing work (git-fixes).\n- UAS: no use logging any details in case of ENODEV (git-fixes).\n- Update config files: Build w1 bus on arm64 (jsc#SLE-11048)\n- USB: Add USB_QUIRK_DELAY_CTRL_MSG and USB_QUIRK_DELAY_INIT for Corsair K70 RGB RAPIDFIRE (git-fixes).\n- USB: cdc-acm: restore capability check order (git-fixes).\n- USB: core: Fix misleading driver bug report (bsc#1051510).\n- USB: dwc3: do not set gadget-\u003eis_otg flag (git-fixes).\n- USB: dwc3: gadget: Do link recovery for SS and SSP (git-fixes).\n- USB: early: Handle AMD\u0027s spec-compliant identifiers, too (git-fixes).\n- USB: f_fs: Clear OS Extended descriptor counts to zero in ffs_data_reset() (git-fixes).\n- USB: gadget: audio: Fix a missing error return value in audio_bind() (git-fixes).\n- USB: gadget: composite: Inform controller driver of self-powered (git-fixes).\n- USB: gadget: legacy: fix error return code in cdc_bind() (git-fixes).\n- USB: gadget: legacy: fix error return code in gncm_bind() (git-fixes).\n- USB: gadget: legacy: fix redundant initialization warnings (bsc#1051510).\n- USB: gadget: net2272: Fix a memory leak in an error handling path in \u0027net2272_plat_probe()\u0027 (git-fixes).\n- USB: gadget: udc: atmel: Fix vbus disconnect handling (git-fixes).\n- USB: gadget: udc: atmel: Make some symbols static (git-fixes).\n- USB: gadget: udc: bdc: Remove unnecessary NULL checks in bdc_req_complete (git-fixes).\n- USB: host: xhci-plat: keep runtime active when removing host (git-fixes).\n- USB: hub: Fix handling of connect changes during sleep (git-fixes).\n- usbnet: silence an unnecessary warning (bsc#1170770).\n- USB: serial: garmin_gps: add sanity checking for data length (git-fixes).\n- USB: serial: option: add BroadMobi BM806U (git-fixes).\n- USB: serial: option: add support for ASKEY WWHC050 (git-fixes).\n- USB: serial: option: add Wistron Neweb D19Q1 (git-fixes).\n- USB: serial: qcserial: Add DW5816e support (git-fixes).\n- USB: sisusbvga: Change port variable from signed to unsigned (git-fixes).\n- usb-storage: Add unusual_devs entry for JMicron JMS566 (git-fixes).\n- USB: uas: add quirk for LaCie 2Big Quadra (git-fixes).\n- USB: xhci: Fix NULL pointer dereference when enqueuing trbs from urb sg list (git-fixes).\n- video: fbdev: sis: Remove unnecessary parentheses and commented code (bsc#1114279)\n- video: fbdev: w100fb: Fix a potential double free (bsc#1051510).\n- vrf: Check skb for XFRM_TRANSFORMED flag (networking-stable-20_04_27).\n- vt: ioctl, switch VT_IS_IN_USE and VT_BUSY to inlines (git-fixes).\n- vt: selection, introduce vc_is_sel (git-fixes).\n- vt: vt_ioctl: fix race in VT_RESIZEX (git-fixes).\n- vt: vt_ioctl: fix use-after-free in vt_in_use() (git-fixes).\n- vt: vt_ioctl: fix VT_DISALLOCATE freeing in-use virtual console (git-fixes).\n- vxlan: check return value of gro_cells_init() (networking-stable-20_03_28).\n- w1: Add subsystem kernel public interface (jsc#SLE-11048).\n- w1: Fix slave count on 1-Wire bus (resend) (jsc#SLE-11048).\n- w1: keep balance of mutex locks and refcnts (jsc#SLE-11048).\n- w1: use put_device() if device_register() fail (jsc#SLE-11048).\n- watchdog: reset last_hw_keepalive time at start (git-fixes).\n- wcn36xx: Fix error handling path in \u0027wcn36xx_probe()\u0027 (bsc#1051510).\n- wil6210: remove reset file from debugfs (git-fixes).\n- wimax/i2400m: Fix potential urb refcnt leak (bsc#1051510).\n- workqueue: do not use wq_select_unbound_cpu() for bound works (bsc#1172130).\n- x86/amd_nb: Add Family 19h PCI IDs (jsc#SLE-11834).\n- x86/entry/64: Fix unwind hints in kernel exit path (bsc#1058115).\n- x86/entry/64: Fix unwind hints in register clearing code (bsc#1058115).\n- x86/entry/64: Fix unwind hints in rewind_stack_do_exit() (bsc#1058115).\n- x86/entry/64: Fix unwind hints in __switch_to_asm() (bsc#1058115).\n- x86/Hyper-V: Allow guests to enable InvariantTSC (bsc#1170620).\n- x86/Hyper-V: Allow guests to enable InvariantTSC (bsc#1170621, bsc#1170620).\n- x86/Hyper-V: Free hv_panic_page when fail to register kmsg dump (bsc#1170617, bsc#1170618).\n- x86/Hyper-V: Free hv_panic_page when fail to register kmsg dump (bsc#1170618).\n- x86/Hyper-V: Report crash data in die() when panic_on_oops is set (bsc#1170617, bsc#1170618).\n- x86/Hyper-V: Report crash data in die() when panic_on_oops is set (bsc#1170618).\n- x86/Hyper-V: Report crash register data or kmsg before running crash kernel (bsc#1170617, bsc#1170618).\n- x86/Hyper-V: Report crash register data or kmsg before running crash kernel (bsc#1170618).\n- x86/Hyper-V: Report crash register data when sysctl_record_panic_msg is not set (bsc#1170617, bsc#1170618).\n- x86/Hyper-V: Report crash register data when sysctl_record_panic_msg is not set (bsc#1170618).\n- x86:Hyper-V: report value of misc_features (git fixes).\n- x86:Hyper-V: report value of misc_features (git-fixes).\n- x86/Hyper-V: Trigger crash enlightenment only once during system crash (bsc#1170617, bsc#1170618).\n- x86/Hyper-V: Trigger crash enlightenment only once during system crash (bsc#1170618).\n- x86/Hyper-V: Unload vmbus channel in hv panic callback (bsc#1170617, bsc#1170618).\n- x86/Hyper-V: Unload vmbus channel in hv panic callback (bsc#1170618).\n- x86/kprobes: Avoid kretprobe recursion bug (bsc#1114279).\n- x86/MCE/AMD: Add a KABI workaround for enum smca_bank_types (jsc#SLE-11833).\n- x86/MCE/AMD, EDAC/mce_amd: Add new Load Store unit McaType (jsc#SLE-11833).\n- x86/microcode/AMD: Increase microcode PATCH_MAX_SIZE (bsc#1169005).\n- x86/resctrl: Fix invalid attempt at removing the default resource group (git-fixes).\n- x86/resctrl: Preserve CDP enable over CPU hotplug (bsc#1114279).\n- x86/unwind/orc: Do not skip the first frame for inactive tasks (bsc#1058115).\n- x86/unwind/orc: Fix error handling in __unwind_start() (bsc#1058115).\n- x86/unwind/orc: Fix error path for bad ORC entry type (bsc#1058115).\n- x86/unwind/orc: Fix unwind_get_return_address_ptr() for inactive tasks (bsc#1058115).\n- x86/unwind/orc: Prevent unwinding before ORC initialization (bsc#1058115).\n- x86/unwind: Prevent false warnings for non-current tasks (bsc#1058115).\n- x86/xen: fix booting 32-bit pv guest (bsc#1071995).\n- x86/xen: Make the boot CPU idle task reliable (bsc#1071995).\n- x86/xen: Make the secondary CPU idle tasks reliable (bsc#1071995).\n- xen/pci: reserve MCFG areas earlier (bsc#1170145).\n- xfrm: Always set XFRM_TRANSFORMED in xfrm{4,6}_output_finish (networking-stable-20_04_27).\n- xfs: clear PF_MEMALLOC before exiting xfsaild thread (git-fixes).\n- xfs: Correctly invert xfs_buftarg LRU isolation logic (git-fixes).\n- xfs: do not ever return a stale pointer from __xfs_dir3_free_read (git-fixes).\n- xprtrdma: Fix completion wait during device removal (git-fixes).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2020-1587,SUSE-SLE-SERVER-12-SP5-2020-1587", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2020_1587-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2020:1587-1", "url": "https://www.suse.com/support/update/announcement/2020/suse-su-20201587-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2020:1587-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-June/006912.html" }, { "category": "self", "summary": "SUSE Bug 1051510", "url": "https://bugzilla.suse.com/1051510" }, { "category": "self", "summary": "SUSE Bug 1058115", "url": "https://bugzilla.suse.com/1058115" }, { "category": "self", "summary": "SUSE Bug 1065729", "url": "https://bugzilla.suse.com/1065729" }, { "category": "self", "summary": "SUSE Bug 1071995", "url": "https://bugzilla.suse.com/1071995" }, { "category": "self", "summary": "SUSE Bug 1082555", "url": "https://bugzilla.suse.com/1082555" }, { "category": "self", "summary": "SUSE Bug 1083647", "url": "https://bugzilla.suse.com/1083647" }, { "category": "self", "summary": "SUSE Bug 1089895", "url": "https://bugzilla.suse.com/1089895" }, { "category": "self", "summary": "SUSE Bug 1103990", "url": "https://bugzilla.suse.com/1103990" }, { "category": "self", "summary": "SUSE Bug 1103991", "url": "https://bugzilla.suse.com/1103991" }, { "category": "self", "summary": "SUSE Bug 1103992", "url": "https://bugzilla.suse.com/1103992" }, { "category": "self", "summary": "SUSE Bug 1104745", "url": "https://bugzilla.suse.com/1104745" }, { "category": "self", "summary": "SUSE Bug 1109837", "url": "https://bugzilla.suse.com/1109837" }, { "category": "self", "summary": "SUSE Bug 1111666", "url": "https://bugzilla.suse.com/1111666" }, { "category": "self", "summary": "SUSE Bug 1112178", "url": "https://bugzilla.suse.com/1112178" }, { "category": "self", "summary": "SUSE Bug 1112374", "url": "https://bugzilla.suse.com/1112374" }, { "category": "self", "summary": "SUSE Bug 1113956", "url": "https://bugzilla.suse.com/1113956" }, { "category": "self", "summary": "SUSE Bug 1114279", "url": "https://bugzilla.suse.com/1114279" }, { "category": "self", "summary": "SUSE Bug 1124278", "url": "https://bugzilla.suse.com/1124278" }, { "category": "self", "summary": "SUSE Bug 1127354", "url": "https://bugzilla.suse.com/1127354" }, { "category": "self", "summary": "SUSE Bug 1127355", "url": "https://bugzilla.suse.com/1127355" }, { "category": "self", "summary": "SUSE Bug 1127371", "url": "https://bugzilla.suse.com/1127371" }, { "category": "self", "summary": "SUSE Bug 1133021", "url": "https://bugzilla.suse.com/1133021" }, { "category": "self", "summary": "SUSE Bug 1141558", "url": "https://bugzilla.suse.com/1141558" }, { "category": "self", "summary": "SUSE Bug 1142685", "url": "https://bugzilla.suse.com/1142685" }, { "category": "self", "summary": "SUSE Bug 1144333", "url": "https://bugzilla.suse.com/1144333" }, { "category": "self", "summary": "SUSE Bug 1151794", "url": "https://bugzilla.suse.com/1151794" }, { "category": "self", "summary": "SUSE Bug 1152489", "url": "https://bugzilla.suse.com/1152489" }, { "category": "self", "summary": "SUSE Bug 1154824", "url": "https://bugzilla.suse.com/1154824" }, { "category": "self", "summary": "SUSE Bug 1157169", "url": "https://bugzilla.suse.com/1157169" }, { "category": "self", "summary": "SUSE Bug 1158265", "url": "https://bugzilla.suse.com/1158265" }, { "category": "self", "summary": "SUSE Bug 1160388", "url": "https://bugzilla.suse.com/1160388" }, { "category": "self", "summary": "SUSE Bug 1160947", "url": "https://bugzilla.suse.com/1160947" }, { "category": "self", "summary": "SUSE Bug 1164780", "url": "https://bugzilla.suse.com/1164780" }, { "category": "self", "summary": "SUSE Bug 1164871", "url": "https://bugzilla.suse.com/1164871" }, { "category": "self", "summary": "SUSE Bug 1165183", "url": "https://bugzilla.suse.com/1165183" }, { "category": "self", "summary": "SUSE Bug 1165478", "url": "https://bugzilla.suse.com/1165478" }, { "category": "self", "summary": "SUSE Bug 1165741", "url": "https://bugzilla.suse.com/1165741" }, { "category": "self", "summary": "SUSE Bug 1166969", "url": "https://bugzilla.suse.com/1166969" }, { "category": "self", "summary": "SUSE Bug 1166978", "url": "https://bugzilla.suse.com/1166978" }, { "category": "self", "summary": "SUSE Bug 1167574", "url": "https://bugzilla.suse.com/1167574" }, { "category": "self", "summary": "SUSE Bug 1167851", "url": "https://bugzilla.suse.com/1167851" }, { "category": "self", "summary": "SUSE Bug 1167867", "url": "https://bugzilla.suse.com/1167867" }, { "category": "self", "summary": "SUSE Bug 1168332", "url": "https://bugzilla.suse.com/1168332" }, { "category": "self", "summary": "SUSE Bug 1168503", "url": "https://bugzilla.suse.com/1168503" }, { "category": "self", "summary": "SUSE Bug 1168670", "url": "https://bugzilla.suse.com/1168670" }, { "category": "self", "summary": "SUSE Bug 1168789", "url": "https://bugzilla.suse.com/1168789" }, { "category": "self", "summary": "SUSE Bug 1169005", "url": "https://bugzilla.suse.com/1169005" }, { "category": "self", "summary": "SUSE Bug 1169020", "url": "https://bugzilla.suse.com/1169020" }, { "category": "self", "summary": "SUSE Bug 1169514", "url": "https://bugzilla.suse.com/1169514" }, { "category": "self", "summary": "SUSE Bug 1169525", "url": "https://bugzilla.suse.com/1169525" }, { "category": "self", "summary": "SUSE Bug 1169762", "url": "https://bugzilla.suse.com/1169762" }, { "category": "self", "summary": "SUSE Bug 1170056", "url": "https://bugzilla.suse.com/1170056" }, { "category": "self", "summary": "SUSE Bug 1170125", "url": "https://bugzilla.suse.com/1170125" }, { "category": "self", "summary": "SUSE Bug 1170145", "url": "https://bugzilla.suse.com/1170145" }, { "category": "self", "summary": "SUSE Bug 1170284", "url": "https://bugzilla.suse.com/1170284" }, { "category": "self", "summary": "SUSE Bug 1170345", "url": "https://bugzilla.suse.com/1170345" }, { "category": "self", "summary": "SUSE Bug 1170457", "url": "https://bugzilla.suse.com/1170457" }, { "category": "self", "summary": "SUSE Bug 1170522", "url": "https://bugzilla.suse.com/1170522" }, { "category": "self", "summary": "SUSE Bug 1170592", "url": "https://bugzilla.suse.com/1170592" }, { "category": "self", "summary": "SUSE Bug 1170617", "url": "https://bugzilla.suse.com/1170617" }, { "category": "self", "summary": "SUSE Bug 1170618", "url": "https://bugzilla.suse.com/1170618" }, { "category": "self", "summary": "SUSE Bug 1170620", "url": "https://bugzilla.suse.com/1170620" }, { "category": "self", "summary": "SUSE Bug 1170621", "url": "https://bugzilla.suse.com/1170621" }, { "category": "self", "summary": "SUSE Bug 1170770", "url": "https://bugzilla.suse.com/1170770" }, { "category": "self", "summary": "SUSE Bug 1170778", "url": "https://bugzilla.suse.com/1170778" }, { "category": "self", "summary": "SUSE Bug 1170791", "url": "https://bugzilla.suse.com/1170791" }, { "category": "self", "summary": "SUSE Bug 1170901", "url": "https://bugzilla.suse.com/1170901" }, { "category": "self", "summary": "SUSE Bug 1171078", "url": "https://bugzilla.suse.com/1171078" }, { "category": "self", "summary": "SUSE Bug 1171098", "url": "https://bugzilla.suse.com/1171098" }, { "category": "self", "summary": "SUSE Bug 1171118", "url": "https://bugzilla.suse.com/1171118" }, { "category": "self", "summary": "SUSE Bug 1171189", "url": "https://bugzilla.suse.com/1171189" }, { "category": "self", "summary": "SUSE Bug 1171191", "url": "https://bugzilla.suse.com/1171191" }, { "category": "self", "summary": "SUSE Bug 1171195", "url": "https://bugzilla.suse.com/1171195" }, { "category": "self", "summary": "SUSE Bug 1171202", "url": "https://bugzilla.suse.com/1171202" }, { "category": "self", "summary": "SUSE Bug 1171205", "url": "https://bugzilla.suse.com/1171205" }, { "category": "self", "summary": "SUSE Bug 1171214", "url": "https://bugzilla.suse.com/1171214" }, { "category": "self", "summary": "SUSE Bug 1171217", "url": "https://bugzilla.suse.com/1171217" }, { "category": "self", "summary": "SUSE Bug 1171218", "url": "https://bugzilla.suse.com/1171218" }, { "category": "self", "summary": "SUSE Bug 1171219", "url": "https://bugzilla.suse.com/1171219" }, { "category": "self", "summary": "SUSE Bug 1171220", "url": "https://bugzilla.suse.com/1171220" }, { "category": "self", "summary": "SUSE Bug 1171244", "url": "https://bugzilla.suse.com/1171244" }, { "category": "self", "summary": "SUSE Bug 1171293", "url": "https://bugzilla.suse.com/1171293" }, { "category": "self", "summary": "SUSE Bug 1171417", "url": "https://bugzilla.suse.com/1171417" }, { "category": "self", "summary": "SUSE Bug 1171527", "url": "https://bugzilla.suse.com/1171527" }, { "category": "self", "summary": "SUSE Bug 1171599", "url": "https://bugzilla.suse.com/1171599" }, { "category": "self", "summary": "SUSE Bug 1171600", "url": "https://bugzilla.suse.com/1171600" }, { "category": "self", "summary": "SUSE Bug 1171601", "url": "https://bugzilla.suse.com/1171601" }, { "category": "self", "summary": "SUSE Bug 1171602", "url": "https://bugzilla.suse.com/1171602" }, { "category": "self", "summary": "SUSE Bug 1171604", "url": "https://bugzilla.suse.com/1171604" }, { "category": "self", "summary": "SUSE Bug 1171605", "url": "https://bugzilla.suse.com/1171605" }, { "category": "self", "summary": "SUSE Bug 1171606", "url": "https://bugzilla.suse.com/1171606" }, { "category": "self", "summary": "SUSE Bug 1171607", "url": "https://bugzilla.suse.com/1171607" }, { "category": "self", "summary": "SUSE Bug 1171608", "url": "https://bugzilla.suse.com/1171608" }, { "category": "self", "summary": "SUSE Bug 1171609", "url": "https://bugzilla.suse.com/1171609" }, { "category": "self", "summary": "SUSE Bug 1171610", "url": "https://bugzilla.suse.com/1171610" }, { "category": "self", "summary": "SUSE Bug 1171611", "url": "https://bugzilla.suse.com/1171611" }, { "category": "self", "summary": "SUSE Bug 1171612", "url": "https://bugzilla.suse.com/1171612" }, { "category": "self", "summary": "SUSE Bug 1171613", "url": "https://bugzilla.suse.com/1171613" }, { "category": "self", "summary": "SUSE Bug 1171614", "url": "https://bugzilla.suse.com/1171614" }, { "category": "self", "summary": "SUSE Bug 1171615", "url": "https://bugzilla.suse.com/1171615" }, { "category": "self", "summary": "SUSE Bug 1171616", "url": "https://bugzilla.suse.com/1171616" }, { "category": "self", "summary": "SUSE Bug 1171617", "url": "https://bugzilla.suse.com/1171617" }, { "category": "self", "summary": "SUSE Bug 1171618", "url": "https://bugzilla.suse.com/1171618" }, { "category": "self", "summary": "SUSE Bug 1171619", "url": "https://bugzilla.suse.com/1171619" }, { "category": "self", "summary": "SUSE Bug 1171620", "url": "https://bugzilla.suse.com/1171620" }, { "category": "self", "summary": "SUSE Bug 1171621", "url": "https://bugzilla.suse.com/1171621" }, { "category": "self", "summary": "SUSE Bug 1171622", "url": "https://bugzilla.suse.com/1171622" }, { "category": "self", "summary": "SUSE Bug 1171623", "url": "https://bugzilla.suse.com/1171623" }, { "category": "self", "summary": "SUSE Bug 1171624", "url": "https://bugzilla.suse.com/1171624" }, { "category": "self", "summary": "SUSE Bug 1171625", "url": "https://bugzilla.suse.com/1171625" }, { "category": "self", "summary": "SUSE Bug 1171626", "url": "https://bugzilla.suse.com/1171626" }, { "category": "self", "summary": "SUSE Bug 1171662", "url": "https://bugzilla.suse.com/1171662" }, { "category": "self", "summary": "SUSE Bug 1171679", "url": "https://bugzilla.suse.com/1171679" }, { "category": "self", "summary": "SUSE Bug 1171691", "url": "https://bugzilla.suse.com/1171691" }, { "category": "self", "summary": "SUSE Bug 1171692", "url": "https://bugzilla.suse.com/1171692" }, { "category": "self", "summary": "SUSE Bug 1171694", "url": "https://bugzilla.suse.com/1171694" }, { "category": "self", "summary": "SUSE Bug 1171695", "url": "https://bugzilla.suse.com/1171695" }, { "category": "self", "summary": "SUSE Bug 1171736", "url": "https://bugzilla.suse.com/1171736" }, { "category": "self", "summary": "SUSE Bug 1171761", "url": "https://bugzilla.suse.com/1171761" }, { "category": "self", "summary": "SUSE Bug 1171817", "url": "https://bugzilla.suse.com/1171817" }, { "category": "self", "summary": "SUSE Bug 1171948", "url": "https://bugzilla.suse.com/1171948" }, { "category": "self", "summary": "SUSE Bug 1171949", "url": "https://bugzilla.suse.com/1171949" }, { "category": "self", "summary": "SUSE Bug 1171951", "url": "https://bugzilla.suse.com/1171951" }, { "category": "self", "summary": "SUSE Bug 1171952", "url": "https://bugzilla.suse.com/1171952" }, { "category": "self", "summary": "SUSE Bug 1171979", "url": "https://bugzilla.suse.com/1171979" }, { "category": "self", "summary": "SUSE Bug 1171982", "url": "https://bugzilla.suse.com/1171982" }, { "category": "self", "summary": "SUSE Bug 1171983", "url": "https://bugzilla.suse.com/1171983" }, { "category": "self", "summary": "SUSE Bug 1172017", "url": "https://bugzilla.suse.com/1172017" }, { "category": "self", "summary": "SUSE Bug 1172096", "url": "https://bugzilla.suse.com/1172096" }, { "category": "self", "summary": "SUSE Bug 1172097", "url": "https://bugzilla.suse.com/1172097" }, { "category": "self", "summary": "SUSE Bug 1172098", "url": "https://bugzilla.suse.com/1172098" }, { "category": "self", "summary": "SUSE Bug 1172099", "url": "https://bugzilla.suse.com/1172099" }, { "category": "self", "summary": "SUSE Bug 1172101", "url": "https://bugzilla.suse.com/1172101" }, { "category": "self", "summary": "SUSE Bug 1172102", "url": "https://bugzilla.suse.com/1172102" }, { "category": "self", "summary": "SUSE Bug 1172103", "url": "https://bugzilla.suse.com/1172103" }, { "category": "self", "summary": "SUSE Bug 1172104", "url": "https://bugzilla.suse.com/1172104" }, { "category": "self", "summary": "SUSE Bug 1172127", "url": "https://bugzilla.suse.com/1172127" }, { "category": "self", "summary": "SUSE Bug 1172130", "url": "https://bugzilla.suse.com/1172130" }, { "category": "self", "summary": "SUSE Bug 1172185", "url": "https://bugzilla.suse.com/1172185" }, { "category": "self", "summary": "SUSE Bug 1172188", "url": "https://bugzilla.suse.com/1172188" }, { "category": "self", "summary": "SUSE Bug 1172199", "url": "https://bugzilla.suse.com/1172199" }, { "category": "self", "summary": "SUSE Bug 1172201", "url": "https://bugzilla.suse.com/1172201" }, { "category": "self", "summary": "SUSE Bug 1172202", "url": "https://bugzilla.suse.com/1172202" }, { "category": "self", "summary": "SUSE Bug 1172218", "url": "https://bugzilla.suse.com/1172218" }, { "category": "self", "summary": "SUSE Bug 1172221", "url": "https://bugzilla.suse.com/1172221" }, { "category": "self", "summary": "SUSE Bug 1172249", "url": "https://bugzilla.suse.com/1172249" }, { "category": "self", "summary": "SUSE Bug 1172251", "url": "https://bugzilla.suse.com/1172251" }, { "category": "self", "summary": "SUSE Bug 1172253", "url": "https://bugzilla.suse.com/1172253" }, { "category": "self", "summary": "SUSE Bug 1172317", "url": "https://bugzilla.suse.com/1172317" }, { "category": "self", "summary": "SUSE Bug 1172342", "url": "https://bugzilla.suse.com/1172342" }, { "category": "self", "summary": "SUSE Bug 1172343", "url": "https://bugzilla.suse.com/1172343" }, { "category": "self", "summary": "SUSE Bug 1172344", "url": "https://bugzilla.suse.com/1172344" }, { "category": "self", "summary": "SUSE Bug 1172366", "url": "https://bugzilla.suse.com/1172366" }, { "category": "self", "summary": "SUSE Bug 1172378", "url": "https://bugzilla.suse.com/1172378" }, { "category": "self", "summary": "SUSE Bug 1172391", "url": "https://bugzilla.suse.com/1172391" }, { "category": "self", "summary": "SUSE Bug 1172397", "url": "https://bugzilla.suse.com/1172397" }, { "category": "self", "summary": "SUSE Bug 1172453", "url": "https://bugzilla.suse.com/1172453" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1000199 page", "url": "https://www.suse.com/security/cve/CVE-2018-1000199/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-19462 page", "url": "https://www.suse.com/security/cve/CVE-2019-19462/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-20806 page", "url": "https://www.suse.com/security/cve/CVE-2019-20806/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-20812 page", "url": "https://www.suse.com/security/cve/CVE-2019-20812/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9455 page", "url": "https://www.suse.com/security/cve/CVE-2019-9455/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-0543 page", "url": "https://www.suse.com/security/cve/CVE-2020-0543/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10690 page", "url": "https://www.suse.com/security/cve/CVE-2020-10690/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10711 page", "url": "https://www.suse.com/security/cve/CVE-2020-10711/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10720 page", "url": "https://www.suse.com/security/cve/CVE-2020-10720/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10732 page", "url": "https://www.suse.com/security/cve/CVE-2020-10732/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10751 page", "url": "https://www.suse.com/security/cve/CVE-2020-10751/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10757 page", "url": "https://www.suse.com/security/cve/CVE-2020-10757/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12114 page", "url": "https://www.suse.com/security/cve/CVE-2020-12114/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12464 page", "url": "https://www.suse.com/security/cve/CVE-2020-12464/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12652 page", "url": "https://www.suse.com/security/cve/CVE-2020-12652/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12653 page", "url": "https://www.suse.com/security/cve/CVE-2020-12653/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12654 page", "url": "https://www.suse.com/security/cve/CVE-2020-12654/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12655 page", "url": "https://www.suse.com/security/cve/CVE-2020-12655/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12656 page", "url": "https://www.suse.com/security/cve/CVE-2020-12656/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12657 page", "url": "https://www.suse.com/security/cve/CVE-2020-12657/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12659 page", "url": "https://www.suse.com/security/cve/CVE-2020-12659/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12768 page", "url": "https://www.suse.com/security/cve/CVE-2020-12768/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12769 page", "url": "https://www.suse.com/security/cve/CVE-2020-12769/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-13143 page", "url": "https://www.suse.com/security/cve/CVE-2020-13143/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2020-06-09T17:10:22Z", "generator": { "date": "2020-06-09T17:10:22Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2020:1587-1", "initial_release_date": "2020-06-09T17:10:22Z", "revision_history": [ { "date": "2020-06-09T17:10:22Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-devel-azure-4.12.14-16.16.1.noarch", "product": { "name": "kernel-devel-azure-4.12.14-16.16.1.noarch", "product_id": "kernel-devel-azure-4.12.14-16.16.1.noarch" } }, { "category": "product_version", "name": "kernel-source-azure-4.12.14-16.16.1.noarch", "product": { "name": "kernel-source-azure-4.12.14-16.16.1.noarch", "product_id": "kernel-source-azure-4.12.14-16.16.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-azure-4.12.14-16.16.1.x86_64", "product": { "name": "cluster-md-kmp-azure-4.12.14-16.16.1.x86_64", "product_id": "cluster-md-kmp-azure-4.12.14-16.16.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-azure-4.12.14-16.16.1.x86_64", "product": { "name": "dlm-kmp-azure-4.12.14-16.16.1.x86_64", "product_id": "dlm-kmp-azure-4.12.14-16.16.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-azure-4.12.14-16.16.1.x86_64", "product": { "name": "gfs2-kmp-azure-4.12.14-16.16.1.x86_64", "product_id": "gfs2-kmp-azure-4.12.14-16.16.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-4.12.14-16.16.1.x86_64", "product": { "name": "kernel-azure-4.12.14-16.16.1.x86_64", "product_id": "kernel-azure-4.12.14-16.16.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-base-4.12.14-16.16.1.x86_64", "product": { "name": "kernel-azure-base-4.12.14-16.16.1.x86_64", "product_id": "kernel-azure-base-4.12.14-16.16.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-devel-4.12.14-16.16.1.x86_64", "product": { "name": "kernel-azure-devel-4.12.14-16.16.1.x86_64", "product_id": "kernel-azure-devel-4.12.14-16.16.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-extra-4.12.14-16.16.1.x86_64", "product": { "name": "kernel-azure-extra-4.12.14-16.16.1.x86_64", "product_id": "kernel-azure-extra-4.12.14-16.16.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-kgraft-devel-4.12.14-16.16.1.x86_64", "product": { "name": "kernel-azure-kgraft-devel-4.12.14-16.16.1.x86_64", "product_id": "kernel-azure-kgraft-devel-4.12.14-16.16.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-azure-4.12.14-16.16.1.x86_64", "product": { "name": "kernel-syms-azure-4.12.14-16.16.1.x86_64", "product_id": "kernel-syms-azure-4.12.14-16.16.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-azure-4.12.14-16.16.1.x86_64", "product": { "name": "kselftests-kmp-azure-4.12.14-16.16.1.x86_64", "product_id": "kselftests-kmp-azure-4.12.14-16.16.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-azure-4.12.14-16.16.1.x86_64", "product": { "name": "ocfs2-kmp-azure-4.12.14-16.16.1.x86_64", "product_id": "ocfs2-kmp-azure-4.12.14-16.16.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP5", "product": { "name": "SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sles:12:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp5" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-4.12.14-16.16.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.16.1.x86_64" }, "product_reference": "kernel-azure-4.12.14-16.16.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-base-4.12.14-16.16.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.16.1.x86_64" }, "product_reference": "kernel-azure-base-4.12.14-16.16.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-devel-4.12.14-16.16.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.16.1.x86_64" }, "product_reference": "kernel-azure-devel-4.12.14-16.16.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-azure-4.12.14-16.16.1.noarch as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.16.1.noarch" }, "product_reference": "kernel-devel-azure-4.12.14-16.16.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-azure-4.12.14-16.16.1.noarch as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.16.1.noarch" }, "product_reference": "kernel-source-azure-4.12.14-16.16.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-azure-4.12.14-16.16.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.16.1.x86_64" }, "product_reference": "kernel-syms-azure-4.12.14-16.16.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-4.12.14-16.16.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.16.1.x86_64" }, "product_reference": "kernel-azure-4.12.14-16.16.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-base-4.12.14-16.16.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.16.1.x86_64" }, "product_reference": "kernel-azure-base-4.12.14-16.16.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-devel-4.12.14-16.16.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.16.1.x86_64" }, "product_reference": "kernel-azure-devel-4.12.14-16.16.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-azure-4.12.14-16.16.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.16.1.noarch" }, "product_reference": "kernel-devel-azure-4.12.14-16.16.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-azure-4.12.14-16.16.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.16.1.noarch" }, "product_reference": "kernel-source-azure-4.12.14-16.16.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-azure-4.12.14-16.16.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.16.1.x86_64" }, "product_reference": "kernel-syms-azure-4.12.14-16.16.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-1000199", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1000199" } ], "notes": [ { "category": "general", "text": "The Linux Kernel version 3.18 contains a dangerous feature vulnerability in modify_user_hw_breakpoint() that can result in crash and possibly memory corruption. This attack appear to be exploitable via local code execution and the ability to use ptrace. This vulnerability appears to have been fixed in git commit f67b15037a7a50c57f72e69a6d59941ad90a0f0f.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.16.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1000199", "url": "https://www.suse.com/security/cve/CVE-2018-1000199" }, { "category": "external", "summary": "SUSE Bug 1089895 for CVE-2018-1000199", "url": "https://bugzilla.suse.com/1089895" }, { "category": "external", "summary": "SUSE Bug 1090036 for CVE-2018-1000199", "url": "https://bugzilla.suse.com/1090036" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.16.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.16.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-09T17:10:22Z", "details": "important" } ], "title": "CVE-2018-1000199" }, { "cve": "CVE-2019-19462", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-19462" } ], "notes": [ { "category": "general", "text": "relay_open in kernel/relay.c in the Linux kernel through 5.4.1 allows local users to cause a denial of service (such as relay blockage) by triggering a NULL alloc_percpu result.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.16.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-19462", "url": "https://www.suse.com/security/cve/CVE-2019-19462" }, { "category": "external", "summary": "SUSE Bug 1158265 for CVE-2019-19462", "url": "https://bugzilla.suse.com/1158265" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.16.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.16.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-09T17:10:22Z", "details": "low" } ], "title": "CVE-2019-19462" }, { "cve": "CVE-2019-20806", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-20806" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.2. There is a NULL pointer dereference in tw5864_handle_frame() in drivers/media/pci/tw5864/tw5864-video.c, which may cause denial of service, aka CID-2e7682ebfc75.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.16.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-20806", "url": "https://www.suse.com/security/cve/CVE-2019-20806" }, { "category": "external", "summary": "SUSE Bug 1172199 for CVE-2019-20806", "url": "https://bugzilla.suse.com/1172199" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.16.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.9, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.16.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-09T17:10:22Z", "details": "low" } ], "title": "CVE-2019-20806" }, { "cve": "CVE-2019-20812", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-20812" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.4.7. The prb_calc_retire_blk_tmo() function in net/packet/af_packet.c can result in a denial of service (CPU consumption and soft lockup) in a certain failure case involving TPACKET_V3, aka CID-b43d1f9f7067.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.16.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-20812", "url": "https://www.suse.com/security/cve/CVE-2019-20812" }, { "category": "external", "summary": "SUSE Bug 1172453 for CVE-2019-20812", "url": "https://bugzilla.suse.com/1172453" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.16.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.16.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-09T17:10:22Z", "details": "moderate" } ], "title": "CVE-2019-20812" }, { "cve": "CVE-2019-9455", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9455" } ], "notes": [ { "category": "general", "text": "In the Android kernel in the video driver there is a kernel pointer leak due to a WARN_ON statement. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.16.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9455", "url": "https://www.suse.com/security/cve/CVE-2019-9455" }, { "category": "external", "summary": "SUSE Bug 1170345 for CVE-2019-9455", "url": "https://bugzilla.suse.com/1170345" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.16.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.16.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-09T17:10:22Z", "details": "moderate" } ], "title": "CVE-2019-9455" }, { "cve": "CVE-2020-0543", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-0543" } ], "notes": [ { "category": "general", "text": "Incomplete cleanup from specific special register read operations in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.16.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-0543", "url": "https://www.suse.com/security/cve/CVE-2020-0543" }, { "category": "external", "summary": "SUSE Bug 1154824 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1154824" }, { "category": "external", "summary": "SUSE Bug 1172205 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172205" }, { "category": "external", "summary": "SUSE Bug 1172206 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172206" }, { "category": "external", "summary": "SUSE Bug 1172207 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172207" }, { "category": "external", "summary": "SUSE Bug 1172770 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172770" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.16.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.16.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-09T17:10:22Z", "details": "moderate" } ], "title": "CVE-2020-0543" }, { "cve": "CVE-2020-10690", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10690" } ], "notes": [ { "category": "general", "text": "There is a use-after-free in kernel versions before 5.5 due to a race condition between the release of ptp_clock and cdev while resource deallocation. When a (high privileged) process allocates a ptp device file (like /dev/ptpX) and voluntarily goes to sleep. During this time if the underlying device is removed, it can cause an exploitable condition as the process wakes up to terminate and clean all attached files. The system crashes due to the cdev structure being invalid (as already freed) which is pointed to by the inode.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.16.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10690", "url": "https://www.suse.com/security/cve/CVE-2020-10690" }, { "category": "external", "summary": "SUSE Bug 1170056 for CVE-2020-10690", "url": "https://bugzilla.suse.com/1170056" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.16.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.16.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-09T17:10:22Z", "details": "moderate" } ], "title": "CVE-2020-10690" }, { "cve": "CVE-2020-10711", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10711" } ], "notes": [ { "category": "general", "text": "A NULL pointer dereference flaw was found in the Linux kernel\u0027s SELinux subsystem in versions before 5.7. This flaw occurs while importing the Commercial IP Security Option (CIPSO) protocol\u0027s category bitmap into the SELinux extensible bitmap via the\u0027 ebitmap_netlbl_import\u0027 routine. While processing the CIPSO restricted bitmap tag in the \u0027cipso_v4_parsetag_rbm\u0027 routine, it sets the security attribute to indicate that the category bitmap is present, even if it has not been allocated. This issue leads to a NULL pointer dereference issue while importing the same category bitmap into SELinux. This flaw allows a remote network user to crash the system kernel, resulting in a denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.16.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10711", "url": "https://www.suse.com/security/cve/CVE-2020-10711" }, { "category": "external", "summary": "SUSE Bug 1171191 for CVE-2020-10711", "url": "https://bugzilla.suse.com/1171191" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.16.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.16.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-09T17:10:22Z", "details": "moderate" } ], "title": "CVE-2020-10711" }, { "cve": "CVE-2020-10720", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10720" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s implementation of GRO in versions before 5.2. This flaw allows an attacker with local access to crash the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.16.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10720", "url": "https://www.suse.com/security/cve/CVE-2020-10720" }, { "category": "external", "summary": "SUSE Bug 1170778 for CVE-2020-10720", "url": "https://bugzilla.suse.com/1170778" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.16.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.16.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-09T17:10:22Z", "details": "moderate" } ], "title": "CVE-2020-10720" }, { "cve": "CVE-2020-10732", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10732" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s implementation of Userspace core dumps. This flaw allows an attacker with a local account to crash a trivial program and exfiltrate private kernel data.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.16.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10732", "url": "https://www.suse.com/security/cve/CVE-2020-10732" }, { "category": "external", "summary": "SUSE Bug 1171220 for CVE-2020-10732", "url": "https://bugzilla.suse.com/1171220" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.16.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.16.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-09T17:10:22Z", "details": "low" } ], "title": "CVE-2020-10732" }, { "cve": "CVE-2020-10751", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10751" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernels SELinux LSM hook implementation before version 5.7, where it incorrectly assumed that an skb would only contain a single netlink message. The hook would incorrectly only validate the first netlink message in the skb and allow or deny the rest of the messages within the skb with the granted permission without further processing.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.16.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10751", "url": "https://www.suse.com/security/cve/CVE-2020-10751" }, { "category": "external", "summary": "SUSE Bug 1171189 for CVE-2020-10751", "url": "https://bugzilla.suse.com/1171189" }, { "category": "external", "summary": "SUSE Bug 1174963 for CVE-2020-10751", "url": "https://bugzilla.suse.com/1174963" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.16.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.16.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-09T17:10:22Z", "details": "moderate" } ], "title": "CVE-2020-10751" }, { "cve": "CVE-2020-10757", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10757" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux Kernel in versions after 4.5-rc1 in the way mremap handled DAX Huge Pages. This flaw allows a local attacker with access to a DAX enabled storage to escalate their privileges on the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.16.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10757", "url": "https://www.suse.com/security/cve/CVE-2020-10757" }, { "category": "external", "summary": "SUSE Bug 1159281 for CVE-2020-10757", "url": "https://bugzilla.suse.com/1159281" }, { "category": "external", "summary": "SUSE Bug 1172317 for CVE-2020-10757", "url": "https://bugzilla.suse.com/1172317" }, { "category": "external", "summary": "SUSE Bug 1172437 for CVE-2020-10757", "url": "https://bugzilla.suse.com/1172437" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.16.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.16.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-09T17:10:22Z", "details": "important" } ], "title": "CVE-2020-10757" }, { "cve": "CVE-2020-12114", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12114" } ], "notes": [ { "category": "general", "text": "A pivot_root race condition in fs/namespace.c in the Linux kernel 4.4.x before 4.4.221, 4.9.x before 4.9.221, 4.14.x before 4.14.178, 4.19.x before 4.19.119, and 5.x before 5.3 allows local users to cause a denial of service (panic) by corrupting a mountpoint reference counter.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.16.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12114", "url": "https://www.suse.com/security/cve/CVE-2020-12114" }, { "category": "external", "summary": "SUSE Bug 1171098 for CVE-2020-12114", "url": "https://bugzilla.suse.com/1171098" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.16.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.16.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-09T17:10:22Z", "details": "moderate" } ], "title": "CVE-2020-12114" }, { "cve": "CVE-2020-12464", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12464" } ], "notes": [ { "category": "general", "text": "usb_sg_cancel in drivers/usb/core/message.c in the Linux kernel before 5.6.8 has a use-after-free because a transfer occurs without a reference, aka CID-056ad39ee925.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.16.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12464", "url": "https://www.suse.com/security/cve/CVE-2020-12464" }, { "category": "external", "summary": "SUSE Bug 1170901 for CVE-2020-12464", "url": "https://bugzilla.suse.com/1170901" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.16.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 1.8, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.16.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-09T17:10:22Z", "details": "low" } ], "title": "CVE-2020-12464" }, { "cve": "CVE-2020-12652", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12652" } ], "notes": [ { "category": "general", "text": "The __mptctl_ioctl function in drivers/message/fusion/mptctl.c in the Linux kernel before 5.4.14 allows local users to hold an incorrect lock during the ioctl operation and trigger a race condition, i.e., a \"double fetch\" vulnerability, aka CID-28d76df18f0a. NOTE: the vendor states \"The security impact of this bug is not as bad as it could have been because these operations are all privileged and root already has enormous destructive power.\"", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.16.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12652", "url": "https://www.suse.com/security/cve/CVE-2020-12652" }, { "category": "external", "summary": "SUSE Bug 1171218 for CVE-2020-12652", "url": "https://bugzilla.suse.com/1171218" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.16.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.16.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-09T17:10:22Z", "details": "moderate" } ], "title": "CVE-2020-12652" }, { "cve": "CVE-2020-12653", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12653" } ], "notes": [ { "category": "general", "text": "An issue was found in Linux kernel before 5.5.4. The mwifiex_cmd_append_vsie_tlv() function in drivers/net/wireless/marvell/mwifiex/scan.c allows local users to gain privileges or cause a denial of service because of an incorrect memcpy and buffer overflow, aka CID-b70261a288ea.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.16.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12653", "url": "https://www.suse.com/security/cve/CVE-2020-12653" }, { "category": "external", "summary": "SUSE Bug 1159281 for CVE-2020-12653", "url": "https://bugzilla.suse.com/1159281" }, { "category": "external", "summary": "SUSE Bug 1171195 for CVE-2020-12653", "url": "https://bugzilla.suse.com/1171195" }, { "category": "external", "summary": "SUSE Bug 1171254 for CVE-2020-12653", "url": "https://bugzilla.suse.com/1171254" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.16.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.16.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-09T17:10:22Z", "details": "important" } ], "title": "CVE-2020-12653" }, { "cve": "CVE-2020-12654", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12654" } ], "notes": [ { "category": "general", "text": "An issue was found in Linux kernel before 5.5.4. mwifiex_ret_wmm_get_status() in drivers/net/wireless/marvell/mwifiex/wmm.c allows a remote AP to trigger a heap-based buffer overflow because of an incorrect memcpy, aka CID-3a9b153c5591.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.16.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12654", "url": "https://www.suse.com/security/cve/CVE-2020-12654" }, { "category": "external", "summary": "SUSE Bug 1159281 for CVE-2020-12654", "url": "https://bugzilla.suse.com/1159281" }, { "category": "external", "summary": "SUSE Bug 1171202 for CVE-2020-12654", "url": "https://bugzilla.suse.com/1171202" }, { "category": "external", "summary": "SUSE Bug 1171252 for CVE-2020-12654", "url": "https://bugzilla.suse.com/1171252" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.16.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.16.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-09T17:10:22Z", "details": "important" } ], "title": "CVE-2020-12654" }, { "cve": "CVE-2020-12655", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12655" } ], "notes": [ { "category": "general", "text": "An issue was discovered in xfs_agf_verify in fs/xfs/libxfs/xfs_alloc.c in the Linux kernel through 5.6.10. Attackers may trigger a sync of excessive duration via an XFS v5 image with crafted metadata, aka CID-d0c7feaf8767.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.16.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12655", "url": "https://www.suse.com/security/cve/CVE-2020-12655" }, { "category": "external", "summary": "SUSE Bug 1171217 for CVE-2020-12655", "url": "https://bugzilla.suse.com/1171217" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.16.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.8, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.16.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-09T17:10:22Z", "details": "moderate" } ], "title": "CVE-2020-12655" }, { "cve": "CVE-2020-12656", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12656" } ], "notes": [ { "category": "general", "text": "gss_mech_free in net/sunrpc/auth_gss/gss_mech_switch.c in the rpcsec_gss_krb5 implementation in the Linux kernel through 5.6.10 lacks certain domain_release calls, leading to a memory leak. Note: This was disputed with the assertion that the issue does not grant any access not already available. It is a problem that on unloading a specific kernel module some memory is leaked, but loading kernel modules is a privileged operation. A user could also write a kernel module to consume any amount of memory they like and load that replicating the effect of this bug", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.16.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12656", "url": "https://www.suse.com/security/cve/CVE-2020-12656" }, { "category": "external", "summary": "SUSE Bug 1171219 for CVE-2020-12656", "url": "https://bugzilla.suse.com/1171219" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.16.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.9, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.16.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-09T17:10:22Z", "details": "low" } ], "title": "CVE-2020-12656" }, { "cve": "CVE-2020-12657", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12657" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.6.5. There is a use-after-free in block/bfq-iosched.c related to bfq_idle_slice_timer_body.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.16.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12657", "url": "https://www.suse.com/security/cve/CVE-2020-12657" }, { "category": "external", "summary": "SUSE Bug 1171205 for CVE-2020-12657", "url": "https://bugzilla.suse.com/1171205" }, { "category": "external", "summary": "SUSE Bug 1201585 for CVE-2020-12657", "url": "https://bugzilla.suse.com/1201585" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.16.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.16.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-09T17:10:22Z", "details": "important" } ], "title": "CVE-2020-12657" }, { "cve": "CVE-2020-12659", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12659" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.6.7. xdp_umem_reg in net/xdp/xdp_umem.c has an out-of-bounds write (by a user with the CAP_NET_ADMIN capability) because of a lack of headroom validation.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.16.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12659", "url": "https://www.suse.com/security/cve/CVE-2020-12659" }, { "category": "external", "summary": "SUSE Bug 1171214 for CVE-2020-12659", "url": "https://bugzilla.suse.com/1171214" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.16.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.16.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-09T17:10:22Z", "details": "moderate" } ], "title": "CVE-2020-12659" }, { "cve": "CVE-2020-12768", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12768" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.6. svm_cpu_uninit in arch/x86/kvm/svm.c has a memory leak, aka CID-d80b64ff297e. NOTE: third parties dispute this issue because it\u0027s a one-time leak at the boot, the size is negligible, and it can\u0027t be triggered at will", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.16.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12768", "url": "https://www.suse.com/security/cve/CVE-2020-12768" }, { "category": "external", "summary": "SUSE Bug 1171736 for CVE-2020-12768", "url": "https://bugzilla.suse.com/1171736" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.16.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.16.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-09T17:10:22Z", "details": "moderate" } ], "title": "CVE-2020-12768" }, { "cve": "CVE-2020-12769", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12769" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.4.17. drivers/spi/spi-dw.c allows attackers to cause a panic via concurrent calls to dw_spi_irq and dw_spi_transfer_one, aka CID-19b61392c5a8.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.16.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12769", "url": "https://www.suse.com/security/cve/CVE-2020-12769" }, { "category": "external", "summary": "SUSE Bug 1171983 for CVE-2020-12769", "url": "https://bugzilla.suse.com/1171983" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.16.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.16.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-09T17:10:22Z", "details": "moderate" } ], "title": "CVE-2020-12769" }, { "cve": "CVE-2020-13143", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-13143" } ], "notes": [ { "category": "general", "text": "gadget_dev_desc_UDC_store in drivers/usb/gadget/configfs.c in the Linux kernel 3.16 through 5.6.13 relies on kstrdup without considering the possibility of an internal \u0027\\0\u0027 value, which allows attackers to trigger an out-of-bounds read, aka CID-15753588bcd4.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.16.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-13143", "url": "https://www.suse.com/security/cve/CVE-2020-13143" }, { "category": "external", "summary": "SUSE Bug 1171982 for CVE-2020-13143", "url": "https://bugzilla.suse.com/1171982" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.16.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.16.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.16.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-09T17:10:22Z", "details": "moderate" } ], "title": "CVE-2020-13143" } ] }
suse-su-2020:1597-1
Vulnerability from csaf_suse
Published
2020-06-10 08:31
Modified
2020-06-10 08:31
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 12 SP2 kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2020-0543: Fixed a side channel attack against special registers which could have resulted in leaking of read values to cores other than the one which called it.
This attack is known as Special Register Buffer Data Sampling (SRBDS) or 'CrossTalk' (bsc#1154824).
- CVE-2020-12656: Fixed an improper handling of certain domain_release calls leadingch could have led to a memory leak (bsc#1171219).
- CVE-2020-12654: Fixed an issue in he wifi driver which could have allowed a remote AP to trigger a heap-based buffer overflow (bsc#1171202).
- CVE-2020-12653: Fixed an issue in the wifi driver which could have allowed local users to gain privileges or cause a denial of service (bsc#1171195).
- CVE-2020-12652: Fixed an issue which could have allowed local users to hold an incorrect lock during the ioctl operation and trigger a race condition (bsc#1171218).
- CVE-2020-12114: Fixed A pivot_root race condition which could have allowed local users to cause a denial of service (panic) by corrupting a mountpoint reference counter (bsc#1171098).
- CVE-2020-10757: Fixed an issue where remaping hugepage DAX to anon mmap could have caused user PTE access (bsc#1172317).
The following non-security bugs were fixed:
- can, slip: Protect tty->disc_data in write_wakeup and close with RCU (bsc#1171698).
- KEYS: allow reaching the keys quotas exactly (bsc#1171689).
- KEYS: reaching the keys quotas correctly (bsc#1171689).
- Revert 'ipc,sem: remove uneeded sem_undo_list lock usage in exit_sem()' (bsc#1172221).
- random: always use batched entropy for get_random_u{32,64} (bsc#1164871).
Patchnames
SUSE-2020-1597,SUSE-OpenStack-Cloud-7-2020-1597,SUSE-SLE-HA-12-SP2-2020-1597,SUSE-SLE-SAP-12-SP2-2020-1597,SUSE-SLE-SERVER-12-SP2-2020-1597,SUSE-SLE-SERVER-12-SP2-BCL-2020-1597
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "The SUSE Linux Enterprise 12 SP2 kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2020-0543: Fixed a side channel attack against special registers which could have resulted in leaking of read values to cores other than the one which called it.\n This attack is known as Special Register Buffer Data Sampling (SRBDS) or \u0027CrossTalk\u0027 (bsc#1154824).\n- CVE-2020-12656: Fixed an improper handling of certain domain_release calls leadingch could have led to a memory leak (bsc#1171219).\n- CVE-2020-12654: Fixed an issue in he wifi driver which could have allowed a remote AP to trigger a heap-based buffer overflow (bsc#1171202).\n- CVE-2020-12653: Fixed an issue in the wifi driver which could have allowed local users to gain privileges or cause a denial of service (bsc#1171195).\n- CVE-2020-12652: Fixed an issue which could have allowed local users to hold an incorrect lock during the ioctl operation and trigger a race condition (bsc#1171218).\n- CVE-2020-12114: Fixed A pivot_root race condition which could have allowed local users to cause a denial of service (panic) by corrupting a mountpoint reference counter (bsc#1171098).\n- CVE-2020-10757: Fixed an issue where remaping hugepage DAX to anon mmap could have caused user PTE access (bsc#1172317).\n\nThe following non-security bugs were fixed:\n\n- can, slip: Protect tty-\u003edisc_data in write_wakeup and close with RCU (bsc#1171698).\n- KEYS: allow reaching the keys quotas exactly (bsc#1171689).\n- KEYS: reaching the keys quotas correctly (bsc#1171689).\n- Revert \u0027ipc,sem: remove uneeded sem_undo_list lock usage in exit_sem()\u0027 (bsc#1172221).\n- random: always use batched entropy for get_random_u{32,64} (bsc#1164871).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2020-1597,SUSE-OpenStack-Cloud-7-2020-1597,SUSE-SLE-HA-12-SP2-2020-1597,SUSE-SLE-SAP-12-SP2-2020-1597,SUSE-SLE-SERVER-12-SP2-2020-1597,SUSE-SLE-SERVER-12-SP2-BCL-2020-1597", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2020_1597-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2020:1597-1", "url": "https://www.suse.com/support/update/announcement/2020/suse-su-20201597-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2020:1597-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-June/006923.html" }, { "category": "self", "summary": "SUSE Bug 1154824", "url": "https://bugzilla.suse.com/1154824" }, { "category": "self", "summary": "SUSE Bug 1164871", "url": "https://bugzilla.suse.com/1164871" }, { "category": "self", "summary": "SUSE Bug 1171098", "url": "https://bugzilla.suse.com/1171098" }, { "category": "self", "summary": "SUSE Bug 1171195", "url": "https://bugzilla.suse.com/1171195" }, { "category": "self", "summary": "SUSE Bug 1171202", "url": "https://bugzilla.suse.com/1171202" }, { "category": "self", "summary": "SUSE Bug 1171218", "url": "https://bugzilla.suse.com/1171218" }, { "category": "self", "summary": "SUSE Bug 1171219", "url": "https://bugzilla.suse.com/1171219" }, { "category": "self", "summary": "SUSE Bug 1171689", "url": "https://bugzilla.suse.com/1171689" }, { "category": "self", "summary": "SUSE Bug 1171698", "url": "https://bugzilla.suse.com/1171698" }, { "category": "self", "summary": "SUSE Bug 1172221", "url": "https://bugzilla.suse.com/1172221" }, { "category": "self", "summary": "SUSE Bug 1172317", "url": "https://bugzilla.suse.com/1172317" }, { "category": "self", "summary": "SUSE CVE CVE-2020-0543 page", "url": "https://www.suse.com/security/cve/CVE-2020-0543/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10757 page", "url": "https://www.suse.com/security/cve/CVE-2020-10757/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12114 page", "url": "https://www.suse.com/security/cve/CVE-2020-12114/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12652 page", "url": "https://www.suse.com/security/cve/CVE-2020-12652/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12653 page", "url": "https://www.suse.com/security/cve/CVE-2020-12653/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12654 page", "url": "https://www.suse.com/security/cve/CVE-2020-12654/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12656 page", "url": "https://www.suse.com/security/cve/CVE-2020-12656/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2020-06-10T08:31:49Z", "generator": { "date": "2020-06-10T08:31:49Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2020:1597-1", "initial_release_date": "2020-06-10T08:31:49Z", "revision_history": [ { "date": "2020-06-10T08:31:49Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.4.121-92.135.1.aarch64", "product": { "name": "cluster-md-kmp-default-4.4.121-92.135.1.aarch64", "product_id": "cluster-md-kmp-default-4.4.121-92.135.1.aarch64" } }, { "category": "product_version", "name": "cluster-md-kmp-vanilla-4.4.121-92.135.1.aarch64", "product": { "name": "cluster-md-kmp-vanilla-4.4.121-92.135.1.aarch64", "product_id": "cluster-md-kmp-vanilla-4.4.121-92.135.1.aarch64" } }, { "category": "product_version", "name": "cluster-network-kmp-default-4.4.121-92.135.1.aarch64", "product": { "name": "cluster-network-kmp-default-4.4.121-92.135.1.aarch64", "product_id": "cluster-network-kmp-default-4.4.121-92.135.1.aarch64" } }, { "category": "product_version", "name": "cluster-network-kmp-vanilla-4.4.121-92.135.1.aarch64", "product": { "name": "cluster-network-kmp-vanilla-4.4.121-92.135.1.aarch64", "product_id": "cluster-network-kmp-vanilla-4.4.121-92.135.1.aarch64" } }, { "category": "product_version", "name": "dlm-kmp-default-4.4.121-92.135.1.aarch64", "product": { "name": "dlm-kmp-default-4.4.121-92.135.1.aarch64", "product_id": "dlm-kmp-default-4.4.121-92.135.1.aarch64" } }, { "category": "product_version", "name": "dlm-kmp-vanilla-4.4.121-92.135.1.aarch64", "product": { "name": "dlm-kmp-vanilla-4.4.121-92.135.1.aarch64", "product_id": "dlm-kmp-vanilla-4.4.121-92.135.1.aarch64" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.4.121-92.135.1.aarch64", "product": { "name": "gfs2-kmp-default-4.4.121-92.135.1.aarch64", "product_id": "gfs2-kmp-default-4.4.121-92.135.1.aarch64" } }, { "category": "product_version", "name": "gfs2-kmp-vanilla-4.4.121-92.135.1.aarch64", "product": { "name": "gfs2-kmp-vanilla-4.4.121-92.135.1.aarch64", "product_id": "gfs2-kmp-vanilla-4.4.121-92.135.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-4.4.121-92.135.1.aarch64", "product": { "name": "kernel-default-4.4.121-92.135.1.aarch64", "product_id": "kernel-default-4.4.121-92.135.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-base-4.4.121-92.135.1.aarch64", "product": { "name": "kernel-default-base-4.4.121-92.135.1.aarch64", "product_id": "kernel-default-base-4.4.121-92.135.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-devel-4.4.121-92.135.1.aarch64", "product": { "name": "kernel-default-devel-4.4.121-92.135.1.aarch64", "product_id": "kernel-default-devel-4.4.121-92.135.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-extra-4.4.121-92.135.1.aarch64", "product": { "name": "kernel-default-extra-4.4.121-92.135.1.aarch64", "product_id": "kernel-default-extra-4.4.121-92.135.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.4.121-92.135.1.aarch64", "product": { "name": "kernel-default-kgraft-4.4.121-92.135.1.aarch64", "product_id": "kernel-default-kgraft-4.4.121-92.135.1.aarch64" } }, { "category": "product_version", "name": "kernel-obs-build-4.4.121-92.135.1.aarch64", "product": { "name": "kernel-obs-build-4.4.121-92.135.1.aarch64", "product_id": "kernel-obs-build-4.4.121-92.135.1.aarch64" } }, { "category": "product_version", "name": "kernel-obs-qa-4.4.121-92.135.1.aarch64", "product": { "name": "kernel-obs-qa-4.4.121-92.135.1.aarch64", "product_id": "kernel-obs-qa-4.4.121-92.135.1.aarch64" } }, { "category": "product_version", "name": "kernel-syms-4.4.121-92.135.1.aarch64", "product": { "name": "kernel-syms-4.4.121-92.135.1.aarch64", "product_id": "kernel-syms-4.4.121-92.135.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-4.4.121-92.135.1.aarch64", "product": { "name": "kernel-vanilla-4.4.121-92.135.1.aarch64", "product_id": "kernel-vanilla-4.4.121-92.135.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.4.121-92.135.1.aarch64", "product": { "name": "kernel-vanilla-base-4.4.121-92.135.1.aarch64", "product_id": "kernel-vanilla-base-4.4.121-92.135.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.4.121-92.135.1.aarch64", "product": { "name": "kernel-vanilla-devel-4.4.121-92.135.1.aarch64", "product_id": "kernel-vanilla-devel-4.4.121-92.135.1.aarch64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.4.121-92.135.1.aarch64", "product": { "name": "ocfs2-kmp-default-4.4.121-92.135.1.aarch64", "product_id": "ocfs2-kmp-default-4.4.121-92.135.1.aarch64" } }, { "category": "product_version", "name": "ocfs2-kmp-vanilla-4.4.121-92.135.1.aarch64", "product": { "name": "ocfs2-kmp-vanilla-4.4.121-92.135.1.aarch64", "product_id": "ocfs2-kmp-vanilla-4.4.121-92.135.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-4.4.121-92.135.1.noarch", "product": { "name": "kernel-devel-4.4.121-92.135.1.noarch", "product_id": "kernel-devel-4.4.121-92.135.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-4.4.121-92.135.1.noarch", "product": { "name": "kernel-docs-4.4.121-92.135.1.noarch", "product_id": "kernel-docs-4.4.121-92.135.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-html-4.4.121-92.135.1.noarch", "product": { "name": "kernel-docs-html-4.4.121-92.135.1.noarch", "product_id": "kernel-docs-html-4.4.121-92.135.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-pdf-4.4.121-92.135.1.noarch", "product": { "name": "kernel-docs-pdf-4.4.121-92.135.1.noarch", "product_id": "kernel-docs-pdf-4.4.121-92.135.1.noarch" } }, { "category": "product_version", "name": "kernel-macros-4.4.121-92.135.1.noarch", "product": { "name": "kernel-macros-4.4.121-92.135.1.noarch", "product_id": "kernel-macros-4.4.121-92.135.1.noarch" } }, { "category": "product_version", "name": "kernel-source-4.4.121-92.135.1.noarch", "product": { "name": "kernel-source-4.4.121-92.135.1.noarch", "product_id": "kernel-source-4.4.121-92.135.1.noarch" } }, { "category": "product_version", "name": "kernel-source-vanilla-4.4.121-92.135.1.noarch", "product": { "name": "kernel-source-vanilla-4.4.121-92.135.1.noarch", "product_id": "kernel-source-vanilla-4.4.121-92.135.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-debug-4.4.121-92.135.1.ppc64le", "product": { "name": "cluster-md-kmp-debug-4.4.121-92.135.1.ppc64le", "product_id": "cluster-md-kmp-debug-4.4.121-92.135.1.ppc64le" } }, { "category": "product_version", "name": "cluster-md-kmp-default-4.4.121-92.135.1.ppc64le", "product": { "name": "cluster-md-kmp-default-4.4.121-92.135.1.ppc64le", "product_id": "cluster-md-kmp-default-4.4.121-92.135.1.ppc64le" } }, { "category": "product_version", "name": "cluster-md-kmp-vanilla-4.4.121-92.135.1.ppc64le", "product": { "name": "cluster-md-kmp-vanilla-4.4.121-92.135.1.ppc64le", "product_id": "cluster-md-kmp-vanilla-4.4.121-92.135.1.ppc64le" } }, { "category": "product_version", "name": "cluster-network-kmp-debug-4.4.121-92.135.1.ppc64le", "product": { "name": "cluster-network-kmp-debug-4.4.121-92.135.1.ppc64le", "product_id": "cluster-network-kmp-debug-4.4.121-92.135.1.ppc64le" } }, { "category": "product_version", "name": "cluster-network-kmp-default-4.4.121-92.135.1.ppc64le", "product": { "name": "cluster-network-kmp-default-4.4.121-92.135.1.ppc64le", "product_id": "cluster-network-kmp-default-4.4.121-92.135.1.ppc64le" } }, { "category": "product_version", "name": "cluster-network-kmp-vanilla-4.4.121-92.135.1.ppc64le", "product": { "name": "cluster-network-kmp-vanilla-4.4.121-92.135.1.ppc64le", "product_id": "cluster-network-kmp-vanilla-4.4.121-92.135.1.ppc64le" } }, { "category": "product_version", "name": "dlm-kmp-debug-4.4.121-92.135.1.ppc64le", "product": { "name": "dlm-kmp-debug-4.4.121-92.135.1.ppc64le", "product_id": "dlm-kmp-debug-4.4.121-92.135.1.ppc64le" } }, { "category": "product_version", "name": "dlm-kmp-default-4.4.121-92.135.1.ppc64le", "product": { "name": "dlm-kmp-default-4.4.121-92.135.1.ppc64le", "product_id": "dlm-kmp-default-4.4.121-92.135.1.ppc64le" } }, { "category": "product_version", "name": "dlm-kmp-vanilla-4.4.121-92.135.1.ppc64le", "product": { "name": "dlm-kmp-vanilla-4.4.121-92.135.1.ppc64le", "product_id": "dlm-kmp-vanilla-4.4.121-92.135.1.ppc64le" } }, { "category": "product_version", "name": "gfs2-kmp-debug-4.4.121-92.135.1.ppc64le", "product": { "name": "gfs2-kmp-debug-4.4.121-92.135.1.ppc64le", "product_id": "gfs2-kmp-debug-4.4.121-92.135.1.ppc64le" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.4.121-92.135.1.ppc64le", "product": { "name": "gfs2-kmp-default-4.4.121-92.135.1.ppc64le", "product_id": "gfs2-kmp-default-4.4.121-92.135.1.ppc64le" } }, { "category": "product_version", "name": "gfs2-kmp-vanilla-4.4.121-92.135.1.ppc64le", "product": { "name": "gfs2-kmp-vanilla-4.4.121-92.135.1.ppc64le", "product_id": "gfs2-kmp-vanilla-4.4.121-92.135.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-4.4.121-92.135.1.ppc64le", "product": { "name": "kernel-debug-4.4.121-92.135.1.ppc64le", "product_id": "kernel-debug-4.4.121-92.135.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-base-4.4.121-92.135.1.ppc64le", "product": { "name": "kernel-debug-base-4.4.121-92.135.1.ppc64le", "product_id": "kernel-debug-base-4.4.121-92.135.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-devel-4.4.121-92.135.1.ppc64le", "product": { "name": "kernel-debug-devel-4.4.121-92.135.1.ppc64le", "product_id": "kernel-debug-devel-4.4.121-92.135.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-extra-4.4.121-92.135.1.ppc64le", "product": { "name": "kernel-debug-extra-4.4.121-92.135.1.ppc64le", "product_id": "kernel-debug-extra-4.4.121-92.135.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-kgraft-4.4.121-92.135.1.ppc64le", "product": { "name": "kernel-debug-kgraft-4.4.121-92.135.1.ppc64le", "product_id": "kernel-debug-kgraft-4.4.121-92.135.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-4.4.121-92.135.1.ppc64le", "product": { "name": "kernel-default-4.4.121-92.135.1.ppc64le", "product_id": "kernel-default-4.4.121-92.135.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-base-4.4.121-92.135.1.ppc64le", "product": { "name": "kernel-default-base-4.4.121-92.135.1.ppc64le", "product_id": "kernel-default-base-4.4.121-92.135.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-devel-4.4.121-92.135.1.ppc64le", "product": { "name": "kernel-default-devel-4.4.121-92.135.1.ppc64le", "product_id": "kernel-default-devel-4.4.121-92.135.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-extra-4.4.121-92.135.1.ppc64le", "product": { "name": "kernel-default-extra-4.4.121-92.135.1.ppc64le", "product_id": "kernel-default-extra-4.4.121-92.135.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.4.121-92.135.1.ppc64le", "product": { "name": "kernel-default-kgraft-4.4.121-92.135.1.ppc64le", "product_id": "kernel-default-kgraft-4.4.121-92.135.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-build-4.4.121-92.135.1.ppc64le", "product": { "name": "kernel-obs-build-4.4.121-92.135.1.ppc64le", "product_id": "kernel-obs-build-4.4.121-92.135.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-qa-4.4.121-92.135.1.ppc64le", "product": { "name": "kernel-obs-qa-4.4.121-92.135.1.ppc64le", "product_id": "kernel-obs-qa-4.4.121-92.135.1.ppc64le" } }, { "category": "product_version", "name": "kernel-syms-4.4.121-92.135.1.ppc64le", "product": { "name": "kernel-syms-4.4.121-92.135.1.ppc64le", "product_id": "kernel-syms-4.4.121-92.135.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-4.4.121-92.135.1.ppc64le", "product": { "name": "kernel-vanilla-4.4.121-92.135.1.ppc64le", "product_id": "kernel-vanilla-4.4.121-92.135.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.4.121-92.135.1.ppc64le", "product": { "name": "kernel-vanilla-base-4.4.121-92.135.1.ppc64le", "product_id": "kernel-vanilla-base-4.4.121-92.135.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.4.121-92.135.1.ppc64le", "product": { "name": "kernel-vanilla-devel-4.4.121-92.135.1.ppc64le", "product_id": "kernel-vanilla-devel-4.4.121-92.135.1.ppc64le" } }, { "category": "product_version", "name": "kgraft-patch-4_4_121-92_135-default-1-3.5.1.ppc64le", "product": { "name": "kgraft-patch-4_4_121-92_135-default-1-3.5.1.ppc64le", "product_id": "kgraft-patch-4_4_121-92_135-default-1-3.5.1.ppc64le" } }, { "category": "product_version", "name": "ocfs2-kmp-debug-4.4.121-92.135.1.ppc64le", "product": { "name": "ocfs2-kmp-debug-4.4.121-92.135.1.ppc64le", "product_id": "ocfs2-kmp-debug-4.4.121-92.135.1.ppc64le" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.4.121-92.135.1.ppc64le", "product": { "name": "ocfs2-kmp-default-4.4.121-92.135.1.ppc64le", "product_id": "ocfs2-kmp-default-4.4.121-92.135.1.ppc64le" } }, { "category": "product_version", "name": "ocfs2-kmp-vanilla-4.4.121-92.135.1.ppc64le", "product": { "name": "ocfs2-kmp-vanilla-4.4.121-92.135.1.ppc64le", "product_id": "ocfs2-kmp-vanilla-4.4.121-92.135.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.4.121-92.135.1.s390x", "product": { "name": "cluster-md-kmp-default-4.4.121-92.135.1.s390x", "product_id": "cluster-md-kmp-default-4.4.121-92.135.1.s390x" } }, { "category": "product_version", "name": "cluster-md-kmp-vanilla-4.4.121-92.135.1.s390x", "product": { "name": "cluster-md-kmp-vanilla-4.4.121-92.135.1.s390x", "product_id": "cluster-md-kmp-vanilla-4.4.121-92.135.1.s390x" } }, { "category": "product_version", "name": "cluster-network-kmp-default-4.4.121-92.135.1.s390x", "product": { "name": "cluster-network-kmp-default-4.4.121-92.135.1.s390x", "product_id": "cluster-network-kmp-default-4.4.121-92.135.1.s390x" } }, { "category": "product_version", "name": "cluster-network-kmp-vanilla-4.4.121-92.135.1.s390x", "product": { "name": "cluster-network-kmp-vanilla-4.4.121-92.135.1.s390x", "product_id": "cluster-network-kmp-vanilla-4.4.121-92.135.1.s390x" } }, { "category": "product_version", "name": "dlm-kmp-default-4.4.121-92.135.1.s390x", "product": { "name": "dlm-kmp-default-4.4.121-92.135.1.s390x", "product_id": "dlm-kmp-default-4.4.121-92.135.1.s390x" } }, { "category": "product_version", "name": "dlm-kmp-vanilla-4.4.121-92.135.1.s390x", "product": { "name": "dlm-kmp-vanilla-4.4.121-92.135.1.s390x", "product_id": "dlm-kmp-vanilla-4.4.121-92.135.1.s390x" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.4.121-92.135.1.s390x", "product": { "name": "gfs2-kmp-default-4.4.121-92.135.1.s390x", "product_id": "gfs2-kmp-default-4.4.121-92.135.1.s390x" } }, { "category": "product_version", "name": "gfs2-kmp-vanilla-4.4.121-92.135.1.s390x", "product": { "name": "gfs2-kmp-vanilla-4.4.121-92.135.1.s390x", "product_id": "gfs2-kmp-vanilla-4.4.121-92.135.1.s390x" } }, { "category": "product_version", "name": "kernel-default-4.4.121-92.135.1.s390x", "product": { "name": "kernel-default-4.4.121-92.135.1.s390x", "product_id": "kernel-default-4.4.121-92.135.1.s390x" } }, { "category": "product_version", "name": "kernel-default-base-4.4.121-92.135.1.s390x", "product": { "name": "kernel-default-base-4.4.121-92.135.1.s390x", "product_id": "kernel-default-base-4.4.121-92.135.1.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-4.4.121-92.135.1.s390x", "product": { "name": "kernel-default-devel-4.4.121-92.135.1.s390x", "product_id": "kernel-default-devel-4.4.121-92.135.1.s390x" } }, { "category": "product_version", "name": "kernel-default-extra-4.4.121-92.135.1.s390x", "product": { "name": "kernel-default-extra-4.4.121-92.135.1.s390x", "product_id": "kernel-default-extra-4.4.121-92.135.1.s390x" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.4.121-92.135.1.s390x", "product": { "name": "kernel-default-kgraft-4.4.121-92.135.1.s390x", "product_id": "kernel-default-kgraft-4.4.121-92.135.1.s390x" } }, { "category": "product_version", "name": "kernel-default-man-4.4.121-92.135.1.s390x", "product": { "name": "kernel-default-man-4.4.121-92.135.1.s390x", "product_id": "kernel-default-man-4.4.121-92.135.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-build-4.4.121-92.135.1.s390x", "product": { "name": "kernel-obs-build-4.4.121-92.135.1.s390x", "product_id": "kernel-obs-build-4.4.121-92.135.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-qa-4.4.121-92.135.1.s390x", "product": { "name": "kernel-obs-qa-4.4.121-92.135.1.s390x", "product_id": "kernel-obs-qa-4.4.121-92.135.1.s390x" } }, { "category": "product_version", "name": "kernel-syms-4.4.121-92.135.1.s390x", "product": { "name": "kernel-syms-4.4.121-92.135.1.s390x", "product_id": "kernel-syms-4.4.121-92.135.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-4.4.121-92.135.1.s390x", "product": { "name": "kernel-vanilla-4.4.121-92.135.1.s390x", "product_id": "kernel-vanilla-4.4.121-92.135.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.4.121-92.135.1.s390x", "product": { "name": "kernel-vanilla-base-4.4.121-92.135.1.s390x", "product_id": "kernel-vanilla-base-4.4.121-92.135.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.4.121-92.135.1.s390x", "product": { "name": "kernel-vanilla-devel-4.4.121-92.135.1.s390x", "product_id": "kernel-vanilla-devel-4.4.121-92.135.1.s390x" } }, { "category": "product_version", "name": "kernel-zfcpdump-4.4.121-92.135.1.s390x", "product": { "name": "kernel-zfcpdump-4.4.121-92.135.1.s390x", "product_id": "kernel-zfcpdump-4.4.121-92.135.1.s390x" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.4.121-92.135.1.s390x", "product": { "name": "ocfs2-kmp-default-4.4.121-92.135.1.s390x", "product_id": "ocfs2-kmp-default-4.4.121-92.135.1.s390x" } }, { "category": "product_version", "name": "ocfs2-kmp-vanilla-4.4.121-92.135.1.s390x", "product": { "name": "ocfs2-kmp-vanilla-4.4.121-92.135.1.s390x", "product_id": "ocfs2-kmp-vanilla-4.4.121-92.135.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-debug-4.4.121-92.135.1.x86_64", "product": { "name": "cluster-md-kmp-debug-4.4.121-92.135.1.x86_64", "product_id": "cluster-md-kmp-debug-4.4.121-92.135.1.x86_64" } }, { "category": "product_version", "name": "cluster-md-kmp-default-4.4.121-92.135.1.x86_64", "product": { "name": "cluster-md-kmp-default-4.4.121-92.135.1.x86_64", "product_id": "cluster-md-kmp-default-4.4.121-92.135.1.x86_64" } }, { "category": "product_version", "name": "cluster-md-kmp-vanilla-4.4.121-92.135.1.x86_64", "product": { "name": "cluster-md-kmp-vanilla-4.4.121-92.135.1.x86_64", "product_id": "cluster-md-kmp-vanilla-4.4.121-92.135.1.x86_64" } }, { "category": "product_version", "name": "cluster-network-kmp-debug-4.4.121-92.135.1.x86_64", "product": { "name": "cluster-network-kmp-debug-4.4.121-92.135.1.x86_64", "product_id": "cluster-network-kmp-debug-4.4.121-92.135.1.x86_64" } }, { "category": "product_version", "name": "cluster-network-kmp-default-4.4.121-92.135.1.x86_64", "product": { "name": "cluster-network-kmp-default-4.4.121-92.135.1.x86_64", "product_id": "cluster-network-kmp-default-4.4.121-92.135.1.x86_64" } }, { "category": "product_version", "name": "cluster-network-kmp-vanilla-4.4.121-92.135.1.x86_64", "product": { "name": "cluster-network-kmp-vanilla-4.4.121-92.135.1.x86_64", "product_id": "cluster-network-kmp-vanilla-4.4.121-92.135.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-debug-4.4.121-92.135.1.x86_64", "product": { "name": "dlm-kmp-debug-4.4.121-92.135.1.x86_64", "product_id": "dlm-kmp-debug-4.4.121-92.135.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-default-4.4.121-92.135.1.x86_64", "product": { "name": "dlm-kmp-default-4.4.121-92.135.1.x86_64", "product_id": "dlm-kmp-default-4.4.121-92.135.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-vanilla-4.4.121-92.135.1.x86_64", "product": { "name": "dlm-kmp-vanilla-4.4.121-92.135.1.x86_64", "product_id": "dlm-kmp-vanilla-4.4.121-92.135.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-debug-4.4.121-92.135.1.x86_64", "product": { "name": "gfs2-kmp-debug-4.4.121-92.135.1.x86_64", "product_id": "gfs2-kmp-debug-4.4.121-92.135.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.4.121-92.135.1.x86_64", "product": { "name": "gfs2-kmp-default-4.4.121-92.135.1.x86_64", "product_id": "gfs2-kmp-default-4.4.121-92.135.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-vanilla-4.4.121-92.135.1.x86_64", "product": { "name": "gfs2-kmp-vanilla-4.4.121-92.135.1.x86_64", "product_id": "gfs2-kmp-vanilla-4.4.121-92.135.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-4.4.121-92.135.1.x86_64", "product": { "name": "kernel-debug-4.4.121-92.135.1.x86_64", "product_id": "kernel-debug-4.4.121-92.135.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-base-4.4.121-92.135.1.x86_64", "product": { "name": "kernel-debug-base-4.4.121-92.135.1.x86_64", "product_id": "kernel-debug-base-4.4.121-92.135.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-devel-4.4.121-92.135.1.x86_64", "product": { "name": "kernel-debug-devel-4.4.121-92.135.1.x86_64", "product_id": "kernel-debug-devel-4.4.121-92.135.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-extra-4.4.121-92.135.1.x86_64", "product": { "name": "kernel-debug-extra-4.4.121-92.135.1.x86_64", "product_id": "kernel-debug-extra-4.4.121-92.135.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-kgraft-4.4.121-92.135.1.x86_64", "product": { "name": "kernel-debug-kgraft-4.4.121-92.135.1.x86_64", "product_id": "kernel-debug-kgraft-4.4.121-92.135.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-4.4.121-92.135.1.x86_64", "product": { "name": "kernel-default-4.4.121-92.135.1.x86_64", "product_id": "kernel-default-4.4.121-92.135.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-4.4.121-92.135.1.x86_64", "product": { "name": "kernel-default-base-4.4.121-92.135.1.x86_64", "product_id": "kernel-default-base-4.4.121-92.135.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-4.4.121-92.135.1.x86_64", "product": { "name": "kernel-default-devel-4.4.121-92.135.1.x86_64", "product_id": "kernel-default-devel-4.4.121-92.135.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-extra-4.4.121-92.135.1.x86_64", "product": { "name": "kernel-default-extra-4.4.121-92.135.1.x86_64", "product_id": "kernel-default-extra-4.4.121-92.135.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.4.121-92.135.1.x86_64", "product": { "name": "kernel-default-kgraft-4.4.121-92.135.1.x86_64", "product_id": "kernel-default-kgraft-4.4.121-92.135.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-build-4.4.121-92.135.1.x86_64", "product": { "name": "kernel-obs-build-4.4.121-92.135.1.x86_64", "product_id": "kernel-obs-build-4.4.121-92.135.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-qa-4.4.121-92.135.1.x86_64", "product": { "name": "kernel-obs-qa-4.4.121-92.135.1.x86_64", "product_id": "kernel-obs-qa-4.4.121-92.135.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-4.4.121-92.135.1.x86_64", "product": { "name": "kernel-syms-4.4.121-92.135.1.x86_64", "product_id": "kernel-syms-4.4.121-92.135.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-4.4.121-92.135.1.x86_64", "product": { "name": "kernel-vanilla-4.4.121-92.135.1.x86_64", "product_id": "kernel-vanilla-4.4.121-92.135.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.4.121-92.135.1.x86_64", "product": { "name": "kernel-vanilla-base-4.4.121-92.135.1.x86_64", "product_id": "kernel-vanilla-base-4.4.121-92.135.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.4.121-92.135.1.x86_64", "product": { "name": "kernel-vanilla-devel-4.4.121-92.135.1.x86_64", "product_id": "kernel-vanilla-devel-4.4.121-92.135.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-4_4_121-92_135-default-1-3.5.1.x86_64", "product": { "name": "kgraft-patch-4_4_121-92_135-default-1-3.5.1.x86_64", "product_id": "kgraft-patch-4_4_121-92_135-default-1-3.5.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-debug-4.4.121-92.135.1.x86_64", "product": { "name": "ocfs2-kmp-debug-4.4.121-92.135.1.x86_64", "product_id": "ocfs2-kmp-debug-4.4.121-92.135.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.4.121-92.135.1.x86_64", "product": { "name": "ocfs2-kmp-default-4.4.121-92.135.1.x86_64", "product_id": "ocfs2-kmp-default-4.4.121-92.135.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-vanilla-4.4.121-92.135.1.x86_64", "product": { "name": "ocfs2-kmp-vanilla-4.4.121-92.135.1.x86_64", "product_id": "ocfs2-kmp-vanilla-4.4.121-92.135.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE OpenStack Cloud 7", "product": { "name": "SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-openstack-cloud:7" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Availability Extension 12 SP2", "product": { "name": "SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-ha:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP2-BCL", "product": { "name": "SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-bcl:12:sp2" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.121-92.135.1.s390x as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.135.1.s390x" }, "product_reference": "kernel-default-4.4.121-92.135.1.s390x", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.121-92.135.1.x86_64 as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.135.1.x86_64" }, "product_reference": "kernel-default-4.4.121-92.135.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.121-92.135.1.s390x as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.135.1.s390x" }, "product_reference": "kernel-default-base-4.4.121-92.135.1.s390x", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.121-92.135.1.x86_64 as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.135.1.x86_64" }, "product_reference": "kernel-default-base-4.4.121-92.135.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.121-92.135.1.s390x as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.135.1.s390x" }, "product_reference": "kernel-default-devel-4.4.121-92.135.1.s390x", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.121-92.135.1.x86_64 as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.135.1.x86_64" }, "product_reference": "kernel-default-devel-4.4.121-92.135.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-4.4.121-92.135.1.s390x as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.135.1.s390x" }, "product_reference": "kernel-default-man-4.4.121-92.135.1.s390x", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.4.121-92.135.1.noarch as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.135.1.noarch" }, "product_reference": "kernel-devel-4.4.121-92.135.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.4.121-92.135.1.noarch as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.135.1.noarch" }, "product_reference": "kernel-macros-4.4.121-92.135.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.4.121-92.135.1.noarch as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.135.1.noarch" }, "product_reference": "kernel-source-4.4.121-92.135.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.121-92.135.1.s390x as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.135.1.s390x" }, "product_reference": "kernel-syms-4.4.121-92.135.1.s390x", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.121-92.135.1.x86_64 as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.135.1.x86_64" }, "product_reference": "kernel-syms-4.4.121-92.135.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_121-92_135-default-1-3.5.1.x86_64 as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_135-default-1-3.5.1.x86_64" }, "product_reference": "kgraft-patch-4_4_121-92_135-default-1-3.5.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.4.121-92.135.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.135.1.ppc64le" }, "product_reference": "cluster-md-kmp-default-4.4.121-92.135.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.4.121-92.135.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.135.1.s390x" }, "product_reference": "cluster-md-kmp-default-4.4.121-92.135.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.4.121-92.135.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.135.1.x86_64" }, "product_reference": "cluster-md-kmp-default-4.4.121-92.135.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-network-kmp-default-4.4.121-92.135.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.135.1.ppc64le" }, "product_reference": "cluster-network-kmp-default-4.4.121-92.135.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-network-kmp-default-4.4.121-92.135.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.135.1.s390x" }, "product_reference": "cluster-network-kmp-default-4.4.121-92.135.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-network-kmp-default-4.4.121-92.135.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.135.1.x86_64" }, "product_reference": "cluster-network-kmp-default-4.4.121-92.135.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.4.121-92.135.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.135.1.ppc64le" }, "product_reference": "dlm-kmp-default-4.4.121-92.135.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.4.121-92.135.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.135.1.s390x" }, "product_reference": "dlm-kmp-default-4.4.121-92.135.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.4.121-92.135.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.135.1.x86_64" }, "product_reference": "dlm-kmp-default-4.4.121-92.135.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.4.121-92.135.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.135.1.ppc64le" }, "product_reference": "gfs2-kmp-default-4.4.121-92.135.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.4.121-92.135.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.135.1.s390x" }, "product_reference": "gfs2-kmp-default-4.4.121-92.135.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.4.121-92.135.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.135.1.x86_64" }, "product_reference": "gfs2-kmp-default-4.4.121-92.135.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.4.121-92.135.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.135.1.ppc64le" }, "product_reference": "ocfs2-kmp-default-4.4.121-92.135.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.4.121-92.135.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.135.1.s390x" }, "product_reference": "ocfs2-kmp-default-4.4.121-92.135.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.4.121-92.135.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.135.1.x86_64" }, "product_reference": "ocfs2-kmp-default-4.4.121-92.135.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.121-92.135.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.135.1.ppc64le" }, "product_reference": "kernel-default-4.4.121-92.135.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.121-92.135.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.135.1.x86_64" }, "product_reference": "kernel-default-4.4.121-92.135.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.121-92.135.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.135.1.ppc64le" }, "product_reference": "kernel-default-base-4.4.121-92.135.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.121-92.135.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.135.1.x86_64" }, "product_reference": "kernel-default-base-4.4.121-92.135.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.121-92.135.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.135.1.ppc64le" }, "product_reference": "kernel-default-devel-4.4.121-92.135.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.121-92.135.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.135.1.x86_64" }, "product_reference": "kernel-default-devel-4.4.121-92.135.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.4.121-92.135.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.135.1.noarch" }, "product_reference": "kernel-devel-4.4.121-92.135.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.4.121-92.135.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.135.1.noarch" }, "product_reference": "kernel-macros-4.4.121-92.135.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.4.121-92.135.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.135.1.noarch" }, "product_reference": "kernel-source-4.4.121-92.135.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.121-92.135.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.135.1.ppc64le" }, "product_reference": "kernel-syms-4.4.121-92.135.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.121-92.135.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.135.1.x86_64" }, "product_reference": "kernel-syms-4.4.121-92.135.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_121-92_135-default-1-3.5.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_135-default-1-3.5.1.ppc64le" }, "product_reference": "kgraft-patch-4_4_121-92_135-default-1-3.5.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_121-92_135-default-1-3.5.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_135-default-1-3.5.1.x86_64" }, "product_reference": "kgraft-patch-4_4_121-92_135-default-1-3.5.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.121-92.135.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.135.1.ppc64le" }, "product_reference": "kernel-default-4.4.121-92.135.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.121-92.135.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.135.1.s390x" }, "product_reference": "kernel-default-4.4.121-92.135.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.121-92.135.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.135.1.x86_64" }, "product_reference": "kernel-default-4.4.121-92.135.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.121-92.135.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.135.1.ppc64le" }, "product_reference": "kernel-default-base-4.4.121-92.135.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.121-92.135.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.135.1.s390x" }, "product_reference": "kernel-default-base-4.4.121-92.135.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.121-92.135.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.135.1.x86_64" }, "product_reference": "kernel-default-base-4.4.121-92.135.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.121-92.135.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.135.1.ppc64le" }, "product_reference": "kernel-default-devel-4.4.121-92.135.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.121-92.135.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.135.1.s390x" }, "product_reference": "kernel-default-devel-4.4.121-92.135.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.121-92.135.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.135.1.x86_64" }, "product_reference": "kernel-default-devel-4.4.121-92.135.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-4.4.121-92.135.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.135.1.s390x" }, "product_reference": "kernel-default-man-4.4.121-92.135.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.4.121-92.135.1.noarch as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.135.1.noarch" }, "product_reference": "kernel-devel-4.4.121-92.135.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.4.121-92.135.1.noarch as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.135.1.noarch" }, "product_reference": "kernel-macros-4.4.121-92.135.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.4.121-92.135.1.noarch as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.135.1.noarch" }, "product_reference": "kernel-source-4.4.121-92.135.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.121-92.135.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.135.1.ppc64le" }, "product_reference": "kernel-syms-4.4.121-92.135.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.121-92.135.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.135.1.s390x" }, "product_reference": "kernel-syms-4.4.121-92.135.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.121-92.135.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.135.1.x86_64" }, "product_reference": "kernel-syms-4.4.121-92.135.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_121-92_135-default-1-3.5.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_135-default-1-3.5.1.ppc64le" }, "product_reference": "kgraft-patch-4_4_121-92_135-default-1-3.5.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_121-92_135-default-1-3.5.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_135-default-1-3.5.1.x86_64" }, "product_reference": "kgraft-patch-4_4_121-92_135-default-1-3.5.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.121-92.135.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.135.1.x86_64" }, "product_reference": "kernel-default-4.4.121-92.135.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.121-92.135.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.135.1.x86_64" }, "product_reference": "kernel-default-base-4.4.121-92.135.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.121-92.135.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.135.1.x86_64" }, "product_reference": "kernel-default-devel-4.4.121-92.135.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.4.121-92.135.1.noarch as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.135.1.noarch" }, "product_reference": "kernel-devel-4.4.121-92.135.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.4.121-92.135.1.noarch as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.135.1.noarch" }, "product_reference": "kernel-macros-4.4.121-92.135.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.4.121-92.135.1.noarch as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.135.1.noarch" }, "product_reference": "kernel-source-4.4.121-92.135.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.121-92.135.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.135.1.x86_64" }, "product_reference": "kernel-syms-4.4.121-92.135.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-0543", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-0543" } ], "notes": [ { "category": "general", "text": "Incomplete cleanup from specific special register read operations in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.135.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.135.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.135.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.135.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.135.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.135.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_135-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_135-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_135-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_135-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.135.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.135.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.135.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.135.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.135.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.135.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.135.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.135.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.135.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.135.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.135.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.135.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_135-default-1-3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-0543", "url": "https://www.suse.com/security/cve/CVE-2020-0543" }, { "category": "external", "summary": "SUSE Bug 1154824 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1154824" }, { "category": "external", "summary": "SUSE Bug 1172205 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172205" }, { "category": "external", "summary": "SUSE Bug 1172206 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172206" }, { "category": "external", "summary": "SUSE Bug 1172207 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172207" }, { "category": "external", "summary": "SUSE Bug 1172770 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172770" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.135.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.135.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.135.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.135.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.135.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.135.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_135-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_135-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_135-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_135-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.135.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.135.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.135.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.135.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.135.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.135.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.135.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.135.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.135.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.135.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.135.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.135.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_135-default-1-3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.135.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.135.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.135.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.135.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.135.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.135.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_135-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_135-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_135-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_135-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.135.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.135.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.135.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.135.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.135.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.135.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.135.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.135.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.135.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.135.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.135.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.135.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_135-default-1-3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-10T08:31:49Z", "details": "moderate" } ], "title": "CVE-2020-0543" }, { "cve": "CVE-2020-10757", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10757" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux Kernel in versions after 4.5-rc1 in the way mremap handled DAX Huge Pages. This flaw allows a local attacker with access to a DAX enabled storage to escalate their privileges on the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.135.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.135.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.135.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.135.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.135.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.135.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_135-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_135-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_135-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_135-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.135.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.135.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.135.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.135.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.135.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.135.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.135.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.135.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.135.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.135.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.135.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.135.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_135-default-1-3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10757", "url": "https://www.suse.com/security/cve/CVE-2020-10757" }, { "category": "external", "summary": "SUSE Bug 1159281 for CVE-2020-10757", "url": "https://bugzilla.suse.com/1159281" }, { "category": "external", "summary": "SUSE Bug 1172317 for CVE-2020-10757", "url": "https://bugzilla.suse.com/1172317" }, { "category": "external", "summary": "SUSE Bug 1172437 for CVE-2020-10757", "url": "https://bugzilla.suse.com/1172437" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.135.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.135.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.135.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.135.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.135.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.135.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_135-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_135-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_135-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_135-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.135.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.135.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.135.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.135.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.135.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.135.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.135.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.135.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.135.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.135.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.135.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.135.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_135-default-1-3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.135.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.135.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.135.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.135.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.135.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.135.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_135-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_135-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_135-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_135-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.135.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.135.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.135.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.135.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.135.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.135.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.135.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.135.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.135.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.135.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.135.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.135.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_135-default-1-3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-10T08:31:49Z", "details": "important" } ], "title": "CVE-2020-10757" }, { "cve": "CVE-2020-12114", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12114" } ], "notes": [ { "category": "general", "text": "A pivot_root race condition in fs/namespace.c in the Linux kernel 4.4.x before 4.4.221, 4.9.x before 4.9.221, 4.14.x before 4.14.178, 4.19.x before 4.19.119, and 5.x before 5.3 allows local users to cause a denial of service (panic) by corrupting a mountpoint reference counter.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.135.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.135.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.135.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.135.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.135.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.135.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_135-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_135-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_135-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_135-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.135.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.135.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.135.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.135.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.135.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.135.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.135.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.135.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.135.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.135.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.135.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.135.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_135-default-1-3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12114", "url": "https://www.suse.com/security/cve/CVE-2020-12114" }, { "category": "external", "summary": "SUSE Bug 1171098 for CVE-2020-12114", "url": "https://bugzilla.suse.com/1171098" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.135.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.135.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.135.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.135.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.135.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.135.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_135-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_135-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_135-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_135-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.135.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.135.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.135.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.135.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.135.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.135.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.135.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.135.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.135.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.135.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.135.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.135.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_135-default-1-3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.135.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.135.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.135.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.135.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.135.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.135.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_135-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_135-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_135-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_135-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.135.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.135.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.135.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.135.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.135.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.135.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.135.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.135.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.135.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.135.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.135.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.135.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_135-default-1-3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-10T08:31:49Z", "details": "moderate" } ], "title": "CVE-2020-12114" }, { "cve": "CVE-2020-12652", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12652" } ], "notes": [ { "category": "general", "text": "The __mptctl_ioctl function in drivers/message/fusion/mptctl.c in the Linux kernel before 5.4.14 allows local users to hold an incorrect lock during the ioctl operation and trigger a race condition, i.e., a \"double fetch\" vulnerability, aka CID-28d76df18f0a. NOTE: the vendor states \"The security impact of this bug is not as bad as it could have been because these operations are all privileged and root already has enormous destructive power.\"", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.135.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.135.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.135.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.135.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.135.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.135.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_135-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_135-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_135-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_135-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.135.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.135.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.135.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.135.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.135.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.135.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.135.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.135.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.135.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.135.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.135.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.135.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_135-default-1-3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12652", "url": "https://www.suse.com/security/cve/CVE-2020-12652" }, { "category": "external", "summary": "SUSE Bug 1171218 for CVE-2020-12652", "url": "https://bugzilla.suse.com/1171218" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.135.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.135.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.135.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.135.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.135.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.135.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_135-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_135-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_135-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_135-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.135.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.135.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.135.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.135.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.135.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.135.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.135.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.135.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.135.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.135.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.135.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.135.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_135-default-1-3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.135.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.135.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.135.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.135.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.135.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.135.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_135-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_135-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_135-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_135-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.135.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.135.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.135.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.135.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.135.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.135.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.135.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.135.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.135.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.135.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.135.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.135.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_135-default-1-3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-10T08:31:49Z", "details": "moderate" } ], "title": "CVE-2020-12652" }, { "cve": "CVE-2020-12653", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12653" } ], "notes": [ { "category": "general", "text": "An issue was found in Linux kernel before 5.5.4. The mwifiex_cmd_append_vsie_tlv() function in drivers/net/wireless/marvell/mwifiex/scan.c allows local users to gain privileges or cause a denial of service because of an incorrect memcpy and buffer overflow, aka CID-b70261a288ea.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.135.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.135.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.135.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.135.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.135.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.135.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_135-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_135-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_135-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_135-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.135.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.135.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.135.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.135.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.135.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.135.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.135.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.135.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.135.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.135.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.135.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.135.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_135-default-1-3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12653", "url": "https://www.suse.com/security/cve/CVE-2020-12653" }, { "category": "external", "summary": "SUSE Bug 1159281 for CVE-2020-12653", "url": "https://bugzilla.suse.com/1159281" }, { "category": "external", "summary": "SUSE Bug 1171195 for CVE-2020-12653", "url": "https://bugzilla.suse.com/1171195" }, { "category": "external", "summary": "SUSE Bug 1171254 for CVE-2020-12653", "url": "https://bugzilla.suse.com/1171254" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.135.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.135.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.135.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.135.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.135.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.135.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_135-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_135-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_135-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_135-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.135.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.135.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.135.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.135.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.135.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.135.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.135.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.135.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.135.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.135.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.135.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.135.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_135-default-1-3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.135.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.135.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.135.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.135.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.135.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.135.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_135-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_135-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_135-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_135-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.135.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.135.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.135.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.135.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.135.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.135.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.135.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.135.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.135.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.135.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.135.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.135.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_135-default-1-3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-10T08:31:49Z", "details": "important" } ], "title": "CVE-2020-12653" }, { "cve": "CVE-2020-12654", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12654" } ], "notes": [ { "category": "general", "text": "An issue was found in Linux kernel before 5.5.4. mwifiex_ret_wmm_get_status() in drivers/net/wireless/marvell/mwifiex/wmm.c allows a remote AP to trigger a heap-based buffer overflow because of an incorrect memcpy, aka CID-3a9b153c5591.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.135.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.135.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.135.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.135.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.135.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.135.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_135-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_135-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_135-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_135-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.135.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.135.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.135.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.135.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.135.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.135.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.135.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.135.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.135.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.135.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.135.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.135.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_135-default-1-3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12654", "url": "https://www.suse.com/security/cve/CVE-2020-12654" }, { "category": "external", "summary": "SUSE Bug 1159281 for CVE-2020-12654", "url": "https://bugzilla.suse.com/1159281" }, { "category": "external", "summary": "SUSE Bug 1171202 for CVE-2020-12654", "url": "https://bugzilla.suse.com/1171202" }, { "category": "external", "summary": "SUSE Bug 1171252 for CVE-2020-12654", "url": "https://bugzilla.suse.com/1171252" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.135.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.135.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.135.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.135.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.135.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.135.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_135-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_135-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_135-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_135-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.135.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.135.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.135.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.135.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.135.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.135.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.135.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.135.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.135.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.135.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.135.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.135.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_135-default-1-3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.135.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.135.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.135.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.135.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.135.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.135.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_135-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_135-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_135-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_135-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.135.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.135.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.135.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.135.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.135.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.135.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.135.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.135.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.135.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.135.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.135.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.135.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_135-default-1-3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-10T08:31:49Z", "details": "important" } ], "title": "CVE-2020-12654" }, { "cve": "CVE-2020-12656", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12656" } ], "notes": [ { "category": "general", "text": "gss_mech_free in net/sunrpc/auth_gss/gss_mech_switch.c in the rpcsec_gss_krb5 implementation in the Linux kernel through 5.6.10 lacks certain domain_release calls, leading to a memory leak. Note: This was disputed with the assertion that the issue does not grant any access not already available. It is a problem that on unloading a specific kernel module some memory is leaked, but loading kernel modules is a privileged operation. A user could also write a kernel module to consume any amount of memory they like and load that replicating the effect of this bug", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.135.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.135.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.135.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.135.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.135.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.135.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_135-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_135-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_135-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_135-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.135.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.135.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.135.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.135.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.135.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.135.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.135.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.135.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.135.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.135.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.135.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.135.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_135-default-1-3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12656", "url": "https://www.suse.com/security/cve/CVE-2020-12656" }, { "category": "external", "summary": "SUSE Bug 1171219 for CVE-2020-12656", "url": "https://bugzilla.suse.com/1171219" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.135.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.135.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.135.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.135.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.135.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.135.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_135-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_135-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_135-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_135-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.135.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.135.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.135.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.135.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.135.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.135.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.135.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.135.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.135.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.135.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.135.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.135.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_135-default-1-3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.9, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.135.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.135.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.135.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.135.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.135.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.135.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.135.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_135-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_135-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.135.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.135.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.135.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_135-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_135-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.135.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.135.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.135.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.135.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.135.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.135.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.135.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.135.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.135.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.135.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.135.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.135.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_135-default-1-3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-10T08:31:49Z", "details": "low" } ], "title": "CVE-2020-12656" } ] }
suse-su-2020:1604-1
Vulnerability from csaf_suse
Published
2020-06-10 13:29
Modified
2020-06-10 13:29
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 15 SP1 azure kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2020-0543: Fixed a side channel attack against special registers which could have resulted in leaking of read values to cores other than the one which called it.
This attack is known as Special Register Buffer Data Sampling (SRBDS) or 'CrossTalk' (bsc#1154824).
- CVE-2020-13143: Fixed an out-of-bounds read in gadget_dev_desc_UDC_store in drivers/usb/gadget/configfs.c (bsc#1171982).
- CVE-2020-12769: Fixed an issue which could have allowed attackers to cause a panic via concurrent calls to dw_spi_irq and dw_spi_transfer_one (bsc#1171983).
- CVE-2020-12768: Fixed a memory leak in svm_cpu_uninit in arch/x86/kvm/svm.c (bsc#1171736).
- CVE-2020-12659: Fixed an out-of-bounds write (by a user with the CAP_NET_ADMIN capability) due to improper headroom validation (bsc#1171214).
- CVE-2020-12657: An a use-after-free in block/bfq-iosched.c (bsc#1171205).
- CVE-2020-12656: Fixed an improper handling of certain domain_release calls leadingch could have led to a memory leak (bsc#1171219).
- CVE-2020-12655: Fixed an issue which could have allowed attackers to trigger a sync of excessive duration via an XFS v5 image with crafted metadata (bsc#1171217).
- CVE-2020-12654: Fixed an issue in he wifi driver which could have allowed a remote AP to trigger a heap-based buffer overflow (bsc#1171202).
- CVE-2020-12653: Fixed an issue in the wifi driver which could have allowed local users to gain privileges or cause a denial of service (bsc#1171195).
- CVE-2020-12652: Fixed an issue which could have allowed local users to hold an incorrect lock during the ioctl operation and trigger a race condition (bsc#1171218).
- CVE-2020-12464: Fixed a use-after-free due to a transfer without a reference (bsc#1170901).
- CVE-2020-12114: Fixed a pivot_root race condition which could have allowed local users to cause a denial of service (panic) by corrupting a mountpoint reference counter (bsc#1171098).
- CVE-2020-10757: Fixed an issue where remaping hugepage DAX to anon mmap could have caused user PTE access (bsc#1172317).
- CVE-2020-10751: Fixed an improper implementation in SELinux LSM hook where it was assumed that an skb would only contain a single netlink message (bsc#1171189).
- CVE-2020-10732: Fixed kernel data leak in userspace coredumps due to uninitialized data (bsc#1171220).
- CVE-2020-10720: Fixed a use-after-free read in napi_gro_frags() (bsc#1170778).
- CVE-2020-10711: Fixed a null pointer dereference in SELinux subsystem which could have allowed a remote network user to crash the kernel resulting in a denial of service (bsc#1171191).
- CVE-2020-10690: Fixed the race between the release of ptp_clock and cdev (bsc#1170056).
- CVE-2019-9455: Fixed a pointer leak due to a WARN_ON statement in a video driver. This could lead to local information disclosure with System execution privileges needed (bsc#1170345).
- CVE-2019-20812: Fixed an issue in prb_calc_retire_blk_tmo() which could have resulted in a denial of service (bsc#1172453).
- CVE-2019-20806: Fixed a null pointer dereference which may had lead to denial of service (bsc#1172199).
- CVE-2019-19462: Fixed an issue which could have allowed local user to cause denial of service (bsc#1158265).
- CVE-2018-1000199: Fixed a potential local code execution via ptrace (bsc#1089895).
The following non-security bugs were fixed:
- ACPI: CPPC: Fix reference count leak in acpi_cppc_processor_probe() (bsc#1051510).
- ACPI: sysfs: Fix reference count leak in acpi_sysfs_add_hotplug_profile() (bsc#1051510).
- acpi/x86: ignore unspecified bit positions in the ACPI global lock field (bsc#1051510).
- Add br_netfilter to kernel-default-base (bsc#1169020)
- Add commit for git-fix that's not a fix This commit cleans up debug code but does not fix anything, and it relies on a new kernel function that isn't yet in this version of SLE.
- agp/intel: Reinforce the barrier after GTT updates (bsc#1051510).
- ALSA: ctxfi: Remove unnecessary cast in kfree (bsc#1051510).
- ALSA: doc: Document PC Beep Hidden Register on Realtek ALC256 (bsc#1051510).
- ALSA: dummy: Fix PCM format loop in proc output (bsc#1111666).
- ALSA: hda: Add driver blacklist (bsc#1051510).
- ALSA: hda: Always use jackpoll helper for jack update after resume (bsc#1051510).
- ALSA: hda: call runtime_allow() for all hda controllers (bsc#1051510).
- ALSA: hda: Do not release card at firmware loading error (bsc#1051510).
- ALSA: hda: Explicitly permit using autosuspend if runtime PM is supported (bsc#1051510).
- ALSA: hda/hdmi: fix race in monitor detection during probe (bsc#1051510).
- ALSA: hda/hdmi: fix without unlocked before return (bsc#1051510).
- ALSA: hda: Honor PM disablement in PM freeze and thaw_noirq ops (bsc#1051510).
- ALSA: hda: Keep the controller initialization even if no codecs found (bsc#1051510).
- ALSA: hda: Match both PCI ID and SSID for driver blacklist (bsc#1111666).
- ALSA: hda/realtek - Add a model for Thinkpad T570 without DAC workaround (bsc#1172017).
- ALSA: hda/realtek - Add COEF workaround for ASUS ZenBook UX431DA (git-fixes).
- ALSA: hda/realtek - Add HP new mute led supported for ALC236 (git-fixes).
- ALSA: hda/realtek - Add more fixup entries for Clevo machines (git-fixes).
- ALSA: hda/realtek - Add new codec supported for ALC245 (bsc#1051510).
- ALSA: hda/realtek - Add new codec supported for ALC287 (git-fixes).
- ALSA: hda/realtek: Add quirk for Samsung Notebook (git-fixes).
- ALSA: hda/realtek - Add supported new mute Led for HP (git-fixes).
- ALSA: hda/realtek - Enable headset mic of ASUS GL503VM with ALC295 (git-fixes).
- ALSA: hda/realtek - Enable headset mic of ASUS UX550GE with ALC295 (git-fixes).
- ALSA: hda/realtek: Enable headset mic of ASUS UX581LV with ALC295 (git-fixes).
- ALSA: hda/realtek - Enable the headset mic on Asus FX505DT (bsc#1051510).
- ALSA: hda/realtek - Fix S3 pop noise on Dell Wyse (git-fixes).
- ALSA: hda/realtek - Fix silent output on Gigabyte X570 Aorus Xtreme (bsc#1111666).
- ALSA: hda/realtek - Fix unexpected init_amp override (bsc#1051510).
- ALSA: hda/realtek - Limit int mic boost for Thinkpad T530 (git-fixes bsc#1171293).
- ALSA: hda/realtek - Two front mics on a Lenovo ThinkCenter (bsc#1051510).
- ALSA: hda: Release resources at error in delayed probe (bsc#1051510).
- ALSA: hda: Remove ASUS ROG Zenith from the blacklist (bsc#1051510).
- ALSA: hda: Skip controller resume if not needed (bsc#1051510).
- ALSA: hwdep: fix a left shifting 1 by 31 UB bug (git-fixes).
- ALSA: iec1712: Initialize STDSP24 properly when using the model=staudio option (git-fixes).
- ALSA: opti9xx: shut up gcc-10 range warning (bsc#1051510).
- ALSA: pcm: fix incorrect hw_base increase (git-fixes).
- ALSA: pcm: oss: Place the plugin buffer overflow checks correctly (bsc#1170522).
- ALSA: rawmidi: Fix racy buffer resize under concurrent accesses (git-fixes).
- ALSA: usb-audio: Add connector notifier delegation (bsc#1051510).
- ALSA: usb-audio: Add control message quirk delay for Kingston HyperX headset (git-fixes).
- ALSA: usb-audio: add mapping for ASRock TRX40 Creator (git-fixes).
- ALSA: usb-audio: Add mixer workaround for TRX40 and co (bsc#1051510).
- ALSA: usb-audio: Add quirk for Focusrite Scarlett 2i2 (bsc#1051510).
- ALSA: usb-audio: Add static mapping table for ALC1220-VB-based mobos (bsc#1051510).
- ALSA: usb-audio: Apply async workaround for Scarlett 2i4 2nd gen (bsc#1051510).
- ALSA: usb-audio: Check mapping at creating connector controls, too (bsc#1051510).
- ALSA: usb-audio: Correct a typo of NuPrime DAC-10 USB ID (bsc#1051510).
- ALSA: usb-audio: Do not create jack controls for PCM terminals (bsc#1051510).
- ALSA: usb-audio: Do not override ignore_ctl_error value from the map (bsc#1051510).
- ALSA: usb-audio: Filter error from connector kctl ops, too (bsc#1051510).
- ALSA: usb-audio: Fix usb audio refcnt leak when getting spdif (bsc#1051510).
- ALSA: usb-audio: mixer: volume quirk for ESS Technology Asus USB DAC (git-fixes).
- ALSA: usb-audio: Quirks for Gigabyte TRX40 Aorus Master onboard audio (git-fixes).
- ALSA: usx2y: Fix potential NULL dereference (bsc#1051510).
- ASoC: codecs: hdac_hdmi: Fix incorrect use of list_for_each_entry (bsc#1051510).
- ASoC: dapm: connect virtual mux with default value (bsc#1051510).
- ASoC: dapm: fixup dapm kcontrol widget (bsc#1051510).
- ASoC: dpcm: allow start or stop during pause for backend (bsc#1051510).
- ASoC: fix regwmask (bsc#1051510).
- ASoC: msm8916-wcd-digital: Reset RX interpolation path after use (bsc#1051510).
- ASoC: samsung: Prevent clk_get_rate() calls in atomic context (bsc#1111666).
- ASoC: topology: Check return value of pcm_new_ver (bsc#1051510).
- ASoC: topology: use name_prefix for new kcontrol (bsc#1051510).
- b43legacy: Fix case where channel status is corrupted (bsc#1051510).
- batman-adv: fix batadv_nc_random_weight_tq (git-fixes).
- batman-adv: Fix refcnt leak in batadv_show_throughput_override (git-fixes).
- batman-adv: Fix refcnt leak in batadv_store_throughput_override (git-fixes).
- batman-adv: Fix refcnt leak in batadv_v_ogm_process (git-fixes).
- bcache: avoid unnecessary btree nodes flushing in btree_flush_write() (git fixes (block drivers)).
- bcache: fix incorrect data type usage in btree_flush_write() (git fixes (block drivers)).
- bcache: Revert 'bcache: shrink btree node cache after bch_btree_check()' (git fixes (block drivers)).
- blk-mq: honor IO scheduler for multiqueue devices (bsc#1165478).
- blk-mq: simplify blk_mq_make_request() (bsc#1165478).
- block/drbd: delete invalid function drbd_md_mark_dirty_ (bsc#1171527).
- block: drbd: remove a stray unlock in __drbd_send_protocol() (bsc#1171599).
- block: fix busy device checking in blk_drop_partitions again (bsc#1171948).
- block: fix busy device checking in blk_drop_partitions (bsc#1171948).
- block: fix memleak of bio integrity data (git fixes (block drivers)).
- block: remove the bd_openers checks in blk_drop_partitions (bsc#1171948).
- bnxt_en: fix memory leaks in bnxt_dcbnl_ieee_getets() (networking-stable-20_03_28).
- bnxt_en: Reduce BNXT_MSIX_VEC_MAX value to supported CQs per PF (bsc#1104745).
- bnxt_en: reinitialize IRQs when MTU is modified (networking-stable-20_03_14).
- bnxt_en: Return error if bnxt_alloc_ctx_mem() fails (bsc#1104745 ).
- bnxt_en: Return error when allocating zero size context memory (bsc#1104745).
- bonding/alb: make sure arp header is pulled before accessing it (networking-stable-20_03_14).
- bpf: Fix sk_psock refcnt leak when receiving message (bsc#1083647).
- bpf: Forbid XADD on spilled pointers for unprivileged users (bsc#1083647).
- brcmfmac: abort and release host after error (bsc#1051510).
- btrfs: fix deadlock with memory reclaim during scrub (bsc#1172127).
- btrfs: fix log context list corruption after rename whiteout error (bsc#1172342).
- btrfs: fix partial loss of prealloc extent past i_size after fsync (bsc#1172343).
- btrfs: relocation: add error injection points for cancelling balance (bsc#1171417).
- btrfs: relocation: Check cancel request after each data page read (bsc#1171417).
- btrfs: relocation: Check cancel request after each extent found (bsc#1171417).
- btrfs: relocation: Clear the DEAD_RELOC_TREE bit for orphan roots to prevent runaway balance (bsc#1171417).
- btrfs: relocation: Fix reloc root leakage and the NULL pointer reference caused by the leakage (bsc#1171417).
- btrfs: relocation: Work around dead relocation stage loop (bsc#1171417).
- btrfs: reloc: clear DEAD_RELOC_TREE bit for orphan roots to prevent runaway balance (bsc#1171417 bsc#1160947 bsc#1172366).
- btrfs: reloc: fix reloc root leak and NULL pointer dereference (bsc#1171417 bsc#1160947 bsc#1172366).
- btrfs: setup a nofs context for memory allocation at btrfs_create_tree() (bsc#1172127).
- btrfs: setup a nofs context for memory allocation at __btrfs_set_acl (bsc#1172127).
- btrfs: use nofs context when initializing security xattrs to avoid deadlock (bsc#1172127).
- can: add missing attribute validation for termination (networking-stable-20_03_14).
- cdc-acm: close race betrween suspend() and acm_softint (git-fixes).
- cdc-acm: introduce a cool down (git-fixes).
- ceph: check if file lock exists before sending unlock request (bsc#1168789).
- ceph: demote quotarealm lookup warning to a debug message (bsc#1171692).
- ceph: fix double unlock in handle_cap_export() (bsc#1171694).
- ceph: fix endianness bug when handling MDS session feature bits (bsc#1171695).
- cgroup, netclassid: periodically release file_lock on classid updating (networking-stable-20_03_14).
- CIFS: Allocate crypto structures on the fly for calculating signatures of incoming packets (bsc#1144333).
- CIFS: Allocate encryption header through kmalloc (bsc#1144333).
- CIFS: allow unlock flock and OFD lock across fork (bsc#1144333).
- CIFS: check new file size when extending file by fallocate (bsc#1144333).
- CIFS: cifspdu.h: Replace zero-length array with flexible-array member (bsc#1144333).
- CIFS: clear PF_MEMALLOC before exiting demultiplex thread (bsc#1144333).
- CIFS: do not share tcons with DFS (bsc#1144333).
- CIFS: dump the session id and keys also for SMB2 sessions (bsc#1144333).
- CIFS: ensure correct super block for DFS reconnect (bsc#1144333).
- CIFS: Fix bug which the return value by asynchronous read is error (bsc#1144333).
- CIFS: fix uninitialised lease_key in open_shroot() (bsc#1144333).
- CIFS: improve read performance for page size 64KB & cache=strict & vers=2.1+ (bsc#1144333).
- CIFS: Increment num_remote_opens stats counter even in case of smb2_query_dir_first (bsc#1144333).
- CIFS: minor update to comments around the cifs_tcp_ses_lock mutex (bsc#1144333).
- CIFS: protect updating server->dstaddr with a spinlock (bsc#1144333).
- CIFS: smb2pdu.h: Replace zero-length array with flexible-array member (bsc#1144333).
- CIFS: smbd: Calculate the correct maximum packet size for segmented SMBDirect send/receive (bsc#1144333).
- CIFS: smbd: Check and extend sender credits in interrupt context (bsc#1144333).
- CIFS: smbd: Check send queue size before posting a send (bsc#1144333).
- CIFS: smbd: Do not schedule work to send immediate packet on every receive (bsc#1144333).
- CIFS: smbd: Merge code to track pending packets (bsc#1144333).
- CIFS: smbd: Properly process errors on ib_post_send (bsc#1144333).
- CIFS: smbd: Update receive credits before sending and deal with credits roll back on failure before sending (bsc#1144333).
- CIFS: Warn less noisily on default mount (bsc#1144333).
- clk: Add clk_hw_unregister_composite helper function definition (bsc#1051510).
- clk: imx6ull: use OSC clock during AXI rate change (bsc#1051510).
- clk: imx: make mux parent strings const (bsc#1051510).
- clk: mediatek: correct the clocks for MT2701 HDMI PHY module (bsc#1051510).
- clk: sunxi-ng: a64: Fix gate bit of DSI DPHY (bsc#1051510).
- clocksource/drivers/hyper-v: Set TSC clocksource as default w/ InvariantTSC (bsc#1170620, bsc#1170621).
- clocksource: dw_apb_timer_of: Fix missing clockevent timers (bsc#1051510).
- component: Silence bind error on -EPROBE_DEFER (bsc#1051510).
- coresight: do not use the BIT() macro in the UAPI header (git fixes (block drivers)).
- cpufreq: s3c64xx: Remove pointless NULL check in s3c64xx_cpufreq_driver_init (bsc#1051510).
- crypto: ccp - AES CFB mode is a stream cipher (git-fixes).
- crypto: ccp - Clean up and exit correctly on allocation failure (git-fixes).
- crypto: ccp - Cleanup misc_dev on sev_exit() (bsc#1114279).
- crypto: ccp - Cleanup sp_dev_master in psp_dev_destroy() (bsc#1114279).
- cxgb4: fix MPS index overwrite when setting MAC address (bsc#1127355).
- cxgb4: fix Txq restart check during backpressure (bsc#1127354 bsc#1127371).
- debugfs: Add debugfs_create_xul() for hexadecimal unsigned long (git-fixes).
- debugfs_lookup(): switch to lookup_one_len_unlocked() (bsc#1171979).
- devlink: fix return value after hitting end in region read (bsc#1109837).
- devlink: validate length of param values (bsc#1109837).
- devlink: validate length of region addr/len (bsc#1109837).
- dmaengine: dmatest: Fix iteration non-stop logic (bsc#1051510).
- dm mpath: switch paths in dm_blk_ioctl() code path (bsc#1167574).
- dm-raid1: fix invalid return value from dm_mirror (bsc#1172378).
- dm writecache: fix data corruption when reloading the target (git fixes (block drivers)).
- dm writecache: fix incorrect flush sequence when doing SSD mode commit (git fixes (block drivers)).
- dm writecache: verify watermark during resume (git fixes (block drivers)).
- dm zoned: fix invalid memory access (git fixes (block drivers)).
- dm zoned: reduce overhead of backing device checks (git fixes (block drivers)).
- dm zoned: remove duplicate nr_rnd_zones increase in dmz_init_zone() (git fixes (block drivers)).
- dm zoned: support zone sizes smaller than 128MiB (git fixes (block drivers)).
- dp83640: reverse arguments to list_add_tail (git-fixes).
- drivers: hv: Add a module description line to the hv_vmbus driver (bsc#1172249, bsc#1172251).
- drivers/net/ibmvnic: Update VNIC protocol version reporting (bsc#1065729).
- drivers: w1: add hwmon support structures (jsc#SLE-11048).
- drivers: w1: add hwmon temp support for w1_therm (jsc#SLE-11048).
- drivers: w1: refactor w1_slave_show to make the temp reading functionality separate (jsc#SLE-11048).
- drm: amd/acp: fix broken menu structure (bsc#1114279) * context changes
- drm/amdgpu: Correctly initialize thermal controller for GPUs with Powerplay table v0 (e.g Hawaii) (bsc#1111666).
- drm/amdgpu: Fix oops when pp_funcs is unset in ACPI event (bsc#1111666).
- drm/amd/powerplay: force the trim of the mclk dpm_levels if OD is (bsc#1113956)
- drm/atomic: Take the atomic toys away from X (bsc#1112178) * context changes
- drm/crc: Actually allow to change the crc source (bsc#1114279) * offset changes
- drm/dp_mst: Fix clearing payload state on topology disable (bsc#1051510).
- drm/dp_mst: Reformat drm_dp_check_act_status() a bit (bsc#1051510).
- drm/edid: Fix off-by-one in DispID DTD pixel clock (bsc#1114279)
- drm/etnaviv: fix perfmon domain interation (bsc#1113956)
- drm/etnaviv: rework perfmon query infrastructure (bsc#1112178)
- drm/i915: Apply Wa_1406680159:icl,ehl as an engine workaround (bsc#1112178) * rename gt/intel_workarounds.c to intel_workarounds.c * context changes
- drm/i915/gvt: Init DPLL/DDI vreg for virtual display instead of (bsc#1114279)
- drm/i915: HDCP: fix Ri prime check done during link check (bsc#1112178) * rename display/intel_hdmi.c to intel_hdmi.c * context changes
- drm/i915: properly sanity check batch_start_offset (bsc#1114279) * renamed display/intel_fbc.c -> intel_fb.c * renamed gt/intel_rc6.c -> intel_pm.c * context changes
- drm/meson: Delete an error message in meson_dw_hdmi_bind() (bsc#1051510).
- drm: NULL pointer dereference [null-pointer-deref] (CWE 476) problem (bsc#1114279)
- drm/qxl: qxl_release leak in qxl_draw_dirty_fb() (bsc#1051510).
- drm/qxl: qxl_release leak in qxl_hw_surface_alloc() (bsc#1051510).
- drm/qxl: qxl_release use after free (bsc#1051510).
- drm: Remove PageReserved manipulation from drm_pci_alloc (bsc#1114279) * offset changes
- drm/sun4i: dsi: Allow binding the host without a panel (bsc#1113956)
- drm/sun4i: dsi: Avoid hotplug race with DRM driver bind (bsc#1113956)
- drm/sun4i: dsi: Remove incorrect use of runtime PM (bsc#1113956) * context changes
- drm/sun4i: dsi: Remove unused drv from driver context (bsc#1113956) * context changes * keep include of sun4i_drv.h
- dump_stack: avoid the livelock of the dump_lock (git fixes (block drivers)).
- EDAC, sb_edac: Add support for systems with segmented PCI buses (bsc#1169525).
- ext4: do not zeroout extents beyond i_disksize (bsc#1167851).
- ext4: fix extent_status fragmentation for plain files (bsc#1171949).
- ext4: use non-movable memory for superblock readahead (bsc#1171952).
- fanotify: fix merging marks masks with FAN_ONDIR (bsc#1171679).
- fbcon: fix null-ptr-deref in fbcon_switch (bsc#1114279) * rename drivers/video/fbdev/core to drivers/video/console * context changes
- fib: add missing attribute validation for tun_id (networking-stable-20_03_14).
- firmware: qcom: scm: fix compilation error when disabled (bsc#1051510).
- fs/cifs: fix gcc warning in sid_to_id (bsc#1144333).
- fs/seq_file.c: simplify seq_file iteration code and interface (bsc#1170125).
- gpio: tegra: mask GPIO IRQs during IRQ shutdown (bsc#1051510).
- gre: fix uninit-value in __iptunnel_pull_header (networking-stable-20_03_14).
- HID: hid-input: clear unmapped usages (git-fixes).
- HID: hyperv: Add a module description line (bsc#1172249, bsc#1172251).
- HID: i2c-hid: add Trekstor Primebook C11B to descriptor override (git-fixes).
- HID: i2c-hid: override HID descriptors for certain devices (git-fixes).
- HID: multitouch: add eGalaxTouch P80H84 support (bsc#1051510).
- HID: wacom: Read HID_DG_CONTACTMAX directly for non-generic devices (git-fixes).
- hrtimer: Annotate lockless access to timer->state (git fixes (block drivers)).
- hsr: add restart routine into hsr_get_node_list() (networking-stable-20_03_28).
- hsr: check protocol version in hsr_newlink() (networking-stable-20_04_17).
- hsr: fix general protection fault in hsr_addr_is_self() (networking-stable-20_03_28).
- hsr: set .netnsok flag (networking-stable-20_03_28).
- hsr: use rcu_read_lock() in hsr_get_node_{list/status}() (networking-stable-20_03_28).
- i2c: acpi: Force bus speed to 400KHz if a Silead touchscreen is present (git-fixes).
- i2c: acpi: put device when verifying client fails (git-fixes).
- i2c: brcmstb: remove unused struct member (git-fixes).
- i2c: core: Allow empty id_table in ACPI case as well (git-fixes).
- i2c: core: decrease reference count of device node in i2c_unregister_device (git-fixes).
- i2c: dev: Fix the race between the release of i2c_dev and cdev (bsc#1051510).
- i2c: fix missing pm_runtime_put_sync in i2c_device_probe (git-fixes).
- i2c-hid: properly terminate i2c_hid_dmi_desc_override_table array (git-fixes).
- i2c: i801: Do not add ICH_RES_IO_SMI for the iTCO_wdt device (git-fixes).
- i2c: iproc: Stop advertising support of SMBUS quick cmd (git-fixes).
- i2c: isch: Remove unnecessary acpi.h include (git-fixes).
- i2c: mux: demux-pinctrl: Fix an error handling path in 'i2c_demux_pinctrl_probe()' (bsc#1051510).
- i2c: st: fix missing struct parameter description (bsc#1051510).
- IB/mlx5: Fix missing congestion control debugfs on rep rdma device (bsc#1103991).
- ibmvnic: Skip fatal error reset after passive init (bsc#1171078 ltc#184239).
- iio:ad7797: Use correct attribute_group (bsc#1051510).
- iio: adc: stm32-adc: fix device used to request dma (bsc#1051510).
- iio: adc: stm32-adc: fix sleep in atomic context (git-fixes).
- iio: adc: stm32-adc: Use dma_request_chan() instead dma_request_slave_channel() (bsc#1051510).
- iio: dac: vf610: Fix an error handling path in 'vf610_dac_probe()' (bsc#1051510).
- iio: sca3000: Remove an erroneous 'get_device()' (bsc#1051510).
- iio: xilinx-xadc: Fix ADC-B powerdown (bsc#1051510).
- iio: xilinx-xadc: Fix clearing interrupt when enabling trigger (bsc#1051510).
- iio: xilinx-xadc: Fix sequencer configuration for aux channels in simultaneous mode (bsc#1051510).
- ima: Fix return value of ima_write_policy() (git-fixes).
- Input: evdev - call input_flush_device() on release(), not flush() (bsc#1051510).
- Input: hyperv-keyboard - add module description (bsc#1172249, bsc#1172251).
- Input: i8042 - add Acer Aspire 5738z to nomux list (bsc#1051510).
- Input: i8042 - add ThinkPad S230u to i8042 reset list (bsc#1051510).
- Input: raydium_i2c_ts - use true and false for boolean values (bsc#1051510).
- Input: synaptics-rmi4 - fix error return code in rmi_driver_probe() (bsc#1051510).
- Input: synaptics-rmi4 - really fix attn_data use-after-free (git-fixes).
- Input: usbtouchscreen - add support for BonXeon TP (bsc#1051510).
- Input: xpad - add custom init packet for Xbox One S controllers (bsc#1051510).
- iommu/amd: Call domain_flush_complete() in update_domain() (bsc#1172096).
- iommu/amd: Do not flush Device Table in iommu_map_page() (bsc#1172097).
- iommu/amd: Do not loop forever when trying to increase address space (bsc#1172098).
- iommu/amd: Fix legacy interrupt remapping for x2APIC-enabled system (bsc#1172099).
- iommu/amd: Fix over-read of ACPI UID from IVRS table (bsc#1172101).
- iommu/amd: Fix race in increase_address_space()/fetch_pte() (bsc#1172102).
- iommu/amd: Update Device Table in increase_address_space() (bsc#1172103).
- iommu: Fix reference count leak in iommu_group_alloc (bsc#1172397).
- ip6_tunnel: Allow rcv/xmit even if remote address is a local address (bsc#1166978).
- ipv4: fix a RCU-list lock in fib_triestat_seq_show (networking-stable-20_04_02).
- ipv6/addrconf: call ipv6_mc_up() for non-Ethernet interface (networking-stable-20_03_14).
- ipv6: do not auto-add link-local address to lag ports (networking-stable-20_04_09).
- ipv6: fix IPV6_ADDRFORM operation logic (bsc#1171662).
- ipv6: fix restrict IPV6_ADDRFORM operation (bsc#1171662).
- ipvlan: add cond_resched_rcu() while processing muticast backlog (networking-stable-20_03_14).
- ipvlan: do not deref eth hdr before checking it's set (networking-stable-20_03_14).
- ipvlan: do not use cond_resched_rcu() in ipvlan_process_multicast() (networking-stable-20_03_14).
- iwlwifi: pcie: actually release queue memory in TVQM (bsc#1051510).
- ixgbe: do not check firmware errors (bsc#1170284).
- kabi fix for early XHCI debug (git-fixes).
- kabi for for md: improve handling of bio with REQ_PREFLUSH in md_flush_request() (git-fixes).
- kabi/severities: Do not track KVM internal symbols.
- kabi/severities: Ingnore get_dev_data() The function is internal to the AMD IOMMU driver and must not be called by any third party.
- kabi workaround for snd_rawmidi buffer_ref field addition (git-fixes).
- KEYS: reaching the keys quotas correctly (bsc#1051510).
- KVM: arm64: Change hyp_panic()s dependency on tpidr_el2 (bsc#1133021).
- KVM: arm64: Stop save/restoring host tpidr_el1 on VHE (bsc#1133021).
- KVM: Check validity of resolved slot when searching memslots (bsc#1172104).
- KVM: s390: vsie: Fix delivery of addressing exceptions (git-fixes).
- KVM: SVM: Fix potential memory leak in svm_cpu_init() (bsc#1171736).
- KVM x86: Extend AMD specific guest behavior to Hygon virtual CPUs (bsc#1152489).
- l2tp: Allow management of tunnels and session in user namespace (networking-stable-20_04_17).
- libata: Remove extra scsi_host_put() in ata_scsi_add_hosts() (bsc#1051510).
- libata: Return correct status in sata_pmp_eh_recover_pm() when ATA_DFLAG_DETACH is set (bsc#1051510).
- lib: raid6: fix awk build warnings (git fixes (block drivers)).
- lib/raid6/test: fix build on distros whose /bin/sh is not bash (git fixes (block drivers)).
- lib/stackdepot.c: fix global out-of-bounds in stack_slabs (git fixes (block drivers)).
- locks: print unsigned ino in /proc/locks (bsc#1171951).
- mac80211: add ieee80211_is_any_nullfunc() (bsc#1051510).
- mac80211_hwsim: Use kstrndup() in place of kasprintf() (bsc#1051510).
- mac80211: mesh: fix discovery timer re-arming issue / crash (bsc#1051510).
- macsec: avoid to set wrong mtu (bsc#1051510).
- macsec: restrict to ethernet devices (networking-stable-20_03_28).
- macvlan: add cond_resched() during multicast processing (networking-stable-20_03_14).
- macvlan: fix null dereference in macvlan_device_event() (bsc#1051510).
- md: improve handling of bio with REQ_PREFLUSH in md_flush_request() (git-fixes).
- md/raid0: Fix an error message in raid0_make_request() (git fixes (block drivers)).
- md/raid10: prevent access of uninitialized resync_pages offset (git-fixes).
- media: dvb: return -EREMOTEIO on i2c transfer failure (bsc#1051510).
- media: platform: fcp: Set appropriate DMA parameters (bsc#1051510).
- media: ti-vpe: cal: fix disable_irqs to only the intended target (git-fixes).
- mei: release me_cl object reference (bsc#1051510).
- mlxsw: Fix some IS_ERR() vs NULL bugs (networking-stable-20_04_27).
- mlxsw: spectrum_flower: Do not stop at FLOW_ACTION_VLAN_MANGLE (networking-stable-20_04_09).
- mlxsw: spectrum_mr: Fix list iteration in error path (bsc#1112374).
- mmc: atmel-mci: Fix debugfs on 64-bit platforms (git-fixes).
- mmc: core: Check request type before completing the request (git-fixes).
- mmc: core: Fix recursive locking issue in CQE recovery path (git-fixes).
- mmc: cqhci: Avoid false 'cqhci: CQE stuck on' by not open-coding timeout loop (git-fixes).
- mmc: dw_mmc: Fix debugfs on 64-bit platforms (git-fixes).
- mmc: meson-gx: make sure the descriptor is stopped on errors (git-fixes).
- mmc: meson-gx: simplify interrupt handler (git-fixes).
- mmc: renesas_sdhi: limit block count to 16 bit for old revisions (git-fixes).
- mmc: sdhci-esdhc-imx: fix the mask for tuning start point (bsc#1051510).
- mmc: sdhci-msm: Clear tuning done flag while hs400 tuning (bsc#1051510).
- mmc: sdhci-of-at91: fix memleak on clk_get failure (git-fixes).
- mmc: sdhci-pci: Fix eMMC driver strength for BYT-based controllers (bsc#1051510).
- mmc: sdhci-xenon: fix annoying 1.8V regulator warning (bsc#1051510).
- mmc: sdio: Fix potential NULL pointer error in mmc_sdio_init_card() (bsc#1051510).
- mmc: tmio: fix access width of Block Count Register (git-fixes).
- mm: limit boost_watermark on small zones (git fixes (mm/pgalloc)).
- mm: thp: handle page cache THP correctly in PageTransCompoundMap (git fixes (block drivers)).
- mtd: cfi: fix deadloop in cfi_cmdset_0002.c do_write_buffer (bsc#1051510).
- mtd: spi-nor: cadence-quadspi: add a delay in write sequence (git-fixes).
- mtd: spi-nor: enable 4B opcodes for mx66l51235l (git-fixes).
- mtd: spi-nor: fsl-quadspi: Do not let -EINVAL on the bus (git-fixes).
- mwifiex: avoid -Wstringop-overflow warning (bsc#1051510).
- mwifiex: Fix memory corruption in dump_station (bsc#1051510).
- net: bcmgenet: correct per TX/RX ring statistics (networking-stable-20_04_27).
- net: dsa: b53: Fix ARL register definitions (networking-stable-20_04_27).
- net: dsa: b53: Rework ARL bin logic (networking-stable-20_04_27).
- net: dsa: bcm_sf2: Do not register slave MDIO bus with OF (networking-stable-20_04_09).
- net: dsa: bcm_sf2: Ensure correct sub-node is parsed (networking-stable-20_04_09).
- net: dsa: Fix duplicate frames flooded by learning (networking-stable-20_03_28).
- net: dsa: mv88e6xxx: fix lockup on warm boot (networking-stable-20_03_14).
- net/ethernet: add Google GVE driver (jsc#SLE-10538)
- net: fec: add phy_reset_after_clk_enable() support (git-fixes).
- net: fec: validate the new settings in fec_enet_set_coalesce() (networking-stable-20_03_14).
- net: fix race condition in __inet_lookup_established() (bsc#1151794).
- net: fq: add missing attribute validation for orphan mask (networking-stable-20_03_14).
- net: hns3: fix 'tc qdisc del' failed issue (bsc#1109837).
- net, ip_tunnel: fix interface lookup with no key (networking-stable-20_04_02).
- net: ipv4: devinet: Fix crash when add/del multicast IP with autojoin (networking-stable-20_04_17).
- net: ipv6: do not consider routes via gateways for anycast address check (networking-stable-20_04_17).
- netlink: Use netlink header as base to calculate bad attribute offset (networking-stable-20_03_14).
- net: macsec: update SCI upon MAC address change (networking-stable-20_03_14).
- net: memcg: fix lockdep splat in inet_csk_accept() (networking-stable-20_03_14).
- net: memcg: late association of sock to memcg (networking-stable-20_03_14).
- net/mlx4_en: avoid indirect call in TX completion (networking-stable-20_04_27).
- net/mlx5: Add new fields to Port Type and Speed register (bsc#1171118).
- net/mlx5: Expose link speed directly (bsc#1171118).
- net/mlx5: Expose port speed when possible (bsc#1171118).
- net/mlx5: Fix failing fw tracer allocation on s390 (bsc#1103990 ).
- net: mvneta: Fix the case where the last poll did not process all rx (networking-stable-20_03_28).
- net: netrom: Fix potential nr_neigh refcnt leak in nr_add_node (networking-stable-20_04_27).
- net/packet: tpacket_rcv: do not increment ring index on drop (networking-stable-20_03_14).
- net: qmi_wwan: add support for ASKEY WWHC050 (networking-stable-20_03_28).
- net: revert default NAPI poll timeout to 2 jiffies (networking-stable-20_04_17).
- net_sched: cls_route: remove the right filter from hashtable (networking-stable-20_03_28).
- net_sched: sch_skbprio: add message validation to skbprio_change() (bsc#1109837).
- net/x25: Fix x25_neigh refcnt leak when receiving frame (networking-stable-20_04_27).
- nfc: add missing attribute validation for SE API (networking-stable-20_03_14).
- nfc: add missing attribute validation for vendor subcommand (networking-stable-20_03_14).
- nfc: st21nfca: add missed kfree_skb() in an error path (bsc#1051510).
- nfp: abm: fix a memory leak bug (bsc#1109837).
- nfsd4: fix up replay_matches_cache() (git-fixes).
- nfsd: Ensure CLONE persists data and metadata changes to the target file (git-fixes).
- nfsd: fix delay timer on 32-bit architectures (git-fixes).
- nfsd: fix jiffies/time_t mixup in LRU list (git-fixes).
- NFS: Directory page cache pages need to be locked when read (git-fixes).
- nfsd: memory corruption in nfsd4_lock() (git-fixes).
- NFS: Do not call generic_error_remove_page() while holding locks (bsc#1170457).
- NFS: Fix memory leaks and corruption in readdir (git-fixes).
- NFS: Fix O_DIRECT accounting of number of bytes read/written (git-fixes).
- NFS: Fix potential posix_acl refcnt leak in nfs3_set_acl (git-fixes).
- NFS: fix racey wait in nfs_set_open_stateid_locked (bsc#1170592).
- NFS/flexfiles: Use the correct TCP timeout for flexfiles I/O (git-fixes).
- NFS/pnfs: Fix pnfs_generic_prepare_to_resend_writes() (git-fixes).
- NFS: Revalidate the file size on a fatal write error (git-fixes).
- NFSv4.0: nfs4_do_fsinfo() should not do implicit lease renewals (git-fixes).
- NFSv4: Do not allow a cached open with a revoked delegation (git-fixes).
- NFSv4: Fix leak of clp->cl_acceptor string (git-fixes).
- NFSv4/pnfs: Return valid stateids in nfs_layout_find_inode_by_stateid() (git-fixes).
- NFSv4: try lease recovery on NFS4ERR_EXPIRED (git-fixes).
- NFSv4.x: Drop the slot if nfs4_delegreturn_prepare waits for layoutreturn (git-fixes).
- nl802154: add missing attribute validation for dev_type (networking-stable-20_03_14).
- nl802154: add missing attribute validation (networking-stable-20_03_14).
- nvme-fc: print proper nvme-fc devloss_tmo value (bsc#1172391).
- objtool: Fix stack offset tracking for indirect CFAs (bsc#1169514).
- objtool: Fix switch table detection in .text.unlikely (bsc#1169514).
- objtool: Make BP scratch register warning more robust (bsc#1169514).
- padata: Remove broken queue flushing (git-fixes).
- Partially revert 'kfifo: fix kfifo_alloc() and kfifo_init()' (git fixes (block drivers)).
- PCI: hv: Add support for protocol 1.3 and support PCI_BUS_RELATIONS2 (bsc#1172201, bsc#1172202).
- PCI: hv: Decouple the func definition in hv_dr_state from VSP message (bsc#1172201, bsc#1172202).
- pinctrl: baytrail: Enable pin configuration setting for GPIO chip (git-fixes).
- pinctrl: cherryview: Add missing spinlock usage in chv_gpio_irq_handler (git-fixes).
- pinctrl: sunrisepoint: Fix PAD lock register offset for SPT-H (git-fixes).
- platform/x86: asus-nb-wmi: Do not load on Asus T100TA and T200TA (bsc#1051510).
- pNFS: Ensure we do clear the return-on-close layout stateid on fatal errors (git-fixes).
- powerpc: Add attributes for setjmp/longjmp (bsc#1065729).
- powerpc/pci/of: Parse unassigned resources (bsc#1065729).
- powerpc/setup_64: Set cache-line-size based on cache-block-size (bsc#1065729).
- powerpc/sstep: Fix DS operand in ld encoding to appropriate value (bsc#1065729).
- r8152: check disconnect status after long sleep (networking-stable-20_03_14).
- raid6/ppc: Fix build for clang (git fixes (block drivers)).
- random: always use batched entropy for get_random_u{32,64} (bsc#1164871).
- rcu: locking and unlocking need to always be at least barriers (git fixes (block drivers)).
- Revert 'ALSA: hda/realtek: Fix pop noise on ALC225' (git-fixes).
- Revert 'drm/panel: simple: Add support for Sharp LQ150X1LG11 panels' (bsc#1114279) * offset changes
- Revert 'HID: i2c-hid: add Trekstor Primebook C11B to descriptor override' Depends on 9b5c747685982d22efffeafc5ec601bd28f6d78b, which was also reverted.
- Revert 'HID: i2c-hid: override HID descriptors for certain devices' This broke i2c-hid.ko's build, there is no way around it without a big file rename or renaming the kernel module.
- Revert 'i2c-hid: properly terminate i2c_hid_dmi_desc_override_table' Fixed 9b5c747685982d22efffeafc5ec601bd28f6d78b, which was also reverted.
- Revert 'ipc,sem: remove uneeded sem_undo_list lock usage in exit_sem()' (bsc#1172221).
- Revert 'RDMA/cma: Simplify rdma_resolve_addr() error flow' (bsc#1103992).
- rtlwifi: Fix a double free in _rtl_usb_tx_urb_setup() (bsc#1051510).
- s390/cpum_cf: Add new extended counters for IBM z15 (bsc#1169762 LTC#185291).
- s390/ftrace: fix potential crashes when switching tracers (git-fixes).
- s390/ism: fix error return code in ism_probe() (git-fixes).
- s390/pci: do not set affinity for floating irqs (git-fixes).
- s390/pci: Fix possible deadlock in recover_store() (bsc#1165183 LTC#184103).
- s390/pci: Recover handle in clp_set_pci_fn() (bsc#1165183 LTC#184103).
- scripts/decodecode: fix trapping instruction formatting (bsc#1065729).
- scripts/dtc: Remove redundant YYLOC global declaration (bsc#1160388).
- scsi: bnx2i: fix potential use after free (bsc#1171600).
- scsi: core: Handle drivers which set sg_tablesize to zero (bsc#1171601) This commit also required: > scsi: core: avoid preallocating big SGL for data
- scsi: core: save/restore command resid for error handling (bsc#1171602).
- scsi: core: scsi_trace: Use get_unaligned_be*() (bsc#1171604).
- scsi: core: try to get module before removing device (bsc#1171605).
- scsi: csiostor: Adjust indentation in csio_device_reset (bsc#1171606).
- scsi: csiostor: Do not enable IRQs too early (bsc#1171607).
- scsi: esas2r: unlock on error in esas2r_nvram_read_direct() (bsc#1171608).
- scsi: fnic: fix invalid stack access (bsc#1171609).
- scsi: fnic: fix msix interrupt allocation (bsc#1171610).
- scsi: ibmvscsi: Fix WARN_ON during event pool release (bsc#1170791 ltc#185128).
- scsi: iscsi: Avoid potential deadlock in iscsi_if_rx func (bsc#1171611).
- scsi: iscsi: Fix a potential deadlock in the timeout handler (bsc#1171612).
- scsi: iscsi: qla4xxx: fix double free in probe (bsc#1171613).
- scsi: lpfc: Change default queue allocation for reduced memory consumption (bsc#1164780).
- scsi: lpfc: fix: Coverity: lpfc_cmpl_els_rsp(): Null pointer dereferences (bsc#1171614).
- scsi: lpfc: Fix crash in target side cable pulls hitting WAIT_FOR_UNREG (bsc#1171615).
- scsi: lpfc: Fix lpfc_nodelist leak when processing unsolicited event (bsc#1164780).
- scsi: lpfc: Fix MDS Diagnostic Enablement definition (bsc#1164780).
- scsi: lpfc: Fix negation of else clause in lpfc_prep_node_fc4type (bsc#1164780).
- scsi: lpfc: Fix noderef and address space warnings (bsc#1164780).
- scsi: lpfc: Maintain atomic consistency of queue_claimed flag (bsc#1164780).
- scsi: lpfc: remove duplicate unloading checks (bsc#1164780).
- scsi: lpfc: Remove re-binding of nvme rport during registration (bsc#1164780).
- scsi: lpfc: Remove redundant initialization to variable rc (bsc#1164780).
- scsi: lpfc: Remove unnecessary lockdep_assert_held calls (bsc#1164780).
- scsi: lpfc: Update lpfc version to 12.8.0.1 (bsc#1164780).
- scsi: megaraid_sas: Do not initiate OCR if controller is not in ready state (bsc#1171616).
- scsi: qla2xxx: add ring buffer for tracing debug logs (bsc#1157169).
- scsi: qla2xxx: check UNLOADING before posting async work (bsc#1157169).
- scsi: qla2xxx: Delete all sessions before unregister local nvme port (bsc#1157169).
- scsi: qla2xxx: Do not log message when reading port speed via sysfs (bsc#1157169).
- scsi: qla2xxx: Fix hang when issuing nvme disconnect-all in NPIV (bsc#1157169).
- scsi: qla2xxx: Fix regression warnings (bsc#1157169).
- scsi: qla2xxx: Remove non functional code (bsc#1157169).
- scsi: qla2xxx: set UNLOADING before waiting for session deletion (bsc#1157169).
- scsi: qla4xxx: Adjust indentation in qla4xxx_mem_free (bsc#1171617).
- scsi: qla4xxx: fix double free bug (bsc#1171618).
- scsi: sd: Clear sdkp->protection_type if disk is reformatted without PI (bsc#1171619).
- scsi: sg: add sg_remove_request in sg_common_write (bsc#1171620).
- scsi: tracing: Fix handling of TRANSFER LENGTH == 0 for READ(6) and WRITE(6) (bsc#1171621).
- scsi: ufs: change msleep to usleep_range (bsc#1171622).
- scsi: ufs: Clean up ufshcd_scale_clks() and clock scaling error out path (bsc#1171623).
- scsi: ufs: Fix ufshcd_hold() caused scheduling while atomic (bsc#1171624).
- scsi: ufs: Fix ufshcd_probe_hba() reture value in case ufshcd_scsi_add_wlus() fails (bsc#1171625).
- scsi: ufs: Recheck bkops level if bkops is disabled (bsc#1171626).
- sctp: fix possibly using a bad saddr with a given dst (networking-stable-20_04_02).
- sctp: fix refcount bug in sctp_wfree (networking-stable-20_04_02).
- selftests/powerpc: Fix build errors in powerpc ptrace selftests (boo#1124278).
- Separate one more kABI fixup from the functional change:
- seq_file: fix problem when seeking mid-record (bsc#1170125).
- serial: uartps: Move the spinlock after the read of the tx empty (git-fixes).
- sfc: detach from cb_page in efx_copy_channel() (networking-stable-20_03_14).
- signal/pid_namespace: Fix reboot_pid_ns to use send_sig not force_sig (bsc#1172185).
- slcan: not call free_netdev before rtnl_unlock in slcan_open (networking-stable-20_03_28).
- slip: make slhc_compress() more robust against malicious packets (networking-stable-20_03_14).
- smb3: Additional compression structures (bsc#1144333).
- smb3: Add new compression flags (bsc#1144333).
- smb3: change noisy error message to FYI (bsc#1144333).
- smb3: enable swap on SMB3 mounts (bsc#1144333).
- smb3: Minor cleanup of protocol definitions (bsc#1144333).
- smb3: remove overly noisy debug line in signing errors (bsc#1144333).
- smb3: smbdirect support can be configured by default (bsc#1144333).
- smb3: use SMB2_SIGNATURE_SIZE define (bsc#1144333).
- spi: bcm2835: Fix 3-wire mode if DMA is enabled (git-fixes).
- spi: bcm63xx-hsspi: Really keep pll clk enabled (bsc#1051510).
- spi: bcm-qspi: when tx/rx buffer is NULL set to 0 (bsc#1051510).
- spi: dw: Add SPI Rx-done wait method to DMA-based transfer (bsc#1051510).
- spi: dw: Add SPI Tx-done wait method to DMA-based transfer (bsc#1051510).
- spi: dw: Zero DMA Tx and Rx configurations on stack (bsc#1051510).
- spi: fsl: do not map irq during probe (git-fixes).
- spi: fsl: use platform_get_irq() instead of of_irq_to_resource() (git-fixes).
- spi: pxa2xx: Add CS control clock quirk (bsc#1051510).
- spi: qup: call spi_qup_pm_resume_runtime before suspending (bsc#1051510).
- spi: spi-fsl-dspi: Replace interruptible wait queue with a simple completion (git-fixes).
- spi: spi-s3c64xx: Fix system resume support (git-fixes).
- spi/zynqmp: remove entry that causes a cs glitch (bsc#1051510).
- staging: comedi: dt2815: fix writing hi byte of analog output (bsc#1051510).
- staging: comedi: Fix comedi_device refcnt leak in comedi_open (bsc#1051510).
- staging: iio: ad2s1210: Fix SPI reading (bsc#1051510).
- staging: vt6656: Do not set RCR_MULTICAST or RCR_BROADCAST by default (git-fixes).
- staging: vt6656: Fix drivers TBTT timing counter (git-fixes).
- staging: vt6656: Fix pairwise key entry save (git-fixes).
- sunrpc: expiry_time should be seconds not timeval (git-fixes).
- SUNRPC: Fix a potential buffer overflow in 'svc_print_xprts()' (git-fixes).
- supported.conf: Add br_netfilter to base (bsc#1169020).
- supported.conf: support w1 core and thermometer support
- svcrdma: Fix double svc_rdma_send_ctxt_put() in an error path (bsc#1103992).
- svcrdma: Fix leak of transport addresses (git-fixes).
- svcrdma: Fix trace point use-after-free race (bsc#1103992 ).
- taskstats: fix data-race (bsc#1172188).
- tcp: cache line align MAX_TCP_HEADER (networking-stable-20_04_27).
- tcp: repair: fix TCP_QUEUE_SEQ implementation (networking-stable-20_03_28).
- team: add missing attribute validation for array index (networking-stable-20_03_14).
- team: add missing attribute validation for port ifindex (networking-stable-20_03_14).
- team: fix hang in team_mode_get() (networking-stable-20_04_27).
- tools lib traceevent: Remove unneeded qsort and uses memmove instead (git-fixes).
- tpm: ibmvtpm: retry on H_CLOSED in tpm_ibmvtpm_send() (bsc#1065729).
- tpm/tpm_tis: Free IRQ if probing fails (bsc#1082555).
- tpm/tpm_tis: Free IRQ if probing fails (git-fixes).
- tracing: Add a vmalloc_sync_mappings() for safe measure (git-fixes).
- tracing: Disable trace_printk() on post poned tests (git-fixes).
- tracing: Fix the race between registering 'snapshot' event trigger and triggering 'snapshot' operation (git-fixes).
- tty: rocket, avoid OOB access (git-fixes).
- tun: Do not put_page() for all negative return values from XDP program (bsc#1109837).
- UAS: fix deadlock in error handling and PM flushing work (git-fixes).
- UAS: no use logging any details in case of ENODEV (git-fixes).
- Update config files: Build w1 bus on arm64 (jsc#SLE-11048)
- USB: Add USB_QUIRK_DELAY_CTRL_MSG and USB_QUIRK_DELAY_INIT for Corsair K70 RGB RAPIDFIRE (git-fixes).
- USB: cdc-acm: restore capability check order (git-fixes).
- USB: core: Fix misleading driver bug report (bsc#1051510).
- USB: dwc3: do not set gadget->is_otg flag (git-fixes).
- USB: dwc3: gadget: Do link recovery for SS and SSP (git-fixes).
- USB: early: Handle AMD's spec-compliant identifiers, too (git-fixes).
- USB: f_fs: Clear OS Extended descriptor counts to zero in ffs_data_reset() (git-fixes).
- USB: gadget: audio: Fix a missing error return value in audio_bind() (git-fixes).
- USB: gadget: composite: Inform controller driver of self-powered (git-fixes).
- USB: gadget: legacy: fix error return code in cdc_bind() (git-fixes).
- USB: gadget: legacy: fix error return code in gncm_bind() (git-fixes).
- USB: gadget: legacy: fix redundant initialization warnings (bsc#1051510).
- USB: gadget: net2272: Fix a memory leak in an error handling path in 'net2272_plat_probe()' (git-fixes).
- USB: gadget: udc: atmel: Fix vbus disconnect handling (git-fixes).
- USB: gadget: udc: atmel: Make some symbols static (git-fixes).
- USB: gadget: udc: bdc: Remove unnecessary NULL checks in bdc_req_complete (git-fixes).
- USB: host: xhci-plat: keep runtime active when removing host (git-fixes).
- USB: hub: Fix handling of connect changes during sleep (git-fixes).
- usbnet: silence an unnecessary warning (bsc#1170770).
- USB: serial: garmin_gps: add sanity checking for data length (git-fixes).
- USB: serial: option: add BroadMobi BM806U (git-fixes).
- USB: serial: option: add support for ASKEY WWHC050 (git-fixes).
- USB: serial: option: add Wistron Neweb D19Q1 (git-fixes).
- USB: serial: qcserial: Add DW5816e support (git-fixes).
- USB: sisusbvga: Change port variable from signed to unsigned (git-fixes).
- usb-storage: Add unusual_devs entry for JMicron JMS566 (git-fixes).
- USB: uas: add quirk for LaCie 2Big Quadra (git-fixes).
- USB: xhci: Fix NULL pointer dereference when enqueuing trbs from urb sg list (git-fixes).
- video: fbdev: sis: Remove unnecessary parentheses and commented code (bsc#1114279)
- video: fbdev: w100fb: Fix a potential double free (bsc#1051510).
- vrf: Check skb for XFRM_TRANSFORMED flag (networking-stable-20_04_27).
- vt: ioctl, switch VT_IS_IN_USE and VT_BUSY to inlines (git-fixes).
- vt: selection, introduce vc_is_sel (git-fixes).
- vt: vt_ioctl: fix race in VT_RESIZEX (git-fixes).
- vt: vt_ioctl: fix use-after-free in vt_in_use() (git-fixes).
- vt: vt_ioctl: fix VT_DISALLOCATE freeing in-use virtual console (git-fixes).
- vxlan: check return value of gro_cells_init() (networking-stable-20_03_28).
- w1: Add subsystem kernel public interface (jsc#SLE-11048).
- w1: Fix slave count on 1-Wire bus (resend) (jsc#SLE-11048).
- w1: keep balance of mutex locks and refcnts (jsc#SLE-11048).
- w1: use put_device() if device_register() fail (jsc#SLE-11048).
- watchdog: reset last_hw_keepalive time at start (git-fixes).
- wcn36xx: Fix error handling path in 'wcn36xx_probe()' (bsc#1051510).
- wil6210: remove reset file from debugfs (git-fixes).
- wimax/i2400m: Fix potential urb refcnt leak (bsc#1051510).
- workqueue: do not use wq_select_unbound_cpu() for bound works (bsc#1172130).
- x86/entry/64: Fix unwind hints in kernel exit path (bsc#1058115).
- x86/entry/64: Fix unwind hints in register clearing code (bsc#1058115).
- x86/entry/64: Fix unwind hints in rewind_stack_do_exit() (bsc#1058115).
- x86/entry/64: Fix unwind hints in __switch_to_asm() (bsc#1058115).
- x86/hyperv: Allow guests to enable InvariantTSC (bsc#1170621, bsc#1170620).
- x86/Hyper-V: Free hv_panic_page when fail to register kmsg dump (bsc#1170617, bsc#1170618).
- x86/Hyper-V: Report crash data in die() when panic_on_oops is set (bsc#1170617, bsc#1170618).
- x86/Hyper-V: Report crash register data or kmsg before running crash kernel (bsc#1170617, bsc#1170618).
- x86/Hyper-V: Report crash register data when sysctl_record_panic_msg is not set (bsc#1170617, bsc#1170618).
- x86/Hyper-V: report value of misc_features (git fixes).
- x86/Hyper-V: Trigger crash enlightenment only once during system crash (bsc#1170617, bsc#1170618).
- x86/Hyper-V: Unload vmbus channel in hv panic callback (bsc#1170617, bsc#1170618).
- x86/kprobes: Avoid kretprobe recursion bug (bsc#1114279).
- x86/resctrl: Fix invalid attempt at removing the default resource group (git-fixes).
- x86/resctrl: Preserve CDP enable over CPU hotplug (bsc#1114279).
- x86/unwind/orc: Do not skip the first frame for inactive tasks (bsc#1058115).
- x86/unwind/orc: Fix error handling in __unwind_start() (bsc#1058115).
- x86/unwind/orc: Fix error path for bad ORC entry type (bsc#1058115).
- x86/unwind/orc: Fix unwind_get_return_address_ptr() for inactive tasks (bsc#1058115).
- x86/unwind/orc: Prevent unwinding before ORC initialization (bsc#1058115).
- x86/unwind: Prevent false warnings for non-current tasks (bsc#1058115).
- xen/pci: reserve MCFG areas earlier (bsc#1170145).
- xfrm: Always set XFRM_TRANSFORMED in xfrm{4,6}_output_finish (networking-stable-20_04_27).
- xfs: clear PF_MEMALLOC before exiting xfsaild thread (git-fixes).
- xfs: Correctly invert xfs_buftarg LRU isolation logic (git-fixes).
- xfs: do not ever return a stale pointer from __xfs_dir3_free_read (git-fixes).
- xprtrdma: Fix completion wait during device removal (git-fixes).
Patchnames
SUSE-2020-1604,SUSE-SLE-Module-Public-Cloud-15-SP1-2020-1604
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "The SUSE Linux Enterprise 15 SP1 azure kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2020-0543: Fixed a side channel attack against special registers which could have resulted in leaking of read values to cores other than the one which called it.\n This attack is known as Special Register Buffer Data Sampling (SRBDS) or \u0027CrossTalk\u0027 (bsc#1154824).\n- CVE-2020-13143: Fixed an out-of-bounds read in gadget_dev_desc_UDC_store in drivers/usb/gadget/configfs.c (bsc#1171982).\n- CVE-2020-12769: Fixed an issue which could have allowed attackers to cause a panic via concurrent calls to dw_spi_irq and dw_spi_transfer_one (bsc#1171983).\n- CVE-2020-12768: Fixed a memory leak in svm_cpu_uninit in arch/x86/kvm/svm.c (bsc#1171736).\n- CVE-2020-12659: Fixed an out-of-bounds write (by a user with the CAP_NET_ADMIN capability) due to improper headroom validation (bsc#1171214).\n- CVE-2020-12657: An a use-after-free in block/bfq-iosched.c (bsc#1171205).\n- CVE-2020-12656: Fixed an improper handling of certain domain_release calls leadingch could have led to a memory leak (bsc#1171219).\n- CVE-2020-12655: Fixed an issue which could have allowed attackers to trigger a sync of excessive duration via an XFS v5 image with crafted metadata (bsc#1171217).\n- CVE-2020-12654: Fixed an issue in he wifi driver which could have allowed a remote AP to trigger a heap-based buffer overflow (bsc#1171202).\n- CVE-2020-12653: Fixed an issue in the wifi driver which could have allowed local users to gain privileges or cause a denial of service (bsc#1171195).\n- CVE-2020-12652: Fixed an issue which could have allowed local users to hold an incorrect lock during the ioctl operation and trigger a race condition (bsc#1171218).\n- CVE-2020-12464: Fixed a use-after-free due to a transfer without a reference (bsc#1170901).\n- CVE-2020-12114: Fixed a pivot_root race condition which could have allowed local users to cause a denial of service (panic) by corrupting a mountpoint reference counter (bsc#1171098).\n- CVE-2020-10757: Fixed an issue where remaping hugepage DAX to anon mmap could have caused user PTE access (bsc#1172317).\n- CVE-2020-10751: Fixed an improper implementation in SELinux LSM hook where it was assumed that an skb would only contain a single netlink message (bsc#1171189).\n- CVE-2020-10732: Fixed kernel data leak in userspace coredumps due to uninitialized data (bsc#1171220).\n- CVE-2020-10720: Fixed a use-after-free read in napi_gro_frags() (bsc#1170778).\n- CVE-2020-10711: Fixed a null pointer dereference in SELinux subsystem which could have allowed a remote network user to crash the kernel resulting in a denial of service (bsc#1171191).\n- CVE-2020-10690: Fixed the race between the release of ptp_clock and cdev (bsc#1170056).\n- CVE-2019-9455: Fixed a pointer leak due to a WARN_ON statement in a video driver. This could lead to local information disclosure with System execution privileges needed (bsc#1170345).\n- CVE-2019-20812: Fixed an issue in prb_calc_retire_blk_tmo() which could have resulted in a denial of service (bsc#1172453).\n- CVE-2019-20806: Fixed a null pointer dereference which may had lead to denial of service (bsc#1172199).\n- CVE-2019-19462: Fixed an issue which could have allowed local user to cause denial of service (bsc#1158265).\n- CVE-2018-1000199: Fixed a potential local code execution via ptrace (bsc#1089895).\n\nThe following non-security bugs were fixed:\n\n- ACPI: CPPC: Fix reference count leak in acpi_cppc_processor_probe() (bsc#1051510).\n- ACPI: sysfs: Fix reference count leak in acpi_sysfs_add_hotplug_profile() (bsc#1051510).\n- acpi/x86: ignore unspecified bit positions in the ACPI global lock field (bsc#1051510).\n- Add br_netfilter to kernel-default-base (bsc#1169020)\n- Add commit for git-fix that\u0027s not a fix This commit cleans up debug code but does not fix anything, and it relies on a new kernel function that isn\u0027t yet in this version of SLE.\n- agp/intel: Reinforce the barrier after GTT updates (bsc#1051510).\n- ALSA: ctxfi: Remove unnecessary cast in kfree (bsc#1051510).\n- ALSA: doc: Document PC Beep Hidden Register on Realtek ALC256 (bsc#1051510).\n- ALSA: dummy: Fix PCM format loop in proc output (bsc#1111666).\n- ALSA: hda: Add driver blacklist (bsc#1051510).\n- ALSA: hda: Always use jackpoll helper for jack update after resume (bsc#1051510).\n- ALSA: hda: call runtime_allow() for all hda controllers (bsc#1051510).\n- ALSA: hda: Do not release card at firmware loading error (bsc#1051510).\n- ALSA: hda: Explicitly permit using autosuspend if runtime PM is supported (bsc#1051510).\n- ALSA: hda/hdmi: fix race in monitor detection during probe (bsc#1051510).\n- ALSA: hda/hdmi: fix without unlocked before return (bsc#1051510).\n- ALSA: hda: Honor PM disablement in PM freeze and thaw_noirq ops (bsc#1051510).\n- ALSA: hda: Keep the controller initialization even if no codecs found (bsc#1051510).\n- ALSA: hda: Match both PCI ID and SSID for driver blacklist (bsc#1111666).\n- ALSA: hda/realtek - Add a model for Thinkpad T570 without DAC workaround (bsc#1172017).\n- ALSA: hda/realtek - Add COEF workaround for ASUS ZenBook UX431DA (git-fixes).\n- ALSA: hda/realtek - Add HP new mute led supported for ALC236 (git-fixes).\n- ALSA: hda/realtek - Add more fixup entries for Clevo machines (git-fixes).\n- ALSA: hda/realtek - Add new codec supported for ALC245 (bsc#1051510).\n- ALSA: hda/realtek - Add new codec supported for ALC287 (git-fixes).\n- ALSA: hda/realtek: Add quirk for Samsung Notebook (git-fixes).\n- ALSA: hda/realtek - Add supported new mute Led for HP (git-fixes).\n- ALSA: hda/realtek - Enable headset mic of ASUS GL503VM with ALC295 (git-fixes).\n- ALSA: hda/realtek - Enable headset mic of ASUS UX550GE with ALC295 (git-fixes).\n- ALSA: hda/realtek: Enable headset mic of ASUS UX581LV with ALC295 (git-fixes).\n- ALSA: hda/realtek - Enable the headset mic on Asus FX505DT (bsc#1051510).\n- ALSA: hda/realtek - Fix S3 pop noise on Dell Wyse (git-fixes).\n- ALSA: hda/realtek - Fix silent output on Gigabyte X570 Aorus Xtreme (bsc#1111666).\n- ALSA: hda/realtek - Fix unexpected init_amp override (bsc#1051510).\n- ALSA: hda/realtek - Limit int mic boost for Thinkpad T530 (git-fixes bsc#1171293).\n- ALSA: hda/realtek - Two front mics on a Lenovo ThinkCenter (bsc#1051510).\n- ALSA: hda: Release resources at error in delayed probe (bsc#1051510).\n- ALSA: hda: Remove ASUS ROG Zenith from the blacklist (bsc#1051510).\n- ALSA: hda: Skip controller resume if not needed (bsc#1051510).\n- ALSA: hwdep: fix a left shifting 1 by 31 UB bug (git-fixes).\n- ALSA: iec1712: Initialize STDSP24 properly when using the model=staudio option (git-fixes).\n- ALSA: opti9xx: shut up gcc-10 range warning (bsc#1051510).\n- ALSA: pcm: fix incorrect hw_base increase (git-fixes).\n- ALSA: pcm: oss: Place the plugin buffer overflow checks correctly (bsc#1170522).\n- ALSA: rawmidi: Fix racy buffer resize under concurrent accesses (git-fixes).\n- ALSA: usb-audio: Add connector notifier delegation (bsc#1051510).\n- ALSA: usb-audio: Add control message quirk delay for Kingston HyperX headset (git-fixes).\n- ALSA: usb-audio: add mapping for ASRock TRX40 Creator (git-fixes).\n- ALSA: usb-audio: Add mixer workaround for TRX40 and co (bsc#1051510).\n- ALSA: usb-audio: Add quirk for Focusrite Scarlett 2i2 (bsc#1051510).\n- ALSA: usb-audio: Add static mapping table for ALC1220-VB-based mobos (bsc#1051510).\n- ALSA: usb-audio: Apply async workaround for Scarlett 2i4 2nd gen (bsc#1051510).\n- ALSA: usb-audio: Check mapping at creating connector controls, too (bsc#1051510).\n- ALSA: usb-audio: Correct a typo of NuPrime DAC-10 USB ID (bsc#1051510).\n- ALSA: usb-audio: Do not create jack controls for PCM terminals (bsc#1051510).\n- ALSA: usb-audio: Do not override ignore_ctl_error value from the map (bsc#1051510).\n- ALSA: usb-audio: Filter error from connector kctl ops, too (bsc#1051510).\n- ALSA: usb-audio: Fix usb audio refcnt leak when getting spdif (bsc#1051510).\n- ALSA: usb-audio: mixer: volume quirk for ESS Technology Asus USB DAC (git-fixes).\n- ALSA: usb-audio: Quirks for Gigabyte TRX40 Aorus Master onboard audio (git-fixes).\n- ALSA: usx2y: Fix potential NULL dereference (bsc#1051510).\n- ASoC: codecs: hdac_hdmi: Fix incorrect use of list_for_each_entry (bsc#1051510).\n- ASoC: dapm: connect virtual mux with default value (bsc#1051510).\n- ASoC: dapm: fixup dapm kcontrol widget (bsc#1051510).\n- ASoC: dpcm: allow start or stop during pause for backend (bsc#1051510).\n- ASoC: fix regwmask (bsc#1051510).\n- ASoC: msm8916-wcd-digital: Reset RX interpolation path after use (bsc#1051510).\n- ASoC: samsung: Prevent clk_get_rate() calls in atomic context (bsc#1111666).\n- ASoC: topology: Check return value of pcm_new_ver (bsc#1051510).\n- ASoC: topology: use name_prefix for new kcontrol (bsc#1051510).\n- b43legacy: Fix case where channel status is corrupted (bsc#1051510).\n- batman-adv: fix batadv_nc_random_weight_tq (git-fixes).\n- batman-adv: Fix refcnt leak in batadv_show_throughput_override (git-fixes).\n- batman-adv: Fix refcnt leak in batadv_store_throughput_override (git-fixes).\n- batman-adv: Fix refcnt leak in batadv_v_ogm_process (git-fixes).\n- bcache: avoid unnecessary btree nodes flushing in btree_flush_write() (git fixes (block drivers)).\n- bcache: fix incorrect data type usage in btree_flush_write() (git fixes (block drivers)).\n- bcache: Revert \u0027bcache: shrink btree node cache after bch_btree_check()\u0027 (git fixes (block drivers)).\n- blk-mq: honor IO scheduler for multiqueue devices (bsc#1165478).\n- blk-mq: simplify blk_mq_make_request() (bsc#1165478).\n- block/drbd: delete invalid function drbd_md_mark_dirty_ (bsc#1171527).\n- block: drbd: remove a stray unlock in __drbd_send_protocol() (bsc#1171599).\n- block: fix busy device checking in blk_drop_partitions again (bsc#1171948).\n- block: fix busy device checking in blk_drop_partitions (bsc#1171948).\n- block: fix memleak of bio integrity data (git fixes (block drivers)).\n- block: remove the bd_openers checks in blk_drop_partitions (bsc#1171948).\n- bnxt_en: fix memory leaks in bnxt_dcbnl_ieee_getets() (networking-stable-20_03_28).\n- bnxt_en: Reduce BNXT_MSIX_VEC_MAX value to supported CQs per PF (bsc#1104745).\n- bnxt_en: reinitialize IRQs when MTU is modified (networking-stable-20_03_14).\n- bnxt_en: Return error if bnxt_alloc_ctx_mem() fails (bsc#1104745 ).\n- bnxt_en: Return error when allocating zero size context memory (bsc#1104745).\n- bonding/alb: make sure arp header is pulled before accessing it (networking-stable-20_03_14).\n- bpf: Fix sk_psock refcnt leak when receiving message (bsc#1083647).\n- bpf: Forbid XADD on spilled pointers for unprivileged users (bsc#1083647).\n- brcmfmac: abort and release host after error (bsc#1051510).\n- btrfs: fix deadlock with memory reclaim during scrub (bsc#1172127).\n- btrfs: fix log context list corruption after rename whiteout error (bsc#1172342).\n- btrfs: fix partial loss of prealloc extent past i_size after fsync (bsc#1172343).\n- btrfs: relocation: add error injection points for cancelling balance (bsc#1171417).\n- btrfs: relocation: Check cancel request after each data page read (bsc#1171417).\n- btrfs: relocation: Check cancel request after each extent found (bsc#1171417).\n- btrfs: relocation: Clear the DEAD_RELOC_TREE bit for orphan roots to prevent runaway balance (bsc#1171417).\n- btrfs: relocation: Fix reloc root leakage and the NULL pointer reference caused by the leakage (bsc#1171417).\n- btrfs: relocation: Work around dead relocation stage loop (bsc#1171417).\n- btrfs: reloc: clear DEAD_RELOC_TREE bit for orphan roots to prevent runaway balance (bsc#1171417 bsc#1160947 bsc#1172366).\n- btrfs: reloc: fix reloc root leak and NULL pointer dereference (bsc#1171417 bsc#1160947 bsc#1172366).\n- btrfs: setup a nofs context for memory allocation at btrfs_create_tree() (bsc#1172127).\n- btrfs: setup a nofs context for memory allocation at __btrfs_set_acl (bsc#1172127).\n- btrfs: use nofs context when initializing security xattrs to avoid deadlock (bsc#1172127).\n- can: add missing attribute validation for termination (networking-stable-20_03_14).\n- cdc-acm: close race betrween suspend() and acm_softint (git-fixes).\n- cdc-acm: introduce a cool down (git-fixes).\n- ceph: check if file lock exists before sending unlock request (bsc#1168789).\n- ceph: demote quotarealm lookup warning to a debug message (bsc#1171692).\n- ceph: fix double unlock in handle_cap_export() (bsc#1171694).\n- ceph: fix endianness bug when handling MDS session feature bits (bsc#1171695).\n- cgroup, netclassid: periodically release file_lock on classid updating (networking-stable-20_03_14).\n- CIFS: Allocate crypto structures on the fly for calculating signatures of incoming packets (bsc#1144333).\n- CIFS: Allocate encryption header through kmalloc (bsc#1144333).\n- CIFS: allow unlock flock and OFD lock across fork (bsc#1144333).\n- CIFS: check new file size when extending file by fallocate (bsc#1144333).\n- CIFS: cifspdu.h: Replace zero-length array with flexible-array member (bsc#1144333).\n- CIFS: clear PF_MEMALLOC before exiting demultiplex thread (bsc#1144333).\n- CIFS: do not share tcons with DFS (bsc#1144333).\n- CIFS: dump the session id and keys also for SMB2 sessions (bsc#1144333).\n- CIFS: ensure correct super block for DFS reconnect (bsc#1144333).\n- CIFS: Fix bug which the return value by asynchronous read is error (bsc#1144333).\n- CIFS: fix uninitialised lease_key in open_shroot() (bsc#1144333).\n- CIFS: improve read performance for page size 64KB \u0026 cache=strict \u0026 vers=2.1+ (bsc#1144333).\n- CIFS: Increment num_remote_opens stats counter even in case of smb2_query_dir_first (bsc#1144333).\n- CIFS: minor update to comments around the cifs_tcp_ses_lock mutex (bsc#1144333).\n- CIFS: protect updating server-\u003edstaddr with a spinlock (bsc#1144333).\n- CIFS: smb2pdu.h: Replace zero-length array with flexible-array member (bsc#1144333).\n- CIFS: smbd: Calculate the correct maximum packet size for segmented SMBDirect send/receive (bsc#1144333).\n- CIFS: smbd: Check and extend sender credits in interrupt context (bsc#1144333).\n- CIFS: smbd: Check send queue size before posting a send (bsc#1144333).\n- CIFS: smbd: Do not schedule work to send immediate packet on every receive (bsc#1144333).\n- CIFS: smbd: Merge code to track pending packets (bsc#1144333).\n- CIFS: smbd: Properly process errors on ib_post_send (bsc#1144333).\n- CIFS: smbd: Update receive credits before sending and deal with credits roll back on failure before sending (bsc#1144333).\n- CIFS: Warn less noisily on default mount (bsc#1144333).\n- clk: Add clk_hw_unregister_composite helper function definition (bsc#1051510).\n- clk: imx6ull: use OSC clock during AXI rate change (bsc#1051510).\n- clk: imx: make mux parent strings const (bsc#1051510).\n- clk: mediatek: correct the clocks for MT2701 HDMI PHY module (bsc#1051510).\n- clk: sunxi-ng: a64: Fix gate bit of DSI DPHY (bsc#1051510).\n- clocksource/drivers/hyper-v: Set TSC clocksource as default w/ InvariantTSC (bsc#1170620, bsc#1170621).\n- clocksource: dw_apb_timer_of: Fix missing clockevent timers (bsc#1051510).\n- component: Silence bind error on -EPROBE_DEFER (bsc#1051510).\n- coresight: do not use the BIT() macro in the UAPI header (git fixes (block drivers)).\n- cpufreq: s3c64xx: Remove pointless NULL check in s3c64xx_cpufreq_driver_init (bsc#1051510).\n- crypto: ccp - AES CFB mode is a stream cipher (git-fixes).\n- crypto: ccp - Clean up and exit correctly on allocation failure (git-fixes).\n- crypto: ccp - Cleanup misc_dev on sev_exit() (bsc#1114279).\n- crypto: ccp - Cleanup sp_dev_master in psp_dev_destroy() (bsc#1114279).\n- cxgb4: fix MPS index overwrite when setting MAC address (bsc#1127355).\n- cxgb4: fix Txq restart check during backpressure (bsc#1127354 bsc#1127371).\n- debugfs: Add debugfs_create_xul() for hexadecimal unsigned long (git-fixes).\n- debugfs_lookup(): switch to lookup_one_len_unlocked() (bsc#1171979).\n- devlink: fix return value after hitting end in region read (bsc#1109837).\n- devlink: validate length of param values (bsc#1109837).\n- devlink: validate length of region addr/len (bsc#1109837).\n- dmaengine: dmatest: Fix iteration non-stop logic (bsc#1051510).\n- dm mpath: switch paths in dm_blk_ioctl() code path (bsc#1167574).\n- dm-raid1: fix invalid return value from dm_mirror (bsc#1172378).\n- dm writecache: fix data corruption when reloading the target (git fixes (block drivers)).\n- dm writecache: fix incorrect flush sequence when doing SSD mode commit (git fixes (block drivers)).\n- dm writecache: verify watermark during resume (git fixes (block drivers)).\n- dm zoned: fix invalid memory access (git fixes (block drivers)).\n- dm zoned: reduce overhead of backing device checks (git fixes (block drivers)).\n- dm zoned: remove duplicate nr_rnd_zones increase in dmz_init_zone() (git fixes (block drivers)).\n- dm zoned: support zone sizes smaller than 128MiB (git fixes (block drivers)).\n- dp83640: reverse arguments to list_add_tail (git-fixes).\n- drivers: hv: Add a module description line to the hv_vmbus driver (bsc#1172249, bsc#1172251).\n- drivers/net/ibmvnic: Update VNIC protocol version reporting (bsc#1065729).\n- drivers: w1: add hwmon support structures (jsc#SLE-11048).\n- drivers: w1: add hwmon temp support for w1_therm (jsc#SLE-11048).\n- drivers: w1: refactor w1_slave_show to make the temp reading functionality separate (jsc#SLE-11048).\n- drm: amd/acp: fix broken menu structure (bsc#1114279) \t* context changes\n- drm/amdgpu: Correctly initialize thermal controller for GPUs with Powerplay table v0 (e.g Hawaii) (bsc#1111666).\n- drm/amdgpu: Fix oops when pp_funcs is unset in ACPI event (bsc#1111666).\n- drm/amd/powerplay: force the trim of the mclk dpm_levels if OD is (bsc#1113956)\n- drm/atomic: Take the atomic toys away from X (bsc#1112178) \t* context changes\n- drm/crc: Actually allow to change the crc source (bsc#1114279) \t* offset changes\n- drm/dp_mst: Fix clearing payload state on topology disable (bsc#1051510).\n- drm/dp_mst: Reformat drm_dp_check_act_status() a bit (bsc#1051510).\n- drm/edid: Fix off-by-one in DispID DTD pixel clock (bsc#1114279)\n- drm/etnaviv: fix perfmon domain interation (bsc#1113956)\n- drm/etnaviv: rework perfmon query infrastructure (bsc#1112178)\n- drm/i915: Apply Wa_1406680159:icl,ehl as an engine workaround (bsc#1112178) \t* rename gt/intel_workarounds.c to intel_workarounds.c \t* context changes\n- drm/i915/gvt: Init DPLL/DDI vreg for virtual display instead of (bsc#1114279)\n- drm/i915: HDCP: fix Ri prime check done during link check (bsc#1112178) \t* rename display/intel_hdmi.c to intel_hdmi.c \t* context changes\n- drm/i915: properly sanity check batch_start_offset (bsc#1114279) \t* renamed display/intel_fbc.c -\u003e intel_fb.c \t* renamed gt/intel_rc6.c -\u003e intel_pm.c \t* context changes\n- drm/meson: Delete an error message in meson_dw_hdmi_bind() (bsc#1051510).\n- drm: NULL pointer dereference [null-pointer-deref] (CWE 476) problem (bsc#1114279)\n- drm/qxl: qxl_release leak in qxl_draw_dirty_fb() (bsc#1051510).\n- drm/qxl: qxl_release leak in qxl_hw_surface_alloc() (bsc#1051510).\n- drm/qxl: qxl_release use after free (bsc#1051510).\n- drm: Remove PageReserved manipulation from drm_pci_alloc (bsc#1114279) \t* offset changes\n- drm/sun4i: dsi: Allow binding the host without a panel (bsc#1113956)\n- drm/sun4i: dsi: Avoid hotplug race with DRM driver bind (bsc#1113956)\n- drm/sun4i: dsi: Remove incorrect use of runtime PM (bsc#1113956) \t* context changes\n- drm/sun4i: dsi: Remove unused drv from driver context (bsc#1113956) \t* context changes \t* keep include of sun4i_drv.h\n- dump_stack: avoid the livelock of the dump_lock (git fixes (block drivers)).\n- EDAC, sb_edac: Add support for systems with segmented PCI buses (bsc#1169525).\n- ext4: do not zeroout extents beyond i_disksize (bsc#1167851).\n- ext4: fix extent_status fragmentation for plain files (bsc#1171949).\n- ext4: use non-movable memory for superblock readahead (bsc#1171952).\n- fanotify: fix merging marks masks with FAN_ONDIR (bsc#1171679).\n- fbcon: fix null-ptr-deref in fbcon_switch (bsc#1114279) \t* rename drivers/video/fbdev/core to drivers/video/console \t* context changes\n- fib: add missing attribute validation for tun_id (networking-stable-20_03_14).\n- firmware: qcom: scm: fix compilation error when disabled (bsc#1051510).\n- fs/cifs: fix gcc warning in sid_to_id (bsc#1144333).\n- fs/seq_file.c: simplify seq_file iteration code and interface (bsc#1170125).\n- gpio: tegra: mask GPIO IRQs during IRQ shutdown (bsc#1051510).\n- gre: fix uninit-value in __iptunnel_pull_header (networking-stable-20_03_14).\n- HID: hid-input: clear unmapped usages (git-fixes).\n- HID: hyperv: Add a module description line (bsc#1172249, bsc#1172251).\n- HID: i2c-hid: add Trekstor Primebook C11B to descriptor override (git-fixes).\n- HID: i2c-hid: override HID descriptors for certain devices (git-fixes).\n- HID: multitouch: add eGalaxTouch P80H84 support (bsc#1051510).\n- HID: wacom: Read HID_DG_CONTACTMAX directly for non-generic devices (git-fixes).\n- hrtimer: Annotate lockless access to timer-\u003estate (git fixes (block drivers)).\n- hsr: add restart routine into hsr_get_node_list() (networking-stable-20_03_28).\n- hsr: check protocol version in hsr_newlink() (networking-stable-20_04_17).\n- hsr: fix general protection fault in hsr_addr_is_self() (networking-stable-20_03_28).\n- hsr: set .netnsok flag (networking-stable-20_03_28).\n- hsr: use rcu_read_lock() in hsr_get_node_{list/status}() (networking-stable-20_03_28).\n- i2c: acpi: Force bus speed to 400KHz if a Silead touchscreen is present (git-fixes).\n- i2c: acpi: put device when verifying client fails (git-fixes).\n- i2c: brcmstb: remove unused struct member (git-fixes).\n- i2c: core: Allow empty id_table in ACPI case as well (git-fixes).\n- i2c: core: decrease reference count of device node in i2c_unregister_device (git-fixes).\n- i2c: dev: Fix the race between the release of i2c_dev and cdev (bsc#1051510).\n- i2c: fix missing pm_runtime_put_sync in i2c_device_probe (git-fixes).\n- i2c-hid: properly terminate i2c_hid_dmi_desc_override_table array (git-fixes).\n- i2c: i801: Do not add ICH_RES_IO_SMI for the iTCO_wdt device (git-fixes).\n- i2c: iproc: Stop advertising support of SMBUS quick cmd (git-fixes).\n- i2c: isch: Remove unnecessary acpi.h include (git-fixes).\n- i2c: mux: demux-pinctrl: Fix an error handling path in \u0027i2c_demux_pinctrl_probe()\u0027 (bsc#1051510).\n- i2c: st: fix missing struct parameter description (bsc#1051510).\n- IB/mlx5: Fix missing congestion control debugfs on rep rdma device (bsc#1103991).\n- ibmvnic: Skip fatal error reset after passive init (bsc#1171078 ltc#184239).\n- iio:ad7797: Use correct attribute_group (bsc#1051510).\n- iio: adc: stm32-adc: fix device used to request dma (bsc#1051510).\n- iio: adc: stm32-adc: fix sleep in atomic context (git-fixes).\n- iio: adc: stm32-adc: Use dma_request_chan() instead dma_request_slave_channel() (bsc#1051510).\n- iio: dac: vf610: Fix an error handling path in \u0027vf610_dac_probe()\u0027 (bsc#1051510).\n- iio: sca3000: Remove an erroneous \u0027get_device()\u0027 (bsc#1051510).\n- iio: xilinx-xadc: Fix ADC-B powerdown (bsc#1051510).\n- iio: xilinx-xadc: Fix clearing interrupt when enabling trigger (bsc#1051510).\n- iio: xilinx-xadc: Fix sequencer configuration for aux channels in simultaneous mode (bsc#1051510).\n- ima: Fix return value of ima_write_policy() (git-fixes).\n- Input: evdev - call input_flush_device() on release(), not flush() (bsc#1051510).\n- Input: hyperv-keyboard - add module description (bsc#1172249, bsc#1172251).\n- Input: i8042 - add Acer Aspire 5738z to nomux list (bsc#1051510).\n- Input: i8042 - add ThinkPad S230u to i8042 reset list (bsc#1051510).\n- Input: raydium_i2c_ts - use true and false for boolean values (bsc#1051510).\n- Input: synaptics-rmi4 - fix error return code in rmi_driver_probe() (bsc#1051510).\n- Input: synaptics-rmi4 - really fix attn_data use-after-free (git-fixes).\n- Input: usbtouchscreen - add support for BonXeon TP (bsc#1051510).\n- Input: xpad - add custom init packet for Xbox One S controllers (bsc#1051510).\n- iommu/amd: Call domain_flush_complete() in update_domain() (bsc#1172096).\n- iommu/amd: Do not flush Device Table in iommu_map_page() (bsc#1172097).\n- iommu/amd: Do not loop forever when trying to increase address space (bsc#1172098).\n- iommu/amd: Fix legacy interrupt remapping for x2APIC-enabled system (bsc#1172099).\n- iommu/amd: Fix over-read of ACPI UID from IVRS table (bsc#1172101).\n- iommu/amd: Fix race in increase_address_space()/fetch_pte() (bsc#1172102).\n- iommu/amd: Update Device Table in increase_address_space() (bsc#1172103).\n- iommu: Fix reference count leak in iommu_group_alloc (bsc#1172397).\n- ip6_tunnel: Allow rcv/xmit even if remote address is a local address (bsc#1166978).\n- ipv4: fix a RCU-list lock in fib_triestat_seq_show (networking-stable-20_04_02).\n- ipv6/addrconf: call ipv6_mc_up() for non-Ethernet interface (networking-stable-20_03_14).\n- ipv6: do not auto-add link-local address to lag ports (networking-stable-20_04_09).\n- ipv6: fix IPV6_ADDRFORM operation logic (bsc#1171662).\n- ipv6: fix restrict IPV6_ADDRFORM operation (bsc#1171662).\n- ipvlan: add cond_resched_rcu() while processing muticast backlog (networking-stable-20_03_14).\n- ipvlan: do not deref eth hdr before checking it\u0027s set (networking-stable-20_03_14).\n- ipvlan: do not use cond_resched_rcu() in ipvlan_process_multicast() (networking-stable-20_03_14).\n- iwlwifi: pcie: actually release queue memory in TVQM (bsc#1051510).\n- ixgbe: do not check firmware errors (bsc#1170284).\n- kabi fix for early XHCI debug (git-fixes).\n- kabi for for md: improve handling of bio with REQ_PREFLUSH in md_flush_request() (git-fixes).\n- kabi/severities: Do not track KVM internal symbols.\n- kabi/severities: Ingnore get_dev_data() The function is internal to the AMD IOMMU driver and must not be called by any third party.\n- kabi workaround for snd_rawmidi buffer_ref field addition (git-fixes).\n- KEYS: reaching the keys quotas correctly (bsc#1051510).\n- KVM: arm64: Change hyp_panic()s dependency on tpidr_el2 (bsc#1133021).\n- KVM: arm64: Stop save/restoring host tpidr_el1 on VHE (bsc#1133021).\n- KVM: Check validity of resolved slot when searching memslots (bsc#1172104).\n- KVM: s390: vsie: Fix delivery of addressing exceptions (git-fixes).\n- KVM: SVM: Fix potential memory leak in svm_cpu_init() (bsc#1171736).\n- KVM x86: Extend AMD specific guest behavior to Hygon virtual CPUs (bsc#1152489).\n- l2tp: Allow management of tunnels and session in user namespace (networking-stable-20_04_17).\n- libata: Remove extra scsi_host_put() in ata_scsi_add_hosts() (bsc#1051510).\n- libata: Return correct status in sata_pmp_eh_recover_pm() when ATA_DFLAG_DETACH is set (bsc#1051510).\n- lib: raid6: fix awk build warnings (git fixes (block drivers)).\n- lib/raid6/test: fix build on distros whose /bin/sh is not bash (git fixes (block drivers)).\n- lib/stackdepot.c: fix global out-of-bounds in stack_slabs (git fixes (block drivers)).\n- locks: print unsigned ino in /proc/locks (bsc#1171951). \n- mac80211: add ieee80211_is_any_nullfunc() (bsc#1051510).\n- mac80211_hwsim: Use kstrndup() in place of kasprintf() (bsc#1051510).\n- mac80211: mesh: fix discovery timer re-arming issue / crash (bsc#1051510).\n- macsec: avoid to set wrong mtu (bsc#1051510).\n- macsec: restrict to ethernet devices (networking-stable-20_03_28).\n- macvlan: add cond_resched() during multicast processing (networking-stable-20_03_14).\n- macvlan: fix null dereference in macvlan_device_event() (bsc#1051510).\n- md: improve handling of bio with REQ_PREFLUSH in md_flush_request() (git-fixes).\n- md/raid0: Fix an error message in raid0_make_request() (git fixes (block drivers)).\n- md/raid10: prevent access of uninitialized resync_pages offset (git-fixes).\n- media: dvb: return -EREMOTEIO on i2c transfer failure (bsc#1051510).\n- media: platform: fcp: Set appropriate DMA parameters (bsc#1051510).\n- media: ti-vpe: cal: fix disable_irqs to only the intended target (git-fixes).\n- mei: release me_cl object reference (bsc#1051510).\n- mlxsw: Fix some IS_ERR() vs NULL bugs (networking-stable-20_04_27).\n- mlxsw: spectrum_flower: Do not stop at FLOW_ACTION_VLAN_MANGLE (networking-stable-20_04_09).\n- mlxsw: spectrum_mr: Fix list iteration in error path (bsc#1112374).\n- mmc: atmel-mci: Fix debugfs on 64-bit platforms (git-fixes).\n- mmc: core: Check request type before completing the request (git-fixes).\n- mmc: core: Fix recursive locking issue in CQE recovery path (git-fixes).\n- mmc: cqhci: Avoid false \u0027cqhci: CQE stuck on\u0027 by not open-coding timeout loop (git-fixes).\n- mmc: dw_mmc: Fix debugfs on 64-bit platforms (git-fixes).\n- mmc: meson-gx: make sure the descriptor is stopped on errors (git-fixes).\n- mmc: meson-gx: simplify interrupt handler (git-fixes).\n- mmc: renesas_sdhi: limit block count to 16 bit for old revisions (git-fixes).\n- mmc: sdhci-esdhc-imx: fix the mask for tuning start point (bsc#1051510).\n- mmc: sdhci-msm: Clear tuning done flag while hs400 tuning (bsc#1051510).\n- mmc: sdhci-of-at91: fix memleak on clk_get failure (git-fixes).\n- mmc: sdhci-pci: Fix eMMC driver strength for BYT-based controllers (bsc#1051510).\n- mmc: sdhci-xenon: fix annoying 1.8V regulator warning (bsc#1051510).\n- mmc: sdio: Fix potential NULL pointer error in mmc_sdio_init_card() (bsc#1051510).\n- mmc: tmio: fix access width of Block Count Register (git-fixes).\n- mm: limit boost_watermark on small zones (git fixes (mm/pgalloc)).\n- mm: thp: handle page cache THP correctly in PageTransCompoundMap (git fixes (block drivers)).\n- mtd: cfi: fix deadloop in cfi_cmdset_0002.c do_write_buffer (bsc#1051510).\n- mtd: spi-nor: cadence-quadspi: add a delay in write sequence (git-fixes).\n- mtd: spi-nor: enable 4B opcodes for mx66l51235l (git-fixes).\n- mtd: spi-nor: fsl-quadspi: Do not let -EINVAL on the bus (git-fixes).\n- mwifiex: avoid -Wstringop-overflow warning (bsc#1051510).\n- mwifiex: Fix memory corruption in dump_station (bsc#1051510).\n- net: bcmgenet: correct per TX/RX ring statistics (networking-stable-20_04_27).\n- net: dsa: b53: Fix ARL register definitions (networking-stable-20_04_27).\n- net: dsa: b53: Rework ARL bin logic (networking-stable-20_04_27).\n- net: dsa: bcm_sf2: Do not register slave MDIO bus with OF (networking-stable-20_04_09).\n- net: dsa: bcm_sf2: Ensure correct sub-node is parsed (networking-stable-20_04_09).\n- net: dsa: Fix duplicate frames flooded by learning (networking-stable-20_03_28).\n- net: dsa: mv88e6xxx: fix lockup on warm boot (networking-stable-20_03_14).\n- net/ethernet: add Google GVE driver (jsc#SLE-10538)\n- net: fec: add phy_reset_after_clk_enable() support (git-fixes).\n- net: fec: validate the new settings in fec_enet_set_coalesce() (networking-stable-20_03_14).\n- net: fix race condition in __inet_lookup_established() (bsc#1151794).\n- net: fq: add missing attribute validation for orphan mask (networking-stable-20_03_14).\n- net: hns3: fix \u0027tc qdisc del\u0027 failed issue (bsc#1109837).\n- net, ip_tunnel: fix interface lookup with no key (networking-stable-20_04_02).\n- net: ipv4: devinet: Fix crash when add/del multicast IP with autojoin (networking-stable-20_04_17).\n- net: ipv6: do not consider routes via gateways for anycast address check (networking-stable-20_04_17).\n- netlink: Use netlink header as base to calculate bad attribute offset (networking-stable-20_03_14).\n- net: macsec: update SCI upon MAC address change (networking-stable-20_03_14).\n- net: memcg: fix lockdep splat in inet_csk_accept() (networking-stable-20_03_14).\n- net: memcg: late association of sock to memcg (networking-stable-20_03_14).\n- net/mlx4_en: avoid indirect call in TX completion (networking-stable-20_04_27).\n- net/mlx5: Add new fields to Port Type and Speed register (bsc#1171118).\n- net/mlx5: Expose link speed directly (bsc#1171118).\n- net/mlx5: Expose port speed when possible (bsc#1171118).\n- net/mlx5: Fix failing fw tracer allocation on s390 (bsc#1103990 ).\n- net: mvneta: Fix the case where the last poll did not process all rx (networking-stable-20_03_28).\n- net: netrom: Fix potential nr_neigh refcnt leak in nr_add_node (networking-stable-20_04_27).\n- net/packet: tpacket_rcv: do not increment ring index on drop (networking-stable-20_03_14).\n- net: qmi_wwan: add support for ASKEY WWHC050 (networking-stable-20_03_28).\n- net: revert default NAPI poll timeout to 2 jiffies (networking-stable-20_04_17).\n- net_sched: cls_route: remove the right filter from hashtable (networking-stable-20_03_28).\n- net_sched: sch_skbprio: add message validation to skbprio_change() (bsc#1109837).\n- net/x25: Fix x25_neigh refcnt leak when receiving frame (networking-stable-20_04_27).\n- nfc: add missing attribute validation for SE API (networking-stable-20_03_14).\n- nfc: add missing attribute validation for vendor subcommand (networking-stable-20_03_14).\n- nfc: st21nfca: add missed kfree_skb() in an error path (bsc#1051510).\n- nfp: abm: fix a memory leak bug (bsc#1109837).\n- nfsd4: fix up replay_matches_cache() (git-fixes).\n- nfsd: Ensure CLONE persists data and metadata changes to the target file (git-fixes).\n- nfsd: fix delay timer on 32-bit architectures (git-fixes).\n- nfsd: fix jiffies/time_t mixup in LRU list (git-fixes).\n- NFS: Directory page cache pages need to be locked when read (git-fixes).\n- nfsd: memory corruption in nfsd4_lock() (git-fixes).\n- NFS: Do not call generic_error_remove_page() while holding locks (bsc#1170457).\n- NFS: Fix memory leaks and corruption in readdir (git-fixes).\n- NFS: Fix O_DIRECT accounting of number of bytes read/written (git-fixes).\n- NFS: Fix potential posix_acl refcnt leak in nfs3_set_acl (git-fixes).\n- NFS: fix racey wait in nfs_set_open_stateid_locked (bsc#1170592).\n- NFS/flexfiles: Use the correct TCP timeout for flexfiles I/O (git-fixes).\n- NFS/pnfs: Fix pnfs_generic_prepare_to_resend_writes() (git-fixes).\n- NFS: Revalidate the file size on a fatal write error (git-fixes).\n- NFSv4.0: nfs4_do_fsinfo() should not do implicit lease renewals (git-fixes).\n- NFSv4: Do not allow a cached open with a revoked delegation (git-fixes).\n- NFSv4: Fix leak of clp-\u003ecl_acceptor string (git-fixes).\n- NFSv4/pnfs: Return valid stateids in nfs_layout_find_inode_by_stateid() (git-fixes).\n- NFSv4: try lease recovery on NFS4ERR_EXPIRED (git-fixes).\n- NFSv4.x: Drop the slot if nfs4_delegreturn_prepare waits for layoutreturn (git-fixes).\n- nl802154: add missing attribute validation for dev_type (networking-stable-20_03_14).\n- nl802154: add missing attribute validation (networking-stable-20_03_14).\n- nvme-fc: print proper nvme-fc devloss_tmo value (bsc#1172391).\n- objtool: Fix stack offset tracking for indirect CFAs (bsc#1169514).\n- objtool: Fix switch table detection in .text.unlikely (bsc#1169514).\n- objtool: Make BP scratch register warning more robust (bsc#1169514).\n- padata: Remove broken queue flushing (git-fixes).\n- Partially revert \u0027kfifo: fix kfifo_alloc() and kfifo_init()\u0027 (git fixes (block drivers)).\n- PCI: hv: Add support for protocol 1.3 and support PCI_BUS_RELATIONS2 (bsc#1172201, bsc#1172202).\n- PCI: hv: Decouple the func definition in hv_dr_state from VSP message (bsc#1172201, bsc#1172202).\n- pinctrl: baytrail: Enable pin configuration setting for GPIO chip (git-fixes).\n- pinctrl: cherryview: Add missing spinlock usage in chv_gpio_irq_handler (git-fixes).\n- pinctrl: sunrisepoint: Fix PAD lock register offset for SPT-H (git-fixes).\n- platform/x86: asus-nb-wmi: Do not load on Asus T100TA and T200TA (bsc#1051510).\n- pNFS: Ensure we do clear the return-on-close layout stateid on fatal errors (git-fixes).\n- powerpc: Add attributes for setjmp/longjmp (bsc#1065729).\n- powerpc/pci/of: Parse unassigned resources (bsc#1065729).\n- powerpc/setup_64: Set cache-line-size based on cache-block-size (bsc#1065729).\n- powerpc/sstep: Fix DS operand in ld encoding to appropriate value (bsc#1065729).\n- r8152: check disconnect status after long sleep (networking-stable-20_03_14).\n- raid6/ppc: Fix build for clang (git fixes (block drivers)).\n- random: always use batched entropy for get_random_u{32,64} (bsc#1164871).\n- rcu: locking and unlocking need to always be at least barriers (git fixes (block drivers)).\n- Revert \u0027ALSA: hda/realtek: Fix pop noise on ALC225\u0027 (git-fixes).\n- Revert \u0027drm/panel: simple: Add support for Sharp LQ150X1LG11 panels\u0027 (bsc#1114279) \t* offset changes\n- Revert \u0027HID: i2c-hid: add Trekstor Primebook C11B to descriptor override\u0027 Depends on 9b5c747685982d22efffeafc5ec601bd28f6d78b, which was also reverted.\n- Revert \u0027HID: i2c-hid: override HID descriptors for certain devices\u0027 This broke i2c-hid.ko\u0027s build, there is no way around it without a big file rename or renaming the kernel module.\n- Revert \u0027i2c-hid: properly terminate i2c_hid_dmi_desc_override_table\u0027 Fixed 9b5c747685982d22efffeafc5ec601bd28f6d78b, which was also reverted.\n- Revert \u0027ipc,sem: remove uneeded sem_undo_list lock usage in exit_sem()\u0027 (bsc#1172221).\n- Revert \u0027RDMA/cma: Simplify rdma_resolve_addr() error flow\u0027 (bsc#1103992).\n- rtlwifi: Fix a double free in _rtl_usb_tx_urb_setup() (bsc#1051510).\n- s390/cpum_cf: Add new extended counters for IBM z15 (bsc#1169762 LTC#185291).\n- s390/ftrace: fix potential crashes when switching tracers (git-fixes).\n- s390/ism: fix error return code in ism_probe() (git-fixes).\n- s390/pci: do not set affinity for floating irqs (git-fixes).\n- s390/pci: Fix possible deadlock in recover_store() (bsc#1165183 LTC#184103).\n- s390/pci: Recover handle in clp_set_pci_fn() (bsc#1165183 LTC#184103).\n- scripts/decodecode: fix trapping instruction formatting (bsc#1065729).\n- scripts/dtc: Remove redundant YYLOC global declaration (bsc#1160388).\n- scsi: bnx2i: fix potential use after free (bsc#1171600).\n- scsi: core: Handle drivers which set sg_tablesize to zero (bsc#1171601) This commit also required: \u003e scsi: core: avoid preallocating big SGL for data\n- scsi: core: save/restore command resid for error handling (bsc#1171602).\n- scsi: core: scsi_trace: Use get_unaligned_be*() (bsc#1171604).\n- scsi: core: try to get module before removing device (bsc#1171605).\n- scsi: csiostor: Adjust indentation in csio_device_reset (bsc#1171606).\n- scsi: csiostor: Do not enable IRQs too early (bsc#1171607).\n- scsi: esas2r: unlock on error in esas2r_nvram_read_direct() (bsc#1171608).\n- scsi: fnic: fix invalid stack access (bsc#1171609).\n- scsi: fnic: fix msix interrupt allocation (bsc#1171610).\n- scsi: ibmvscsi: Fix WARN_ON during event pool release (bsc#1170791 ltc#185128).\n- scsi: iscsi: Avoid potential deadlock in iscsi_if_rx func (bsc#1171611).\n- scsi: iscsi: Fix a potential deadlock in the timeout handler (bsc#1171612).\n- scsi: iscsi: qla4xxx: fix double free in probe (bsc#1171613).\n- scsi: lpfc: Change default queue allocation for reduced memory consumption (bsc#1164780).\n- scsi: lpfc: fix: Coverity: lpfc_cmpl_els_rsp(): Null pointer dereferences (bsc#1171614).\n- scsi: lpfc: Fix crash in target side cable pulls hitting WAIT_FOR_UNREG (bsc#1171615).\n- scsi: lpfc: Fix lpfc_nodelist leak when processing unsolicited event (bsc#1164780).\n- scsi: lpfc: Fix MDS Diagnostic Enablement definition (bsc#1164780).\n- scsi: lpfc: Fix negation of else clause in lpfc_prep_node_fc4type (bsc#1164780).\n- scsi: lpfc: Fix noderef and address space warnings (bsc#1164780).\n- scsi: lpfc: Maintain atomic consistency of queue_claimed flag (bsc#1164780).\n- scsi: lpfc: remove duplicate unloading checks (bsc#1164780).\n- scsi: lpfc: Remove re-binding of nvme rport during registration (bsc#1164780).\n- scsi: lpfc: Remove redundant initialization to variable rc (bsc#1164780).\n- scsi: lpfc: Remove unnecessary lockdep_assert_held calls (bsc#1164780).\n- scsi: lpfc: Update lpfc version to 12.8.0.1 (bsc#1164780).\n- scsi: megaraid_sas: Do not initiate OCR if controller is not in ready state (bsc#1171616).\n- scsi: qla2xxx: add ring buffer for tracing debug logs (bsc#1157169).\n- scsi: qla2xxx: check UNLOADING before posting async work (bsc#1157169).\n- scsi: qla2xxx: Delete all sessions before unregister local nvme port (bsc#1157169).\n- scsi: qla2xxx: Do not log message when reading port speed via sysfs (bsc#1157169).\n- scsi: qla2xxx: Fix hang when issuing nvme disconnect-all in NPIV (bsc#1157169).\n- scsi: qla2xxx: Fix regression warnings (bsc#1157169).\n- scsi: qla2xxx: Remove non functional code (bsc#1157169).\n- scsi: qla2xxx: set UNLOADING before waiting for session deletion (bsc#1157169).\n- scsi: qla4xxx: Adjust indentation in qla4xxx_mem_free (bsc#1171617).\n- scsi: qla4xxx: fix double free bug (bsc#1171618).\n- scsi: sd: Clear sdkp-\u003eprotection_type if disk is reformatted without PI (bsc#1171619).\n- scsi: sg: add sg_remove_request in sg_common_write (bsc#1171620).\n- scsi: tracing: Fix handling of TRANSFER LENGTH == 0 for READ(6) and WRITE(6) (bsc#1171621).\n- scsi: ufs: change msleep to usleep_range (bsc#1171622).\n- scsi: ufs: Clean up ufshcd_scale_clks() and clock scaling error out path (bsc#1171623).\n- scsi: ufs: Fix ufshcd_hold() caused scheduling while atomic (bsc#1171624).\n- scsi: ufs: Fix ufshcd_probe_hba() reture value in case ufshcd_scsi_add_wlus() fails (bsc#1171625).\n- scsi: ufs: Recheck bkops level if bkops is disabled (bsc#1171626).\n- sctp: fix possibly using a bad saddr with a given dst (networking-stable-20_04_02).\n- sctp: fix refcount bug in sctp_wfree (networking-stable-20_04_02).\n- selftests/powerpc: Fix build errors in powerpc ptrace selftests (boo#1124278).\n- Separate one more kABI fixup from the functional change:\n- seq_file: fix problem when seeking mid-record (bsc#1170125).\n- serial: uartps: Move the spinlock after the read of the tx empty (git-fixes).\n- sfc: detach from cb_page in efx_copy_channel() (networking-stable-20_03_14).\n- signal/pid_namespace: Fix reboot_pid_ns to use send_sig not force_sig (bsc#1172185).\n- slcan: not call free_netdev before rtnl_unlock in slcan_open (networking-stable-20_03_28).\n- slip: make slhc_compress() more robust against malicious packets (networking-stable-20_03_14).\n- smb3: Additional compression structures (bsc#1144333).\n- smb3: Add new compression flags (bsc#1144333).\n- smb3: change noisy error message to FYI (bsc#1144333).\n- smb3: enable swap on SMB3 mounts (bsc#1144333).\n- smb3: Minor cleanup of protocol definitions (bsc#1144333).\n- smb3: remove overly noisy debug line in signing errors (bsc#1144333).\n- smb3: smbdirect support can be configured by default (bsc#1144333).\n- smb3: use SMB2_SIGNATURE_SIZE define (bsc#1144333).\n- spi: bcm2835: Fix 3-wire mode if DMA is enabled (git-fixes).\n- spi: bcm63xx-hsspi: Really keep pll clk enabled (bsc#1051510).\n- spi: bcm-qspi: when tx/rx buffer is NULL set to 0 (bsc#1051510).\n- spi: dw: Add SPI Rx-done wait method to DMA-based transfer (bsc#1051510).\n- spi: dw: Add SPI Tx-done wait method to DMA-based transfer (bsc#1051510).\n- spi: dw: Zero DMA Tx and Rx configurations on stack (bsc#1051510).\n- spi: fsl: do not map irq during probe (git-fixes).\n- spi: fsl: use platform_get_irq() instead of of_irq_to_resource() (git-fixes).\n- spi: pxa2xx: Add CS control clock quirk (bsc#1051510).\n- spi: qup: call spi_qup_pm_resume_runtime before suspending (bsc#1051510).\n- spi: spi-fsl-dspi: Replace interruptible wait queue with a simple completion (git-fixes).\n- spi: spi-s3c64xx: Fix system resume support (git-fixes).\n- spi/zynqmp: remove entry that causes a cs glitch (bsc#1051510).\n- staging: comedi: dt2815: fix writing hi byte of analog output (bsc#1051510).\n- staging: comedi: Fix comedi_device refcnt leak in comedi_open (bsc#1051510).\n- staging: iio: ad2s1210: Fix SPI reading (bsc#1051510).\n- staging: vt6656: Do not set RCR_MULTICAST or RCR_BROADCAST by default (git-fixes).\n- staging: vt6656: Fix drivers TBTT timing counter (git-fixes).\n- staging: vt6656: Fix pairwise key entry save (git-fixes).\n- sunrpc: expiry_time should be seconds not timeval (git-fixes).\n- SUNRPC: Fix a potential buffer overflow in \u0027svc_print_xprts()\u0027 (git-fixes).\n- supported.conf: Add br_netfilter to base (bsc#1169020).\n- supported.conf: support w1 core and thermometer support\n- svcrdma: Fix double svc_rdma_send_ctxt_put() in an error path (bsc#1103992).\n- svcrdma: Fix leak of transport addresses (git-fixes).\n- svcrdma: Fix trace point use-after-free race (bsc#1103992 ).\n- taskstats: fix data-race (bsc#1172188).\n- tcp: cache line align MAX_TCP_HEADER (networking-stable-20_04_27).\n- tcp: repair: fix TCP_QUEUE_SEQ implementation (networking-stable-20_03_28).\n- team: add missing attribute validation for array index (networking-stable-20_03_14).\n- team: add missing attribute validation for port ifindex (networking-stable-20_03_14).\n- team: fix hang in team_mode_get() (networking-stable-20_04_27).\n- tools lib traceevent: Remove unneeded qsort and uses memmove instead (git-fixes).\n- tpm: ibmvtpm: retry on H_CLOSED in tpm_ibmvtpm_send() (bsc#1065729).\n- tpm/tpm_tis: Free IRQ if probing fails (bsc#1082555).\n- tpm/tpm_tis: Free IRQ if probing fails (git-fixes).\n- tracing: Add a vmalloc_sync_mappings() for safe measure (git-fixes).\n- tracing: Disable trace_printk() on post poned tests (git-fixes).\n- tracing: Fix the race between registering \u0027snapshot\u0027 event trigger and triggering \u0027snapshot\u0027 operation (git-fixes).\n- tty: rocket, avoid OOB access (git-fixes).\n- tun: Do not put_page() for all negative return values from XDP program (bsc#1109837).\n- UAS: fix deadlock in error handling and PM flushing work (git-fixes).\n- UAS: no use logging any details in case of ENODEV (git-fixes).\n- Update config files: Build w1 bus on arm64 (jsc#SLE-11048)\n- USB: Add USB_QUIRK_DELAY_CTRL_MSG and USB_QUIRK_DELAY_INIT for Corsair K70 RGB RAPIDFIRE (git-fixes).\n- USB: cdc-acm: restore capability check order (git-fixes).\n- USB: core: Fix misleading driver bug report (bsc#1051510).\n- USB: dwc3: do not set gadget-\u003eis_otg flag (git-fixes).\n- USB: dwc3: gadget: Do link recovery for SS and SSP (git-fixes).\n- USB: early: Handle AMD\u0027s spec-compliant identifiers, too (git-fixes).\n- USB: f_fs: Clear OS Extended descriptor counts to zero in ffs_data_reset() (git-fixes).\n- USB: gadget: audio: Fix a missing error return value in audio_bind() (git-fixes).\n- USB: gadget: composite: Inform controller driver of self-powered (git-fixes).\n- USB: gadget: legacy: fix error return code in cdc_bind() (git-fixes).\n- USB: gadget: legacy: fix error return code in gncm_bind() (git-fixes).\n- USB: gadget: legacy: fix redundant initialization warnings (bsc#1051510).\n- USB: gadget: net2272: Fix a memory leak in an error handling path in \u0027net2272_plat_probe()\u0027 (git-fixes).\n- USB: gadget: udc: atmel: Fix vbus disconnect handling (git-fixes).\n- USB: gadget: udc: atmel: Make some symbols static (git-fixes).\n- USB: gadget: udc: bdc: Remove unnecessary NULL checks in bdc_req_complete (git-fixes).\n- USB: host: xhci-plat: keep runtime active when removing host (git-fixes).\n- USB: hub: Fix handling of connect changes during sleep (git-fixes).\n- usbnet: silence an unnecessary warning (bsc#1170770).\n- USB: serial: garmin_gps: add sanity checking for data length (git-fixes).\n- USB: serial: option: add BroadMobi BM806U (git-fixes).\n- USB: serial: option: add support for ASKEY WWHC050 (git-fixes).\n- USB: serial: option: add Wistron Neweb D19Q1 (git-fixes).\n- USB: serial: qcserial: Add DW5816e support (git-fixes).\n- USB: sisusbvga: Change port variable from signed to unsigned (git-fixes).\n- usb-storage: Add unusual_devs entry for JMicron JMS566 (git-fixes).\n- USB: uas: add quirk for LaCie 2Big Quadra (git-fixes).\n- USB: xhci: Fix NULL pointer dereference when enqueuing trbs from urb sg list (git-fixes).\n- video: fbdev: sis: Remove unnecessary parentheses and commented code (bsc#1114279)\n- video: fbdev: w100fb: Fix a potential double free (bsc#1051510).\n- vrf: Check skb for XFRM_TRANSFORMED flag (networking-stable-20_04_27).\n- vt: ioctl, switch VT_IS_IN_USE and VT_BUSY to inlines (git-fixes).\n- vt: selection, introduce vc_is_sel (git-fixes).\n- vt: vt_ioctl: fix race in VT_RESIZEX (git-fixes).\n- vt: vt_ioctl: fix use-after-free in vt_in_use() (git-fixes).\n- vt: vt_ioctl: fix VT_DISALLOCATE freeing in-use virtual console (git-fixes).\n- vxlan: check return value of gro_cells_init() (networking-stable-20_03_28).\n- w1: Add subsystem kernel public interface (jsc#SLE-11048).\n- w1: Fix slave count on 1-Wire bus (resend) (jsc#SLE-11048).\n- w1: keep balance of mutex locks and refcnts (jsc#SLE-11048).\n- w1: use put_device() if device_register() fail (jsc#SLE-11048).\n- watchdog: reset last_hw_keepalive time at start (git-fixes).\n- wcn36xx: Fix error handling path in \u0027wcn36xx_probe()\u0027 (bsc#1051510).\n- wil6210: remove reset file from debugfs (git-fixes).\n- wimax/i2400m: Fix potential urb refcnt leak (bsc#1051510).\n- workqueue: do not use wq_select_unbound_cpu() for bound works (bsc#1172130).\n- x86/entry/64: Fix unwind hints in kernel exit path (bsc#1058115).\n- x86/entry/64: Fix unwind hints in register clearing code (bsc#1058115).\n- x86/entry/64: Fix unwind hints in rewind_stack_do_exit() (bsc#1058115).\n- x86/entry/64: Fix unwind hints in __switch_to_asm() (bsc#1058115).\n- x86/hyperv: Allow guests to enable InvariantTSC (bsc#1170621, bsc#1170620).\n- x86/Hyper-V: Free hv_panic_page when fail to register kmsg dump (bsc#1170617, bsc#1170618).\n- x86/Hyper-V: Report crash data in die() when panic_on_oops is set (bsc#1170617, bsc#1170618).\n- x86/Hyper-V: Report crash register data or kmsg before running crash kernel (bsc#1170617, bsc#1170618).\n- x86/Hyper-V: Report crash register data when sysctl_record_panic_msg is not set (bsc#1170617, bsc#1170618).\n- x86/Hyper-V: report value of misc_features (git fixes).\n- x86/Hyper-V: Trigger crash enlightenment only once during system crash (bsc#1170617, bsc#1170618).\n- x86/Hyper-V: Unload vmbus channel in hv panic callback (bsc#1170617, bsc#1170618).\n- x86/kprobes: Avoid kretprobe recursion bug (bsc#1114279).\n- x86/resctrl: Fix invalid attempt at removing the default resource group (git-fixes).\n- x86/resctrl: Preserve CDP enable over CPU hotplug (bsc#1114279).\n- x86/unwind/orc: Do not skip the first frame for inactive tasks (bsc#1058115).\n- x86/unwind/orc: Fix error handling in __unwind_start() (bsc#1058115).\n- x86/unwind/orc: Fix error path for bad ORC entry type (bsc#1058115).\n- x86/unwind/orc: Fix unwind_get_return_address_ptr() for inactive tasks (bsc#1058115).\n- x86/unwind/orc: Prevent unwinding before ORC initialization (bsc#1058115).\n- x86/unwind: Prevent false warnings for non-current tasks (bsc#1058115).\n- xen/pci: reserve MCFG areas earlier (bsc#1170145).\n- xfrm: Always set XFRM_TRANSFORMED in xfrm{4,6}_output_finish (networking-stable-20_04_27).\n- xfs: clear PF_MEMALLOC before exiting xfsaild thread (git-fixes).\n- xfs: Correctly invert xfs_buftarg LRU isolation logic (git-fixes).\n- xfs: do not ever return a stale pointer from __xfs_dir3_free_read (git-fixes).\n- xprtrdma: Fix completion wait during device removal (git-fixes).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2020-1604,SUSE-SLE-Module-Public-Cloud-15-SP1-2020-1604", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2020_1604-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2020:1604-1", "url": "https://www.suse.com/support/update/announcement/2020/suse-su-20201604-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2020:1604-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-June/006931.html" }, { "category": "self", "summary": "SUSE Bug 1051510", "url": "https://bugzilla.suse.com/1051510" }, { "category": "self", "summary": "SUSE Bug 1058115", "url": "https://bugzilla.suse.com/1058115" }, { "category": "self", "summary": "SUSE Bug 1065729", "url": "https://bugzilla.suse.com/1065729" }, { "category": "self", "summary": "SUSE Bug 1082555", "url": "https://bugzilla.suse.com/1082555" }, { "category": "self", "summary": "SUSE Bug 1083647", "url": "https://bugzilla.suse.com/1083647" }, { "category": "self", "summary": "SUSE Bug 1089895", "url": "https://bugzilla.suse.com/1089895" }, { "category": "self", "summary": "SUSE Bug 1103990", "url": "https://bugzilla.suse.com/1103990" }, { "category": "self", "summary": "SUSE Bug 1103991", "url": "https://bugzilla.suse.com/1103991" }, { "category": "self", "summary": "SUSE Bug 1103992", "url": "https://bugzilla.suse.com/1103992" }, { "category": "self", "summary": "SUSE Bug 1104745", "url": "https://bugzilla.suse.com/1104745" }, { "category": "self", "summary": "SUSE Bug 1109837", "url": "https://bugzilla.suse.com/1109837" }, { "category": "self", "summary": "SUSE Bug 1111666", "url": "https://bugzilla.suse.com/1111666" }, { "category": "self", "summary": "SUSE Bug 1112178", "url": "https://bugzilla.suse.com/1112178" }, { "category": "self", "summary": "SUSE Bug 1112374", "url": "https://bugzilla.suse.com/1112374" }, { "category": "self", "summary": "SUSE Bug 1113956", "url": "https://bugzilla.suse.com/1113956" }, { "category": "self", "summary": "SUSE Bug 1114279", "url": "https://bugzilla.suse.com/1114279" }, { "category": "self", "summary": "SUSE Bug 1124278", "url": "https://bugzilla.suse.com/1124278" }, { "category": "self", "summary": "SUSE Bug 1127354", "url": "https://bugzilla.suse.com/1127354" }, { "category": "self", "summary": "SUSE Bug 1127355", "url": "https://bugzilla.suse.com/1127355" }, { "category": "self", "summary": "SUSE Bug 1127371", "url": "https://bugzilla.suse.com/1127371" }, { "category": "self", "summary": "SUSE Bug 1133021", "url": "https://bugzilla.suse.com/1133021" }, { "category": "self", "summary": "SUSE Bug 1142685", "url": "https://bugzilla.suse.com/1142685" }, { "category": "self", "summary": "SUSE Bug 1144333", "url": "https://bugzilla.suse.com/1144333" }, { "category": "self", "summary": "SUSE Bug 1151794", "url": "https://bugzilla.suse.com/1151794" }, { "category": "self", "summary": "SUSE Bug 1152489", "url": "https://bugzilla.suse.com/1152489" }, { "category": "self", "summary": "SUSE Bug 1154824", "url": "https://bugzilla.suse.com/1154824" }, { "category": "self", "summary": "SUSE Bug 1157169", "url": "https://bugzilla.suse.com/1157169" }, { "category": "self", "summary": "SUSE Bug 1158265", "url": "https://bugzilla.suse.com/1158265" }, { "category": "self", "summary": "SUSE Bug 1160388", "url": "https://bugzilla.suse.com/1160388" }, { "category": "self", "summary": "SUSE Bug 1160947", "url": "https://bugzilla.suse.com/1160947" }, { "category": "self", "summary": "SUSE Bug 1164780", "url": "https://bugzilla.suse.com/1164780" }, { "category": "self", "summary": "SUSE Bug 1164871", "url": "https://bugzilla.suse.com/1164871" }, { "category": "self", "summary": "SUSE Bug 1165183", "url": "https://bugzilla.suse.com/1165183" }, { "category": "self", "summary": "SUSE Bug 1165478", "url": "https://bugzilla.suse.com/1165478" }, { "category": "self", "summary": "SUSE Bug 1165741", "url": "https://bugzilla.suse.com/1165741" }, { "category": "self", "summary": "SUSE Bug 1166969", "url": "https://bugzilla.suse.com/1166969" }, { "category": "self", "summary": "SUSE Bug 1166978", "url": "https://bugzilla.suse.com/1166978" }, { "category": "self", "summary": "SUSE Bug 1167574", "url": "https://bugzilla.suse.com/1167574" }, { "category": "self", "summary": "SUSE Bug 1167851", "url": "https://bugzilla.suse.com/1167851" }, { "category": "self", "summary": "SUSE Bug 1167867", "url": "https://bugzilla.suse.com/1167867" }, { "category": "self", "summary": "SUSE Bug 1168332", "url": "https://bugzilla.suse.com/1168332" }, { "category": "self", "summary": "SUSE Bug 1168670", "url": "https://bugzilla.suse.com/1168670" }, { "category": "self", "summary": "SUSE Bug 1168789", "url": "https://bugzilla.suse.com/1168789" }, { "category": "self", "summary": "SUSE Bug 1169020", "url": "https://bugzilla.suse.com/1169020" }, { "category": "self", "summary": "SUSE Bug 1169514", "url": "https://bugzilla.suse.com/1169514" }, { "category": "self", "summary": "SUSE Bug 1169525", "url": "https://bugzilla.suse.com/1169525" }, { "category": "self", "summary": "SUSE Bug 1169762", "url": "https://bugzilla.suse.com/1169762" }, { "category": "self", "summary": "SUSE Bug 1170056", "url": "https://bugzilla.suse.com/1170056" }, { "category": "self", "summary": "SUSE Bug 1170125", "url": "https://bugzilla.suse.com/1170125" }, { "category": "self", "summary": "SUSE Bug 1170145", "url": "https://bugzilla.suse.com/1170145" }, { "category": "self", "summary": "SUSE Bug 1170284", "url": "https://bugzilla.suse.com/1170284" }, { "category": "self", "summary": "SUSE Bug 1170345", "url": "https://bugzilla.suse.com/1170345" }, { "category": "self", "summary": "SUSE Bug 1170457", "url": "https://bugzilla.suse.com/1170457" }, { "category": "self", "summary": "SUSE Bug 1170522", "url": "https://bugzilla.suse.com/1170522" }, { "category": "self", "summary": "SUSE Bug 1170592", "url": "https://bugzilla.suse.com/1170592" }, { "category": "self", "summary": "SUSE Bug 1170617", "url": "https://bugzilla.suse.com/1170617" }, { "category": "self", "summary": "SUSE Bug 1170618", "url": "https://bugzilla.suse.com/1170618" }, { "category": "self", "summary": "SUSE Bug 1170620", "url": "https://bugzilla.suse.com/1170620" }, { "category": "self", "summary": "SUSE Bug 1170621", "url": "https://bugzilla.suse.com/1170621" }, { "category": "self", "summary": "SUSE Bug 1170770", "url": "https://bugzilla.suse.com/1170770" }, { "category": "self", "summary": "SUSE Bug 1170778", "url": "https://bugzilla.suse.com/1170778" }, { "category": "self", "summary": "SUSE Bug 1170791", "url": "https://bugzilla.suse.com/1170791" }, { "category": "self", "summary": "SUSE Bug 1170901", "url": "https://bugzilla.suse.com/1170901" }, { "category": "self", "summary": "SUSE Bug 1171078", "url": "https://bugzilla.suse.com/1171078" }, { "category": "self", "summary": "SUSE Bug 1171098", "url": "https://bugzilla.suse.com/1171098" }, { "category": "self", "summary": "SUSE Bug 1171118", "url": "https://bugzilla.suse.com/1171118" }, { "category": "self", "summary": "SUSE Bug 1171189", "url": "https://bugzilla.suse.com/1171189" }, { "category": "self", "summary": "SUSE Bug 1171191", "url": "https://bugzilla.suse.com/1171191" }, { "category": "self", "summary": "SUSE Bug 1171195", "url": "https://bugzilla.suse.com/1171195" }, { "category": "self", "summary": "SUSE Bug 1171202", "url": "https://bugzilla.suse.com/1171202" }, { "category": "self", "summary": "SUSE Bug 1171205", "url": "https://bugzilla.suse.com/1171205" }, { "category": "self", "summary": "SUSE Bug 1171214", "url": "https://bugzilla.suse.com/1171214" }, { "category": "self", "summary": "SUSE Bug 1171217", "url": "https://bugzilla.suse.com/1171217" }, { "category": "self", "summary": "SUSE Bug 1171218", "url": "https://bugzilla.suse.com/1171218" }, { "category": "self", "summary": "SUSE Bug 1171219", "url": "https://bugzilla.suse.com/1171219" }, { "category": "self", "summary": "SUSE Bug 1171220", "url": "https://bugzilla.suse.com/1171220" }, { "category": "self", "summary": "SUSE Bug 1171244", "url": "https://bugzilla.suse.com/1171244" }, { "category": "self", "summary": "SUSE Bug 1171293", "url": "https://bugzilla.suse.com/1171293" }, { "category": "self", "summary": "SUSE Bug 1171417", "url": "https://bugzilla.suse.com/1171417" }, { "category": "self", "summary": "SUSE Bug 1171527", "url": "https://bugzilla.suse.com/1171527" }, { "category": "self", "summary": "SUSE Bug 1171599", "url": "https://bugzilla.suse.com/1171599" }, { "category": "self", "summary": "SUSE Bug 1171600", "url": "https://bugzilla.suse.com/1171600" }, { "category": "self", "summary": "SUSE Bug 1171601", "url": "https://bugzilla.suse.com/1171601" }, { "category": "self", "summary": "SUSE Bug 1171602", "url": "https://bugzilla.suse.com/1171602" }, { "category": "self", "summary": "SUSE Bug 1171604", "url": "https://bugzilla.suse.com/1171604" }, { "category": "self", "summary": "SUSE Bug 1171605", "url": "https://bugzilla.suse.com/1171605" }, { "category": "self", "summary": "SUSE Bug 1171606", "url": "https://bugzilla.suse.com/1171606" }, { "category": "self", "summary": "SUSE Bug 1171607", "url": "https://bugzilla.suse.com/1171607" }, { "category": "self", "summary": "SUSE Bug 1171608", "url": "https://bugzilla.suse.com/1171608" }, { "category": "self", "summary": "SUSE Bug 1171609", "url": "https://bugzilla.suse.com/1171609" }, { "category": "self", "summary": "SUSE Bug 1171610", "url": "https://bugzilla.suse.com/1171610" }, { "category": "self", "summary": "SUSE Bug 1171611", "url": "https://bugzilla.suse.com/1171611" }, { "category": "self", "summary": "SUSE Bug 1171612", "url": "https://bugzilla.suse.com/1171612" }, { "category": "self", "summary": "SUSE Bug 1171613", "url": "https://bugzilla.suse.com/1171613" }, { "category": "self", "summary": "SUSE Bug 1171614", "url": "https://bugzilla.suse.com/1171614" }, { "category": "self", "summary": "SUSE Bug 1171615", "url": "https://bugzilla.suse.com/1171615" }, { "category": "self", "summary": "SUSE Bug 1171616", "url": "https://bugzilla.suse.com/1171616" }, { "category": "self", "summary": "SUSE Bug 1171617", "url": "https://bugzilla.suse.com/1171617" }, { "category": "self", "summary": "SUSE Bug 1171618", "url": "https://bugzilla.suse.com/1171618" }, { "category": "self", "summary": "SUSE Bug 1171619", "url": "https://bugzilla.suse.com/1171619" }, { "category": "self", "summary": "SUSE Bug 1171620", "url": "https://bugzilla.suse.com/1171620" }, { "category": "self", "summary": "SUSE Bug 1171621", "url": "https://bugzilla.suse.com/1171621" }, { "category": "self", "summary": "SUSE Bug 1171622", "url": "https://bugzilla.suse.com/1171622" }, { "category": "self", "summary": "SUSE Bug 1171623", "url": "https://bugzilla.suse.com/1171623" }, { "category": "self", "summary": "SUSE Bug 1171624", "url": "https://bugzilla.suse.com/1171624" }, { "category": "self", "summary": "SUSE Bug 1171625", "url": "https://bugzilla.suse.com/1171625" }, { "category": "self", "summary": "SUSE Bug 1171626", "url": "https://bugzilla.suse.com/1171626" }, { "category": "self", "summary": "SUSE Bug 1171662", "url": "https://bugzilla.suse.com/1171662" }, { "category": "self", "summary": "SUSE Bug 1171679", "url": "https://bugzilla.suse.com/1171679" }, { "category": "self", "summary": "SUSE Bug 1171691", "url": "https://bugzilla.suse.com/1171691" }, { "category": "self", "summary": "SUSE Bug 1171692", "url": "https://bugzilla.suse.com/1171692" }, { "category": "self", "summary": "SUSE Bug 1171694", "url": "https://bugzilla.suse.com/1171694" }, { "category": "self", "summary": "SUSE Bug 1171695", "url": "https://bugzilla.suse.com/1171695" }, { "category": "self", "summary": "SUSE Bug 1171736", "url": "https://bugzilla.suse.com/1171736" }, { "category": "self", "summary": "SUSE Bug 1171817", "url": "https://bugzilla.suse.com/1171817" }, { "category": "self", "summary": "SUSE Bug 1171948", "url": "https://bugzilla.suse.com/1171948" }, { "category": "self", "summary": "SUSE Bug 1171949", "url": "https://bugzilla.suse.com/1171949" }, { "category": "self", "summary": "SUSE Bug 1171951", "url": "https://bugzilla.suse.com/1171951" }, { "category": "self", "summary": "SUSE Bug 1171952", "url": "https://bugzilla.suse.com/1171952" }, { "category": "self", "summary": "SUSE Bug 1171979", "url": "https://bugzilla.suse.com/1171979" }, { "category": "self", "summary": "SUSE Bug 1171982", "url": "https://bugzilla.suse.com/1171982" }, { "category": "self", "summary": "SUSE Bug 1171983", "url": "https://bugzilla.suse.com/1171983" }, { "category": "self", "summary": "SUSE Bug 1172017", "url": "https://bugzilla.suse.com/1172017" }, { "category": "self", "summary": "SUSE Bug 1172096", "url": "https://bugzilla.suse.com/1172096" }, { "category": "self", "summary": "SUSE Bug 1172097", "url": "https://bugzilla.suse.com/1172097" }, { "category": "self", "summary": "SUSE Bug 1172098", "url": "https://bugzilla.suse.com/1172098" }, { "category": "self", "summary": "SUSE Bug 1172099", "url": "https://bugzilla.suse.com/1172099" }, { "category": "self", "summary": "SUSE Bug 1172101", "url": "https://bugzilla.suse.com/1172101" }, { "category": "self", "summary": "SUSE Bug 1172102", "url": "https://bugzilla.suse.com/1172102" }, { "category": "self", "summary": "SUSE Bug 1172103", "url": "https://bugzilla.suse.com/1172103" }, { "category": "self", "summary": "SUSE Bug 1172104", "url": "https://bugzilla.suse.com/1172104" }, { "category": "self", "summary": "SUSE Bug 1172127", "url": "https://bugzilla.suse.com/1172127" }, { "category": "self", "summary": "SUSE Bug 1172130", "url": "https://bugzilla.suse.com/1172130" }, { "category": "self", "summary": "SUSE Bug 1172185", "url": "https://bugzilla.suse.com/1172185" }, { "category": "self", "summary": "SUSE Bug 1172188", "url": "https://bugzilla.suse.com/1172188" }, { "category": "self", "summary": "SUSE Bug 1172199", "url": "https://bugzilla.suse.com/1172199" }, { "category": "self", "summary": "SUSE Bug 1172201", "url": "https://bugzilla.suse.com/1172201" }, { "category": "self", "summary": "SUSE Bug 1172202", "url": "https://bugzilla.suse.com/1172202" }, { "category": "self", "summary": "SUSE Bug 1172221", "url": "https://bugzilla.suse.com/1172221" }, { "category": "self", "summary": "SUSE Bug 1172249", "url": "https://bugzilla.suse.com/1172249" }, { "category": "self", "summary": "SUSE Bug 1172251", "url": "https://bugzilla.suse.com/1172251" }, { "category": "self", "summary": "SUSE Bug 1172317", "url": "https://bugzilla.suse.com/1172317" }, { "category": "self", "summary": "SUSE Bug 1172342", "url": "https://bugzilla.suse.com/1172342" }, { "category": "self", "summary": "SUSE Bug 1172343", "url": "https://bugzilla.suse.com/1172343" }, { "category": "self", "summary": "SUSE Bug 1172344", "url": "https://bugzilla.suse.com/1172344" }, { "category": "self", "summary": "SUSE Bug 1172366", "url": "https://bugzilla.suse.com/1172366" }, { "category": "self", "summary": "SUSE Bug 1172378", "url": "https://bugzilla.suse.com/1172378" }, { "category": "self", "summary": "SUSE Bug 1172391", "url": "https://bugzilla.suse.com/1172391" }, { "category": "self", "summary": "SUSE Bug 1172397", "url": "https://bugzilla.suse.com/1172397" }, { "category": "self", "summary": "SUSE Bug 1172453", "url": "https://bugzilla.suse.com/1172453" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1000199 page", "url": "https://www.suse.com/security/cve/CVE-2018-1000199/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-19462 page", "url": "https://www.suse.com/security/cve/CVE-2019-19462/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-20806 page", "url": "https://www.suse.com/security/cve/CVE-2019-20806/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-20812 page", "url": "https://www.suse.com/security/cve/CVE-2019-20812/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9455 page", "url": "https://www.suse.com/security/cve/CVE-2019-9455/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-0543 page", "url": "https://www.suse.com/security/cve/CVE-2020-0543/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10690 page", "url": "https://www.suse.com/security/cve/CVE-2020-10690/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10711 page", "url": "https://www.suse.com/security/cve/CVE-2020-10711/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10720 page", "url": "https://www.suse.com/security/cve/CVE-2020-10720/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10732 page", "url": "https://www.suse.com/security/cve/CVE-2020-10732/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10751 page", "url": "https://www.suse.com/security/cve/CVE-2020-10751/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10757 page", "url": "https://www.suse.com/security/cve/CVE-2020-10757/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12114 page", "url": "https://www.suse.com/security/cve/CVE-2020-12114/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12464 page", "url": "https://www.suse.com/security/cve/CVE-2020-12464/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12652 page", "url": "https://www.suse.com/security/cve/CVE-2020-12652/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12653 page", "url": "https://www.suse.com/security/cve/CVE-2020-12653/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12654 page", "url": "https://www.suse.com/security/cve/CVE-2020-12654/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12655 page", "url": "https://www.suse.com/security/cve/CVE-2020-12655/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12656 page", "url": "https://www.suse.com/security/cve/CVE-2020-12656/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12657 page", "url": "https://www.suse.com/security/cve/CVE-2020-12657/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12659 page", "url": "https://www.suse.com/security/cve/CVE-2020-12659/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12768 page", "url": "https://www.suse.com/security/cve/CVE-2020-12768/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12769 page", "url": "https://www.suse.com/security/cve/CVE-2020-12769/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-13143 page", "url": "https://www.suse.com/security/cve/CVE-2020-13143/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2020-06-10T13:29:01Z", "generator": { "date": "2020-06-10T13:29:01Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2020:1604-1", "initial_release_date": "2020-06-10T13:29:01Z", "revision_history": [ { "date": "2020-06-10T13:29:01Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-devel-azure-4.12.14-8.33.1.noarch", "product": { "name": "kernel-devel-azure-4.12.14-8.33.1.noarch", "product_id": "kernel-devel-azure-4.12.14-8.33.1.noarch" } }, { "category": "product_version", "name": "kernel-source-azure-4.12.14-8.33.1.noarch", "product": { "name": "kernel-source-azure-4.12.14-8.33.1.noarch", "product_id": "kernel-source-azure-4.12.14-8.33.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-azure-4.12.14-8.33.1.x86_64", "product": { "name": "cluster-md-kmp-azure-4.12.14-8.33.1.x86_64", "product_id": "cluster-md-kmp-azure-4.12.14-8.33.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-azure-4.12.14-8.33.1.x86_64", "product": { "name": "dlm-kmp-azure-4.12.14-8.33.1.x86_64", "product_id": "dlm-kmp-azure-4.12.14-8.33.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-azure-4.12.14-8.33.1.x86_64", "product": { "name": "gfs2-kmp-azure-4.12.14-8.33.1.x86_64", "product_id": "gfs2-kmp-azure-4.12.14-8.33.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-4.12.14-8.33.1.x86_64", "product": { "name": "kernel-azure-4.12.14-8.33.1.x86_64", "product_id": "kernel-azure-4.12.14-8.33.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-base-4.12.14-8.33.1.x86_64", "product": { "name": "kernel-azure-base-4.12.14-8.33.1.x86_64", "product_id": "kernel-azure-base-4.12.14-8.33.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-devel-4.12.14-8.33.1.x86_64", "product": { "name": "kernel-azure-devel-4.12.14-8.33.1.x86_64", "product_id": "kernel-azure-devel-4.12.14-8.33.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-extra-4.12.14-8.33.1.x86_64", "product": { "name": "kernel-azure-extra-4.12.14-8.33.1.x86_64", "product_id": "kernel-azure-extra-4.12.14-8.33.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-livepatch-devel-4.12.14-8.33.1.x86_64", "product": { "name": "kernel-azure-livepatch-devel-4.12.14-8.33.1.x86_64", "product_id": "kernel-azure-livepatch-devel-4.12.14-8.33.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-azure-4.12.14-8.33.1.x86_64", "product": { "name": "kernel-syms-azure-4.12.14-8.33.1.x86_64", "product_id": "kernel-syms-azure-4.12.14-8.33.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-azure-4.12.14-8.33.1.x86_64", "product": { "name": "kselftests-kmp-azure-4.12.14-8.33.1.x86_64", "product_id": "kselftests-kmp-azure-4.12.14-8.33.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-azure-4.12.14-8.33.1.x86_64", "product": { "name": "ocfs2-kmp-azure-4.12.14-8.33.1.x86_64", "product_id": "ocfs2-kmp-azure-4.12.14-8.33.1.x86_64" } }, { "category": "product_version", "name": "reiserfs-kmp-azure-4.12.14-8.33.1.x86_64", "product": { "name": "reiserfs-kmp-azure-4.12.14-8.33.1.x86_64", "product_id": "reiserfs-kmp-azure-4.12.14-8.33.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Module for Public Cloud 15 SP1", "product": { "name": "SUSE Linux Enterprise Module for Public Cloud 15 SP1", "product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-public-cloud:15:sp1" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-4.12.14-8.33.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP1", "product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.33.1.x86_64" }, "product_reference": "kernel-azure-4.12.14-8.33.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-base-4.12.14-8.33.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP1", "product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.33.1.x86_64" }, "product_reference": "kernel-azure-base-4.12.14-8.33.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-devel-4.12.14-8.33.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP1", "product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.33.1.x86_64" }, "product_reference": "kernel-azure-devel-4.12.14-8.33.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-azure-4.12.14-8.33.1.noarch as component of SUSE Linux Enterprise Module for Public Cloud 15 SP1", "product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.33.1.noarch" }, "product_reference": "kernel-devel-azure-4.12.14-8.33.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-azure-4.12.14-8.33.1.noarch as component of SUSE Linux Enterprise Module for Public Cloud 15 SP1", "product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.33.1.noarch" }, "product_reference": "kernel-source-azure-4.12.14-8.33.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-azure-4.12.14-8.33.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP1", "product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.33.1.x86_64" }, "product_reference": "kernel-syms-azure-4.12.14-8.33.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP1" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-1000199", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1000199" } ], "notes": [ { "category": "general", "text": "The Linux Kernel version 3.18 contains a dangerous feature vulnerability in modify_user_hw_breakpoint() that can result in crash and possibly memory corruption. This attack appear to be exploitable via local code execution and the ability to use ptrace. This vulnerability appears to have been fixed in git commit f67b15037a7a50c57f72e69a6d59941ad90a0f0f.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.33.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1000199", "url": "https://www.suse.com/security/cve/CVE-2018-1000199" }, { "category": "external", "summary": "SUSE Bug 1089895 for CVE-2018-1000199", "url": "https://bugzilla.suse.com/1089895" }, { "category": "external", "summary": "SUSE Bug 1090036 for CVE-2018-1000199", "url": "https://bugzilla.suse.com/1090036" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.33.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.33.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-10T13:29:01Z", "details": "important" } ], "title": "CVE-2018-1000199" }, { "cve": "CVE-2019-19462", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-19462" } ], "notes": [ { "category": "general", "text": "relay_open in kernel/relay.c in the Linux kernel through 5.4.1 allows local users to cause a denial of service (such as relay blockage) by triggering a NULL alloc_percpu result.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.33.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-19462", "url": "https://www.suse.com/security/cve/CVE-2019-19462" }, { "category": "external", "summary": "SUSE Bug 1158265 for CVE-2019-19462", "url": "https://bugzilla.suse.com/1158265" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.33.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.33.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-10T13:29:01Z", "details": "low" } ], "title": "CVE-2019-19462" }, { "cve": "CVE-2019-20806", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-20806" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.2. There is a NULL pointer dereference in tw5864_handle_frame() in drivers/media/pci/tw5864/tw5864-video.c, which may cause denial of service, aka CID-2e7682ebfc75.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.33.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-20806", "url": "https://www.suse.com/security/cve/CVE-2019-20806" }, { "category": "external", "summary": "SUSE Bug 1172199 for CVE-2019-20806", "url": "https://bugzilla.suse.com/1172199" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.33.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.9, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.33.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-10T13:29:01Z", "details": "low" } ], "title": "CVE-2019-20806" }, { "cve": "CVE-2019-20812", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-20812" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.4.7. The prb_calc_retire_blk_tmo() function in net/packet/af_packet.c can result in a denial of service (CPU consumption and soft lockup) in a certain failure case involving TPACKET_V3, aka CID-b43d1f9f7067.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.33.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-20812", "url": "https://www.suse.com/security/cve/CVE-2019-20812" }, { "category": "external", "summary": "SUSE Bug 1172453 for CVE-2019-20812", "url": "https://bugzilla.suse.com/1172453" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.33.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.33.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-10T13:29:01Z", "details": "moderate" } ], "title": "CVE-2019-20812" }, { "cve": "CVE-2019-9455", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9455" } ], "notes": [ { "category": "general", "text": "In the Android kernel in the video driver there is a kernel pointer leak due to a WARN_ON statement. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.33.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9455", "url": "https://www.suse.com/security/cve/CVE-2019-9455" }, { "category": "external", "summary": "SUSE Bug 1170345 for CVE-2019-9455", "url": "https://bugzilla.suse.com/1170345" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.33.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.33.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-10T13:29:01Z", "details": "moderate" } ], "title": "CVE-2019-9455" }, { "cve": "CVE-2020-0543", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-0543" } ], "notes": [ { "category": "general", "text": "Incomplete cleanup from specific special register read operations in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.33.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-0543", "url": "https://www.suse.com/security/cve/CVE-2020-0543" }, { "category": "external", "summary": "SUSE Bug 1154824 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1154824" }, { "category": "external", "summary": "SUSE Bug 1172205 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172205" }, { "category": "external", "summary": "SUSE Bug 1172206 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172206" }, { "category": "external", "summary": "SUSE Bug 1172207 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172207" }, { "category": "external", "summary": "SUSE Bug 1172770 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172770" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.33.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.33.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-10T13:29:01Z", "details": "moderate" } ], "title": "CVE-2020-0543" }, { "cve": "CVE-2020-10690", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10690" } ], "notes": [ { "category": "general", "text": "There is a use-after-free in kernel versions before 5.5 due to a race condition between the release of ptp_clock and cdev while resource deallocation. When a (high privileged) process allocates a ptp device file (like /dev/ptpX) and voluntarily goes to sleep. During this time if the underlying device is removed, it can cause an exploitable condition as the process wakes up to terminate and clean all attached files. The system crashes due to the cdev structure being invalid (as already freed) which is pointed to by the inode.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.33.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10690", "url": "https://www.suse.com/security/cve/CVE-2020-10690" }, { "category": "external", "summary": "SUSE Bug 1170056 for CVE-2020-10690", "url": "https://bugzilla.suse.com/1170056" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.33.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.33.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-10T13:29:01Z", "details": "moderate" } ], "title": "CVE-2020-10690" }, { "cve": "CVE-2020-10711", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10711" } ], "notes": [ { "category": "general", "text": "A NULL pointer dereference flaw was found in the Linux kernel\u0027s SELinux subsystem in versions before 5.7. This flaw occurs while importing the Commercial IP Security Option (CIPSO) protocol\u0027s category bitmap into the SELinux extensible bitmap via the\u0027 ebitmap_netlbl_import\u0027 routine. While processing the CIPSO restricted bitmap tag in the \u0027cipso_v4_parsetag_rbm\u0027 routine, it sets the security attribute to indicate that the category bitmap is present, even if it has not been allocated. This issue leads to a NULL pointer dereference issue while importing the same category bitmap into SELinux. This flaw allows a remote network user to crash the system kernel, resulting in a denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.33.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10711", "url": "https://www.suse.com/security/cve/CVE-2020-10711" }, { "category": "external", "summary": "SUSE Bug 1171191 for CVE-2020-10711", "url": "https://bugzilla.suse.com/1171191" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.33.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.33.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-10T13:29:01Z", "details": "moderate" } ], "title": "CVE-2020-10711" }, { "cve": "CVE-2020-10720", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10720" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s implementation of GRO in versions before 5.2. This flaw allows an attacker with local access to crash the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.33.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10720", "url": "https://www.suse.com/security/cve/CVE-2020-10720" }, { "category": "external", "summary": "SUSE Bug 1170778 for CVE-2020-10720", "url": "https://bugzilla.suse.com/1170778" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.33.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.33.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-10T13:29:01Z", "details": "moderate" } ], "title": "CVE-2020-10720" }, { "cve": "CVE-2020-10732", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10732" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s implementation of Userspace core dumps. This flaw allows an attacker with a local account to crash a trivial program and exfiltrate private kernel data.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.33.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10732", "url": "https://www.suse.com/security/cve/CVE-2020-10732" }, { "category": "external", "summary": "SUSE Bug 1171220 for CVE-2020-10732", "url": "https://bugzilla.suse.com/1171220" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.33.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.33.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-10T13:29:01Z", "details": "low" } ], "title": "CVE-2020-10732" }, { "cve": "CVE-2020-10751", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10751" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernels SELinux LSM hook implementation before version 5.7, where it incorrectly assumed that an skb would only contain a single netlink message. The hook would incorrectly only validate the first netlink message in the skb and allow or deny the rest of the messages within the skb with the granted permission without further processing.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.33.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10751", "url": "https://www.suse.com/security/cve/CVE-2020-10751" }, { "category": "external", "summary": "SUSE Bug 1171189 for CVE-2020-10751", "url": "https://bugzilla.suse.com/1171189" }, { "category": "external", "summary": "SUSE Bug 1174963 for CVE-2020-10751", "url": "https://bugzilla.suse.com/1174963" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.33.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.33.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-10T13:29:01Z", "details": "moderate" } ], "title": "CVE-2020-10751" }, { "cve": "CVE-2020-10757", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10757" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux Kernel in versions after 4.5-rc1 in the way mremap handled DAX Huge Pages. This flaw allows a local attacker with access to a DAX enabled storage to escalate their privileges on the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.33.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10757", "url": "https://www.suse.com/security/cve/CVE-2020-10757" }, { "category": "external", "summary": "SUSE Bug 1159281 for CVE-2020-10757", "url": "https://bugzilla.suse.com/1159281" }, { "category": "external", "summary": "SUSE Bug 1172317 for CVE-2020-10757", "url": "https://bugzilla.suse.com/1172317" }, { "category": "external", "summary": "SUSE Bug 1172437 for CVE-2020-10757", "url": "https://bugzilla.suse.com/1172437" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.33.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.33.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-10T13:29:01Z", "details": "important" } ], "title": "CVE-2020-10757" }, { "cve": "CVE-2020-12114", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12114" } ], "notes": [ { "category": "general", "text": "A pivot_root race condition in fs/namespace.c in the Linux kernel 4.4.x before 4.4.221, 4.9.x before 4.9.221, 4.14.x before 4.14.178, 4.19.x before 4.19.119, and 5.x before 5.3 allows local users to cause a denial of service (panic) by corrupting a mountpoint reference counter.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.33.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12114", "url": "https://www.suse.com/security/cve/CVE-2020-12114" }, { "category": "external", "summary": "SUSE Bug 1171098 for CVE-2020-12114", "url": "https://bugzilla.suse.com/1171098" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.33.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.33.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-10T13:29:01Z", "details": "moderate" } ], "title": "CVE-2020-12114" }, { "cve": "CVE-2020-12464", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12464" } ], "notes": [ { "category": "general", "text": "usb_sg_cancel in drivers/usb/core/message.c in the Linux kernel before 5.6.8 has a use-after-free because a transfer occurs without a reference, aka CID-056ad39ee925.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.33.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12464", "url": "https://www.suse.com/security/cve/CVE-2020-12464" }, { "category": "external", "summary": "SUSE Bug 1170901 for CVE-2020-12464", "url": "https://bugzilla.suse.com/1170901" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.33.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 1.8, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.33.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-10T13:29:01Z", "details": "low" } ], "title": "CVE-2020-12464" }, { "cve": "CVE-2020-12652", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12652" } ], "notes": [ { "category": "general", "text": "The __mptctl_ioctl function in drivers/message/fusion/mptctl.c in the Linux kernel before 5.4.14 allows local users to hold an incorrect lock during the ioctl operation and trigger a race condition, i.e., a \"double fetch\" vulnerability, aka CID-28d76df18f0a. NOTE: the vendor states \"The security impact of this bug is not as bad as it could have been because these operations are all privileged and root already has enormous destructive power.\"", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.33.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12652", "url": "https://www.suse.com/security/cve/CVE-2020-12652" }, { "category": "external", "summary": "SUSE Bug 1171218 for CVE-2020-12652", "url": "https://bugzilla.suse.com/1171218" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.33.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.33.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-10T13:29:01Z", "details": "moderate" } ], "title": "CVE-2020-12652" }, { "cve": "CVE-2020-12653", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12653" } ], "notes": [ { "category": "general", "text": "An issue was found in Linux kernel before 5.5.4. The mwifiex_cmd_append_vsie_tlv() function in drivers/net/wireless/marvell/mwifiex/scan.c allows local users to gain privileges or cause a denial of service because of an incorrect memcpy and buffer overflow, aka CID-b70261a288ea.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.33.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12653", "url": "https://www.suse.com/security/cve/CVE-2020-12653" }, { "category": "external", "summary": "SUSE Bug 1159281 for CVE-2020-12653", "url": "https://bugzilla.suse.com/1159281" }, { "category": "external", "summary": "SUSE Bug 1171195 for CVE-2020-12653", "url": "https://bugzilla.suse.com/1171195" }, { "category": "external", "summary": "SUSE Bug 1171254 for CVE-2020-12653", "url": "https://bugzilla.suse.com/1171254" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.33.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.33.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-10T13:29:01Z", "details": "important" } ], "title": "CVE-2020-12653" }, { "cve": "CVE-2020-12654", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12654" } ], "notes": [ { "category": "general", "text": "An issue was found in Linux kernel before 5.5.4. mwifiex_ret_wmm_get_status() in drivers/net/wireless/marvell/mwifiex/wmm.c allows a remote AP to trigger a heap-based buffer overflow because of an incorrect memcpy, aka CID-3a9b153c5591.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.33.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12654", "url": "https://www.suse.com/security/cve/CVE-2020-12654" }, { "category": "external", "summary": "SUSE Bug 1159281 for CVE-2020-12654", "url": "https://bugzilla.suse.com/1159281" }, { "category": "external", "summary": "SUSE Bug 1171202 for CVE-2020-12654", "url": "https://bugzilla.suse.com/1171202" }, { "category": "external", "summary": "SUSE Bug 1171252 for CVE-2020-12654", "url": "https://bugzilla.suse.com/1171252" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.33.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.33.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-10T13:29:01Z", "details": "important" } ], "title": "CVE-2020-12654" }, { "cve": "CVE-2020-12655", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12655" } ], "notes": [ { "category": "general", "text": "An issue was discovered in xfs_agf_verify in fs/xfs/libxfs/xfs_alloc.c in the Linux kernel through 5.6.10. Attackers may trigger a sync of excessive duration via an XFS v5 image with crafted metadata, aka CID-d0c7feaf8767.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.33.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12655", "url": "https://www.suse.com/security/cve/CVE-2020-12655" }, { "category": "external", "summary": "SUSE Bug 1171217 for CVE-2020-12655", "url": "https://bugzilla.suse.com/1171217" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.33.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.8, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.33.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-10T13:29:01Z", "details": "moderate" } ], "title": "CVE-2020-12655" }, { "cve": "CVE-2020-12656", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12656" } ], "notes": [ { "category": "general", "text": "gss_mech_free in net/sunrpc/auth_gss/gss_mech_switch.c in the rpcsec_gss_krb5 implementation in the Linux kernel through 5.6.10 lacks certain domain_release calls, leading to a memory leak. Note: This was disputed with the assertion that the issue does not grant any access not already available. It is a problem that on unloading a specific kernel module some memory is leaked, but loading kernel modules is a privileged operation. A user could also write a kernel module to consume any amount of memory they like and load that replicating the effect of this bug", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.33.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12656", "url": "https://www.suse.com/security/cve/CVE-2020-12656" }, { "category": "external", "summary": "SUSE Bug 1171219 for CVE-2020-12656", "url": "https://bugzilla.suse.com/1171219" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.33.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.9, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.33.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-10T13:29:01Z", "details": "low" } ], "title": "CVE-2020-12656" }, { "cve": "CVE-2020-12657", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12657" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.6.5. There is a use-after-free in block/bfq-iosched.c related to bfq_idle_slice_timer_body.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.33.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12657", "url": "https://www.suse.com/security/cve/CVE-2020-12657" }, { "category": "external", "summary": "SUSE Bug 1171205 for CVE-2020-12657", "url": "https://bugzilla.suse.com/1171205" }, { "category": "external", "summary": "SUSE Bug 1201585 for CVE-2020-12657", "url": "https://bugzilla.suse.com/1201585" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.33.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.33.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-10T13:29:01Z", "details": "important" } ], "title": "CVE-2020-12657" }, { "cve": "CVE-2020-12659", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12659" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.6.7. xdp_umem_reg in net/xdp/xdp_umem.c has an out-of-bounds write (by a user with the CAP_NET_ADMIN capability) because of a lack of headroom validation.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.33.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12659", "url": "https://www.suse.com/security/cve/CVE-2020-12659" }, { "category": "external", "summary": "SUSE Bug 1171214 for CVE-2020-12659", "url": "https://bugzilla.suse.com/1171214" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.33.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.33.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-10T13:29:01Z", "details": "moderate" } ], "title": "CVE-2020-12659" }, { "cve": "CVE-2020-12768", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12768" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.6. svm_cpu_uninit in arch/x86/kvm/svm.c has a memory leak, aka CID-d80b64ff297e. NOTE: third parties dispute this issue because it\u0027s a one-time leak at the boot, the size is negligible, and it can\u0027t be triggered at will", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.33.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12768", "url": "https://www.suse.com/security/cve/CVE-2020-12768" }, { "category": "external", "summary": "SUSE Bug 1171736 for CVE-2020-12768", "url": "https://bugzilla.suse.com/1171736" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.33.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.33.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-10T13:29:01Z", "details": "moderate" } ], "title": "CVE-2020-12768" }, { "cve": "CVE-2020-12769", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12769" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.4.17. drivers/spi/spi-dw.c allows attackers to cause a panic via concurrent calls to dw_spi_irq and dw_spi_transfer_one, aka CID-19b61392c5a8.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.33.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12769", "url": "https://www.suse.com/security/cve/CVE-2020-12769" }, { "category": "external", "summary": "SUSE Bug 1171983 for CVE-2020-12769", "url": "https://bugzilla.suse.com/1171983" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.33.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.33.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-10T13:29:01Z", "details": "moderate" } ], "title": "CVE-2020-12769" }, { "cve": "CVE-2020-13143", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-13143" } ], "notes": [ { "category": "general", "text": "gadget_dev_desc_UDC_store in drivers/usb/gadget/configfs.c in the Linux kernel 3.16 through 5.6.13 relies on kstrdup without considering the possibility of an internal \u0027\\0\u0027 value, which allows attackers to trigger an out-of-bounds read, aka CID-15753588bcd4.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.33.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-13143", "url": "https://www.suse.com/security/cve/CVE-2020-13143" }, { "category": "external", "summary": "SUSE Bug 1171982 for CVE-2020-13143", "url": "https://bugzilla.suse.com/1171982" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.33.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.33.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.33.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.33.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-10T13:29:01Z", "details": "moderate" } ], "title": "CVE-2020-13143" } ] }
suse-su-2020:2156-1
Vulnerability from csaf_suse
Published
2020-08-06 18:03
Modified
2020-08-06 18:03
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 12 SP4 RT kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2020-10135: Legacy pairing and secure-connections pairing authentication in Bluetooth BR/EDR Core Specification v5.2 and earlier may have allowed an unauthenticated user to complete authentication without pairing credentials via adjacent access. An unauthenticated, adjacent attacker could impersonate a Bluetooth BR/EDR master or slave to pair with a previously paired remote device to successfully complete the authentication procedure without knowing the link key (bnc#1171988).
- CVE-2020-0305: In cdev_get of char_dev.c, there is a possible use-after-free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation (bnc#1174462).
- CVE-2019-20908: An issue was discovered in drivers/firmware/efi/efi.c where incorrect access permissions for the efivar_ssdt ACPI variable could be used by attackers to bypass lockdown or secure boot restrictions, aka CID-1957a85b0032 (bnc#1173567).
- CVE-2020-10781: zram sysfs resource consumption was fixed (bnc#1173074).
- CVE-2020-15780: An issue was discovered in drivers/acpi/acpi_configfs.c where injection of malicious ACPI tables via configfs could be used by attackers to bypass lockdown and secure boot restrictions, aka CID-75b0cea7bf30 (bnc#1173573).
- CVE-2020-15393: usbtest_disconnect in drivers/usb/misc/usbtest.c had a memory leak, aka CID-28ebeb8db770 (bnc#1173514).
- CVE-2020-12771: btree_gc_coalesce in drivers/md/bcache/btree.c had a deadlock if a coalescing operation fails (bnc#1171732).
- CVE-2020-12888: The VFIO PCI driver mishandled attempts to access disabled memory space (bnc#1171868).
- CVE-2020-10769: A buffer over-read flaw was found in crypto_authenc_extractkeys in crypto/authenc.c in the IPsec Cryptographic algorithm's module, authenc. When a payload longer than 4 bytes, and is not following 4-byte alignment boundary guidelines, it causes a buffer over-read threat, leading to a system crash. This flaw allowed a local attacker with user privileges to cause a denial of service (bnc#1173265).
- CVE-2020-10773: A kernel stack information leak on s390/s390x was fixed (bnc#1172999).
- CVE-2020-14416: A race condition in tty->disc_data handling in the slip and slcan line discipline could lead to a use-after-free, aka CID-0ace17d56824. This affects drivers/net/slip/slip.c and drivers/net/can/slcan.c (bnc#1162002).
- CVE-2020-10766: Fixed an issue which allowed an attacker with a local account to disable SSBD protection (bnc#1172781).
- CVE-2020-10767: Fixed an issue where Indirect Branch Prediction Barrier was disabled in certain circumstances, leaving the system open to a spectre v2 style attack (bnc#1172782).
- CVE-2020-10768: Fixed an issue with the prctl() function, where indirect branch speculation could be enabled even though it was diabled before (bnc#1172783).
- CVE-2020-13974: Fixed a integer overflow in drivers/tty/vt/keyboard.c, if k_ascii is called several times in a row (bnc#1172775).
- CVE-2020-0543: Fixed a side channel attack against special registers which could have resulted in leaking of read values to cores other than the one which called it. This attack is known as Special Register Buffer Data Sampling (SRBDS) or 'CrossTalk' (bsc#1154824).
- CVE-2020-13974: Fixed an integer overflow in drivers/tty/vt/keyboard.c which could have been caused by calling multiple time in a row k_ascii (bsc#1172775).
- CVE-2020-13143: Fixed an out-of-bounds read in gadget_dev_desc_UDC_store in drivers/usb/gadget/configfs.c (bsc#1171982).
- CVE-2020-12769: Fixed an issue which could have allowed attackers to cause a panic via concurrent calls to dw_spi_irq and dw_spi_transfer_one (bsc#1171983).
- CVE-2020-12657: An a use-after-free in block/bfq-iosched.c (bsc#1171205).
- CVE-2020-12656: Fixed an improper handling of certain domain_release calls leadingch could have led to a memory leak (bsc#1171219).
- CVE-2020-12655: Fixed an issue which could have allowed attackers to trigger a sync of excessive duration via an XFS v5 image with crafted metadata (bsc#1171217).
- CVE-2020-12654: Fixed an issue in he wifi driver which could have allowed a remote AP to trigger a heap-based buffer overflow (bsc#1171202).
- CVE-2020-12653: Fixed an issue in the wifi driver which could have allowed local users to gain privileges or cause a denial of service (bsc#1171195).
- CVE-2020-12652: Fixed an issue which could have allowed local users to hold an incorrect lock during the ioctl operation and trigger a race condition (bsc#1171218).
- CVE-2020-12464: Fixed a use-after-free due to a transfer without a reference (bsc#1170901).
- CVE-2020-12114: Fixed a pivot_root race condition which could have allowed local users to cause a denial of service (panic) by corrupting a mountpoint reference counter (bsc#1171098).
- CVE-2020-10757: Fixed an issue where remaping hugepage DAX to anon mmap could have caused user PTE access (bsc#1172317).
- CVE-2020-10751: Fixed an improper implementation in SELinux LSM hook where it was assumed that an skb would only contain a single netlink message (bsc#1171189).
- CVE-2020-10732: Fixed kernel data leak in userspace coredumps due to uninitialized data (bsc#1171220).
- CVE-2020-10720: Fixed a use-after-free read in napi_gro_frags() (bsc#1170778).
- CVE-2020-10711: Fixed a null pointer dereference in SELinux subsystem which could have allowed a remote network user to crash the kernel resulting in a denial of service (bsc#1171191).
- CVE-2020-10690: Fixed the race between the release of ptp_clock and cdev (bsc#1170056).
- CVE-2019-9455: Fixed a pointer leak due to a WARN_ON statement in a video driver. This could lead to local information disclosure with System execution privileges needed (bsc#1170345).
- CVE-2019-20812: Fixed an issue in prb_calc_retire_blk_tmo() which could have resulted in a denial of service (bsc#1172453).
- CVE-2019-20810: Fixed a memory leak in due to not calling of snd_card_free (bsc#1172458).
- CVE-2019-20806: Fixed a null pointer dereference which may had lead to denial of service (bsc#1172199).
- CVE-2019-19462: Fixed an issue which could have allowed local user to cause denial of service (bsc#1158265).
- CVE-2019-16746: An issue was discovered in net/wireless/nl80211.c, where the length of variable elements in a beacon head was not checked, leading to a buffer overflow (bnc#1152107 1173659).
- CVE-2019-20810: go7007_snd_init in drivers/media/usb/go7007/snd-go7007.c did not call snd_card_free for a failure path, which caused a memory leak, aka CID-9453264ef586 (bnc#1172458).
- CVE-2018-1000199: Fixed a potential local code execution via ptrace (bsc#1089895).
The following non-security bugs were fixed:
- ACPI: CPPC: Fix reference count leak in acpi_cppc_processor_probe() (bsc#1051510).
- ACPI: PM: Avoid using power resources if there are none for D0 (bsc#1051510).
- ACPI: sysfs: Fix reference count leak in acpi_sysfs_add_hotplug_profile() (bsc#1051510).
- acpi/x86: ignore unspecified bit positions in the ACPI global lock field (bsc#1051510).
- agp/intel: Reinforce the barrier after GTT updates (bsc#1051510).
- ALSA: ctxfi: Remove unnecessary cast in kfree (bsc#1051510).
- ALSA: dummy: Fix PCM format loop in proc output (bsc#1111666).
- ALSA: es1688: Add the missed snd_card_free() (bsc#1051510).
- ALSA: hda: Do not release card at firmware loading error (bsc#1051510).
- ALSA: hda/hdmi: fix race in monitor detection during probe (bsc#1051510).
- ALSA: hda/hdmi: fix without unlocked before return (bsc#1051510).
- ALSA: hda: Keep the controller initialization even if no codecs found (bsc#1051510).
- ALSA: hda/realtek - Add more fixup entries for Clevo machines (git-fixes).
- ALSA: hda/realtek - Add new codec supported for ALC245 (bsc#1051510).
- ALSA: hda/realtek - Add new codec supported for ALC287 (git-fixes).
- ALSA: hda/realtek - Fix S3 pop noise on Dell Wyse (git-fixes).
- ALSA: hda/realtek - Fix unexpected init_amp override (bsc#1051510).
- ALSA: hda/realtek - Limit int mic boost for Thinkpad T530 (git-fixes bsc#1171293).
- ALSA: hda/realtek - Two front mics on a Lenovo ThinkCenter (bsc#1051510).
- ALSA: hwdep: fix a left shifting 1 by 31 UB bug (git-fixes).
- ALSA: iec1712: Initialize STDSP24 properly when using the model=staudio option (git-fixes).
- ALSA: opti9xx: shut up gcc-10 range warning (bsc#1051510).
- ALSA: pcm: fix incorrect hw_base increase (git-fixes).
- ALSA: pcm: oss: Place the plugin buffer overflow checks correctly (bsc#1170522).
- ALSA: rawmidi: Fix racy buffer resize under concurrent accesses (git-fixes).
- ALSA: usb-audio: Add control message quirk delay for Kingston HyperX headset (git-fixes).
- ALSA: usb-audio: Correct a typo of NuPrime DAC-10 USB ID (bsc#1051510).
- ALSA: usb-audio: Do not override ignore_ctl_error value from the map (bsc#1051510).
- ALSA: usb-audio: Fix usb audio refcnt leak when getting spdif (bsc#1051510).
- ALSA: usb-audio: mixer: volume quirk for ESS Technology Asus USB DAC (git-fixes).
- ALSA: usx2y: Fix potential NULL dereference (bsc#1051510).
- ASoC: codecs: hdac_hdmi: Fix incorrect use of list_for_each_entry (bsc#1051510).
- ASoC: dapm: connect virtual mux with default value (bsc#1051510).
- ASoC: dapm: fixup dapm kcontrol widget (bsc#1051510).
- ASoC: dpcm: allow start or stop during pause for backend (bsc#1051510).
- ASoC: fix regwmask (bsc#1051510).
- ASoC: msm8916-wcd-digital: Reset RX interpolation path after use (bsc#1051510).
- ASoC: samsung: Prevent clk_get_rate() calls in atomic context (bsc#1111666).
- ASoC: topology: Check return value of pcm_new_ver (bsc#1051510).
- ASoC: topology: use name_prefix for new kcontrol (bsc#1051510).
- b43legacy: Fix case where channel status is corrupted (bsc#1051510).
- batman-adv: fix batadv_nc_random_weight_tq (git-fixes).
- batman-adv: Fix refcnt leak in batadv_show_throughput_override (git-fixes).
- batman-adv: Fix refcnt leak in batadv_store_throughput_override (git-fixes).
- batman-adv: Fix refcnt leak in batadv_v_ogm_process (git-fixes).
- bcache: avoid unnecessary btree nodes flushing in btree_flush_write() (git fixes (block drivers)).
- bcache: Fix an error code in bch_dump_read() (git fixes (block drivers)).
- bcache: fix incorrect data type usage in btree_flush_write() (git fixes (block drivers)).
- bcache: Revert 'bcache: shrink btree node cache after bch_btree_check()' (git fixes (block drivers)).
- block, bfq: add requeue-request hook (bsc#1104967 bsc#1171673).
- block, bfq: postpone rq preparation to insert or merge (bsc#1104967 bsc#1171673).
- block/drbd: delete invalid function drbd_md_mark_dirty_ (bsc#1171527).
- block: drbd: remove a stray unlock in __drbd_send_protocol() (bsc#1171599).
- block: fix busy device checking in blk_drop_partitions again (bsc#1171948).
- block: fix busy device checking in blk_drop_partitions (bsc#1171948).
- block: fix memleak of bio integrity data (git fixes (block drivers)).
- block: remove QUEUE_FLAG_STACKABLE (git fixes (block drivers)).
- block: remove the bd_openers checks in blk_drop_partitions (bsc#1171948).
- block: sed-opal: fix sparse warning: convert __be64 data (git fixes (block drivers)).
- bnxt_en: fix memory leaks in bnxt_dcbnl_ieee_getets() (networking-stable-20_03_28).
- bnxt_en: reinitialize IRQs when MTU is modified (networking-stable-20_03_14).
- bonding/alb: make sure arp header is pulled before accessing it (networking-stable-20_03_14).
- brcmfmac: abort and release host after error (bsc#1051510).
- btrfs: always wait on ordered extents at fsync time (bsc#1171761).
- btrfs: clean up the left over logged_list usage (bsc#1171761).
- btrfs: do not zero f_bavail if we have available space (bsc#1168081).
- btrfs: fix deadlock with memory reclaim during scrub (bsc#1172127).
- Btrfs: fix list_add corruption and soft lockups in fsync (bsc#1171761).
- btrfs: fix log context list corruption after rename whiteout error (bsc#1172342).
- Btrfs: fix missing data checksums after a ranged fsync (msync) (bsc#1171761).
- btrfs: fix missing file extent item for hole after ranged fsync (bsc#1171761).
- Btrfs: fix missing hole after hole punching and fsync when using NO_HOLES (bsc#1171761).
- btrfs: fix missing semaphore unlock in btrfs_sync_file (bsc#1171761).
- btrfs: fix partial loss of prealloc extent past i_size after fsync (bsc#1172343).
- Btrfs: fix rare chances for data loss when doing a fast fsync (bsc#1171761).
- btrfs: move the dio_sem higher up the callchain (bsc#1171761).
- btrfs: reloc: clear DEAD_RELOC_TREE bit for orphan roots to prevent runaway balance (bsc#1171417 bsc#1160947 bsc#1172366).
- btrfs: reloc: fix reloc root leak and NULL pointer dereference (bsc#1171417 bsc#1160947 bsc#1172366).
- btrfs: Remove extra parentheses from condition in copy_items() (bsc#1171761).
- Btrfs: remove no longer used io_err from btrfs_log_ctx (bsc#1171761).
- Btrfs: remove no longer used logged range variables when logging extents (bsc#1171761).
- Btrfs: remove no longer used 'sync' member from transaction handle (bsc#1171761).
- btrfs: remove remaing full_sync logic from btrfs_sync_file (bsc#1171761).
- btrfs: remove the logged extents infrastructure (bsc#1171761).
- btrfs: remove the wait ordered logic in the log_one_extent path (bsc#1171761).
- btrfs: setup a nofs context for memory allocation at btrfs_create_tree() (bsc#1172127).
- btrfs: setup a nofs context for memory allocation at __btrfs_set_acl (bsc#1172127).
- btrfs: use nofs context when initializing security xattrs to avoid deadlock (bsc#1172127).
- btrfs: volumes: Remove ENOSPC-prone btrfs_can_relocate() (bsc#1171124).
- can: add missing attribute validation for termination (networking-stable-20_03_14).
- cdc-acm: close race betrween suspend() and acm_softint (git-fixes).
- CDC-ACM: heed quirk also in error handling (git-fixes).
- cdc-acm: introduce a cool down (git-fixes).
- ceph: fix double unlock in handle_cap_export() (bsc#1171694).
- ceph: fix endianness bug when handling MDS session feature bits (bsc#1171695).
- cgroup, netclassid: periodically release file_lock on classid updating (networking-stable-20_03_14).
- CIFS: Allocate crypto structures on the fly for calculating signatures of incoming packets (bsc#1144333).
- CIFS: Allocate encryption header through kmalloc (bsc#1144333).
- CIFS: allow unlock flock and OFD lock across fork (bsc#1144333).
- CIFS: check new file size when extending file by fallocate (bsc#1144333).
- CIFS: cifspdu.h: Replace zero-length array with flexible-array member (bsc#1144333).
- CIFS: clear PF_MEMALLOC before exiting demultiplex thread (bsc#1144333).
- CIFS: do not share tcons with DFS (bsc#1144333).
- CIFS: dump the session id and keys also for SMB2 sessions (bsc#1144333).
- CIFS: ensure correct super block for DFS reconnect (bsc#1144333).
- CIFS: Fix bug which the return value by asynchronous read is error (bsc#1144333).
- CIFS: fix uninitialised lease_key in open_shroot() (bsc#1144333).
- cifs: get rid of unused parameter in reconn_setup_dfs_targets() (bsc#1144333).
- cifs: handle hostnames that resolve to same ip in failover (bsc#1144333 bsc#1161016).
- CIFS: improve read performance for page size 64KB & cache=strict & vers=2.1+ (bsc#1144333).
- CIFS: Increment num_remote_opens stats counter even in case of smb2_query_dir_first (bsc#1144333).
- CIFS: minor update to comments around the cifs_tcp_ses_lock mutex (bsc#1144333).
- CIFS: protect updating server->dstaddr with a spinlock (bsc#1144333).
- cifs: set up next DFS target before generic_ip_connect() (bsc#1144333 bsc#1161016).
- CIFS: smb2pdu.h: Replace zero-length array with flexible-array member (bsc#1144333).
- CIFS: smbd: Calculate the correct maximum packet size for segmented SMBDirect send/receive (bsc#1144333).
- CIFS: smbd: Check and extend sender credits in interrupt context (bsc#1144333).
- CIFS: smbd: Check send queue size before posting a send (bsc#1144333).
- CIFS: smbd: Do not schedule work to send immediate packet on every receive (bsc#1144333).
- CIFS: smbd: Merge code to track pending packets (bsc#1144333).
- CIFS: smbd: Properly process errors on ib_post_send (bsc#1144333).
- CIFS: smbd: Update receive credits before sending and deal with credits roll back on failure before sending (bsc#1144333).
- CIFS: Warn less noisily on default mount (bsc#1144333).
- clk: Add clk_hw_unregister_composite helper function definition (bsc#1051510).
- clk: bcm2835: Fix return type of bcm2835_register_gate (bsc#1051510).
- clk: clk-flexgen: fix clock-critical handling (bsc#1051510).
- clk: imx6ull: use OSC clock during AXI rate change (bsc#1051510).
- clk: imx: make mux parent strings const (bsc#1051510).
- clk: mediatek: correct the clocks for MT2701 HDMI PHY module (bsc#1051510).
- clk: sunxi: Fix incorrect usage of round_down() (bsc#1051510).
- clk: sunxi-ng: a64: Fix gate bit of DSI DPHY (bsc#1051510).
- clocksource/drivers/hyper-v: Set TSC clocksource as default w/ InvariantTSC (bsc#1170620).
- clocksource: dw_apb_timer_of: Fix missing clockevent timers (bsc#1051510).
- compat_ioctl: block: handle BLKREPORTZONE/BLKRESETZONE (git fixes (block drivers)).
- compat_ioctl: block: handle Persistent Reservations (git fixes (block drivers)).
- component: Silence bind error on -EPROBE_DEFER (bsc#1051510).
- copy_{to,from}_user(): consolidate object size checks (git fixes).
- coresight: do not use the BIT() macro in the UAPI header (git fixes (block drivers)).
- cpufreq: s3c64xx: Remove pointless NULL check in s3c64xx_cpufreq_driver_init (bsc#1051510).
- crypto: cavium/nitrox - Fix 'nitrox_get_first_device()' when ndevlist is fully iterated (git-fixes).
- crypto: ccp - AES CFB mode is a stream cipher (git-fixes).
- crypto: ccp - Clean up and exit correctly on allocation failure (git-fixes).
- crypto: ccp - Cleanup misc_dev on sev_exit() (bsc#1114279).
- crypto: ccp - Cleanup sp_dev_master in psp_dev_destroy() (bsc#1114279).
- debugfs: Add debugfs_create_xul() for hexadecimal unsigned long (git-fixes).
- dmaengine: dmatest: Fix iteration non-stop logic (bsc#1051510).
- dm btree: increase rebalance threshold in __rebalance2() (git fixes (block drivers)).
- dm cache: fix a crash due to incorrect work item cancelling (git fixes (block drivers)).
- dm crypt: fix benbi IV constructor crash if used in authenticated mode (git fixes (block drivers)).
- dm: fix potential for q->make_request_fn NULL pointer (git fixes (block drivers)).
- dm mpath: switch paths in dm_blk_ioctl() code path (bsc#1167574).
- dm space map common: fix to ensure new block isn't already in use (git fixes (block drivers)).
- dm: various cleanups to md->queue initialization code (git fixes).
- dm verity fec: fix hash block number in verity_fec_decode (git fixes (block drivers)).
- dm verity fec: fix memory leak in verity_fec_dtr (git fixes (block drivers)).
- dm writecache: fix data corruption when reloading the target (git fixes (block drivers)).
- dm writecache: fix incorrect flush sequence when doing SSD mode commit (git fixes (block drivers)).
- dm writecache: verify watermark during resume (git fixes (block drivers)).
- dm zoned: fix invalid memory access (git fixes (block drivers)).
- dm zoned: reduce overhead of backing device checks (git fixes (block drivers)).
- dm zoned: remove duplicate nr_rnd_zones increase in dmz_init_zone() (git fixes (block drivers)).
- dm zoned: support zone sizes smaller than 128MiB (git fixes (block drivers)).
- dp83640: reverse arguments to list_add_tail (git-fixes).
- Drivers: hv: Add a module description line to the hv_vmbus driver (bsc#1172253).
- Drivers: HV: Send one page worth of kmsg dump over Hyper-V during panic (bsc#1170618).
- Drivers: hv: vmbus: Fix the issue with freeing up hv_ctl_table_hdr (bsc#1170618).
- Drivers: hv: vmbus: Get rid of MSR access from vmbus_drv.c (bsc#1170618).
- Drivers: hv: vmus: Fix the check for return value from kmsg get dump buffer (bsc#1170618).
- Drivers/net/ibmvnic: Update VNIC protocol version reporting (bsc#1065729).
- Drivers: soc: ti: knav_qmss_queue: Make knav_gp_range_ops static (bsc#1051510).
- drm: amd/acp: fix broken menu structure (bsc#1114279) * context changes
- drm/crc: Actually allow to change the crc source (bsc#1114279) * offset changes
- drm/dp_mst: Fix clearing payload state on topology disable (bsc#1051510).
- drm/dp_mst: Reformat drm_dp_check_act_status() a bit (bsc#1051510).
- drm/edid: Fix off-by-one in DispID DTD pixel clock (bsc#1114279)
- drm: encoder_slave: fix refcouting error for modules (bsc#1114279)
- drm/i915/gvt: Init DPLL/DDI vreg for virtual display instead of (bsc#1114279)
- drm/i915: properly sanity check batch_start_offset (bsc#1114279) * renamed display/intel_fbc.c -> intel_fb.c * renamed gt/intel_rc6.c -> intel_pm.c * context changes
- drm/meson: Delete an error message in meson_dw_hdmi_bind() (bsc#1051510).
- drm: NULL pointer dereference [null-pointer-deref] (CWE 476) problem (bsc#1114279)
- drm/qxl: qxl_release leak in qxl_draw_dirty_fb() (bsc#1051510).
- drm/qxl: qxl_release leak in qxl_hw_surface_alloc() (bsc#1051510).
- drm/qxl: qxl_release use after free (bsc#1051510).
- drm: Remove PageReserved manipulation from drm_pci_alloc (bsc#1114279) * offset changes
- dump_stack: avoid the livelock of the dump_lock (git fixes (block drivers)).
- e1000e: Disable TSO for buffer overrun workaround (bsc#1051510).
- e1000e: Do not wake up the system via WOL if device wakeup is disabled (bsc#1051510).
- EDAC/amd64: Read back the scrub rate PCI register on F15h (bsc#1114279).
- EDAC, sb_edac: Add support for systems with segmented PCI buses (bsc#1169525).
- evm: Check also if *tfm is an error pointer in init_desc() (bsc#1051510).
- evm: Fix a small race in init_desc() (bsc#1051510).
- ext4: do not zeroout extents beyond i_disksize (bsc#1167851).
- ext4: fix extent_status fragmentation for plain files (bsc#1171949).
- ext4: use non-movable memory for superblock readahead (bsc#1171952).
- extcon: adc-jack: Fix an error handling path in 'adc_jack_probe()' (bsc#1051510).
- fanotify: fix merging marks masks with FAN_ONDIR (bsc#1171679).
- fbcon: fix null-ptr-deref in fbcon_switch (bsc#1114279) * rename drivers/video/fbdev/core to drivers/video/console * context changes
- fbdev: potential information leak in do_fb_ioctl() (bsc#1114279)
- fbmem: Adjust indentation in fb_prepare_logo and fb_blank (bsc#1114279)
- fib: add missing attribute validation for tun_id (networking-stable-20_03_14).
- firmware: qcom: scm: fix compilation error when disabled (bsc#1051510).
- fs/cifs: fix gcc warning in sid_to_id (bsc#1144333).
- fs/seq_file.c: simplify seq_file iteration code and interface (bsc#1170125).
- gpiolib: Document that GPIO line names are not globally unique (bsc#1051510).
- gpio: tegra: mask GPIO IRQs during IRQ shutdown (bsc#1051510).
- gre: fix uninit-value in __iptunnel_pull_header (networking-stable-20_03_14).
- HID: hid-input: clear unmapped usages (git-fixes).
- HID: hyperv: Add a module description line (bsc#1172253).
- HID: i2c-hid: add Trekstor Primebook C11B to descriptor override (git-fixes).
- HID: i2c-hid: override HID descriptors for certain devices (git-fixes).
- HID: multitouch: add eGalaxTouch P80H84 support (bsc#1051510).
- HID: sony: Fix for broken buttons on DS3 USB dongles (bsc#1051510).
- HID: wacom: Read HID_DG_CONTACTMAX directly for non-generic devices (git-fixes).
- hrtimer: Annotate lockless access to timer->state (git fixes (block drivers)).
- hsr: add restart routine into hsr_get_node_list() (networking-stable-20_03_28).
- hsr: check protocol version in hsr_newlink() (networking-stable-20_04_17).
- hsr: fix general protection fault in hsr_addr_is_self() (networking-stable-20_03_28).
- hsr: set .netnsok flag (networking-stable-20_03_28).
- hsr: use rcu_read_lock() in hsr_get_node_{list/status}() (networking-stable-20_03_28).
- i2c: acpi: Force bus speed to 400KHz if a Silead touchscreen is present (git-fixes).
- i2c: acpi: put device when verifying client fails (git-fixes).
- i2c: brcmstb: remove unused struct member (git-fixes).
- i2c: core: Allow empty id_table in ACPI case as well (git-fixes).
- i2c: core: decrease reference count of device node in i2c_unregister_device (git-fixes).
- i2c: dev: Fix the race between the release of i2c_dev and cdev (bsc#1051510).
- i2c: fix missing pm_runtime_put_sync in i2c_device_probe (git-fixes).
- i2c-hid: properly terminate i2c_hid_dmi_desc_override_table array (git-fixes).
- i2c: i801: Do not add ICH_RES_IO_SMI for the iTCO_wdt device (git-fixes).
- i2c: iproc: Stop advertising support of SMBUS quick cmd (git-fixes).
- i2c: isch: Remove unnecessary acpi.h include (git-fixes).
- i2c: mux: demux-pinctrl: Fix an error handling path in 'i2c_demux_pinctrl_probe()' (bsc#1051510).
- i2c: st: fix missing struct parameter description (bsc#1051510).
- IB/ipoib: Add child to parent list only if device initialized (bsc#1168503).
- IB/ipoib: Consolidate checking of the proposed child interface (bsc#1168503).
- IB/ipoib: Do not remove child devices from within the ndo_uninit (bsc#1168503).
- IB/ipoib: Get rid of IPOIB_FLAG_GOING_DOWN (bsc#1168503).
- IB/ipoib: Get rid of the sysfs_mutex (bsc#1168503).
- IB/ipoib: Maintain the child_intfs list from ndo_init/uninit (bsc#1168503).
- IB/ipoib: Move all uninit code into ndo_uninit (bsc#1168503).
- IB/ipoib: Move init code to ndo_init (bsc#1168503).
- IB/ipoib: Replace printk with pr_warn (bsc#1168503).
- IB/ipoib: Use cancel_delayed_work_sync for neigh-clean task (bsc#1168503).
- IB/ipoib: Warn when one port fails to initialize (bsc#1168503).
- ibmveth: Fix max MTU limit (bsc#1173428 ltc#186397).
- ibmvfc: do not send implicit logouts prior to NPIV login (bsc#1169625 ltc#184611).
- ibmvnic: continue to init in CRQ reset returns H_CLOSED (bsc#1173280 ltc#185369).
- ibmvnic: Flush existing work items before device removal (bsc#1065729).
- ibmvnic: Harden device login requests (bsc#1170011 ltc#183538).
- ibmvnic: Skip fatal error reset after passive init (bsc#1171078 ltc#184239).
- iio:ad7797: Use correct attribute_group (bsc#1051510).
- iio: adc: stm32-adc: fix device used to request dma (bsc#1051510).
- iio: adc: stm32-adc: fix sleep in atomic context (git-fixes).
- iio: adc: stm32-adc: Use dma_request_chan() instead dma_request_slave_channel() (bsc#1051510).
- iio: buffer: Do not allow buffers without any channels enabled to be activated (bsc#1051510).
- iio: dac: vf610: Fix an error handling path in 'vf610_dac_probe()' (bsc#1051510).
- iio: pressure: bmp280: Tolerate IRQ before registering (bsc#1051510).
- iio: sca3000: Remove an erroneous 'get_device()' (bsc#1051510).
- iio: xilinx-xadc: Fix ADC-B powerdown (bsc#1051510).
- iio: xilinx-xadc: Fix clearing interrupt when enabling trigger (bsc#1051510).
- iio: xilinx-xadc: Fix sequencer configuration for aux channels in simultaneous mode (bsc#1051510).
- ima: Directly assign the ima_default_policy pointer to ima_rules (bsc#1051510).
- ima: Fix ima digest hash table key calculation (bsc#1051510).
- ima: Fix return value of ima_write_policy() (git-fixes).
- include/asm-generic/topology.h: guard cpumask_of_node() macro argument (bsc#1148868).
- Input: evdev - call input_flush_device() on release(), not flush() (bsc#1051510).
- Input: hyperv-keyboard - add module description (bsc#1172253).
- Input: i8042 - add Acer Aspire 5738z to nomux list (bsc#1051510).
- Input: i8042 - add ThinkPad S230u to i8042 reset list (bsc#1051510).
- Input: raydium_i2c_ts - use true and false for boolean values (bsc#1051510).
- Input: synaptics-rmi4 - fix error return code in rmi_driver_probe() (bsc#1051510).
- Input: synaptics-rmi4 - really fix attn_data use-after-free (git-fixes).
- Input: usbtouchscreen - add support for BonXeon TP (bsc#1051510).
- Input: xpad - add custom init packet for Xbox One S controllers (bsc#1051510).
- iommu/amd: Call domain_flush_complete() in update_domain() (bsc#1172096).
- iommu/amd: Do not flush Device Table in iommu_map_page() (bsc#1172097).
- iommu/amd: Do not loop forever when trying to increase address space (bsc#1172098).
- iommu/amd: Fix legacy interrupt remapping for x2APIC-enabled system (bsc#1172099).
- iommu/amd: Fix over-read of ACPI UID from IVRS table (bsc#1172101).
- iommu/amd: Fix race in increase_address_space()/fetch_pte() (bsc#1172102).
- iommu/amd: Update Device Table in increase_address_space() (bsc#1172103).
- iommu: Fix reference count leak in iommu_group_alloc (bsc#1172397).
- ipmi: fix hung processes in __get_guid() (git-fixes).
- ipv4: fix a RCU-list lock in fib_triestat_seq_show (networking-stable-20_04_02).
- ipv6/addrconf: call ipv6_mc_up() for non-Ethernet interface (networking-stable-20_03_14).
- ipv6: do not auto-add link-local address to lag ports (networking-stable-20_04_09).
- ipv6: Fix nlmsg_flags when splitting a multipath route (networking-stable-20_03_01).
- ipv6: Fix route replacement with dev-only route (networking-stable-20_03_01).
- ipvlan: add cond_resched_rcu() while processing muticast backlog (networking-stable-20_03_14).
- ipvlan: do not deref eth hdr before checking it's set (networking-stable-20_03_14).
- ipvlan: do not use cond_resched_rcu() in ipvlan_process_multicast() (networking-stable-20_03_14).
- iwlwifi: pcie: actually release queue memory in TVQM (bsc#1051510).
- kABI fix for early XHCI debug (git-fixes).
- kabi for for md: improve handling of bio with REQ_PREFLUSH in md_flush_request() (git-fixes).
- kabi, protect struct ib_device (bsc#1168503).
- kabi/severities: Do not track KVM internal symbols.
- kabi/severities: Ingnore get_dev_data() The function is internal to the AMD IOMMU driver and must not be called by any third party.
- kabi workaround for snd_rawmidi buffer_ref field addition (git-fixes).
- KEYS: reaching the keys quotas correctly (bsc#1051510).
- KVM: arm64: Change hyp_panic()s dependency on tpidr_el2 (bsc#1133021).
- KVM: arm64: Stop save/restoring host tpidr_el1 on VHE (bsc#1133021).
- KVM: Check validity of resolved slot when searching memslots (bsc#1172104).
- KVM: nVMX: Do not reread VMCS-agnostic state when switching VMCS (bsc#1114279).
- KVM: nVMX: Skip IBPB when switching between vmcs01 and vmcs02 (bsc#1114279).
- KVM: s390: vsie: Fix delivery of addressing exceptions (git-fixes).
- KVM: s390: vsie: Fix possible race when shadowing region 3 tables (git-fixes).
- KVM: s390: vsie: Fix region 1 ASCE sanity shadow address checks (git-fixes).
- KVM: SVM: Fix potential memory leak in svm_cpu_init() (bsc#1171736).
- KVM x86: Extend AMD specific guest behavior to Hygon virtual CPUs (bsc#1152489).
- kvm: x86: Fix L1TF mitigation for shadow MMU (bsc#1171904).
- KVM: x86/mmu: Set mmio_value to '0' if reserved #PF can't be generated (bsc#1171904).
- KVM: x86: only do L1TF workaround on affected processors (bsc#1171904).
- l2tp: Allow management of tunnels and session in user namespace (networking-stable-20_04_17).
- libata: Remove extra scsi_host_put() in ata_scsi_add_hosts() (bsc#1051510).
- libata: Return correct status in sata_pmp_eh_recover_pm() when ATA_DFLAG_DETACH is set (bsc#1051510).
- libceph: do not omit recovery_deletes in target_copy() (bsc#1173462).
- lib: raid6: fix awk build warnings (git fixes (block drivers)).
- lib/raid6/test: fix build on distros whose /bin/sh is not bash (git fixes (block drivers)).
- lib/stackdepot.c: fix global out-of-bounds in stack_slabs (git fixes (block drivers)).
- livepatch: Apply vmlinux-specific KLP relocations early (bsc#1071995).
- livepatch: Disallow vmlinux.ko (bsc#1071995).
- livepatch: Make klp_apply_object_relocs static (bsc#1071995).
- livepatch: Prevent module-specific KLP rela sections from referencing vmlinux symbols (bsc#1071995).
- livepatch: Remove .klp.arch (bsc#1071995).
- locks: print unsigned ino in /proc/locks (bsc#1171951).
- mac80211: add ieee80211_is_any_nullfunc() (bsc#1051510).
- mac80211_hwsim: Use kstrndup() in place of kasprintf() (bsc#1051510).
- mac80211: mesh: fix discovery timer re-arming issue / crash (bsc#1051510).
- macsec: avoid to set wrong mtu (bsc#1051510).
- macsec: restrict to ethernet devices (networking-stable-20_03_28).
- macvlan: add cond_resched() during multicast processing (networking-stable-20_03_14).
- macvlan: fix null dereference in macvlan_device_event() (bsc#1051510).
- md: Avoid namespace collision with bitmap API (git fixes (block drivers)).
- md: improve handling of bio with REQ_PREFLUSH in md_flush_request() (git-fixes).
- md/raid0: Fix an error message in raid0_make_request() (git fixes (block drivers)).
- md/raid10: prevent access of uninitialized resync_pages offset (git-fixes).
- md: use memalloc scope APIs in mddev_suspend()/mddev_resume() (git fixes (block drivers)).
- media: dvb: return -EREMOTEIO on i2c transfer failure (bsc#1051510).
- media: platform: fcp: Set appropriate DMA parameters (bsc#1051510).
- media: ti-vpe: cal: fix disable_irqs to only the intended target (git-fixes).
- mei: release me_cl object reference (bsc#1051510).
- mlxsw: Fix some IS_ERR() vs NULL bugs (networking-stable-20_04_27).
- mlxsw: spectrum_flower: Do not stop at FLOW_ACTION_VLAN_MANGLE (networking-stable-20_04_09).
- mmc: atmel-mci: Fix debugfs on 64-bit platforms (git-fixes).
- mmc: dw_mmc: Fix debugfs on 64-bit platforms (git-fixes).
- mmc: fix compilation of user API (bsc#1051510).
- mmc: meson-gx: make sure the descriptor is stopped on errors (git-fixes).
- mmc: meson-gx: simplify interrupt handler (git-fixes).
- mmc: renesas_sdhi: limit block count to 16 bit for old revisions (git-fixes).
- mmc: sdhci-esdhc-imx: fix the mask for tuning start point (bsc#1051510).
- mmc: sdhci-msm: Clear tuning done flag while hs400 tuning (bsc#1051510).
- mmc: sdhci-of-at91: fix memleak on clk_get failure (git-fixes).
- mmc: sdhci-pci: Fix eMMC driver strength for BYT-based controllers (bsc#1051510).
- mmc: sdhci-xenon: fix annoying 1.8V regulator warning (bsc#1051510).
- mmc: sdio: Fix potential NULL pointer error in mmc_sdio_init_card() (bsc#1051510).
- mmc: tmio: fix access width of Block Count Register (git-fixes).
- mm: thp: handle page cache THP correctly in PageTransCompoundMap (git fixes (block drivers)).
- mtd: cfi: fix deadloop in cfi_cmdset_0002.c do_write_buffer (bsc#1051510).
- mtd: spi-nor: cadence-quadspi: add a delay in write sequence (git-fixes).
- mtd: spi-nor: enable 4B opcodes for mx66l51235l (git-fixes).
- mtd: spi-nor: fsl-quadspi: Do not let -EINVAL on the bus (git-fixes).
- mwifiex: avoid -Wstringop-overflow warning (bsc#1051510).
- mwifiex: Fix memory corruption in dump_station (bsc#1051510).
- net: bcmgenet: correct per TX/RX ring statistics (networking-stable-20_04_27).
- net: dsa: b53: Fix ARL register definitions (networking-stable-20_04_27).
- net: dsa: b53: Rework ARL bin logic (networking-stable-20_04_27).
- net: dsa: bcm_sf2: Do not register slave MDIO bus with OF (networking-stable-20_04_09).
- net: dsa: bcm_sf2: Ensure correct sub-node is parsed (networking-stable-20_04_09).
- net: dsa: bcm_sf2: Fix overflow checks (git-fixes).
- net: dsa: Fix duplicate frames flooded by learning (networking-stable-20_03_28).
- net: dsa: mv88e6xxx: fix lockup on warm boot (networking-stable-20_03_14).
- net: fec: validate the new settings in fec_enet_set_coalesce() (networking-stable-20_03_14).
- net: fib_rules: Correctly set table field when table number exceeds 8 bits (networking-stable-20_03_01).
- netfilter: connlabels: prefer static lock initialiser (git-fixes).
- netfilter: conntrack: sctp: use distinct states for new SCTP connections (bsc#1159199).
- netfilter: ctnetlink: netns exit must wait for callbacks (bsc#1169795).
- netfilter: not mark a spinlock as __read_mostly (git-fixes).
- net: fix race condition in __inet_lookup_established() (bsc#1151794).
- net: fq: add missing attribute validation for orphan mask (networking-stable-20_03_14).
- net, ip_tunnel: fix interface lookup with no key (networking-stable-20_04_02).
- net: ipv4: devinet: Fix crash when add/del multicast IP with autojoin (networking-stable-20_04_17).
- net: ipv6: do not consider routes via gateways for anycast address check (networking-stable-20_04_17).
- netlink: Use netlink header as base to calculate bad attribute offset (networking-stable-20_03_14).
- net: macsec: update SCI upon MAC address change (networking-stable-20_03_14).
- net: memcg: fix lockdep splat in inet_csk_accept() (networking-stable-20_03_14).
- net: memcg: late association of sock to memcg (networking-stable-20_03_14).
- net/mlx4_en: avoid indirect call in TX completion (networking-stable-20_04_27).
- net/mlx5: Add new fields to Port Type and Speed register (bsc#1171118).
- net/mlx5: Add RoCE RX ICRC encapsulated counter (bsc#1171118).
- net/mlx5e: Fix ethtool self test: link speed (bsc#1171118).
- net/mlx5e: Move port speed code from en_ethtool.c to en/port.c (bsc#1171118).
- net/mlx5: Expose link speed directly (bsc#1171118).
- net/mlx5: Expose port speed when possible (bsc#1171118).
- net: mvneta: Fix the case where the last poll did not process all rx (networking-stable-20_03_28).
- net: netrom: Fix potential nr_neigh refcnt leak in nr_add_node (networking-stable-20_04_27).
- net/packet: tpacket_rcv: do not increment ring index on drop (networking-stable-20_03_14).
- net: phy: restore mdio regs in the iproc mdio driver (networking-stable-20_03_01).
- net: qmi_wwan: add support for ASKEY WWHC050 (networking-stable-20_03_28).
- net: revert default NAPI poll timeout to 2 jiffies (networking-stable-20_04_17).
- net_sched: cls_route: remove the right filter from hashtable (networking-stable-20_03_28).
- net/smc: add fallback check to connect() (git-fixes).
- net/smc: fix refcount non-blocking connect() -part 2 (git-fixes).
- net: vmxnet3: fix possible buffer overflow caused by bad DMA value in vmxnet3_get_rss() (bsc#1172484).
- net/x25: Fix x25_neigh refcnt leak when receiving frame (networking-stable-20_04_27).
- nfc: add missing attribute validation for SE API (networking-stable-20_03_14).
- nfc: add missing attribute validation for vendor subcommand (networking-stable-20_03_14).
- nfc: pn544: Fix occasional HW initialization failure (networking-stable-20_03_01).
- nfc: st21nfca: add missed kfree_skb() in an error path (bsc#1051510).
- nfsd4: fix up replay_matches_cache() (git-fixes).
- nfsd: Ensure CLONE persists data and metadata changes to the target file (git-fixes).
- nfsd: fix delay timer on 32-bit architectures (git-fixes).
- nfsd: fix jiffies/time_t mixup in LRU list (git-fixes).
- NFS: Directory page cache pages need to be locked when read (git-fixes).
- nfsd: memory corruption in nfsd4_lock() (git-fixes).
- NFS: Do not call generic_error_remove_page() while holding locks (bsc#1170457).
- NFS: Fix an RCU lock leak in nfs4_refresh_delegation_stateid() (bsc#1170592).
- NFS: Fix memory leaks and corruption in readdir (git-fixes).
- NFS: Fix O_DIRECT accounting of number of bytes read/written (git-fixes).
- NFS: Fix potential posix_acl refcnt leak in nfs3_set_acl (git-fixes).
- NFS: fix racey wait in nfs_set_open_stateid_locked (bsc#1170592).
- NFS/flexfiles: Use the correct TCP timeout for flexfiles I/O (git-fixes).
- NFS/pnfs: Fix pnfs_generic_prepare_to_resend_writes() (git-fixes).
- NFS: Revalidate the file size on a fatal write error (git-fixes).
- NFSv4.0: nfs4_do_fsinfo() should not do implicit lease renewals (git-fixes).
- NFSv4: Do not allow a cached open with a revoked delegation (git-fixes).
- NFSv4: Fix leak of clp->cl_acceptor string (git-fixes).
- NFSv4/pnfs: Return valid stateids in nfs_layout_find_inode_by_stateid() (git-fixes).
- NFSv4: Retry CLOSE and DELEGRETURN on NFS4ERR_OLD_STATEID (bsc#1170592).
- NFSv4: try lease recovery on NFS4ERR_EXPIRED (git-fixes).
- NFSv4.x: Drop the slot if nfs4_delegreturn_prepare waits for layoutreturn (git-fixes).
- nl802154: add missing attribute validation for dev_type (networking-stable-20_03_14).
- nl802154: add missing attribute validation (networking-stable-20_03_14).
- nvme: check for NVME_CTRL_LIVE in nvme_report_ns_ids() (bcs#1171558 bsc#1159058).
- nvme: do not update multipath disk information if the controller is down (bcs#1171558 bsc#1159058).
- nvme-fc: print proper nvme-fc devloss_tmo value (bsc#1172391).
- objtool: Add is_static_jump() helper (bsc#1169514).
- objtool: Add relocation check for alternative sections (bsc#1169514).
- objtool: Clean instruction state before each function validation (bsc#1169514).
- objtool: Fix stack offset tracking for indirect CFAs (bsc#1169514).
- objtool: Fix switch table detection in .text.unlikely (bsc#1169514).
- objtool: Ignore empty alternatives (bsc#1169514).
- objtool: Make BP scratch register warning more robust (bsc#1169514).
- OMAP: DSS2: remove non-zero check on variable r (bsc#1114279)
- overflow: Fix -Wtype-limits compilation warnings (git fixes).
- overflow.h: Add arithmetic shift helper (git fixes).
- p54usb: add AirVasT USB stick device-id (bsc#1051510).
- padata: Remove broken queue flushing (git-fixes).
- Partially revert 'kfifo: fix kfifo_alloc() and kfifo_init()' (git fixes (block drivers)).
- PCI: Allow pci_resize_resource() for devices on root bus (bsc#1051510).
- PCI: Fix pci_register_host_bridge() device_register() error handling (bsc#1051510).
- PCI: Program MPS for RCiEP devices (bsc#1051510).
- PCI/PTM: Inherit Switch Downstream Port PTM settings from Upstream Port (bsc#1051510).
- perf: Allocate context task_ctx_data for child event (git-fixes).
- perf/cgroup: Fix perf cgroup hierarchy support (git-fixes).
- perf: Copy parent's address filter offsets on clone (git-fixes).
- perf/core: Add sanity check to deal with pinned event failure (git-fixes).
- perf/core: Avoid freeing static PMU contexts when PMU is unregistered (git-fixes).
- perf/core: Correct event creation with PERF_FORMAT_GROUP (git-fixes).
- perf/core: Do not WARN() for impossible ring-buffer sizes (git-fixes).
- perf/core: Fix crash when using HW tracing kernel filters (git-fixes).
- perf/core: Fix ctx_event_type in ctx_resched() (git-fixes).
- perf/core: Fix error handling in perf_event_alloc() (git-fixes).
- perf/core: Fix exclusive events' grouping (git-fixes).
- perf/core: Fix group scheduling with mixed hw and sw events (git-fixes).
- perf/core: Fix impossible ring-buffer sizes warning (git-fixes).
- perf/core: Fix locking for children siblings group read (git-fixes).
- perf/core: Fix perf_event_read_value() locking (git-fixes).
- perf/core: Fix perf_pmu_unregister() locking (git-fixes).
- perf/core: Fix perf_sample_regs_user() mm check (git-fixes).
- perf/core: Fix possible Spectre-v1 indexing for ->aux_pages (git-fixes).
- perf/core: Fix race between close() and fork() (git-fixes).
- perf/core: Fix the address filtering fix (git-fixes).
- perf/core: Fix use-after-free in uprobe_perf_close() (git-fixes).
- perf/core: Force USER_DS when recording user stack data (git-fixes).
- perf/core: Restore mmap record type correctly (git-fixes).
- perf: Fix header.size for namespace events (git-fixes).
- perf/ioctl: Add check for the sample_period value (git-fixes).
- perf, pt, coresight: Fix address filters for vmas with non-zero offset (git-fixes).
- perf: Return proper values for user stack errors (git-fixes).
- perf/x86/amd: Constrain Large Increment per Cycle events (git-fixes).
- perf/x86/amd/ibs: Fix reading of the IBS OpData register and thus precise RIP validity (git-fixes).
- perf/x86/amd/ibs: Fix sample bias for dispatched micro-ops (git-fixes).
- perf/x86/amd/ibs: Handle erratum #420 only on the affected CPU family (10h) (git-fixes).
- perf/x86/amd/iommu: Make the 'amd_iommu_attr_groups' symbol static (git-fixes).
- perf/x86/amd/uncore: Do not set 'ThreadMask' and 'SliceMask' for non-L3 PMCs (git-fixes stable).
- perf/x86/amd/uncore: Set the thread mask for F17h L3 PMCs (git-fixes).
- perf/x86/amd/uncore: Set ThreadMask and SliceMask for L3 Cache perf events (git-fixes stable).
- perf/x86: Enable free running PEBS for REGS_USER/INTR (git-fixes).
- perf/x86: Fix incorrect PEBS_REGS (git-fixes).
- perf/x86/intel: Add generic branch tracing check to intel_pmu_has_bts() (git-fixes).
- perf/x86/intel: Add proper condition to run sched_task callbacks (git-fixes).
- perf/x86/intel/bts: Fix the use of page_private() (git-fixes).
- perf/x86/intel: Fix PT PMI handling (git-fixes).
- perf/x86/intel: Move branch tracing setup to the Intel-specific source file (git-fixes).
- perf/x86/intel/uncore: Add Node ID mask (git-fixes).
- perf/x86/intel/uncore: Fix PCI BDF address of M3UPI on SKX (git-fixes).
- perf/x86/uncore: Fix event group support (git-fixes).
- pid: Improve the comment about waiting in zap_pid_ns_processes (git fixes)).
- pinctrl: baytrail: Enable pin configuration setting for GPIO chip (git-fixes).
- pinctrl: cherryview: Add missing spinlock usage in chv_gpio_irq_handler (git-fixes).
- pinctrl: freescale: imx: Fix an error handling path in 'imx_pinctrl_probe()' (bsc#1051510).
- pinctrl: imxl: Fix an error handling path in 'imx1_pinctrl_core_probe()' (bsc#1051510).
- pinctrl: samsung: Save/restore eint_mask over suspend for EINT_TYPE GPIOs (bsc#1051510).
- platform/x86: asus-nb-wmi: Do not load on Asus T100TA and T200TA (bsc#1051510).
- pNFS: Ensure we do clear the return-on-close layout stateid on fatal errors (git-fixes).
- pnp: Use list_for_each_entry() instead of open coding (git fixes).
- powerpc/64s: Do not let DT CPU features set FSCR_DSCR (bsc#1065729).
- powerpc/64s: Save FSCR to init_task.thread.fscr after feature init (bsc#1065729).
- powerpc: Add attributes for setjmp/longjmp (bsc#1065729).
- powerpc/pci/of: Parse unassigned resources (bsc#1065729).
- powerpc/setup_64: Set cache-line-size based on cache-block-size (bsc#1065729).
- powerpc/sstep: Fix DS operand in ld encoding to appropriate value (bsc#1065729).
- powerpc/xive: Clear the page tables for the ESB IO mapping (bsc#1085030).
- power: supply: bq24257_charger: Replace depends on REGMAP_I2C with select (bsc#1051510).
- power: supply: lp8788: Fix an error handling path in 'lp8788_charger_probe()' (bsc#1051510).
- power: supply: smb347-charger: IRQSTAT_D is volatile (bsc#1051510).
- qede: Fix race between rdma destroy workqueue and link change event (networking-stable-20_03_01).
- r8152: check disconnect status after long sleep (networking-stable-20_03_14).
- raid5: remove gfp flags from scribble_alloc() (git fixes (block drivers)).
- raid6/ppc: Fix build for clang (git fixes (block drivers)).
- rcu: locking and unlocking need to always be at least barriers (git fixes (block drivers)).
- RDMA/ipoib: Fix use of sizeof() (bsc#1168503).
- RDMA/netdev: Fix netlink support in IPoIB (bsc#1168503).
- RDMA/netdev: Hoist alloc_netdev_mqs out of the driver (bsc#1168503).
- RDMA/netdev: Use priv_destructor for netdev cleanup (bsc#1168503).
- README.BRANCH: Replace Matt Fleming with Davidlohr Bueso as maintainer.
- Revert 'dm crypt: use WQ_HIGHPRI for the IO and crypt workqueues' (git fixes (block drivers)).
- Revert 'drm/panel: simple: Add support for Sharp LQ150X1LG11 panels' (bsc#1114279) * offset changes
- Revert 'ipc,sem: remove uneeded sem_undo_list lock usage in exit_sem()' (bsc#1172221).
- Revert 'tools lib traceevent: Remove unneeded qsort and uses memmove'
- rpm/kernel-docs.spec.in: Require python-packaging for build.
- rtlwifi: Fix a double free in _rtl_usb_tx_urb_setup() (bsc#1051510).
- s390/bpf: Maintain 8-byte stack alignment (bsc#1169194).
- s390/cio: avoid duplicated 'ADD' uevents (git-fixes).
- s390/cio: generate delayed uevent for vfio-ccw subchannels (git-fixes).
- s390/cpuinfo: fix wrong output when CPU0 is offline (git-fixes).
- s390/diag: fix display of diagnose call statistics (git-fixes).
- s390: fix syscall_get_error for compat processes (git-fixes).
- s390/ftrace: fix potential crashes when switching tracers (git-fixes).
- s390/gmap: return proper error code on ksm unsharing (git-fixes).
- s390/ism: fix error return code in ism_probe() (git-fixes).
- s390/pci: Fix possible deadlock in recover_store() (bsc#1165183 LTC#184103).
- s390/pci: Recover handle in clp_set_pci_fn() (bsc#1165183 LTC#184103).
- s390/qdio: consistently restore the IRQ handler (git-fixes).
- s390/qdio: lock device while installing IRQ handler (git-fixes).
- s390/qdio: put thinint indicator after early error (git-fixes).
- s390/qdio: tear down thinint indicator after early error (git-fixes).
- s390/qeth: cancel RX reclaim work earlier (git-fixes).
- s390/qeth: do not return -ENOTSUPP to userspace (git-fixes).
- s390/qeth: do not warn for napi with 0 budget (git-fixes).
- s390/qeth: fix error handling for isolation mode cmds (git-fixes).
- s390/qeth: fix off-by-one in RX copybreak check (git-fixes).
- s390/qeth: fix promiscuous mode after reset (git-fixes).
- s390/qeth: fix qdio teardown after early init error (git-fixes).
- s390/qeth: handle error due to unsupported transport mode (git-fixes).
- s390/qeth: handle error when backing RX buffer (git-fixes).
- s390/qeth: lock the card while changing its hsuid (git-fixes).
- s390/qeth: support net namespaces for L3 devices (git-fixes).
- s390/time: Fix clk type in get_tod_clock (git-fixes).
- scripts/decodecode: fix trapping instruction formatting (bsc#1065729).
- scripts/dtc: Remove redundant YYLOC global declaration (bsc#1160388).
- scsi: bnx2i: fix potential use after free (bsc#1171600).
- scsi: core: Handle drivers which set sg_tablesize to zero (bsc#1171601) This commit also required: > scsi: core: avoid preallocating big SGL for data
- scsi: core: save/restore command resid for error handling (bsc#1171602).
- scsi: core: scsi_trace: Use get_unaligned_be*() (bsc#1171604).
- scsi: core: try to get module before removing device (bsc#1171605).
- scsi: csiostor: Adjust indentation in csio_device_reset (bsc#1171606).
- scsi: csiostor: Do not enable IRQs too early (bsc#1171607).
- scsi: esas2r: unlock on error in esas2r_nvram_read_direct() (bsc#1171608).
- scsi: fnic: fix invalid stack access (bsc#1171609).
- scsi: fnic: fix msix interrupt allocation (bsc#1171610).
- scsi: ibmvscsi: Do not send host info in adapter info MAD after LPM (bsc#1172759 ltc#184814).
- scsi: ibmvscsi: Fix WARN_ON during event pool release (bsc#1170791 ltc#185128).
- scsi: iscsi: Avoid potential deadlock in iscsi_if_rx func (bsc#1171611).
- scsi: iscsi: Fix a potential deadlock in the timeout handler (bsc#1171612).
- scsi: iscsi: qla4xxx: fix double free in probe (bsc#1171613).
- scsi: lpfc: fix: Coverity: lpfc_cmpl_els_rsp(): Null pointer dereferences (bsc#1171614).
- scsi: lpfc: Fix crash in target side cable pulls hitting WAIT_FOR_UNREG (bsc#1171615).
- scsi: megaraid_sas: Do not initiate OCR if controller is not in ready state (bsc#1171616).
- scsi: qedf: Add port_id getter (bsc#1150660).
- scsi: qla2xxx: add ring buffer for tracing debug logs (bsc#1157169).
- scsi: qla2xxx: check UNLOADING before posting async work (bsc#1157169).
- scsi: qla2xxx: Delete all sessions before unregister local nvme port (bsc#1157169).
- scsi: qla2xxx: Do not log message when reading port speed via sysfs (bsc#1157169).
- scsi: qla2xxx: Fix hang when issuing nvme disconnect-all in NPIV (bsc#1157169).
- scsi: qla2xxx: Fix regression warnings (bsc#1157169).
- scsi: qla2xxx: Remove non functional code (bsc#1157169).
- scsi: qla2xxx: Set NVMe status code for failed NVMe FCP request (bsc#1158983).
- scsi: qla2xxx: set UNLOADING before waiting for session deletion (bsc#1157169).
- scsi: qla4xxx: Adjust indentation in qla4xxx_mem_free (bsc#1171617).
- scsi: qla4xxx: fix double free bug (bsc#1171618).
- scsi: sd: Clear sdkp->protection_type if disk is reformatted without PI (bsc#1171619).
- scsi: sg: add sg_remove_request in sg_common_write (bsc#1171620).
- scsi: tracing: Fix handling of TRANSFER LENGTH == 0 for READ(6) and WRITE(6) (bsc#1171621).
- scsi: ufs: change msleep to usleep_range (bsc#1171622).
- scsi: ufs: Clean up ufshcd_scale_clks() and clock scaling error out path (bsc#1171623).
- scsi: ufs: Fix ufshcd_hold() caused scheduling while atomic (bsc#1171624).
- scsi: ufs: Fix ufshcd_probe_hba() reture value in case ufshcd_scsi_add_wlus() fails (bsc#1171625).
- scsi: ufs: Recheck bkops level if bkops is disabled (bsc#1171626).
- scsi: zfcp: fix missing erp_lock in port recovery trigger for point-to-point (git-fixes).
- sctp: fix possibly using a bad saddr with a given dst (networking-stable-20_04_02).
- sctp: fix refcount bug in sctp_wfree (networking-stable-20_04_02).
- sctp: move the format error check out of __sctp_sf_do_9_1_abort (networking-stable-20_03_01).
- seq_file: fix problem when seeking mid-record (bsc#1170125).
- serial: uartps: Move the spinlock after the read of the tx empty (git-fixes).
- sfc: detach from cb_page in efx_copy_channel() (networking-stable-20_03_14).
- signal/pid_namespace: Fix reboot_pid_ns to use send_sig not force_sig (bsc#1172185).
- slcan: not call free_netdev before rtnl_unlock in slcan_open (networking-stable-20_03_28).
- slip: make slhc_compress() more robust against malicious packets (networking-stable-20_03_14).
- smb3: Additional compression structures (bsc#1144333).
- smb3: Add new compression flags (bsc#1144333).
- smb3: change noisy error message to FYI (bsc#1144333).
- smb3: enable swap on SMB3 mounts (bsc#1144333).
- smb3: Minor cleanup of protocol definitions (bsc#1144333).
- smb3: remove overly noisy debug line in signing errors (bsc#1144333).
- smb3: smbdirect support can be configured by default (bsc#1144333).
- smb3: use SMB2_SIGNATURE_SIZE define (bsc#1144333).
- spi: bcm2835: Fix 3-wire mode if DMA is enabled (git-fixes).
- spi: bcm63xx-hsspi: Really keep pll clk enabled (bsc#1051510).
- spi: bcm-qspi: when tx/rx buffer is NULL set to 0 (bsc#1051510).
- spi: dw: Add SPI Rx-done wait method to DMA-based transfer (bsc#1051510).
- spi: dw: Add SPI Tx-done wait method to DMA-based transfer (bsc#1051510).
- spi: dw: use 'smp_mb()' to avoid sending spi data error (bsc#1051510).
- spi: dw: Zero DMA Tx and Rx configurations on stack (bsc#1051510).
- spi: fsl: do not map irq during probe (git-fixes).
- spi: fsl: use platform_get_irq() instead of of_irq_to_resource() (git-fixes).
- spi: pxa2xx: Add CS control clock quirk (bsc#1051510).
- spi: qup: call spi_qup_pm_resume_runtime before suspending (bsc#1051510).
- spi: spi-fsl-dspi: Replace interruptible wait queue with a simple completion (git-fixes).
- spi: spi-s3c64xx: Fix system resume support (git-fixes).
- spi/zynqmp: remove entry that causes a cs glitch (bsc#1051510).
- staging: comedi: dt2815: fix writing hi byte of analog output (bsc#1051510).
- staging: comedi: Fix comedi_device refcnt leak in comedi_open (bsc#1051510).
- staging: iio: ad2s1210: Fix SPI reading (bsc#1051510).
- staging: rtl8712: Fix IEEE80211_ADDBA_PARAM_BUF_SIZE_MASK (bsc#1051510).
- staging: sm750fb: add missing case while setting FB_VISUAL (bsc#1051510).
- staging: vt6656: Do not set RCR_MULTICAST or RCR_BROADCAST by default (git-fixes).
- staging: vt6656: Fix drivers TBTT timing counter (git-fixes).
- staging: vt6656: Fix pairwise key entry save (git-fixes).
- sunrpc: expiry_time should be seconds not timeval (git-fixes).
- SUNRPC: Fix a potential buffer overflow in 'svc_print_xprts()' (git-fixes).
- SUNRPC: The TCP back channel mustn't disappear while requests are outstanding (bsc#1152624).
- supported.conf: Add br_netfilter to base (bsc#1169020).
- svcrdma: Fix leak of transport addresses (git-fixes).
- taskstats: fix data-race (bsc#1172188).
- tcp: cache line align MAX_TCP_HEADER (networking-stable-20_04_27).
- tcp: repair: fix TCP_QUEUE_SEQ implementation (networking-stable-20_03_28).
- team: add missing attribute validation for array index (networking-stable-20_03_14).
- team: add missing attribute validation for port ifindex (networking-stable-20_03_14).
- team: fix hang in team_mode_get() (networking-stable-20_04_27).
- tools lib traceevent: Remove unneeded qsort and uses memmove instead (git-fixes).
- tpm: ibmvtpm: retry on H_CLOSED in tpm_ibmvtpm_send() (bsc#1065729).
- tpm/tpm_tis: Free IRQ if probing fails (bsc#1082555).
- tpm/tpm_tis: Free IRQ if probing fails (git-fixes).
- tracing: Add a vmalloc_sync_mappings() for safe measure (git-fixes).
- tracing: Disable trace_printk() on post poned tests (git-fixes).
- tracing: Fix event trigger to accept redundant spaces (git-fixes).
- tracing: Fix the race between registering 'snapshot' event trigger and triggering 'snapshot' operation (git-fixes).
- tty: n_gsm: Fix bogus i++ in gsm_data_kick (bsc#1051510).
- tty: n_gsm: Fix SOF skipping (bsc#1051510).
- tty: n_gsm: Fix waking up upper tty layer when room available (bsc#1051510).
- tty: rocket, avoid OOB access (git-fixes).
- UAS: fix deadlock in error handling and PM flushing work (git-fixes).
- UAS: no use logging any details in case of ENODEV (git-fixes).
- USB: Add USB_QUIRK_DELAY_CTRL_MSG and USB_QUIRK_DELAY_INIT for Corsair K70 RGB RAPIDFIRE (git-fixes).
- USB: cdc-acm: restore capability check order (git-fixes).
- USB: core: Fix misleading driver bug report (bsc#1051510).
- USB: dwc2: gadget: move gadget resume after the core is in L0 state (bsc#1051510).
- USB: dwc3: do not set gadget->is_otg flag (git-fixes).
- USB: dwc3: gadget: Do link recovery for SS and SSP (git-fixes).
- USB: early: Handle AMD's spec-compliant identifiers, too (git-fixes).
- USB: f_fs: Clear OS Extended descriptor counts to zero in ffs_data_reset() (git-fixes).
- USB: gadget: audio: Fix a missing error return value in audio_bind() (git-fixes).
- USB: gadget: composite: Inform controller driver of self-powered (git-fixes).
- USB: gadget: legacy: fix error return code in cdc_bind() (git-fixes).
- USB: gadget: legacy: fix error return code in gncm_bind() (git-fixes).
- USB: gadget: legacy: fix redundant initialization warnings (bsc#1051510).
- USB: gadget: lpc32xx_udc: do not dereference ep pointer before null check (bsc#1051510).
- USB: gadget: net2272: Fix a memory leak in an error handling path in 'net2272_plat_probe()' (git-fixes).
- USB: gadget: udc: atmel: Fix vbus disconnect handling (git-fixes).
- USB: gadget: udc: atmel: Make some symbols static (git-fixes).
- USB: gadget: udc: bdc: Remove unnecessary NULL checks in bdc_req_complete (git-fixes).
- USB: gadget: udc: s3c2410_udc: Remove pointless NULL check in s3c2410_udc_nuke (bsc#1051510).
- USB: host: ehci-mxc: Add error handling in ehci_mxc_drv_probe() (bsc#1051510).
- USB: host: xhci-plat: keep runtime active when removing host (git-fixes).
- USB: hub: Fix handling of connect changes during sleep (git-fixes).
- USB: musb: Fix runtime PM imbalance on error (bsc#1051510).
- USB: musb: start session in resume for host port (bsc#1051510).
- usbnet: silence an unnecessary warning (bsc#1170770).
- USB: serial: garmin_gps: add sanity checking for data length (git-fixes).
- USB: serial: option: add BroadMobi BM806U (git-fixes).
- USB: serial: option: add support for ASKEY WWHC050 (git-fixes).
- USB: serial: option: add Telit LE910C1-EUX compositions (bsc#1051510).
- USB: serial: option: add Wistron Neweb D19Q1 (git-fixes).
- USB: serial: qcserial: add DW5816e QDL support (bsc#1051510).
- USB: serial: qcserial: Add DW5816e support (git-fixes).
- USB: serial: usb_wwan: do not resubmit rx urb on fatal errors (bsc#1051510).
- USB: serial: usb_wwan: do not resubmit rx urb on fatal errors (git-fixes).
- USB: sisusbvga: Change port variable from signed to unsigned (git-fixes).
- USB-storage: Add unusual_devs entry for JMicron JMS566 (git-fixes).
- USB: uas: add quirk for LaCie 2Big Quadra (git-fixes).
- USB: xhci: Fix NULL pointer dereference when enqueuing trbs from urb sg list (git-fixes).
- video: fbdev: sis: Remove unnecessary parentheses and commented code (bsc#1114279)
- video: fbdev: w100fb: Fix a potential double free (bsc#1051510).
- virtio-blk: handle block_device_operations callbacks after hot unplug (git fixes (block drivers)).
- vmxnet3: add geneve and vxlan tunnel offload support (bsc#1172484).
- vmxnet3: add support to get/set rx flow hash (bsc#1172484).
- vmxnet3: allow rx flow hash ops only when rss is enabled (bsc#1172484).
- vmxnet3: avoid format strint overflow warning (bsc#1172484).
- vmxnet3: prepare for version 4 changes (bsc#1172484).
- vmxnet3: Remove always false conditional statement (bsc#1172484).
- vmxnet3: remove redundant initialization of pointer 'rq' (bsc#1172484).
- vmxnet3: remove unused flag 'rxcsum' from struct vmxnet3_adapter (bsc#1172484).
- vmxnet3: Replace msleep(1) with usleep_range() (bsc#1172484).
- vmxnet3: update to version 4 (bsc#1172484).
- vmxnet3: use correct hdr reference when packet is encapsulated (bsc#1172484).
- vrf: Check skb for XFRM_TRANSFORMED flag (networking-stable-20_04_27).
- vt: ioctl, switch VT_IS_IN_USE and VT_BUSY to inlines (git-fixes).
- vt: selection, introduce vc_is_sel (git-fixes).
- vt: vt_ioctl: fix race in VT_RESIZEX (git-fixes).
- vt: vt_ioctl: fix use-after-free in vt_in_use() (git-fixes).
- vt: vt_ioctl: fix VT_DISALLOCATE freeing in-use virtual console (git-fixes).
- vxlan: check return value of gro_cells_init() (networking-stable-20_03_28).
- w1: omap-hdq: cleanup to add missing newline for some dev_dbg (bsc#1051510).
- watchdog: reset last_hw_keepalive time at start (git-fixes).
- wcn36xx: Fix error handling path in 'wcn36xx_probe()' (bsc#1051510).
- wil6210: remove reset file from debugfs (git-fixes).
- wimax/i2400m: Fix potential urb refcnt leak (bsc#1051510).
- work around mvfs bug (bsc#1162063).
- workqueue: do not use wq_select_unbound_cpu() for bound works (bsc#1172130).
- x86/cpu/amd: Make erratum #1054 a legacy erratum (bsc#1114279).
- x86/entry/64: Fix unwind hints in kernel exit path (bsc#1058115).
- x86/entry/64: Fix unwind hints in register clearing code (bsc#1058115).
- x86/entry/64: Fix unwind hints in rewind_stack_do_exit() (bsc#1058115).
- x86/entry/64: Fix unwind hints in __switch_to_asm() (bsc#1058115).
- x86/events/intel/ds: Add PERF_SAMPLE_PERIOD into PEBS_FREERUNNING_FLAGS (git-fixes).
- x86: Fix early boot crash on gcc-10, third try (bsc#1114279).
- x86/Hyper-V: Allow guests to enable InvariantTSC (bsc#1170620).
- x86/Hyper-V: Free hv_panic_page when fail to register kmsg dump (bsc#1170618).
- x86/Hyper-V: Report crash data in die() when panic_on_oops is set (bsc#1170618).
- x86/Hyper-V: Report crash register data or kmsg before running crash kernel (bsc#1170618).
- x86/Hyper-V: Report crash register data when sysctl_record_panic_msg is not set (bsc#1170618).
- x86/Hyper-V: report value of misc_features (git-fixes).
- x86/Hyper-V: Trigger crash enlightenment only once during system crash (bsc#1170618).
- x86/Hyper-V: Unload vmbus channel in hv panic callback (bsc#1170618).
- x86/kprobes: Avoid kretprobe recursion bug (bsc#1114279).
- x86/{mce,mm}: Unmap the entire page if the whole page is affected and poisoned (bsc#1172257).
- x86/reboot/quirks: Add MacBook6,1 reboot quirk (bsc#1114279).
- x86/resctrl: Fix invalid attempt at removing the default resource group (git-fixes).
- x86/resctrl: Preserve CDP enable over CPU hotplug (bsc#1114279).
- x86/unwind/orc: Do not skip the first frame for inactive tasks (bsc#1058115).
- x86/unwind/orc: Fix error handling in __unwind_start() (bsc#1058115).
- x86/unwind/orc: Fix error path for bad ORC entry type (bsc#1058115).
- x86/unwind/orc: Fix unwind_get_return_address_ptr() for inactive tasks (bsc#1058115).
- x86/unwind/orc: Prevent unwinding before ORC initialization (bsc#1058115).
- x86/unwind: Prevent false warnings for non-current tasks (bsc#1058115).
- x86/xen: fix booting 32-bit pv guest (bsc#1071995).
- x86/xen: Make the boot CPU idle task reliable (bsc#1071995).
- x86/xen: Make the secondary CPU idle tasks reliable (bsc#1071995).
- xen/pci: reserve MCFG areas earlier (bsc#1170145).
- xfrm: Always set XFRM_TRANSFORMED in xfrm{4,6}_output_finish (networking-stable-20_04_27).
- xfrm: fix error in comment (git fixes).
- xfs: Correctly invert xfs_buftarg LRU isolation logic (git-fixes).
- xfs: do not ever return a stale pointer from __xfs_dir3_free_read (git-fixes).
- xprtrdma: Fix completion wait during device removal (git-fixes).
Patchnames
SUSE-2020-2156,SUSE-SLE-RT-12-SP4-2020-2156
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "The SUSE Linux Enterprise 12 SP4 RT kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2020-10135: Legacy pairing and secure-connections pairing authentication in Bluetooth BR/EDR Core Specification v5.2 and earlier may have allowed an unauthenticated user to complete authentication without pairing credentials via adjacent access. An unauthenticated, adjacent attacker could impersonate a Bluetooth BR/EDR master or slave to pair with a previously paired remote device to successfully complete the authentication procedure without knowing the link key (bnc#1171988).\n- CVE-2020-0305: In cdev_get of char_dev.c, there is a possible use-after-free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation (bnc#1174462).\n- CVE-2019-20908: An issue was discovered in drivers/firmware/efi/efi.c where incorrect access permissions for the efivar_ssdt ACPI variable could be used by attackers to bypass lockdown or secure boot restrictions, aka CID-1957a85b0032 (bnc#1173567).\n- CVE-2020-10781: zram sysfs resource consumption was fixed (bnc#1173074).\n- CVE-2020-15780: An issue was discovered in drivers/acpi/acpi_configfs.c where injection of malicious ACPI tables via configfs could be used by attackers to bypass lockdown and secure boot restrictions, aka CID-75b0cea7bf30 (bnc#1173573).\n- CVE-2020-15393: usbtest_disconnect in drivers/usb/misc/usbtest.c had a memory leak, aka CID-28ebeb8db770 (bnc#1173514).\n- CVE-2020-12771: btree_gc_coalesce in drivers/md/bcache/btree.c had a deadlock if a coalescing operation fails (bnc#1171732).\n- CVE-2020-12888: The VFIO PCI driver mishandled attempts to access disabled memory space (bnc#1171868).\n- CVE-2020-10769: A buffer over-read flaw was found in crypto_authenc_extractkeys in crypto/authenc.c in the IPsec Cryptographic algorithm\u0027s module, authenc. When a payload longer than 4 bytes, and is not following 4-byte alignment boundary guidelines, it causes a buffer over-read threat, leading to a system crash. This flaw allowed a local attacker with user privileges to cause a denial of service (bnc#1173265).\n- CVE-2020-10773: A kernel stack information leak on s390/s390x was fixed (bnc#1172999).\n- CVE-2020-14416: A race condition in tty-\u003edisc_data handling in the slip and slcan line discipline could lead to a use-after-free, aka CID-0ace17d56824. This affects drivers/net/slip/slip.c and drivers/net/can/slcan.c (bnc#1162002).\n- CVE-2020-10766: Fixed an issue which allowed an attacker with a local account to disable SSBD protection (bnc#1172781).\n- CVE-2020-10767: Fixed an issue where Indirect Branch Prediction Barrier was disabled in certain circumstances, leaving the system open to a spectre v2 style attack (bnc#1172782).\n- CVE-2020-10768: Fixed an issue with the prctl() function, where indirect branch speculation could be enabled even though it was diabled before (bnc#1172783).\n- CVE-2020-13974: Fixed a integer overflow in drivers/tty/vt/keyboard.c, if k_ascii is called several times in a row (bnc#1172775).\n- CVE-2020-0543: Fixed a side channel attack against special registers which could have resulted in leaking of read values to cores other than the one which called it. This attack is known as Special Register Buffer Data Sampling (SRBDS) or \u0027CrossTalk\u0027 (bsc#1154824).\n- CVE-2020-13974: Fixed an integer overflow in drivers/tty/vt/keyboard.c which could have been caused by calling multiple time in a row k_ascii (bsc#1172775).\n- CVE-2020-13143: Fixed an out-of-bounds read in gadget_dev_desc_UDC_store in drivers/usb/gadget/configfs.c (bsc#1171982).\n- CVE-2020-12769: Fixed an issue which could have allowed attackers to cause a panic via concurrent calls to dw_spi_irq and dw_spi_transfer_one (bsc#1171983).\n- CVE-2020-12657: An a use-after-free in block/bfq-iosched.c (bsc#1171205).\n- CVE-2020-12656: Fixed an improper handling of certain domain_release calls leadingch could have led to a memory leak (bsc#1171219).\n- CVE-2020-12655: Fixed an issue which could have allowed attackers to trigger a sync of excessive duration via an XFS v5 image with crafted metadata (bsc#1171217).\n- CVE-2020-12654: Fixed an issue in he wifi driver which could have allowed a remote AP to trigger a heap-based buffer overflow (bsc#1171202).\n- CVE-2020-12653: Fixed an issue in the wifi driver which could have allowed local users to gain privileges or cause a denial of service (bsc#1171195).\n- CVE-2020-12652: Fixed an issue which could have allowed local users to hold an incorrect lock during the ioctl operation and trigger a race condition (bsc#1171218).\n- CVE-2020-12464: Fixed a use-after-free due to a transfer without a reference (bsc#1170901).\n- CVE-2020-12114: Fixed a pivot_root race condition which could have allowed local users to cause a denial of service (panic) by corrupting a mountpoint reference counter (bsc#1171098).\n- CVE-2020-10757: Fixed an issue where remaping hugepage DAX to anon mmap could have caused user PTE access (bsc#1172317).\n- CVE-2020-10751: Fixed an improper implementation in SELinux LSM hook where it was assumed that an skb would only contain a single netlink message (bsc#1171189).\n- CVE-2020-10732: Fixed kernel data leak in userspace coredumps due to uninitialized data (bsc#1171220).\n- CVE-2020-10720: Fixed a use-after-free read in napi_gro_frags() (bsc#1170778).\n- CVE-2020-10711: Fixed a null pointer dereference in SELinux subsystem which could have allowed a remote network user to crash the kernel resulting in a denial of service (bsc#1171191).\n- CVE-2020-10690: Fixed the race between the release of ptp_clock and cdev (bsc#1170056).\n- CVE-2019-9455: Fixed a pointer leak due to a WARN_ON statement in a video driver. This could lead to local information disclosure with System execution privileges needed (bsc#1170345).\n- CVE-2019-20812: Fixed an issue in prb_calc_retire_blk_tmo() which could have resulted in a denial of service (bsc#1172453).\n- CVE-2019-20810: Fixed a memory leak in due to not calling of snd_card_free (bsc#1172458).\n- CVE-2019-20806: Fixed a null pointer dereference which may had lead to denial of service (bsc#1172199).\n- CVE-2019-19462: Fixed an issue which could have allowed local user to cause denial of service (bsc#1158265).\n- CVE-2019-16746: An issue was discovered in net/wireless/nl80211.c, where the length of variable elements in a beacon head was not checked, leading to a buffer overflow (bnc#1152107 1173659).\n- CVE-2019-20810: go7007_snd_init in drivers/media/usb/go7007/snd-go7007.c did not call snd_card_free for a failure path, which caused a memory leak, aka CID-9453264ef586 (bnc#1172458).\n- CVE-2018-1000199: Fixed a potential local code execution via ptrace (bsc#1089895).\n\nThe following non-security bugs were fixed:\n\n- ACPI: CPPC: Fix reference count leak in acpi_cppc_processor_probe() (bsc#1051510).\n- ACPI: PM: Avoid using power resources if there are none for D0 (bsc#1051510).\n- ACPI: sysfs: Fix reference count leak in acpi_sysfs_add_hotplug_profile() (bsc#1051510).\n- acpi/x86: ignore unspecified bit positions in the ACPI global lock field (bsc#1051510).\n- agp/intel: Reinforce the barrier after GTT updates (bsc#1051510).\n- ALSA: ctxfi: Remove unnecessary cast in kfree (bsc#1051510).\n- ALSA: dummy: Fix PCM format loop in proc output (bsc#1111666).\n- ALSA: es1688: Add the missed snd_card_free() (bsc#1051510).\n- ALSA: hda: Do not release card at firmware loading error (bsc#1051510).\n- ALSA: hda/hdmi: fix race in monitor detection during probe (bsc#1051510).\n- ALSA: hda/hdmi: fix without unlocked before return (bsc#1051510).\n- ALSA: hda: Keep the controller initialization even if no codecs found (bsc#1051510).\n- ALSA: hda/realtek - Add more fixup entries for Clevo machines (git-fixes).\n- ALSA: hda/realtek - Add new codec supported for ALC245 (bsc#1051510).\n- ALSA: hda/realtek - Add new codec supported for ALC287 (git-fixes).\n- ALSA: hda/realtek - Fix S3 pop noise on Dell Wyse (git-fixes).\n- ALSA: hda/realtek - Fix unexpected init_amp override (bsc#1051510).\n- ALSA: hda/realtek - Limit int mic boost for Thinkpad T530 (git-fixes bsc#1171293).\n- ALSA: hda/realtek - Two front mics on a Lenovo ThinkCenter (bsc#1051510).\n- ALSA: hwdep: fix a left shifting 1 by 31 UB bug (git-fixes).\n- ALSA: iec1712: Initialize STDSP24 properly when using the model=staudio option (git-fixes).\n- ALSA: opti9xx: shut up gcc-10 range warning (bsc#1051510).\n- ALSA: pcm: fix incorrect hw_base increase (git-fixes).\n- ALSA: pcm: oss: Place the plugin buffer overflow checks correctly (bsc#1170522).\n- ALSA: rawmidi: Fix racy buffer resize under concurrent accesses (git-fixes).\n- ALSA: usb-audio: Add control message quirk delay for Kingston HyperX headset (git-fixes).\n- ALSA: usb-audio: Correct a typo of NuPrime DAC-10 USB ID (bsc#1051510).\n- ALSA: usb-audio: Do not override ignore_ctl_error value from the map (bsc#1051510).\n- ALSA: usb-audio: Fix usb audio refcnt leak when getting spdif (bsc#1051510).\n- ALSA: usb-audio: mixer: volume quirk for ESS Technology Asus USB DAC (git-fixes).\n- ALSA: usx2y: Fix potential NULL dereference (bsc#1051510).\n- ASoC: codecs: hdac_hdmi: Fix incorrect use of list_for_each_entry (bsc#1051510).\n- ASoC: dapm: connect virtual mux with default value (bsc#1051510).\n- ASoC: dapm: fixup dapm kcontrol widget (bsc#1051510).\n- ASoC: dpcm: allow start or stop during pause for backend (bsc#1051510).\n- ASoC: fix regwmask (bsc#1051510).\n- ASoC: msm8916-wcd-digital: Reset RX interpolation path after use (bsc#1051510).\n- ASoC: samsung: Prevent clk_get_rate() calls in atomic context (bsc#1111666).\n- ASoC: topology: Check return value of pcm_new_ver (bsc#1051510).\n- ASoC: topology: use name_prefix for new kcontrol (bsc#1051510).\n- b43legacy: Fix case where channel status is corrupted (bsc#1051510).\n- batman-adv: fix batadv_nc_random_weight_tq (git-fixes).\n- batman-adv: Fix refcnt leak in batadv_show_throughput_override (git-fixes).\n- batman-adv: Fix refcnt leak in batadv_store_throughput_override (git-fixes).\n- batman-adv: Fix refcnt leak in batadv_v_ogm_process (git-fixes).\n- bcache: avoid unnecessary btree nodes flushing in btree_flush_write() (git fixes (block drivers)).\n- bcache: Fix an error code in bch_dump_read() (git fixes (block drivers)).\n- bcache: fix incorrect data type usage in btree_flush_write() (git fixes (block drivers)).\n- bcache: Revert \u0027bcache: shrink btree node cache after bch_btree_check()\u0027 (git fixes (block drivers)).\n- block, bfq: add requeue-request hook (bsc#1104967 bsc#1171673).\n- block, bfq: postpone rq preparation to insert or merge (bsc#1104967 bsc#1171673).\n- block/drbd: delete invalid function drbd_md_mark_dirty_ (bsc#1171527).\n- block: drbd: remove a stray unlock in __drbd_send_protocol() (bsc#1171599).\n- block: fix busy device checking in blk_drop_partitions again (bsc#1171948).\n- block: fix busy device checking in blk_drop_partitions (bsc#1171948).\n- block: fix memleak of bio integrity data (git fixes (block drivers)).\n- block: remove QUEUE_FLAG_STACKABLE (git fixes (block drivers)).\n- block: remove the bd_openers checks in blk_drop_partitions (bsc#1171948).\n- block: sed-opal: fix sparse warning: convert __be64 data (git fixes (block drivers)).\n- bnxt_en: fix memory leaks in bnxt_dcbnl_ieee_getets() (networking-stable-20_03_28).\n- bnxt_en: reinitialize IRQs when MTU is modified (networking-stable-20_03_14).\n- bonding/alb: make sure arp header is pulled before accessing it (networking-stable-20_03_14).\n- brcmfmac: abort and release host after error (bsc#1051510).\n- btrfs: always wait on ordered extents at fsync time (bsc#1171761).\n- btrfs: clean up the left over logged_list usage (bsc#1171761).\n- btrfs: do not zero f_bavail if we have available space (bsc#1168081).\n- btrfs: fix deadlock with memory reclaim during scrub (bsc#1172127).\n- Btrfs: fix list_add corruption and soft lockups in fsync (bsc#1171761).\n- btrfs: fix log context list corruption after rename whiteout error (bsc#1172342).\n- Btrfs: fix missing data checksums after a ranged fsync (msync) (bsc#1171761).\n- btrfs: fix missing file extent item for hole after ranged fsync (bsc#1171761).\n- Btrfs: fix missing hole after hole punching and fsync when using NO_HOLES (bsc#1171761).\n- btrfs: fix missing semaphore unlock in btrfs_sync_file (bsc#1171761).\n- btrfs: fix partial loss of prealloc extent past i_size after fsync (bsc#1172343).\n- Btrfs: fix rare chances for data loss when doing a fast fsync (bsc#1171761).\n- btrfs: move the dio_sem higher up the callchain (bsc#1171761).\n- btrfs: reloc: clear DEAD_RELOC_TREE bit for orphan roots to prevent runaway balance (bsc#1171417 bsc#1160947 bsc#1172366).\n- btrfs: reloc: fix reloc root leak and NULL pointer dereference (bsc#1171417 bsc#1160947 bsc#1172366).\n- btrfs: Remove extra parentheses from condition in copy_items() (bsc#1171761).\n- Btrfs: remove no longer used io_err from btrfs_log_ctx (bsc#1171761).\n- Btrfs: remove no longer used logged range variables when logging extents (bsc#1171761).\n- Btrfs: remove no longer used \u0027sync\u0027 member from transaction handle (bsc#1171761).\n- btrfs: remove remaing full_sync logic from btrfs_sync_file (bsc#1171761).\n- btrfs: remove the logged extents infrastructure (bsc#1171761).\n- btrfs: remove the wait ordered logic in the log_one_extent path (bsc#1171761).\n- btrfs: setup a nofs context for memory allocation at btrfs_create_tree() (bsc#1172127).\n- btrfs: setup a nofs context for memory allocation at __btrfs_set_acl (bsc#1172127).\n- btrfs: use nofs context when initializing security xattrs to avoid deadlock (bsc#1172127).\n- btrfs: volumes: Remove ENOSPC-prone btrfs_can_relocate() (bsc#1171124).\n- can: add missing attribute validation for termination (networking-stable-20_03_14).\n- cdc-acm: close race betrween suspend() and acm_softint (git-fixes).\n- CDC-ACM: heed quirk also in error handling (git-fixes).\n- cdc-acm: introduce a cool down (git-fixes).\n- ceph: fix double unlock in handle_cap_export() (bsc#1171694).\n- ceph: fix endianness bug when handling MDS session feature bits (bsc#1171695).\n- cgroup, netclassid: periodically release file_lock on classid updating (networking-stable-20_03_14).\n- CIFS: Allocate crypto structures on the fly for calculating signatures of incoming packets (bsc#1144333).\n- CIFS: Allocate encryption header through kmalloc (bsc#1144333).\n- CIFS: allow unlock flock and OFD lock across fork (bsc#1144333).\n- CIFS: check new file size when extending file by fallocate (bsc#1144333).\n- CIFS: cifspdu.h: Replace zero-length array with flexible-array member (bsc#1144333).\n- CIFS: clear PF_MEMALLOC before exiting demultiplex thread (bsc#1144333).\n- CIFS: do not share tcons with DFS (bsc#1144333).\n- CIFS: dump the session id and keys also for SMB2 sessions (bsc#1144333).\n- CIFS: ensure correct super block for DFS reconnect (bsc#1144333).\n- CIFS: Fix bug which the return value by asynchronous read is error (bsc#1144333).\n- CIFS: fix uninitialised lease_key in open_shroot() (bsc#1144333).\n- cifs: get rid of unused parameter in reconn_setup_dfs_targets() (bsc#1144333).\n- cifs: handle hostnames that resolve to same ip in failover (bsc#1144333 bsc#1161016).\n- CIFS: improve read performance for page size 64KB \u0026 cache=strict \u0026 vers=2.1+ (bsc#1144333).\n- CIFS: Increment num_remote_opens stats counter even in case of smb2_query_dir_first (bsc#1144333).\n- CIFS: minor update to comments around the cifs_tcp_ses_lock mutex (bsc#1144333).\n- CIFS: protect updating server-\u003edstaddr with a spinlock (bsc#1144333).\n- cifs: set up next DFS target before generic_ip_connect() (bsc#1144333 bsc#1161016).\n- CIFS: smb2pdu.h: Replace zero-length array with flexible-array member (bsc#1144333).\n- CIFS: smbd: Calculate the correct maximum packet size for segmented SMBDirect send/receive (bsc#1144333).\n- CIFS: smbd: Check and extend sender credits in interrupt context (bsc#1144333).\n- CIFS: smbd: Check send queue size before posting a send (bsc#1144333).\n- CIFS: smbd: Do not schedule work to send immediate packet on every receive (bsc#1144333).\n- CIFS: smbd: Merge code to track pending packets (bsc#1144333).\n- CIFS: smbd: Properly process errors on ib_post_send (bsc#1144333).\n- CIFS: smbd: Update receive credits before sending and deal with credits roll back on failure before sending (bsc#1144333).\n- CIFS: Warn less noisily on default mount (bsc#1144333).\n- clk: Add clk_hw_unregister_composite helper function definition (bsc#1051510).\n- clk: bcm2835: Fix return type of bcm2835_register_gate (bsc#1051510).\n- clk: clk-flexgen: fix clock-critical handling (bsc#1051510).\n- clk: imx6ull: use OSC clock during AXI rate change (bsc#1051510).\n- clk: imx: make mux parent strings const (bsc#1051510).\n- clk: mediatek: correct the clocks for MT2701 HDMI PHY module (bsc#1051510).\n- clk: sunxi: Fix incorrect usage of round_down() (bsc#1051510).\n- clk: sunxi-ng: a64: Fix gate bit of DSI DPHY (bsc#1051510).\n- clocksource/drivers/hyper-v: Set TSC clocksource as default w/ InvariantTSC (bsc#1170620).\n- clocksource: dw_apb_timer_of: Fix missing clockevent timers (bsc#1051510).\n- compat_ioctl: block: handle BLKREPORTZONE/BLKRESETZONE (git fixes (block drivers)).\n- compat_ioctl: block: handle Persistent Reservations (git fixes (block drivers)).\n- component: Silence bind error on -EPROBE_DEFER (bsc#1051510).\n- copy_{to,from}_user(): consolidate object size checks (git fixes).\n- coresight: do not use the BIT() macro in the UAPI header (git fixes (block drivers)).\n- cpufreq: s3c64xx: Remove pointless NULL check in s3c64xx_cpufreq_driver_init (bsc#1051510).\n- crypto: cavium/nitrox - Fix \u0027nitrox_get_first_device()\u0027 when ndevlist is fully iterated (git-fixes).\n- crypto: ccp - AES CFB mode is a stream cipher (git-fixes).\n- crypto: ccp - Clean up and exit correctly on allocation failure (git-fixes).\n- crypto: ccp - Cleanup misc_dev on sev_exit() (bsc#1114279).\n- crypto: ccp - Cleanup sp_dev_master in psp_dev_destroy() (bsc#1114279).\n- debugfs: Add debugfs_create_xul() for hexadecimal unsigned long (git-fixes).\n- dmaengine: dmatest: Fix iteration non-stop logic (bsc#1051510).\n- dm btree: increase rebalance threshold in __rebalance2() (git fixes (block drivers)).\n- dm cache: fix a crash due to incorrect work item cancelling (git fixes (block drivers)).\n- dm crypt: fix benbi IV constructor crash if used in authenticated mode (git fixes (block drivers)).\n- dm: fix potential for q-\u003emake_request_fn NULL pointer (git fixes (block drivers)).\n- dm mpath: switch paths in dm_blk_ioctl() code path (bsc#1167574).\n- dm space map common: fix to ensure new block isn\u0027t already in use (git fixes (block drivers)).\n- dm: various cleanups to md-\u003equeue initialization code (git fixes).\n- dm verity fec: fix hash block number in verity_fec_decode (git fixes (block drivers)).\n- dm verity fec: fix memory leak in verity_fec_dtr (git fixes (block drivers)).\n- dm writecache: fix data corruption when reloading the target (git fixes (block drivers)).\n- dm writecache: fix incorrect flush sequence when doing SSD mode commit (git fixes (block drivers)).\n- dm writecache: verify watermark during resume (git fixes (block drivers)).\n- dm zoned: fix invalid memory access (git fixes (block drivers)).\n- dm zoned: reduce overhead of backing device checks (git fixes (block drivers)).\n- dm zoned: remove duplicate nr_rnd_zones increase in dmz_init_zone() (git fixes (block drivers)).\n- dm zoned: support zone sizes smaller than 128MiB (git fixes (block drivers)).\n- dp83640: reverse arguments to list_add_tail (git-fixes).\n- Drivers: hv: Add a module description line to the hv_vmbus driver (bsc#1172253).\n- Drivers: HV: Send one page worth of kmsg dump over Hyper-V during panic (bsc#1170618).\n- Drivers: hv: vmbus: Fix the issue with freeing up hv_ctl_table_hdr (bsc#1170618).\n- Drivers: hv: vmbus: Get rid of MSR access from vmbus_drv.c (bsc#1170618).\n- Drivers: hv: vmus: Fix the check for return value from kmsg get dump buffer (bsc#1170618).\n- Drivers/net/ibmvnic: Update VNIC protocol version reporting (bsc#1065729).\n- Drivers: soc: ti: knav_qmss_queue: Make knav_gp_range_ops static (bsc#1051510).\n- drm: amd/acp: fix broken menu structure (bsc#1114279) \t* context changes\n- drm/crc: Actually allow to change the crc source (bsc#1114279) \t* offset changes\n- drm/dp_mst: Fix clearing payload state on topology disable (bsc#1051510).\n- drm/dp_mst: Reformat drm_dp_check_act_status() a bit (bsc#1051510).\n- drm/edid: Fix off-by-one in DispID DTD pixel clock (bsc#1114279)\n- drm: encoder_slave: fix refcouting error for modules (bsc#1114279)\n- drm/i915/gvt: Init DPLL/DDI vreg for virtual display instead of (bsc#1114279)\n- drm/i915: properly sanity check batch_start_offset (bsc#1114279) \t* renamed display/intel_fbc.c -\u003e intel_fb.c \t* renamed gt/intel_rc6.c -\u003e intel_pm.c \t* context changes\n- drm/meson: Delete an error message in meson_dw_hdmi_bind() (bsc#1051510).\n- drm: NULL pointer dereference [null-pointer-deref] (CWE 476) problem (bsc#1114279)\n- drm/qxl: qxl_release leak in qxl_draw_dirty_fb() (bsc#1051510).\n- drm/qxl: qxl_release leak in qxl_hw_surface_alloc() (bsc#1051510).\n- drm/qxl: qxl_release use after free (bsc#1051510).\n- drm: Remove PageReserved manipulation from drm_pci_alloc (bsc#1114279) \t* offset changes\n- dump_stack: avoid the livelock of the dump_lock (git fixes (block drivers)).\n- e1000e: Disable TSO for buffer overrun workaround (bsc#1051510).\n- e1000e: Do not wake up the system via WOL if device wakeup is disabled (bsc#1051510).\n- EDAC/amd64: Read back the scrub rate PCI register on F15h (bsc#1114279).\n- EDAC, sb_edac: Add support for systems with segmented PCI buses (bsc#1169525).\n- evm: Check also if *tfm is an error pointer in init_desc() (bsc#1051510).\n- evm: Fix a small race in init_desc() (bsc#1051510).\n- ext4: do not zeroout extents beyond i_disksize (bsc#1167851).\n- ext4: fix extent_status fragmentation for plain files (bsc#1171949).\n- ext4: use non-movable memory for superblock readahead (bsc#1171952).\n- extcon: adc-jack: Fix an error handling path in \u0027adc_jack_probe()\u0027 (bsc#1051510).\n- fanotify: fix merging marks masks with FAN_ONDIR (bsc#1171679).\n- fbcon: fix null-ptr-deref in fbcon_switch (bsc#1114279) \t* rename drivers/video/fbdev/core to drivers/video/console \t* context changes\n- fbdev: potential information leak in do_fb_ioctl() (bsc#1114279)\n- fbmem: Adjust indentation in fb_prepare_logo and fb_blank (bsc#1114279)\n- fib: add missing attribute validation for tun_id (networking-stable-20_03_14).\n- firmware: qcom: scm: fix compilation error when disabled (bsc#1051510).\n- fs/cifs: fix gcc warning in sid_to_id (bsc#1144333).\n- fs/seq_file.c: simplify seq_file iteration code and interface (bsc#1170125).\n- gpiolib: Document that GPIO line names are not globally unique (bsc#1051510).\n- gpio: tegra: mask GPIO IRQs during IRQ shutdown (bsc#1051510).\n- gre: fix uninit-value in __iptunnel_pull_header (networking-stable-20_03_14).\n- HID: hid-input: clear unmapped usages (git-fixes).\n- HID: hyperv: Add a module description line (bsc#1172253).\n- HID: i2c-hid: add Trekstor Primebook C11B to descriptor override (git-fixes).\n- HID: i2c-hid: override HID descriptors for certain devices (git-fixes).\n- HID: multitouch: add eGalaxTouch P80H84 support (bsc#1051510).\n- HID: sony: Fix for broken buttons on DS3 USB dongles (bsc#1051510).\n- HID: wacom: Read HID_DG_CONTACTMAX directly for non-generic devices (git-fixes).\n- hrtimer: Annotate lockless access to timer-\u003estate (git fixes (block drivers)).\n- hsr: add restart routine into hsr_get_node_list() (networking-stable-20_03_28).\n- hsr: check protocol version in hsr_newlink() (networking-stable-20_04_17).\n- hsr: fix general protection fault in hsr_addr_is_self() (networking-stable-20_03_28).\n- hsr: set .netnsok flag (networking-stable-20_03_28).\n- hsr: use rcu_read_lock() in hsr_get_node_{list/status}() (networking-stable-20_03_28).\n- i2c: acpi: Force bus speed to 400KHz if a Silead touchscreen is present (git-fixes).\n- i2c: acpi: put device when verifying client fails (git-fixes).\n- i2c: brcmstb: remove unused struct member (git-fixes).\n- i2c: core: Allow empty id_table in ACPI case as well (git-fixes).\n- i2c: core: decrease reference count of device node in i2c_unregister_device (git-fixes).\n- i2c: dev: Fix the race between the release of i2c_dev and cdev (bsc#1051510).\n- i2c: fix missing pm_runtime_put_sync in i2c_device_probe (git-fixes).\n- i2c-hid: properly terminate i2c_hid_dmi_desc_override_table array (git-fixes).\n- i2c: i801: Do not add ICH_RES_IO_SMI for the iTCO_wdt device (git-fixes).\n- i2c: iproc: Stop advertising support of SMBUS quick cmd (git-fixes).\n- i2c: isch: Remove unnecessary acpi.h include (git-fixes).\n- i2c: mux: demux-pinctrl: Fix an error handling path in \u0027i2c_demux_pinctrl_probe()\u0027 (bsc#1051510).\n- i2c: st: fix missing struct parameter description (bsc#1051510).\n- IB/ipoib: Add child to parent list only if device initialized (bsc#1168503).\n- IB/ipoib: Consolidate checking of the proposed child interface (bsc#1168503).\n- IB/ipoib: Do not remove child devices from within the ndo_uninit (bsc#1168503).\n- IB/ipoib: Get rid of IPOIB_FLAG_GOING_DOWN (bsc#1168503).\n- IB/ipoib: Get rid of the sysfs_mutex (bsc#1168503).\n- IB/ipoib: Maintain the child_intfs list from ndo_init/uninit (bsc#1168503).\n- IB/ipoib: Move all uninit code into ndo_uninit (bsc#1168503).\n- IB/ipoib: Move init code to ndo_init (bsc#1168503).\n- IB/ipoib: Replace printk with pr_warn (bsc#1168503).\n- IB/ipoib: Use cancel_delayed_work_sync for neigh-clean task (bsc#1168503).\n- IB/ipoib: Warn when one port fails to initialize (bsc#1168503).\n- ibmveth: Fix max MTU limit (bsc#1173428 ltc#186397).\n- ibmvfc: do not send implicit logouts prior to NPIV login (bsc#1169625 ltc#184611).\n- ibmvnic: continue to init in CRQ reset returns H_CLOSED (bsc#1173280 ltc#185369).\n- ibmvnic: Flush existing work items before device removal (bsc#1065729).\n- ibmvnic: Harden device login requests (bsc#1170011 ltc#183538).\n- ibmvnic: Skip fatal error reset after passive init (bsc#1171078 ltc#184239).\n- iio:ad7797: Use correct attribute_group (bsc#1051510).\n- iio: adc: stm32-adc: fix device used to request dma (bsc#1051510).\n- iio: adc: stm32-adc: fix sleep in atomic context (git-fixes).\n- iio: adc: stm32-adc: Use dma_request_chan() instead dma_request_slave_channel() (bsc#1051510).\n- iio: buffer: Do not allow buffers without any channels enabled to be activated (bsc#1051510).\n- iio: dac: vf610: Fix an error handling path in \u0027vf610_dac_probe()\u0027 (bsc#1051510).\n- iio: pressure: bmp280: Tolerate IRQ before registering (bsc#1051510).\n- iio: sca3000: Remove an erroneous \u0027get_device()\u0027 (bsc#1051510).\n- iio: xilinx-xadc: Fix ADC-B powerdown (bsc#1051510).\n- iio: xilinx-xadc: Fix clearing interrupt when enabling trigger (bsc#1051510).\n- iio: xilinx-xadc: Fix sequencer configuration for aux channels in simultaneous mode (bsc#1051510).\n- ima: Directly assign the ima_default_policy pointer to ima_rules (bsc#1051510).\n- ima: Fix ima digest hash table key calculation (bsc#1051510).\n- ima: Fix return value of ima_write_policy() (git-fixes).\n- include/asm-generic/topology.h: guard cpumask_of_node() macro argument (bsc#1148868).\n- Input: evdev - call input_flush_device() on release(), not flush() (bsc#1051510).\n- Input: hyperv-keyboard - add module description (bsc#1172253).\n- Input: i8042 - add Acer Aspire 5738z to nomux list (bsc#1051510).\n- Input: i8042 - add ThinkPad S230u to i8042 reset list (bsc#1051510).\n- Input: raydium_i2c_ts - use true and false for boolean values (bsc#1051510).\n- Input: synaptics-rmi4 - fix error return code in rmi_driver_probe() (bsc#1051510).\n- Input: synaptics-rmi4 - really fix attn_data use-after-free (git-fixes).\n- Input: usbtouchscreen - add support for BonXeon TP (bsc#1051510).\n- Input: xpad - add custom init packet for Xbox One S controllers (bsc#1051510).\n- iommu/amd: Call domain_flush_complete() in update_domain() (bsc#1172096).\n- iommu/amd: Do not flush Device Table in iommu_map_page() (bsc#1172097).\n- iommu/amd: Do not loop forever when trying to increase address space (bsc#1172098).\n- iommu/amd: Fix legacy interrupt remapping for x2APIC-enabled system (bsc#1172099).\n- iommu/amd: Fix over-read of ACPI UID from IVRS table (bsc#1172101).\n- iommu/amd: Fix race in increase_address_space()/fetch_pte() (bsc#1172102).\n- iommu/amd: Update Device Table in increase_address_space() (bsc#1172103).\n- iommu: Fix reference count leak in iommu_group_alloc (bsc#1172397).\n- ipmi: fix hung processes in __get_guid() (git-fixes).\n- ipv4: fix a RCU-list lock in fib_triestat_seq_show (networking-stable-20_04_02).\n- ipv6/addrconf: call ipv6_mc_up() for non-Ethernet interface (networking-stable-20_03_14).\n- ipv6: do not auto-add link-local address to lag ports (networking-stable-20_04_09).\n- ipv6: Fix nlmsg_flags when splitting a multipath route (networking-stable-20_03_01).\n- ipv6: Fix route replacement with dev-only route (networking-stable-20_03_01).\n- ipvlan: add cond_resched_rcu() while processing muticast backlog (networking-stable-20_03_14).\n- ipvlan: do not deref eth hdr before checking it\u0027s set (networking-stable-20_03_14).\n- ipvlan: do not use cond_resched_rcu() in ipvlan_process_multicast() (networking-stable-20_03_14).\n- iwlwifi: pcie: actually release queue memory in TVQM (bsc#1051510).\n- kABI fix for early XHCI debug (git-fixes).\n- kabi for for md: improve handling of bio with REQ_PREFLUSH in md_flush_request() (git-fixes).\n- kabi, protect struct ib_device (bsc#1168503).\n- kabi/severities: Do not track KVM internal symbols.\n- kabi/severities: Ingnore get_dev_data() The function is internal to the AMD IOMMU driver and must not be called by any third party.\n- kabi workaround for snd_rawmidi buffer_ref field addition (git-fixes).\n- KEYS: reaching the keys quotas correctly (bsc#1051510).\n- KVM: arm64: Change hyp_panic()s dependency on tpidr_el2 (bsc#1133021).\n- KVM: arm64: Stop save/restoring host tpidr_el1 on VHE (bsc#1133021).\n- KVM: Check validity of resolved slot when searching memslots (bsc#1172104).\n- KVM: nVMX: Do not reread VMCS-agnostic state when switching VMCS (bsc#1114279).\n- KVM: nVMX: Skip IBPB when switching between vmcs01 and vmcs02 (bsc#1114279).\n- KVM: s390: vsie: Fix delivery of addressing exceptions (git-fixes).\n- KVM: s390: vsie: Fix possible race when shadowing region 3 tables (git-fixes).\n- KVM: s390: vsie: Fix region 1 ASCE sanity shadow address checks (git-fixes).\n- KVM: SVM: Fix potential memory leak in svm_cpu_init() (bsc#1171736).\n- KVM x86: Extend AMD specific guest behavior to Hygon virtual CPUs (bsc#1152489).\n- kvm: x86: Fix L1TF mitigation for shadow MMU (bsc#1171904).\n- KVM: x86/mmu: Set mmio_value to \u00270\u0027 if reserved #PF can\u0027t be generated (bsc#1171904).\n- KVM: x86: only do L1TF workaround on affected processors (bsc#1171904).\n- l2tp: Allow management of tunnels and session in user namespace (networking-stable-20_04_17).\n- libata: Remove extra scsi_host_put() in ata_scsi_add_hosts() (bsc#1051510).\n- libata: Return correct status in sata_pmp_eh_recover_pm() when ATA_DFLAG_DETACH is set (bsc#1051510).\n- libceph: do not omit recovery_deletes in target_copy() (bsc#1173462).\n- lib: raid6: fix awk build warnings (git fixes (block drivers)).\n- lib/raid6/test: fix build on distros whose /bin/sh is not bash (git fixes (block drivers)).\n- lib/stackdepot.c: fix global out-of-bounds in stack_slabs (git fixes (block drivers)).\n- livepatch: Apply vmlinux-specific KLP relocations early (bsc#1071995).\n- livepatch: Disallow vmlinux.ko (bsc#1071995).\n- livepatch: Make klp_apply_object_relocs static (bsc#1071995).\n- livepatch: Prevent module-specific KLP rela sections from referencing vmlinux symbols (bsc#1071995).\n- livepatch: Remove .klp.arch (bsc#1071995).\n- locks: print unsigned ino in /proc/locks (bsc#1171951). \n- mac80211: add ieee80211_is_any_nullfunc() (bsc#1051510).\n- mac80211_hwsim: Use kstrndup() in place of kasprintf() (bsc#1051510).\n- mac80211: mesh: fix discovery timer re-arming issue / crash (bsc#1051510).\n- macsec: avoid to set wrong mtu (bsc#1051510).\n- macsec: restrict to ethernet devices (networking-stable-20_03_28).\n- macvlan: add cond_resched() during multicast processing (networking-stable-20_03_14).\n- macvlan: fix null dereference in macvlan_device_event() (bsc#1051510).\n- md: Avoid namespace collision with bitmap API (git fixes (block drivers)).\n- md: improve handling of bio with REQ_PREFLUSH in md_flush_request() (git-fixes).\n- md/raid0: Fix an error message in raid0_make_request() (git fixes (block drivers)).\n- md/raid10: prevent access of uninitialized resync_pages offset (git-fixes).\n- md: use memalloc scope APIs in mddev_suspend()/mddev_resume() (git fixes (block drivers)).\n- media: dvb: return -EREMOTEIO on i2c transfer failure (bsc#1051510).\n- media: platform: fcp: Set appropriate DMA parameters (bsc#1051510).\n- media: ti-vpe: cal: fix disable_irqs to only the intended target (git-fixes).\n- mei: release me_cl object reference (bsc#1051510).\n- mlxsw: Fix some IS_ERR() vs NULL bugs (networking-stable-20_04_27).\n- mlxsw: spectrum_flower: Do not stop at FLOW_ACTION_VLAN_MANGLE (networking-stable-20_04_09).\n- mmc: atmel-mci: Fix debugfs on 64-bit platforms (git-fixes).\n- mmc: dw_mmc: Fix debugfs on 64-bit platforms (git-fixes).\n- mmc: fix compilation of user API (bsc#1051510).\n- mmc: meson-gx: make sure the descriptor is stopped on errors (git-fixes).\n- mmc: meson-gx: simplify interrupt handler (git-fixes).\n- mmc: renesas_sdhi: limit block count to 16 bit for old revisions (git-fixes).\n- mmc: sdhci-esdhc-imx: fix the mask for tuning start point (bsc#1051510).\n- mmc: sdhci-msm: Clear tuning done flag while hs400 tuning (bsc#1051510).\n- mmc: sdhci-of-at91: fix memleak on clk_get failure (git-fixes).\n- mmc: sdhci-pci: Fix eMMC driver strength for BYT-based controllers (bsc#1051510).\n- mmc: sdhci-xenon: fix annoying 1.8V regulator warning (bsc#1051510).\n- mmc: sdio: Fix potential NULL pointer error in mmc_sdio_init_card() (bsc#1051510).\n- mmc: tmio: fix access width of Block Count Register (git-fixes).\n- mm: thp: handle page cache THP correctly in PageTransCompoundMap (git fixes (block drivers)).\n- mtd: cfi: fix deadloop in cfi_cmdset_0002.c do_write_buffer (bsc#1051510).\n- mtd: spi-nor: cadence-quadspi: add a delay in write sequence (git-fixes).\n- mtd: spi-nor: enable 4B opcodes for mx66l51235l (git-fixes).\n- mtd: spi-nor: fsl-quadspi: Do not let -EINVAL on the bus (git-fixes).\n- mwifiex: avoid -Wstringop-overflow warning (bsc#1051510).\n- mwifiex: Fix memory corruption in dump_station (bsc#1051510).\n- net: bcmgenet: correct per TX/RX ring statistics (networking-stable-20_04_27).\n- net: dsa: b53: Fix ARL register definitions (networking-stable-20_04_27).\n- net: dsa: b53: Rework ARL bin logic (networking-stable-20_04_27).\n- net: dsa: bcm_sf2: Do not register slave MDIO bus with OF (networking-stable-20_04_09).\n- net: dsa: bcm_sf2: Ensure correct sub-node is parsed (networking-stable-20_04_09).\n- net: dsa: bcm_sf2: Fix overflow checks (git-fixes).\n- net: dsa: Fix duplicate frames flooded by learning (networking-stable-20_03_28).\n- net: dsa: mv88e6xxx: fix lockup on warm boot (networking-stable-20_03_14).\n- net: fec: validate the new settings in fec_enet_set_coalesce() (networking-stable-20_03_14).\n- net: fib_rules: Correctly set table field when table number exceeds 8 bits (networking-stable-20_03_01).\n- netfilter: connlabels: prefer static lock initialiser (git-fixes).\n- netfilter: conntrack: sctp: use distinct states for new SCTP connections (bsc#1159199).\n- netfilter: ctnetlink: netns exit must wait for callbacks (bsc#1169795).\n- netfilter: not mark a spinlock as __read_mostly (git-fixes).\n- net: fix race condition in __inet_lookup_established() (bsc#1151794).\n- net: fq: add missing attribute validation for orphan mask (networking-stable-20_03_14).\n- net, ip_tunnel: fix interface lookup with no key (networking-stable-20_04_02).\n- net: ipv4: devinet: Fix crash when add/del multicast IP with autojoin (networking-stable-20_04_17).\n- net: ipv6: do not consider routes via gateways for anycast address check (networking-stable-20_04_17).\n- netlink: Use netlink header as base to calculate bad attribute offset (networking-stable-20_03_14).\n- net: macsec: update SCI upon MAC address change (networking-stable-20_03_14).\n- net: memcg: fix lockdep splat in inet_csk_accept() (networking-stable-20_03_14).\n- net: memcg: late association of sock to memcg (networking-stable-20_03_14).\n- net/mlx4_en: avoid indirect call in TX completion (networking-stable-20_04_27).\n- net/mlx5: Add new fields to Port Type and Speed register (bsc#1171118).\n- net/mlx5: Add RoCE RX ICRC encapsulated counter (bsc#1171118).\n- net/mlx5e: Fix ethtool self test: link speed (bsc#1171118).\n- net/mlx5e: Move port speed code from en_ethtool.c to en/port.c (bsc#1171118).\n- net/mlx5: Expose link speed directly (bsc#1171118).\n- net/mlx5: Expose port speed when possible (bsc#1171118).\n- net: mvneta: Fix the case where the last poll did not process all rx (networking-stable-20_03_28).\n- net: netrom: Fix potential nr_neigh refcnt leak in nr_add_node (networking-stable-20_04_27).\n- net/packet: tpacket_rcv: do not increment ring index on drop (networking-stable-20_03_14).\n- net: phy: restore mdio regs in the iproc mdio driver (networking-stable-20_03_01).\n- net: qmi_wwan: add support for ASKEY WWHC050 (networking-stable-20_03_28).\n- net: revert default NAPI poll timeout to 2 jiffies (networking-stable-20_04_17).\n- net_sched: cls_route: remove the right filter from hashtable (networking-stable-20_03_28).\n- net/smc: add fallback check to connect() (git-fixes).\n- net/smc: fix refcount non-blocking connect() -part 2 (git-fixes).\n- net: vmxnet3: fix possible buffer overflow caused by bad DMA value in vmxnet3_get_rss() (bsc#1172484).\n- net/x25: Fix x25_neigh refcnt leak when receiving frame (networking-stable-20_04_27).\n- nfc: add missing attribute validation for SE API (networking-stable-20_03_14).\n- nfc: add missing attribute validation for vendor subcommand (networking-stable-20_03_14).\n- nfc: pn544: Fix occasional HW initialization failure (networking-stable-20_03_01).\n- nfc: st21nfca: add missed kfree_skb() in an error path (bsc#1051510).\n- nfsd4: fix up replay_matches_cache() (git-fixes).\n- nfsd: Ensure CLONE persists data and metadata changes to the target file (git-fixes).\n- nfsd: fix delay timer on 32-bit architectures (git-fixes).\n- nfsd: fix jiffies/time_t mixup in LRU list (git-fixes).\n- NFS: Directory page cache pages need to be locked when read (git-fixes).\n- nfsd: memory corruption in nfsd4_lock() (git-fixes).\n- NFS: Do not call generic_error_remove_page() while holding locks (bsc#1170457).\n- NFS: Fix an RCU lock leak in nfs4_refresh_delegation_stateid() (bsc#1170592).\n- NFS: Fix memory leaks and corruption in readdir (git-fixes).\n- NFS: Fix O_DIRECT accounting of number of bytes read/written (git-fixes).\n- NFS: Fix potential posix_acl refcnt leak in nfs3_set_acl (git-fixes).\n- NFS: fix racey wait in nfs_set_open_stateid_locked (bsc#1170592).\n- NFS/flexfiles: Use the correct TCP timeout for flexfiles I/O (git-fixes).\n- NFS/pnfs: Fix pnfs_generic_prepare_to_resend_writes() (git-fixes).\n- NFS: Revalidate the file size on a fatal write error (git-fixes).\n- NFSv4.0: nfs4_do_fsinfo() should not do implicit lease renewals (git-fixes).\n- NFSv4: Do not allow a cached open with a revoked delegation (git-fixes).\n- NFSv4: Fix leak of clp-\u003ecl_acceptor string (git-fixes).\n- NFSv4/pnfs: Return valid stateids in nfs_layout_find_inode_by_stateid() (git-fixes).\n- NFSv4: Retry CLOSE and DELEGRETURN on NFS4ERR_OLD_STATEID (bsc#1170592).\n- NFSv4: try lease recovery on NFS4ERR_EXPIRED (git-fixes).\n- NFSv4.x: Drop the slot if nfs4_delegreturn_prepare waits for layoutreturn (git-fixes).\n- nl802154: add missing attribute validation for dev_type (networking-stable-20_03_14).\n- nl802154: add missing attribute validation (networking-stable-20_03_14).\n- nvme: check for NVME_CTRL_LIVE in nvme_report_ns_ids() (bcs#1171558 bsc#1159058).\n- nvme: do not update multipath disk information if the controller is down (bcs#1171558 bsc#1159058).\n- nvme-fc: print proper nvme-fc devloss_tmo value (bsc#1172391).\n- objtool: Add is_static_jump() helper (bsc#1169514).\n- objtool: Add relocation check for alternative sections (bsc#1169514).\n- objtool: Clean instruction state before each function validation (bsc#1169514).\n- objtool: Fix stack offset tracking for indirect CFAs (bsc#1169514).\n- objtool: Fix switch table detection in .text.unlikely (bsc#1169514).\n- objtool: Ignore empty alternatives (bsc#1169514).\n- objtool: Make BP scratch register warning more robust (bsc#1169514).\n- OMAP: DSS2: remove non-zero check on variable r (bsc#1114279)\n- overflow: Fix -Wtype-limits compilation warnings (git fixes).\n- overflow.h: Add arithmetic shift helper (git fixes).\n- p54usb: add AirVasT USB stick device-id (bsc#1051510).\n- padata: Remove broken queue flushing (git-fixes).\n- Partially revert \u0027kfifo: fix kfifo_alloc() and kfifo_init()\u0027 (git fixes (block drivers)).\n- PCI: Allow pci_resize_resource() for devices on root bus (bsc#1051510).\n- PCI: Fix pci_register_host_bridge() device_register() error handling (bsc#1051510).\n- PCI: Program MPS for RCiEP devices (bsc#1051510).\n- PCI/PTM: Inherit Switch Downstream Port PTM settings from Upstream Port (bsc#1051510).\n- perf: Allocate context task_ctx_data for child event (git-fixes).\n- perf/cgroup: Fix perf cgroup hierarchy support (git-fixes).\n- perf: Copy parent\u0027s address filter offsets on clone (git-fixes).\n- perf/core: Add sanity check to deal with pinned event failure (git-fixes).\n- perf/core: Avoid freeing static PMU contexts when PMU is unregistered (git-fixes).\n- perf/core: Correct event creation with PERF_FORMAT_GROUP (git-fixes).\n- perf/core: Do not WARN() for impossible ring-buffer sizes (git-fixes).\n- perf/core: Fix crash when using HW tracing kernel filters (git-fixes).\n- perf/core: Fix ctx_event_type in ctx_resched() (git-fixes).\n- perf/core: Fix error handling in perf_event_alloc() (git-fixes).\n- perf/core: Fix exclusive events\u0027 grouping (git-fixes).\n- perf/core: Fix group scheduling with mixed hw and sw events (git-fixes).\n- perf/core: Fix impossible ring-buffer sizes warning (git-fixes).\n- perf/core: Fix locking for children siblings group read (git-fixes).\n- perf/core: Fix perf_event_read_value() locking (git-fixes).\n- perf/core: Fix perf_pmu_unregister() locking (git-fixes).\n- perf/core: Fix perf_sample_regs_user() mm check (git-fixes).\n- perf/core: Fix possible Spectre-v1 indexing for -\u003eaux_pages (git-fixes).\n- perf/core: Fix race between close() and fork() (git-fixes).\n- perf/core: Fix the address filtering fix (git-fixes).\n- perf/core: Fix use-after-free in uprobe_perf_close() (git-fixes).\n- perf/core: Force USER_DS when recording user stack data (git-fixes).\n- perf/core: Restore mmap record type correctly (git-fixes).\n- perf: Fix header.size for namespace events (git-fixes).\n- perf/ioctl: Add check for the sample_period value (git-fixes).\n- perf, pt, coresight: Fix address filters for vmas with non-zero offset (git-fixes).\n- perf: Return proper values for user stack errors (git-fixes).\n- perf/x86/amd: Constrain Large Increment per Cycle events (git-fixes).\n- perf/x86/amd/ibs: Fix reading of the IBS OpData register and thus precise RIP validity (git-fixes).\n- perf/x86/amd/ibs: Fix sample bias for dispatched micro-ops (git-fixes).\n- perf/x86/amd/ibs: Handle erratum #420 only on the affected CPU family (10h) (git-fixes).\n- perf/x86/amd/iommu: Make the \u0027amd_iommu_attr_groups\u0027 symbol static (git-fixes).\n- perf/x86/amd/uncore: Do not set \u0027ThreadMask\u0027 and \u0027SliceMask\u0027 for non-L3 PMCs (git-fixes stable).\n- perf/x86/amd/uncore: Set the thread mask for F17h L3 PMCs (git-fixes).\n- perf/x86/amd/uncore: Set ThreadMask and SliceMask for L3 Cache perf events (git-fixes stable).\n- perf/x86: Enable free running PEBS for REGS_USER/INTR (git-fixes).\n- perf/x86: Fix incorrect PEBS_REGS (git-fixes).\n- perf/x86/intel: Add generic branch tracing check to intel_pmu_has_bts() (git-fixes).\n- perf/x86/intel: Add proper condition to run sched_task callbacks (git-fixes).\n- perf/x86/intel/bts: Fix the use of page_private() (git-fixes).\n- perf/x86/intel: Fix PT PMI handling (git-fixes).\n- perf/x86/intel: Move branch tracing setup to the Intel-specific source file (git-fixes).\n- perf/x86/intel/uncore: Add Node ID mask (git-fixes).\n- perf/x86/intel/uncore: Fix PCI BDF address of M3UPI on SKX (git-fixes).\n- perf/x86/uncore: Fix event group support (git-fixes).\n- pid: Improve the comment about waiting in zap_pid_ns_processes (git fixes)).\n- pinctrl: baytrail: Enable pin configuration setting for GPIO chip (git-fixes).\n- pinctrl: cherryview: Add missing spinlock usage in chv_gpio_irq_handler (git-fixes).\n- pinctrl: freescale: imx: Fix an error handling path in \u0027imx_pinctrl_probe()\u0027 (bsc#1051510).\n- pinctrl: imxl: Fix an error handling path in \u0027imx1_pinctrl_core_probe()\u0027 (bsc#1051510).\n- pinctrl: samsung: Save/restore eint_mask over suspend for EINT_TYPE GPIOs (bsc#1051510).\n- platform/x86: asus-nb-wmi: Do not load on Asus T100TA and T200TA (bsc#1051510).\n- pNFS: Ensure we do clear the return-on-close layout stateid on fatal errors (git-fixes).\n- pnp: Use list_for_each_entry() instead of open coding (git fixes).\n- powerpc/64s: Do not let DT CPU features set FSCR_DSCR (bsc#1065729).\n- powerpc/64s: Save FSCR to init_task.thread.fscr after feature init (bsc#1065729).\n- powerpc: Add attributes for setjmp/longjmp (bsc#1065729).\n- powerpc/pci/of: Parse unassigned resources (bsc#1065729).\n- powerpc/setup_64: Set cache-line-size based on cache-block-size (bsc#1065729).\n- powerpc/sstep: Fix DS operand in ld encoding to appropriate value (bsc#1065729).\n- powerpc/xive: Clear the page tables for the ESB IO mapping (bsc#1085030).\n- power: supply: bq24257_charger: Replace depends on REGMAP_I2C with select (bsc#1051510).\n- power: supply: lp8788: Fix an error handling path in \u0027lp8788_charger_probe()\u0027 (bsc#1051510).\n- power: supply: smb347-charger: IRQSTAT_D is volatile (bsc#1051510).\n- qede: Fix race between rdma destroy workqueue and link change event (networking-stable-20_03_01).\n- r8152: check disconnect status after long sleep (networking-stable-20_03_14).\n- raid5: remove gfp flags from scribble_alloc() (git fixes (block drivers)).\n- raid6/ppc: Fix build for clang (git fixes (block drivers)).\n- rcu: locking and unlocking need to always be at least barriers (git fixes (block drivers)).\n- RDMA/ipoib: Fix use of sizeof() (bsc#1168503).\n- RDMA/netdev: Fix netlink support in IPoIB (bsc#1168503).\n- RDMA/netdev: Hoist alloc_netdev_mqs out of the driver (bsc#1168503).\n- RDMA/netdev: Use priv_destructor for netdev cleanup (bsc#1168503).\n- README.BRANCH: Replace Matt Fleming with Davidlohr Bueso as maintainer.\n- Revert \u0027dm crypt: use WQ_HIGHPRI for the IO and crypt workqueues\u0027 (git fixes (block drivers)).\n- Revert \u0027drm/panel: simple: Add support for Sharp LQ150X1LG11 panels\u0027 (bsc#1114279) \t* offset changes\n- Revert \u0027ipc,sem: remove uneeded sem_undo_list lock usage in exit_sem()\u0027 (bsc#1172221).\n- Revert \u0027tools lib traceevent: Remove unneeded qsort and uses memmove\u0027\n- rpm/kernel-docs.spec.in: Require python-packaging for build.\n- rtlwifi: Fix a double free in _rtl_usb_tx_urb_setup() (bsc#1051510).\n- s390/bpf: Maintain 8-byte stack alignment (bsc#1169194).\n- s390/cio: avoid duplicated \u0027ADD\u0027 uevents (git-fixes).\n- s390/cio: generate delayed uevent for vfio-ccw subchannels (git-fixes).\n- s390/cpuinfo: fix wrong output when CPU0 is offline (git-fixes).\n- s390/diag: fix display of diagnose call statistics (git-fixes).\n- s390: fix syscall_get_error for compat processes (git-fixes).\n- s390/ftrace: fix potential crashes when switching tracers (git-fixes).\n- s390/gmap: return proper error code on ksm unsharing (git-fixes).\n- s390/ism: fix error return code in ism_probe() (git-fixes).\n- s390/pci: Fix possible deadlock in recover_store() (bsc#1165183 LTC#184103).\n- s390/pci: Recover handle in clp_set_pci_fn() (bsc#1165183 LTC#184103).\n- s390/qdio: consistently restore the IRQ handler (git-fixes).\n- s390/qdio: lock device while installing IRQ handler (git-fixes).\n- s390/qdio: put thinint indicator after early error (git-fixes).\n- s390/qdio: tear down thinint indicator after early error (git-fixes).\n- s390/qeth: cancel RX reclaim work earlier (git-fixes).\n- s390/qeth: do not return -ENOTSUPP to userspace (git-fixes).\n- s390/qeth: do not warn for napi with 0 budget (git-fixes).\n- s390/qeth: fix error handling for isolation mode cmds (git-fixes).\n- s390/qeth: fix off-by-one in RX copybreak check (git-fixes).\n- s390/qeth: fix promiscuous mode after reset (git-fixes).\n- s390/qeth: fix qdio teardown after early init error (git-fixes).\n- s390/qeth: handle error due to unsupported transport mode (git-fixes).\n- s390/qeth: handle error when backing RX buffer (git-fixes).\n- s390/qeth: lock the card while changing its hsuid (git-fixes).\n- s390/qeth: support net namespaces for L3 devices (git-fixes).\n- s390/time: Fix clk type in get_tod_clock (git-fixes).\n- scripts/decodecode: fix trapping instruction formatting (bsc#1065729).\n- scripts/dtc: Remove redundant YYLOC global declaration (bsc#1160388).\n- scsi: bnx2i: fix potential use after free (bsc#1171600).\n- scsi: core: Handle drivers which set sg_tablesize to zero (bsc#1171601) This commit also required: \u003e scsi: core: avoid preallocating big SGL for data\n- scsi: core: save/restore command resid for error handling (bsc#1171602).\n- scsi: core: scsi_trace: Use get_unaligned_be*() (bsc#1171604).\n- scsi: core: try to get module before removing device (bsc#1171605).\n- scsi: csiostor: Adjust indentation in csio_device_reset (bsc#1171606).\n- scsi: csiostor: Do not enable IRQs too early (bsc#1171607).\n- scsi: esas2r: unlock on error in esas2r_nvram_read_direct() (bsc#1171608).\n- scsi: fnic: fix invalid stack access (bsc#1171609).\n- scsi: fnic: fix msix interrupt allocation (bsc#1171610).\n- scsi: ibmvscsi: Do not send host info in adapter info MAD after LPM (bsc#1172759 ltc#184814).\n- scsi: ibmvscsi: Fix WARN_ON during event pool release (bsc#1170791 ltc#185128).\n- scsi: iscsi: Avoid potential deadlock in iscsi_if_rx func (bsc#1171611).\n- scsi: iscsi: Fix a potential deadlock in the timeout handler (bsc#1171612).\n- scsi: iscsi: qla4xxx: fix double free in probe (bsc#1171613).\n- scsi: lpfc: fix: Coverity: lpfc_cmpl_els_rsp(): Null pointer dereferences (bsc#1171614).\n- scsi: lpfc: Fix crash in target side cable pulls hitting WAIT_FOR_UNREG (bsc#1171615).\n- scsi: megaraid_sas: Do not initiate OCR if controller is not in ready state (bsc#1171616).\n- scsi: qedf: Add port_id getter (bsc#1150660).\n- scsi: qla2xxx: add ring buffer for tracing debug logs (bsc#1157169).\n- scsi: qla2xxx: check UNLOADING before posting async work (bsc#1157169).\n- scsi: qla2xxx: Delete all sessions before unregister local nvme port (bsc#1157169).\n- scsi: qla2xxx: Do not log message when reading port speed via sysfs (bsc#1157169).\n- scsi: qla2xxx: Fix hang when issuing nvme disconnect-all in NPIV (bsc#1157169).\n- scsi: qla2xxx: Fix regression warnings (bsc#1157169).\n- scsi: qla2xxx: Remove non functional code (bsc#1157169).\n- scsi: qla2xxx: Set NVMe status code for failed NVMe FCP request (bsc#1158983).\n- scsi: qla2xxx: set UNLOADING before waiting for session deletion (bsc#1157169).\n- scsi: qla4xxx: Adjust indentation in qla4xxx_mem_free (bsc#1171617).\n- scsi: qla4xxx: fix double free bug (bsc#1171618).\n- scsi: sd: Clear sdkp-\u003eprotection_type if disk is reformatted without PI (bsc#1171619).\n- scsi: sg: add sg_remove_request in sg_common_write (bsc#1171620).\n- scsi: tracing: Fix handling of TRANSFER LENGTH == 0 for READ(6) and WRITE(6) (bsc#1171621).\n- scsi: ufs: change msleep to usleep_range (bsc#1171622).\n- scsi: ufs: Clean up ufshcd_scale_clks() and clock scaling error out path (bsc#1171623).\n- scsi: ufs: Fix ufshcd_hold() caused scheduling while atomic (bsc#1171624).\n- scsi: ufs: Fix ufshcd_probe_hba() reture value in case ufshcd_scsi_add_wlus() fails (bsc#1171625).\n- scsi: ufs: Recheck bkops level if bkops is disabled (bsc#1171626).\n- scsi: zfcp: fix missing erp_lock in port recovery trigger for point-to-point (git-fixes).\n- sctp: fix possibly using a bad saddr with a given dst (networking-stable-20_04_02).\n- sctp: fix refcount bug in sctp_wfree (networking-stable-20_04_02).\n- sctp: move the format error check out of __sctp_sf_do_9_1_abort (networking-stable-20_03_01).\n- seq_file: fix problem when seeking mid-record (bsc#1170125).\n- serial: uartps: Move the spinlock after the read of the tx empty (git-fixes).\n- sfc: detach from cb_page in efx_copy_channel() (networking-stable-20_03_14).\n- signal/pid_namespace: Fix reboot_pid_ns to use send_sig not force_sig (bsc#1172185).\n- slcan: not call free_netdev before rtnl_unlock in slcan_open (networking-stable-20_03_28).\n- slip: make slhc_compress() more robust against malicious packets (networking-stable-20_03_14).\n- smb3: Additional compression structures (bsc#1144333).\n- smb3: Add new compression flags (bsc#1144333).\n- smb3: change noisy error message to FYI (bsc#1144333).\n- smb3: enable swap on SMB3 mounts (bsc#1144333).\n- smb3: Minor cleanup of protocol definitions (bsc#1144333).\n- smb3: remove overly noisy debug line in signing errors (bsc#1144333).\n- smb3: smbdirect support can be configured by default (bsc#1144333).\n- smb3: use SMB2_SIGNATURE_SIZE define (bsc#1144333).\n- spi: bcm2835: Fix 3-wire mode if DMA is enabled (git-fixes).\n- spi: bcm63xx-hsspi: Really keep pll clk enabled (bsc#1051510).\n- spi: bcm-qspi: when tx/rx buffer is NULL set to 0 (bsc#1051510).\n- spi: dw: Add SPI Rx-done wait method to DMA-based transfer (bsc#1051510).\n- spi: dw: Add SPI Tx-done wait method to DMA-based transfer (bsc#1051510).\n- spi: dw: use \u0027smp_mb()\u0027 to avoid sending spi data error (bsc#1051510).\n- spi: dw: Zero DMA Tx and Rx configurations on stack (bsc#1051510).\n- spi: fsl: do not map irq during probe (git-fixes).\n- spi: fsl: use platform_get_irq() instead of of_irq_to_resource() (git-fixes).\n- spi: pxa2xx: Add CS control clock quirk (bsc#1051510).\n- spi: qup: call spi_qup_pm_resume_runtime before suspending (bsc#1051510).\n- spi: spi-fsl-dspi: Replace interruptible wait queue with a simple completion (git-fixes).\n- spi: spi-s3c64xx: Fix system resume support (git-fixes).\n- spi/zynqmp: remove entry that causes a cs glitch (bsc#1051510).\n- staging: comedi: dt2815: fix writing hi byte of analog output (bsc#1051510).\n- staging: comedi: Fix comedi_device refcnt leak in comedi_open (bsc#1051510).\n- staging: iio: ad2s1210: Fix SPI reading (bsc#1051510).\n- staging: rtl8712: Fix IEEE80211_ADDBA_PARAM_BUF_SIZE_MASK (bsc#1051510).\n- staging: sm750fb: add missing case while setting FB_VISUAL (bsc#1051510).\n- staging: vt6656: Do not set RCR_MULTICAST or RCR_BROADCAST by default (git-fixes).\n- staging: vt6656: Fix drivers TBTT timing counter (git-fixes).\n- staging: vt6656: Fix pairwise key entry save (git-fixes).\n- sunrpc: expiry_time should be seconds not timeval (git-fixes).\n- SUNRPC: Fix a potential buffer overflow in \u0027svc_print_xprts()\u0027 (git-fixes).\n- SUNRPC: The TCP back channel mustn\u0027t disappear while requests are outstanding (bsc#1152624).\n- supported.conf: Add br_netfilter to base (bsc#1169020).\n- svcrdma: Fix leak of transport addresses (git-fixes).\n- taskstats: fix data-race (bsc#1172188).\n- tcp: cache line align MAX_TCP_HEADER (networking-stable-20_04_27).\n- tcp: repair: fix TCP_QUEUE_SEQ implementation (networking-stable-20_03_28).\n- team: add missing attribute validation for array index (networking-stable-20_03_14).\n- team: add missing attribute validation for port ifindex (networking-stable-20_03_14).\n- team: fix hang in team_mode_get() (networking-stable-20_04_27).\n- tools lib traceevent: Remove unneeded qsort and uses memmove instead (git-fixes).\n- tpm: ibmvtpm: retry on H_CLOSED in tpm_ibmvtpm_send() (bsc#1065729).\n- tpm/tpm_tis: Free IRQ if probing fails (bsc#1082555).\n- tpm/tpm_tis: Free IRQ if probing fails (git-fixes).\n- tracing: Add a vmalloc_sync_mappings() for safe measure (git-fixes).\n- tracing: Disable trace_printk() on post poned tests (git-fixes).\n- tracing: Fix event trigger to accept redundant spaces (git-fixes).\n- tracing: Fix the race between registering \u0027snapshot\u0027 event trigger and triggering \u0027snapshot\u0027 operation (git-fixes).\n- tty: n_gsm: Fix bogus i++ in gsm_data_kick (bsc#1051510).\n- tty: n_gsm: Fix SOF skipping (bsc#1051510).\n- tty: n_gsm: Fix waking up upper tty layer when room available (bsc#1051510).\n- tty: rocket, avoid OOB access (git-fixes).\n- UAS: fix deadlock in error handling and PM flushing work (git-fixes).\n- UAS: no use logging any details in case of ENODEV (git-fixes).\n- USB: Add USB_QUIRK_DELAY_CTRL_MSG and USB_QUIRK_DELAY_INIT for Corsair K70 RGB RAPIDFIRE (git-fixes).\n- USB: cdc-acm: restore capability check order (git-fixes).\n- USB: core: Fix misleading driver bug report (bsc#1051510).\n- USB: dwc2: gadget: move gadget resume after the core is in L0 state (bsc#1051510).\n- USB: dwc3: do not set gadget-\u003eis_otg flag (git-fixes).\n- USB: dwc3: gadget: Do link recovery for SS and SSP (git-fixes).\n- USB: early: Handle AMD\u0027s spec-compliant identifiers, too (git-fixes).\n- USB: f_fs: Clear OS Extended descriptor counts to zero in ffs_data_reset() (git-fixes).\n- USB: gadget: audio: Fix a missing error return value in audio_bind() (git-fixes).\n- USB: gadget: composite: Inform controller driver of self-powered (git-fixes).\n- USB: gadget: legacy: fix error return code in cdc_bind() (git-fixes).\n- USB: gadget: legacy: fix error return code in gncm_bind() (git-fixes).\n- USB: gadget: legacy: fix redundant initialization warnings (bsc#1051510).\n- USB: gadget: lpc32xx_udc: do not dereference ep pointer before null check (bsc#1051510).\n- USB: gadget: net2272: Fix a memory leak in an error handling path in \u0027net2272_plat_probe()\u0027 (git-fixes).\n- USB: gadget: udc: atmel: Fix vbus disconnect handling (git-fixes).\n- USB: gadget: udc: atmel: Make some symbols static (git-fixes).\n- USB: gadget: udc: bdc: Remove unnecessary NULL checks in bdc_req_complete (git-fixes).\n- USB: gadget: udc: s3c2410_udc: Remove pointless NULL check in s3c2410_udc_nuke (bsc#1051510).\n- USB: host: ehci-mxc: Add error handling in ehci_mxc_drv_probe() (bsc#1051510).\n- USB: host: xhci-plat: keep runtime active when removing host (git-fixes).\n- USB: hub: Fix handling of connect changes during sleep (git-fixes).\n- USB: musb: Fix runtime PM imbalance on error (bsc#1051510).\n- USB: musb: start session in resume for host port (bsc#1051510).\n- usbnet: silence an unnecessary warning (bsc#1170770).\n- USB: serial: garmin_gps: add sanity checking for data length (git-fixes).\n- USB: serial: option: add BroadMobi BM806U (git-fixes).\n- USB: serial: option: add support for ASKEY WWHC050 (git-fixes).\n- USB: serial: option: add Telit LE910C1-EUX compositions (bsc#1051510).\n- USB: serial: option: add Wistron Neweb D19Q1 (git-fixes).\n- USB: serial: qcserial: add DW5816e QDL support (bsc#1051510).\n- USB: serial: qcserial: Add DW5816e support (git-fixes).\n- USB: serial: usb_wwan: do not resubmit rx urb on fatal errors (bsc#1051510).\n- USB: serial: usb_wwan: do not resubmit rx urb on fatal errors (git-fixes).\n- USB: sisusbvga: Change port variable from signed to unsigned (git-fixes).\n- USB-storage: Add unusual_devs entry for JMicron JMS566 (git-fixes).\n- USB: uas: add quirk for LaCie 2Big Quadra (git-fixes).\n- USB: xhci: Fix NULL pointer dereference when enqueuing trbs from urb sg list (git-fixes).\n- video: fbdev: sis: Remove unnecessary parentheses and commented code (bsc#1114279)\n- video: fbdev: w100fb: Fix a potential double free (bsc#1051510).\n- virtio-blk: handle block_device_operations callbacks after hot unplug (git fixes (block drivers)).\n- vmxnet3: add geneve and vxlan tunnel offload support (bsc#1172484).\n- vmxnet3: add support to get/set rx flow hash (bsc#1172484).\n- vmxnet3: allow rx flow hash ops only when rss is enabled (bsc#1172484).\n- vmxnet3: avoid format strint overflow warning (bsc#1172484).\n- vmxnet3: prepare for version 4 changes (bsc#1172484).\n- vmxnet3: Remove always false conditional statement (bsc#1172484).\n- vmxnet3: remove redundant initialization of pointer \u0027rq\u0027 (bsc#1172484).\n- vmxnet3: remove unused flag \u0027rxcsum\u0027 from struct vmxnet3_adapter (bsc#1172484).\n- vmxnet3: Replace msleep(1) with usleep_range() (bsc#1172484).\n- vmxnet3: update to version 4 (bsc#1172484).\n- vmxnet3: use correct hdr reference when packet is encapsulated (bsc#1172484).\n- vrf: Check skb for XFRM_TRANSFORMED flag (networking-stable-20_04_27).\n- vt: ioctl, switch VT_IS_IN_USE and VT_BUSY to inlines (git-fixes).\n- vt: selection, introduce vc_is_sel (git-fixes).\n- vt: vt_ioctl: fix race in VT_RESIZEX (git-fixes).\n- vt: vt_ioctl: fix use-after-free in vt_in_use() (git-fixes).\n- vt: vt_ioctl: fix VT_DISALLOCATE freeing in-use virtual console (git-fixes).\n- vxlan: check return value of gro_cells_init() (networking-stable-20_03_28).\n- w1: omap-hdq: cleanup to add missing newline for some dev_dbg (bsc#1051510).\n- watchdog: reset last_hw_keepalive time at start (git-fixes).\n- wcn36xx: Fix error handling path in \u0027wcn36xx_probe()\u0027 (bsc#1051510).\n- wil6210: remove reset file from debugfs (git-fixes).\n- wimax/i2400m: Fix potential urb refcnt leak (bsc#1051510).\n- work around mvfs bug (bsc#1162063).\n- workqueue: do not use wq_select_unbound_cpu() for bound works (bsc#1172130).\n- x86/cpu/amd: Make erratum #1054 a legacy erratum (bsc#1114279).\n- x86/entry/64: Fix unwind hints in kernel exit path (bsc#1058115).\n- x86/entry/64: Fix unwind hints in register clearing code (bsc#1058115).\n- x86/entry/64: Fix unwind hints in rewind_stack_do_exit() (bsc#1058115).\n- x86/entry/64: Fix unwind hints in __switch_to_asm() (bsc#1058115).\n- x86/events/intel/ds: Add PERF_SAMPLE_PERIOD into PEBS_FREERUNNING_FLAGS (git-fixes).\n- x86: Fix early boot crash on gcc-10, third try (bsc#1114279).\n- x86/Hyper-V: Allow guests to enable InvariantTSC (bsc#1170620).\n- x86/Hyper-V: Free hv_panic_page when fail to register kmsg dump (bsc#1170618).\n- x86/Hyper-V: Report crash data in die() when panic_on_oops is set (bsc#1170618).\n- x86/Hyper-V: Report crash register data or kmsg before running crash kernel (bsc#1170618).\n- x86/Hyper-V: Report crash register data when sysctl_record_panic_msg is not set (bsc#1170618).\n- x86/Hyper-V: report value of misc_features (git-fixes).\n- x86/Hyper-V: Trigger crash enlightenment only once during system crash (bsc#1170618).\n- x86/Hyper-V: Unload vmbus channel in hv panic callback (bsc#1170618).\n- x86/kprobes: Avoid kretprobe recursion bug (bsc#1114279).\n- x86/{mce,mm}: Unmap the entire page if the whole page is affected and poisoned (bsc#1172257).\n- x86/reboot/quirks: Add MacBook6,1 reboot quirk (bsc#1114279).\n- x86/resctrl: Fix invalid attempt at removing the default resource group (git-fixes).\n- x86/resctrl: Preserve CDP enable over CPU hotplug (bsc#1114279).\n- x86/unwind/orc: Do not skip the first frame for inactive tasks (bsc#1058115).\n- x86/unwind/orc: Fix error handling in __unwind_start() (bsc#1058115).\n- x86/unwind/orc: Fix error path for bad ORC entry type (bsc#1058115).\n- x86/unwind/orc: Fix unwind_get_return_address_ptr() for inactive tasks (bsc#1058115).\n- x86/unwind/orc: Prevent unwinding before ORC initialization (bsc#1058115).\n- x86/unwind: Prevent false warnings for non-current tasks (bsc#1058115).\n- x86/xen: fix booting 32-bit pv guest (bsc#1071995).\n- x86/xen: Make the boot CPU idle task reliable (bsc#1071995).\n- x86/xen: Make the secondary CPU idle tasks reliable (bsc#1071995).\n- xen/pci: reserve MCFG areas earlier (bsc#1170145).\n- xfrm: Always set XFRM_TRANSFORMED in xfrm{4,6}_output_finish (networking-stable-20_04_27).\n- xfrm: fix error in comment (git fixes).\n- xfs: Correctly invert xfs_buftarg LRU isolation logic (git-fixes).\n- xfs: do not ever return a stale pointer from __xfs_dir3_free_read (git-fixes).\n- xprtrdma: Fix completion wait during device removal (git-fixes).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2020-2156,SUSE-SLE-RT-12-SP4-2020-2156", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2020_2156-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2020:2156-1", "url": "https://www.suse.com/support/update/announcement/2020/suse-su-20202156-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2020:2156-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-August/007238.html" }, { "category": "self", "summary": "SUSE Bug 1051510", "url": "https://bugzilla.suse.com/1051510" }, { "category": "self", "summary": "SUSE Bug 1058115", "url": "https://bugzilla.suse.com/1058115" }, { "category": "self", "summary": "SUSE Bug 1065729", "url": "https://bugzilla.suse.com/1065729" }, { "category": "self", "summary": "SUSE Bug 1071995", "url": "https://bugzilla.suse.com/1071995" }, { "category": "self", "summary": "SUSE Bug 1082555", "url": "https://bugzilla.suse.com/1082555" }, { "category": "self", "summary": "SUSE Bug 1085030", "url": "https://bugzilla.suse.com/1085030" }, { "category": "self", "summary": "SUSE Bug 1089895", "url": "https://bugzilla.suse.com/1089895" }, { "category": "self", "summary": "SUSE Bug 1104967", "url": "https://bugzilla.suse.com/1104967" }, { "category": "self", "summary": "SUSE Bug 1111666", "url": "https://bugzilla.suse.com/1111666" }, { "category": "self", "summary": "SUSE Bug 1114279", "url": "https://bugzilla.suse.com/1114279" }, { "category": "self", "summary": "SUSE Bug 1133021", "url": "https://bugzilla.suse.com/1133021" }, { "category": "self", "summary": "SUSE Bug 1144333", "url": "https://bugzilla.suse.com/1144333" }, { "category": "self", "summary": "SUSE Bug 1148868", "url": "https://bugzilla.suse.com/1148868" }, { "category": "self", "summary": "SUSE Bug 1150660", "url": "https://bugzilla.suse.com/1150660" }, { "category": "self", "summary": "SUSE Bug 1151794", "url": "https://bugzilla.suse.com/1151794" }, { "category": "self", "summary": "SUSE Bug 1152107", "url": "https://bugzilla.suse.com/1152107" }, { "category": "self", "summary": "SUSE Bug 1152489", "url": "https://bugzilla.suse.com/1152489" }, { "category": "self", "summary": "SUSE Bug 1152624", "url": "https://bugzilla.suse.com/1152624" }, { "category": "self", "summary": "SUSE Bug 1154824", "url": "https://bugzilla.suse.com/1154824" }, { "category": "self", "summary": "SUSE Bug 1157169", "url": "https://bugzilla.suse.com/1157169" }, { "category": "self", "summary": "SUSE Bug 1158265", "url": "https://bugzilla.suse.com/1158265" }, { "category": "self", "summary": "SUSE Bug 1158983", "url": "https://bugzilla.suse.com/1158983" }, { "category": "self", "summary": "SUSE Bug 1159058", "url": "https://bugzilla.suse.com/1159058" }, { "category": "self", "summary": "SUSE Bug 1159199", "url": "https://bugzilla.suse.com/1159199" }, { "category": "self", "summary": "SUSE Bug 1160388", "url": "https://bugzilla.suse.com/1160388" }, { "category": "self", "summary": "SUSE Bug 1160947", "url": "https://bugzilla.suse.com/1160947" }, { "category": "self", "summary": "SUSE Bug 1161016", "url": "https://bugzilla.suse.com/1161016" }, { "category": "self", "summary": "SUSE Bug 1162002", "url": "https://bugzilla.suse.com/1162002" }, { "category": "self", "summary": "SUSE Bug 1162063", "url": "https://bugzilla.suse.com/1162063" }, { "category": "self", "summary": "SUSE Bug 1165183", "url": "https://bugzilla.suse.com/1165183" }, { "category": "self", "summary": "SUSE Bug 1165741", "url": "https://bugzilla.suse.com/1165741" }, { "category": "self", "summary": "SUSE Bug 1166969", "url": "https://bugzilla.suse.com/1166969" }, { "category": "self", "summary": "SUSE Bug 1167574", "url": "https://bugzilla.suse.com/1167574" }, { "category": "self", "summary": "SUSE Bug 1167851", "url": "https://bugzilla.suse.com/1167851" }, { "category": "self", "summary": "SUSE Bug 1168081", "url": "https://bugzilla.suse.com/1168081" }, { "category": "self", "summary": "SUSE Bug 1168503", "url": "https://bugzilla.suse.com/1168503" }, { "category": "self", "summary": "SUSE Bug 1168670", "url": "https://bugzilla.suse.com/1168670" }, { "category": "self", "summary": "SUSE Bug 1169020", "url": "https://bugzilla.suse.com/1169020" }, { "category": "self", "summary": "SUSE Bug 1169194", "url": "https://bugzilla.suse.com/1169194" }, { "category": "self", "summary": "SUSE Bug 1169514", "url": "https://bugzilla.suse.com/1169514" }, { "category": "self", "summary": "SUSE Bug 1169525", "url": "https://bugzilla.suse.com/1169525" }, { "category": "self", "summary": "SUSE Bug 1169625", "url": "https://bugzilla.suse.com/1169625" }, { "category": "self", "summary": "SUSE Bug 1169795", "url": "https://bugzilla.suse.com/1169795" }, { "category": "self", "summary": "SUSE Bug 1170011", "url": "https://bugzilla.suse.com/1170011" }, { "category": "self", "summary": "SUSE Bug 1170056", "url": "https://bugzilla.suse.com/1170056" }, { "category": "self", "summary": "SUSE Bug 1170125", "url": "https://bugzilla.suse.com/1170125" }, { "category": "self", "summary": "SUSE Bug 1170145", "url": "https://bugzilla.suse.com/1170145" }, { "category": "self", "summary": "SUSE Bug 1170345", "url": "https://bugzilla.suse.com/1170345" }, { "category": "self", "summary": "SUSE Bug 1170457", "url": "https://bugzilla.suse.com/1170457" }, { "category": "self", "summary": "SUSE Bug 1170522", "url": "https://bugzilla.suse.com/1170522" }, { "category": "self", "summary": "SUSE Bug 1170592", "url": "https://bugzilla.suse.com/1170592" }, { "category": "self", "summary": "SUSE Bug 1170618", "url": "https://bugzilla.suse.com/1170618" }, { "category": "self", "summary": "SUSE Bug 1170620", "url": "https://bugzilla.suse.com/1170620" }, { "category": "self", "summary": "SUSE Bug 1170770", "url": "https://bugzilla.suse.com/1170770" }, { "category": "self", "summary": "SUSE Bug 1170778", "url": "https://bugzilla.suse.com/1170778" }, { "category": "self", "summary": "SUSE Bug 1170791", "url": "https://bugzilla.suse.com/1170791" }, { "category": "self", "summary": "SUSE Bug 1170901", "url": "https://bugzilla.suse.com/1170901" }, { "category": "self", "summary": "SUSE Bug 1171078", "url": "https://bugzilla.suse.com/1171078" }, { "category": "self", "summary": "SUSE Bug 1171098", "url": "https://bugzilla.suse.com/1171098" }, { "category": "self", "summary": "SUSE Bug 1171118", "url": "https://bugzilla.suse.com/1171118" }, { "category": "self", "summary": "SUSE Bug 1171124", "url": "https://bugzilla.suse.com/1171124" }, { "category": "self", "summary": "SUSE Bug 1171189", "url": "https://bugzilla.suse.com/1171189" }, { "category": "self", "summary": "SUSE Bug 1171191", "url": "https://bugzilla.suse.com/1171191" }, { "category": "self", "summary": "SUSE Bug 1171195", "url": "https://bugzilla.suse.com/1171195" }, { "category": "self", "summary": "SUSE Bug 1171202", "url": "https://bugzilla.suse.com/1171202" }, { "category": "self", "summary": "SUSE Bug 1171205", "url": "https://bugzilla.suse.com/1171205" }, { "category": "self", "summary": "SUSE Bug 1171217", "url": "https://bugzilla.suse.com/1171217" }, { "category": "self", "summary": "SUSE Bug 1171218", "url": "https://bugzilla.suse.com/1171218" }, { "category": "self", "summary": "SUSE Bug 1171219", "url": "https://bugzilla.suse.com/1171219" }, { "category": "self", "summary": "SUSE Bug 1171220", "url": "https://bugzilla.suse.com/1171220" }, { "category": "self", "summary": "SUSE Bug 1171293", "url": "https://bugzilla.suse.com/1171293" }, { "category": "self", "summary": "SUSE Bug 1171417", "url": "https://bugzilla.suse.com/1171417" }, { "category": "self", "summary": "SUSE Bug 1171424", "url": "https://bugzilla.suse.com/1171424" }, { "category": "self", "summary": "SUSE Bug 1171527", "url": "https://bugzilla.suse.com/1171527" }, { "category": "self", "summary": "SUSE Bug 1171558", "url": "https://bugzilla.suse.com/1171558" }, { "category": "self", "summary": "SUSE Bug 1171599", "url": "https://bugzilla.suse.com/1171599" }, { "category": "self", "summary": "SUSE Bug 1171600", "url": "https://bugzilla.suse.com/1171600" }, { "category": "self", "summary": "SUSE Bug 1171601", "url": "https://bugzilla.suse.com/1171601" }, { "category": "self", "summary": "SUSE Bug 1171602", "url": "https://bugzilla.suse.com/1171602" }, { "category": "self", "summary": "SUSE Bug 1171604", "url": "https://bugzilla.suse.com/1171604" }, { "category": "self", "summary": "SUSE Bug 1171605", "url": "https://bugzilla.suse.com/1171605" }, { "category": "self", "summary": "SUSE Bug 1171606", "url": "https://bugzilla.suse.com/1171606" }, { "category": "self", "summary": "SUSE Bug 1171607", "url": "https://bugzilla.suse.com/1171607" }, { "category": "self", "summary": "SUSE Bug 1171608", "url": "https://bugzilla.suse.com/1171608" }, { "category": "self", "summary": "SUSE Bug 1171609", "url": "https://bugzilla.suse.com/1171609" }, { "category": "self", "summary": "SUSE Bug 1171610", "url": "https://bugzilla.suse.com/1171610" }, { "category": "self", "summary": "SUSE Bug 1171611", "url": "https://bugzilla.suse.com/1171611" }, { "category": "self", "summary": "SUSE Bug 1171612", "url": "https://bugzilla.suse.com/1171612" }, { "category": "self", "summary": "SUSE Bug 1171613", "url": "https://bugzilla.suse.com/1171613" }, { "category": "self", "summary": "SUSE Bug 1171614", "url": "https://bugzilla.suse.com/1171614" }, { "category": "self", "summary": "SUSE Bug 1171615", "url": "https://bugzilla.suse.com/1171615" }, { "category": "self", "summary": "SUSE Bug 1171616", "url": "https://bugzilla.suse.com/1171616" }, { "category": "self", "summary": "SUSE Bug 1171617", "url": "https://bugzilla.suse.com/1171617" }, { "category": "self", "summary": "SUSE Bug 1171618", "url": "https://bugzilla.suse.com/1171618" }, { "category": "self", "summary": "SUSE Bug 1171619", "url": "https://bugzilla.suse.com/1171619" }, { "category": "self", "summary": "SUSE Bug 1171620", "url": "https://bugzilla.suse.com/1171620" }, { "category": "self", "summary": "SUSE Bug 1171621", "url": "https://bugzilla.suse.com/1171621" }, { "category": "self", "summary": "SUSE Bug 1171622", "url": "https://bugzilla.suse.com/1171622" }, { "category": "self", "summary": "SUSE Bug 1171623", "url": "https://bugzilla.suse.com/1171623" }, { "category": "self", "summary": "SUSE Bug 1171624", "url": "https://bugzilla.suse.com/1171624" }, { "category": "self", "summary": "SUSE Bug 1171625", "url": "https://bugzilla.suse.com/1171625" }, { "category": "self", "summary": "SUSE Bug 1171626", "url": "https://bugzilla.suse.com/1171626" }, { "category": "self", "summary": "SUSE Bug 1171673", "url": "https://bugzilla.suse.com/1171673" }, { "category": "self", "summary": "SUSE Bug 1171679", "url": "https://bugzilla.suse.com/1171679" }, { "category": "self", "summary": "SUSE Bug 1171691", "url": "https://bugzilla.suse.com/1171691" }, { "category": "self", "summary": "SUSE Bug 1171694", "url": "https://bugzilla.suse.com/1171694" }, { "category": "self", "summary": "SUSE Bug 1171695", "url": "https://bugzilla.suse.com/1171695" }, { "category": "self", "summary": "SUSE Bug 1171736", "url": "https://bugzilla.suse.com/1171736" }, { "category": "self", "summary": "SUSE Bug 1171761", "url": "https://bugzilla.suse.com/1171761" }, { "category": "self", "summary": "SUSE Bug 1171868", "url": "https://bugzilla.suse.com/1171868" }, { "category": "self", "summary": "SUSE Bug 1171904", "url": "https://bugzilla.suse.com/1171904" }, { "category": "self", "summary": "SUSE Bug 1171948", "url": "https://bugzilla.suse.com/1171948" }, { "category": "self", "summary": "SUSE Bug 1171949", "url": "https://bugzilla.suse.com/1171949" }, { "category": "self", "summary": "SUSE Bug 1171951", "url": "https://bugzilla.suse.com/1171951" }, { "category": "self", "summary": "SUSE Bug 1171952", "url": "https://bugzilla.suse.com/1171952" }, { "category": "self", "summary": "SUSE Bug 1171982", "url": "https://bugzilla.suse.com/1171982" }, { "category": "self", "summary": "SUSE Bug 1171983", "url": "https://bugzilla.suse.com/1171983" }, { "category": "self", "summary": "SUSE Bug 1172096", "url": "https://bugzilla.suse.com/1172096" }, { "category": "self", "summary": "SUSE Bug 1172097", "url": "https://bugzilla.suse.com/1172097" }, { "category": "self", "summary": "SUSE Bug 1172098", "url": "https://bugzilla.suse.com/1172098" }, { "category": "self", "summary": "SUSE Bug 1172099", "url": "https://bugzilla.suse.com/1172099" }, { "category": "self", "summary": "SUSE Bug 1172101", "url": "https://bugzilla.suse.com/1172101" }, { "category": "self", "summary": "SUSE Bug 1172102", "url": "https://bugzilla.suse.com/1172102" }, { "category": "self", "summary": "SUSE Bug 1172103", "url": "https://bugzilla.suse.com/1172103" }, { "category": "self", "summary": "SUSE Bug 1172104", "url": "https://bugzilla.suse.com/1172104" }, { "category": "self", "summary": "SUSE Bug 1172127", "url": "https://bugzilla.suse.com/1172127" }, { "category": "self", "summary": "SUSE Bug 1172130", "url": "https://bugzilla.suse.com/1172130" }, { "category": "self", "summary": "SUSE Bug 1172185", "url": "https://bugzilla.suse.com/1172185" }, { "category": "self", "summary": "SUSE Bug 1172188", "url": "https://bugzilla.suse.com/1172188" }, { "category": "self", "summary": "SUSE Bug 1172199", "url": "https://bugzilla.suse.com/1172199" }, { "category": "self", "summary": "SUSE Bug 1172221", "url": "https://bugzilla.suse.com/1172221" }, { "category": "self", "summary": "SUSE Bug 1172253", "url": "https://bugzilla.suse.com/1172253" }, { "category": "self", "summary": "SUSE Bug 1172257", "url": "https://bugzilla.suse.com/1172257" }, { "category": "self", "summary": "SUSE Bug 1172317", "url": "https://bugzilla.suse.com/1172317" }, { "category": "self", "summary": "SUSE Bug 1172342", "url": "https://bugzilla.suse.com/1172342" }, { "category": "self", "summary": "SUSE Bug 1172343", "url": "https://bugzilla.suse.com/1172343" }, { "category": "self", "summary": "SUSE Bug 1172344", "url": "https://bugzilla.suse.com/1172344" }, { "category": "self", "summary": "SUSE Bug 1172366", "url": "https://bugzilla.suse.com/1172366" }, { "category": "self", "summary": "SUSE Bug 1172391", "url": "https://bugzilla.suse.com/1172391" }, { "category": "self", "summary": "SUSE Bug 1172397", "url": "https://bugzilla.suse.com/1172397" }, { "category": "self", "summary": "SUSE Bug 1172453", "url": "https://bugzilla.suse.com/1172453" }, { "category": "self", "summary": "SUSE Bug 1172458", "url": "https://bugzilla.suse.com/1172458" }, { "category": "self", "summary": "SUSE Bug 1172484", "url": "https://bugzilla.suse.com/1172484" }, { "category": "self", "summary": "SUSE Bug 1172759", "url": "https://bugzilla.suse.com/1172759" }, { "category": "self", "summary": "SUSE Bug 1172775", "url": "https://bugzilla.suse.com/1172775" }, { "category": "self", "summary": "SUSE Bug 1172781", "url": "https://bugzilla.suse.com/1172781" }, { "category": "self", "summary": "SUSE Bug 1172782", "url": "https://bugzilla.suse.com/1172782" }, { "category": "self", "summary": "SUSE Bug 1172783", "url": "https://bugzilla.suse.com/1172783" }, { "category": "self", "summary": "SUSE Bug 1172999", "url": "https://bugzilla.suse.com/1172999" }, { "category": "self", "summary": "SUSE Bug 1173265", "url": "https://bugzilla.suse.com/1173265" }, { "category": "self", "summary": "SUSE Bug 1173280", "url": "https://bugzilla.suse.com/1173280" }, { "category": "self", "summary": "SUSE Bug 1173428", "url": "https://bugzilla.suse.com/1173428" }, { "category": "self", "summary": "SUSE Bug 1173462", "url": "https://bugzilla.suse.com/1173462" }, { "category": "self", "summary": "SUSE Bug 1173659", "url": "https://bugzilla.suse.com/1173659" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1000199 page", "url": "https://www.suse.com/security/cve/CVE-2018-1000199/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-16746 page", "url": "https://www.suse.com/security/cve/CVE-2019-16746/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-19462 page", "url": "https://www.suse.com/security/cve/CVE-2019-19462/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-20806 page", "url": "https://www.suse.com/security/cve/CVE-2019-20806/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-20810 page", "url": "https://www.suse.com/security/cve/CVE-2019-20810/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-20812 page", "url": "https://www.suse.com/security/cve/CVE-2019-20812/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9455 page", "url": "https://www.suse.com/security/cve/CVE-2019-9455/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-0543 page", "url": "https://www.suse.com/security/cve/CVE-2020-0543/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10690 page", "url": "https://www.suse.com/security/cve/CVE-2020-10690/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10711 page", "url": "https://www.suse.com/security/cve/CVE-2020-10711/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10720 page", "url": "https://www.suse.com/security/cve/CVE-2020-10720/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10732 page", "url": "https://www.suse.com/security/cve/CVE-2020-10732/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10751 page", "url": "https://www.suse.com/security/cve/CVE-2020-10751/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10757 page", "url": "https://www.suse.com/security/cve/CVE-2020-10757/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10766 page", "url": "https://www.suse.com/security/cve/CVE-2020-10766/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10767 page", "url": "https://www.suse.com/security/cve/CVE-2020-10767/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10768 page", "url": "https://www.suse.com/security/cve/CVE-2020-10768/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10769 page", "url": "https://www.suse.com/security/cve/CVE-2020-10769/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10773 page", "url": "https://www.suse.com/security/cve/CVE-2020-10773/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12114 page", "url": "https://www.suse.com/security/cve/CVE-2020-12114/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12464 page", "url": "https://www.suse.com/security/cve/CVE-2020-12464/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12652 page", "url": "https://www.suse.com/security/cve/CVE-2020-12652/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12653 page", "url": "https://www.suse.com/security/cve/CVE-2020-12653/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12654 page", "url": "https://www.suse.com/security/cve/CVE-2020-12654/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12655 page", "url": "https://www.suse.com/security/cve/CVE-2020-12655/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12656 page", "url": "https://www.suse.com/security/cve/CVE-2020-12656/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12657 page", "url": "https://www.suse.com/security/cve/CVE-2020-12657/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12769 page", "url": "https://www.suse.com/security/cve/CVE-2020-12769/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12888 page", "url": "https://www.suse.com/security/cve/CVE-2020-12888/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-13143 page", "url": "https://www.suse.com/security/cve/CVE-2020-13143/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-13974 page", "url": "https://www.suse.com/security/cve/CVE-2020-13974/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14416 page", "url": "https://www.suse.com/security/cve/CVE-2020-14416/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2020-08-06T18:03:08Z", "generator": { "date": "2020-08-06T18:03:08Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2020:2156-1", "initial_release_date": "2020-08-06T18:03:08Z", "revision_history": [ { "date": "2020-08-06T18:03:08Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-devel-rt-4.12.14-8.23.1.noarch", "product": { "name": "kernel-devel-rt-4.12.14-8.23.1.noarch", "product_id": "kernel-devel-rt-4.12.14-8.23.1.noarch" } }, { "category": "product_version", "name": "kernel-source-rt-4.12.14-8.23.1.noarch", "product": { "name": "kernel-source-rt-4.12.14-8.23.1.noarch", "product_id": "kernel-source-rt-4.12.14-8.23.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-rt-4.12.14-8.23.1.x86_64", "product": { "name": "cluster-md-kmp-rt-4.12.14-8.23.1.x86_64", "product_id": "cluster-md-kmp-rt-4.12.14-8.23.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-rt-4.12.14-8.23.1.x86_64", "product": { "name": "dlm-kmp-rt-4.12.14-8.23.1.x86_64", "product_id": "dlm-kmp-rt-4.12.14-8.23.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-rt-4.12.14-8.23.1.x86_64", "product": { "name": "gfs2-kmp-rt-4.12.14-8.23.1.x86_64", "product_id": "gfs2-kmp-rt-4.12.14-8.23.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-4.12.14-8.23.1.x86_64", "product": { "name": "kernel-rt-4.12.14-8.23.1.x86_64", "product_id": "kernel-rt-4.12.14-8.23.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-base-4.12.14-8.23.1.x86_64", "product": { "name": "kernel-rt-base-4.12.14-8.23.1.x86_64", "product_id": "kernel-rt-base-4.12.14-8.23.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-devel-4.12.14-8.23.1.x86_64", "product": { "name": "kernel-rt-devel-4.12.14-8.23.1.x86_64", "product_id": "kernel-rt-devel-4.12.14-8.23.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_debug-devel-4.12.14-8.23.1.x86_64", "product": { "name": "kernel-rt_debug-devel-4.12.14-8.23.1.x86_64", "product_id": "kernel-rt_debug-devel-4.12.14-8.23.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-rt-4.12.14-8.23.1.x86_64", "product": { "name": "kernel-syms-rt-4.12.14-8.23.1.x86_64", "product_id": "kernel-syms-rt-4.12.14-8.23.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-rt-4.12.14-8.23.1.x86_64", "product": { "name": "ocfs2-kmp-rt-4.12.14-8.23.1.x86_64", "product_id": "ocfs2-kmp-rt-4.12.14-8.23.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Real Time 12 SP4", "product": { "name": "SUSE Linux Enterprise Real Time 12 SP4", "product_id": "SUSE Linux Enterprise Real Time 12 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-linux-enterprise-rt:12:sp4" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-rt-4.12.14-8.23.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP4", "product_id": "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.23.1.x86_64" }, "product_reference": "cluster-md-kmp-rt-4.12.14-8.23.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-rt-4.12.14-8.23.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP4", "product_id": "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.23.1.x86_64" }, "product_reference": "dlm-kmp-rt-4.12.14-8.23.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-rt-4.12.14-8.23.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP4", "product_id": "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.23.1.x86_64" }, "product_reference": "gfs2-kmp-rt-4.12.14-8.23.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-rt-4.12.14-8.23.1.noarch as component of SUSE Linux Enterprise Real Time 12 SP4", "product_id": "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.23.1.noarch" }, "product_reference": "kernel-devel-rt-4.12.14-8.23.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-4.12.14-8.23.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP4", "product_id": "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.23.1.x86_64" }, "product_reference": "kernel-rt-4.12.14-8.23.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-base-4.12.14-8.23.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP4", "product_id": "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.23.1.x86_64" }, "product_reference": "kernel-rt-base-4.12.14-8.23.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-4.12.14-8.23.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP4", "product_id": "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.23.1.x86_64" }, "product_reference": "kernel-rt-devel-4.12.14-8.23.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt_debug-devel-4.12.14-8.23.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP4", "product_id": "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.23.1.x86_64" }, "product_reference": "kernel-rt_debug-devel-4.12.14-8.23.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-rt-4.12.14-8.23.1.noarch as component of SUSE Linux Enterprise Real Time 12 SP4", "product_id": "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.23.1.noarch" }, "product_reference": "kernel-source-rt-4.12.14-8.23.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-rt-4.12.14-8.23.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP4", "product_id": "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.23.1.x86_64" }, "product_reference": "kernel-syms-rt-4.12.14-8.23.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-rt-4.12.14-8.23.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP4", "product_id": "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.23.1.x86_64" }, "product_reference": "ocfs2-kmp-rt-4.12.14-8.23.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP4" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-1000199", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1000199" } ], "notes": [ { "category": "general", "text": "The Linux Kernel version 3.18 contains a dangerous feature vulnerability in modify_user_hw_breakpoint() that can result in crash and possibly memory corruption. This attack appear to be exploitable via local code execution and the ability to use ptrace. This vulnerability appears to have been fixed in git commit f67b15037a7a50c57f72e69a6d59941ad90a0f0f.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.23.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1000199", "url": "https://www.suse.com/security/cve/CVE-2018-1000199" }, { "category": "external", "summary": "SUSE Bug 1089895 for CVE-2018-1000199", "url": "https://bugzilla.suse.com/1089895" }, { "category": "external", "summary": "SUSE Bug 1090036 for CVE-2018-1000199", "url": "https://bugzilla.suse.com/1090036" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.23.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.23.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-06T18:03:08Z", "details": "important" } ], "title": "CVE-2018-1000199" }, { "cve": "CVE-2019-16746", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-16746" } ], "notes": [ { "category": "general", "text": "An issue was discovered in net/wireless/nl80211.c in the Linux kernel through 5.2.17. It does not check the length of variable elements in a beacon head, leading to a buffer overflow.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.23.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-16746", "url": "https://www.suse.com/security/cve/CVE-2019-16746" }, { "category": "external", "summary": "SUSE Bug 1152107 for CVE-2019-16746", "url": "https://bugzilla.suse.com/1152107" }, { "category": "external", "summary": "SUSE Bug 1173659 for CVE-2019-16746", "url": "https://bugzilla.suse.com/1173659" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.23.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.23.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-06T18:03:08Z", "details": "moderate" } ], "title": "CVE-2019-16746" }, { "cve": "CVE-2019-19462", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-19462" } ], "notes": [ { "category": "general", "text": "relay_open in kernel/relay.c in the Linux kernel through 5.4.1 allows local users to cause a denial of service (such as relay blockage) by triggering a NULL alloc_percpu result.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.23.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-19462", "url": "https://www.suse.com/security/cve/CVE-2019-19462" }, { "category": "external", "summary": "SUSE Bug 1158265 for CVE-2019-19462", "url": "https://bugzilla.suse.com/1158265" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.23.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.23.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-06T18:03:08Z", "details": "low" } ], "title": "CVE-2019-19462" }, { "cve": "CVE-2019-20806", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-20806" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.2. There is a NULL pointer dereference in tw5864_handle_frame() in drivers/media/pci/tw5864/tw5864-video.c, which may cause denial of service, aka CID-2e7682ebfc75.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.23.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-20806", "url": "https://www.suse.com/security/cve/CVE-2019-20806" }, { "category": "external", "summary": "SUSE Bug 1172199 for CVE-2019-20806", "url": "https://bugzilla.suse.com/1172199" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.23.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.9, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.23.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-06T18:03:08Z", "details": "low" } ], "title": "CVE-2019-20806" }, { "cve": "CVE-2019-20810", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-20810" } ], "notes": [ { "category": "general", "text": "go7007_snd_init in drivers/media/usb/go7007/snd-go7007.c in the Linux kernel before 5.6 does not call snd_card_free for a failure path, which causes a memory leak, aka CID-9453264ef586.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.23.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-20810", "url": "https://www.suse.com/security/cve/CVE-2019-20810" }, { "category": "external", "summary": "SUSE Bug 1172458 for CVE-2019-20810", "url": "https://bugzilla.suse.com/1172458" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.23.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.23.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-06T18:03:08Z", "details": "low" } ], "title": "CVE-2019-20810" }, { "cve": "CVE-2019-20812", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-20812" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.4.7. The prb_calc_retire_blk_tmo() function in net/packet/af_packet.c can result in a denial of service (CPU consumption and soft lockup) in a certain failure case involving TPACKET_V3, aka CID-b43d1f9f7067.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.23.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-20812", "url": "https://www.suse.com/security/cve/CVE-2019-20812" }, { "category": "external", "summary": "SUSE Bug 1172453 for CVE-2019-20812", "url": "https://bugzilla.suse.com/1172453" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.23.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.23.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-06T18:03:08Z", "details": "moderate" } ], "title": "CVE-2019-20812" }, { "cve": "CVE-2019-9455", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9455" } ], "notes": [ { "category": "general", "text": "In the Android kernel in the video driver there is a kernel pointer leak due to a WARN_ON statement. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.23.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9455", "url": "https://www.suse.com/security/cve/CVE-2019-9455" }, { "category": "external", "summary": "SUSE Bug 1170345 for CVE-2019-9455", "url": "https://bugzilla.suse.com/1170345" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.23.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.23.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-06T18:03:08Z", "details": "moderate" } ], "title": "CVE-2019-9455" }, { "cve": "CVE-2020-0543", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-0543" } ], "notes": [ { "category": "general", "text": "Incomplete cleanup from specific special register read operations in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.23.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-0543", "url": "https://www.suse.com/security/cve/CVE-2020-0543" }, { "category": "external", "summary": "SUSE Bug 1154824 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1154824" }, { "category": "external", "summary": "SUSE Bug 1172205 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172205" }, { "category": "external", "summary": "SUSE Bug 1172206 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172206" }, { "category": "external", "summary": "SUSE Bug 1172207 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172207" }, { "category": "external", "summary": "SUSE Bug 1172770 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172770" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.23.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.23.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-06T18:03:08Z", "details": "moderate" } ], "title": "CVE-2020-0543" }, { "cve": "CVE-2020-10690", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10690" } ], "notes": [ { "category": "general", "text": "There is a use-after-free in kernel versions before 5.5 due to a race condition between the release of ptp_clock and cdev while resource deallocation. When a (high privileged) process allocates a ptp device file (like /dev/ptpX) and voluntarily goes to sleep. During this time if the underlying device is removed, it can cause an exploitable condition as the process wakes up to terminate and clean all attached files. The system crashes due to the cdev structure being invalid (as already freed) which is pointed to by the inode.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.23.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10690", "url": "https://www.suse.com/security/cve/CVE-2020-10690" }, { "category": "external", "summary": "SUSE Bug 1170056 for CVE-2020-10690", "url": "https://bugzilla.suse.com/1170056" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.23.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.23.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-06T18:03:08Z", "details": "moderate" } ], "title": "CVE-2020-10690" }, { "cve": "CVE-2020-10711", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10711" } ], "notes": [ { "category": "general", "text": "A NULL pointer dereference flaw was found in the Linux kernel\u0027s SELinux subsystem in versions before 5.7. This flaw occurs while importing the Commercial IP Security Option (CIPSO) protocol\u0027s category bitmap into the SELinux extensible bitmap via the\u0027 ebitmap_netlbl_import\u0027 routine. While processing the CIPSO restricted bitmap tag in the \u0027cipso_v4_parsetag_rbm\u0027 routine, it sets the security attribute to indicate that the category bitmap is present, even if it has not been allocated. This issue leads to a NULL pointer dereference issue while importing the same category bitmap into SELinux. This flaw allows a remote network user to crash the system kernel, resulting in a denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.23.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10711", "url": "https://www.suse.com/security/cve/CVE-2020-10711" }, { "category": "external", "summary": "SUSE Bug 1171191 for CVE-2020-10711", "url": "https://bugzilla.suse.com/1171191" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.23.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.23.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-06T18:03:08Z", "details": "moderate" } ], "title": "CVE-2020-10711" }, { "cve": "CVE-2020-10720", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10720" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s implementation of GRO in versions before 5.2. This flaw allows an attacker with local access to crash the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.23.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10720", "url": "https://www.suse.com/security/cve/CVE-2020-10720" }, { "category": "external", "summary": "SUSE Bug 1170778 for CVE-2020-10720", "url": "https://bugzilla.suse.com/1170778" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.23.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.23.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-06T18:03:08Z", "details": "moderate" } ], "title": "CVE-2020-10720" }, { "cve": "CVE-2020-10732", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10732" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s implementation of Userspace core dumps. This flaw allows an attacker with a local account to crash a trivial program and exfiltrate private kernel data.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.23.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10732", "url": "https://www.suse.com/security/cve/CVE-2020-10732" }, { "category": "external", "summary": "SUSE Bug 1171220 for CVE-2020-10732", "url": "https://bugzilla.suse.com/1171220" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.23.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.23.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-06T18:03:08Z", "details": "low" } ], "title": "CVE-2020-10732" }, { "cve": "CVE-2020-10751", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10751" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernels SELinux LSM hook implementation before version 5.7, where it incorrectly assumed that an skb would only contain a single netlink message. The hook would incorrectly only validate the first netlink message in the skb and allow or deny the rest of the messages within the skb with the granted permission without further processing.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.23.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10751", "url": "https://www.suse.com/security/cve/CVE-2020-10751" }, { "category": "external", "summary": "SUSE Bug 1171189 for CVE-2020-10751", "url": "https://bugzilla.suse.com/1171189" }, { "category": "external", "summary": "SUSE Bug 1174963 for CVE-2020-10751", "url": "https://bugzilla.suse.com/1174963" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.23.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.23.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-06T18:03:08Z", "details": "moderate" } ], "title": "CVE-2020-10751" }, { "cve": "CVE-2020-10757", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10757" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux Kernel in versions after 4.5-rc1 in the way mremap handled DAX Huge Pages. This flaw allows a local attacker with access to a DAX enabled storage to escalate their privileges on the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.23.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10757", "url": "https://www.suse.com/security/cve/CVE-2020-10757" }, { "category": "external", "summary": "SUSE Bug 1159281 for CVE-2020-10757", "url": "https://bugzilla.suse.com/1159281" }, { "category": "external", "summary": "SUSE Bug 1172317 for CVE-2020-10757", "url": "https://bugzilla.suse.com/1172317" }, { "category": "external", "summary": "SUSE Bug 1172437 for CVE-2020-10757", "url": "https://bugzilla.suse.com/1172437" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.23.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.23.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-06T18:03:08Z", "details": "important" } ], "title": "CVE-2020-10757" }, { "cve": "CVE-2020-10766", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10766" } ], "notes": [ { "category": "general", "text": "A logic bug flaw was found in Linux kernel before 5.8-rc1 in the implementation of SSBD. A bug in the logic handling allows an attacker with a local account to disable SSBD protection during a context switch when additional speculative execution mitigations are in place. This issue was introduced when the per task/process conditional STIPB switching was added on top of the existing SSBD switching. The highest threat from this vulnerability is to confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.23.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10766", "url": "https://www.suse.com/security/cve/CVE-2020-10766" }, { "category": "external", "summary": "SUSE Bug 1159281 for CVE-2020-10766", "url": "https://bugzilla.suse.com/1159281" }, { "category": "external", "summary": "SUSE Bug 1172781 for CVE-2020-10766", "url": "https://bugzilla.suse.com/1172781" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.23.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.23.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-06T18:03:08Z", "details": "moderate" } ], "title": "CVE-2020-10766" }, { "cve": "CVE-2020-10767", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10767" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel before 5.8-rc1 in the implementation of the Enhanced IBPB (Indirect Branch Prediction Barrier). The IBPB mitigation will be disabled when STIBP is not available or when the Enhanced Indirect Branch Restricted Speculation (IBRS) is available. This flaw allows a local attacker to perform a Spectre V2 style attack when this configuration is active. The highest threat from this vulnerability is to confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.23.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10767", "url": "https://www.suse.com/security/cve/CVE-2020-10767" }, { "category": "external", "summary": "SUSE Bug 1159281 for CVE-2020-10767", "url": "https://bugzilla.suse.com/1159281" }, { "category": "external", "summary": "SUSE Bug 1172782 for CVE-2020-10767", "url": "https://bugzilla.suse.com/1172782" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.23.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.23.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-06T18:03:08Z", "details": "moderate" } ], "title": "CVE-2020-10767" }, { "cve": "CVE-2020-10768", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10768" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux Kernel before 5.8-rc1 in the prctl() function, where it can be used to enable indirect branch speculation after it has been disabled. This call incorrectly reports it as being \u0027force disabled\u0027 when it is not and opens the system to Spectre v2 attacks. The highest threat from this vulnerability is to confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.23.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10768", "url": "https://www.suse.com/security/cve/CVE-2020-10768" }, { "category": "external", "summary": "SUSE Bug 1159281 for CVE-2020-10768", "url": "https://bugzilla.suse.com/1159281" }, { "category": "external", "summary": "SUSE Bug 1172783 for CVE-2020-10768", "url": "https://bugzilla.suse.com/1172783" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.23.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.23.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-06T18:03:08Z", "details": "moderate" } ], "title": "CVE-2020-10768" }, { "cve": "CVE-2020-10769", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10769" } ], "notes": [ { "category": "general", "text": "A buffer over-read flaw was found in RH kernel versions before 5.0 in crypto_authenc_extractkeys in crypto/authenc.c in the IPsec Cryptographic algorithm\u0027s module, authenc. When a payload longer than 4 bytes, and is not following 4-byte alignment boundary guidelines, it causes a buffer over-read threat, leading to a system crash. This flaw allows a local attacker with user privileges to cause a denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.23.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10769", "url": "https://www.suse.com/security/cve/CVE-2020-10769" }, { "category": "external", "summary": "SUSE Bug 1173265 for CVE-2020-10769", "url": "https://bugzilla.suse.com/1173265" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.23.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.23.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-06T18:03:08Z", "details": "moderate" } ], "title": "CVE-2020-10769" }, { "cve": "CVE-2020-10773", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10773" } ], "notes": [ { "category": "general", "text": "A stack information leak flaw was found in s390/s390x in the Linux kernel\u0027s memory manager functionality, where it incorrectly writes to the /proc/sys/vm/cmm_timeout file. This flaw allows a local user to see the kernel data.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.23.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10773", "url": "https://www.suse.com/security/cve/CVE-2020-10773" }, { "category": "external", "summary": "SUSE Bug 1172999 for CVE-2020-10773", "url": "https://bugzilla.suse.com/1172999" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.23.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.5, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.23.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-06T18:03:08Z", "details": "low" } ], "title": "CVE-2020-10773" }, { "cve": "CVE-2020-12114", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12114" } ], "notes": [ { "category": "general", "text": "A pivot_root race condition in fs/namespace.c in the Linux kernel 4.4.x before 4.4.221, 4.9.x before 4.9.221, 4.14.x before 4.14.178, 4.19.x before 4.19.119, and 5.x before 5.3 allows local users to cause a denial of service (panic) by corrupting a mountpoint reference counter.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.23.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12114", "url": "https://www.suse.com/security/cve/CVE-2020-12114" }, { "category": "external", "summary": "SUSE Bug 1171098 for CVE-2020-12114", "url": "https://bugzilla.suse.com/1171098" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.23.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.23.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-06T18:03:08Z", "details": "moderate" } ], "title": "CVE-2020-12114" }, { "cve": "CVE-2020-12464", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12464" } ], "notes": [ { "category": "general", "text": "usb_sg_cancel in drivers/usb/core/message.c in the Linux kernel before 5.6.8 has a use-after-free because a transfer occurs without a reference, aka CID-056ad39ee925.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.23.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12464", "url": "https://www.suse.com/security/cve/CVE-2020-12464" }, { "category": "external", "summary": "SUSE Bug 1170901 for CVE-2020-12464", "url": "https://bugzilla.suse.com/1170901" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.23.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 1.8, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.23.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-06T18:03:08Z", "details": "low" } ], "title": "CVE-2020-12464" }, { "cve": "CVE-2020-12652", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12652" } ], "notes": [ { "category": "general", "text": "The __mptctl_ioctl function in drivers/message/fusion/mptctl.c in the Linux kernel before 5.4.14 allows local users to hold an incorrect lock during the ioctl operation and trigger a race condition, i.e., a \"double fetch\" vulnerability, aka CID-28d76df18f0a. NOTE: the vendor states \"The security impact of this bug is not as bad as it could have been because these operations are all privileged and root already has enormous destructive power.\"", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.23.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12652", "url": "https://www.suse.com/security/cve/CVE-2020-12652" }, { "category": "external", "summary": "SUSE Bug 1171218 for CVE-2020-12652", "url": "https://bugzilla.suse.com/1171218" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.23.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.23.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-06T18:03:08Z", "details": "moderate" } ], "title": "CVE-2020-12652" }, { "cve": "CVE-2020-12653", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12653" } ], "notes": [ { "category": "general", "text": "An issue was found in Linux kernel before 5.5.4. The mwifiex_cmd_append_vsie_tlv() function in drivers/net/wireless/marvell/mwifiex/scan.c allows local users to gain privileges or cause a denial of service because of an incorrect memcpy and buffer overflow, aka CID-b70261a288ea.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.23.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12653", "url": "https://www.suse.com/security/cve/CVE-2020-12653" }, { "category": "external", "summary": "SUSE Bug 1159281 for CVE-2020-12653", "url": "https://bugzilla.suse.com/1159281" }, { "category": "external", "summary": "SUSE Bug 1171195 for CVE-2020-12653", "url": "https://bugzilla.suse.com/1171195" }, { "category": "external", "summary": "SUSE Bug 1171254 for CVE-2020-12653", "url": "https://bugzilla.suse.com/1171254" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.23.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.23.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-06T18:03:08Z", "details": "important" } ], "title": "CVE-2020-12653" }, { "cve": "CVE-2020-12654", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12654" } ], "notes": [ { "category": "general", "text": "An issue was found in Linux kernel before 5.5.4. mwifiex_ret_wmm_get_status() in drivers/net/wireless/marvell/mwifiex/wmm.c allows a remote AP to trigger a heap-based buffer overflow because of an incorrect memcpy, aka CID-3a9b153c5591.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.23.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12654", "url": "https://www.suse.com/security/cve/CVE-2020-12654" }, { "category": "external", "summary": "SUSE Bug 1159281 for CVE-2020-12654", "url": "https://bugzilla.suse.com/1159281" }, { "category": "external", "summary": "SUSE Bug 1171202 for CVE-2020-12654", "url": "https://bugzilla.suse.com/1171202" }, { "category": "external", "summary": "SUSE Bug 1171252 for CVE-2020-12654", "url": "https://bugzilla.suse.com/1171252" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.23.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.23.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-06T18:03:08Z", "details": "important" } ], "title": "CVE-2020-12654" }, { "cve": "CVE-2020-12655", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12655" } ], "notes": [ { "category": "general", "text": "An issue was discovered in xfs_agf_verify in fs/xfs/libxfs/xfs_alloc.c in the Linux kernel through 5.6.10. Attackers may trigger a sync of excessive duration via an XFS v5 image with crafted metadata, aka CID-d0c7feaf8767.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.23.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12655", "url": "https://www.suse.com/security/cve/CVE-2020-12655" }, { "category": "external", "summary": "SUSE Bug 1171217 for CVE-2020-12655", "url": "https://bugzilla.suse.com/1171217" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.23.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.8, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.23.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-06T18:03:08Z", "details": "moderate" } ], "title": "CVE-2020-12655" }, { "cve": "CVE-2020-12656", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12656" } ], "notes": [ { "category": "general", "text": "gss_mech_free in net/sunrpc/auth_gss/gss_mech_switch.c in the rpcsec_gss_krb5 implementation in the Linux kernel through 5.6.10 lacks certain domain_release calls, leading to a memory leak. Note: This was disputed with the assertion that the issue does not grant any access not already available. It is a problem that on unloading a specific kernel module some memory is leaked, but loading kernel modules is a privileged operation. A user could also write a kernel module to consume any amount of memory they like and load that replicating the effect of this bug", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.23.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12656", "url": "https://www.suse.com/security/cve/CVE-2020-12656" }, { "category": "external", "summary": "SUSE Bug 1171219 for CVE-2020-12656", "url": "https://bugzilla.suse.com/1171219" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.23.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.9, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.23.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-06T18:03:08Z", "details": "low" } ], "title": "CVE-2020-12656" }, { "cve": "CVE-2020-12657", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12657" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.6.5. There is a use-after-free in block/bfq-iosched.c related to bfq_idle_slice_timer_body.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.23.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12657", "url": "https://www.suse.com/security/cve/CVE-2020-12657" }, { "category": "external", "summary": "SUSE Bug 1171205 for CVE-2020-12657", "url": "https://bugzilla.suse.com/1171205" }, { "category": "external", "summary": "SUSE Bug 1201585 for CVE-2020-12657", "url": "https://bugzilla.suse.com/1201585" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.23.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.23.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-06T18:03:08Z", "details": "important" } ], "title": "CVE-2020-12657" }, { "cve": "CVE-2020-12769", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12769" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.4.17. drivers/spi/spi-dw.c allows attackers to cause a panic via concurrent calls to dw_spi_irq and dw_spi_transfer_one, aka CID-19b61392c5a8.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.23.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12769", "url": "https://www.suse.com/security/cve/CVE-2020-12769" }, { "category": "external", "summary": "SUSE Bug 1171983 for CVE-2020-12769", "url": "https://bugzilla.suse.com/1171983" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.23.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.23.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-06T18:03:08Z", "details": "moderate" } ], "title": "CVE-2020-12769" }, { "cve": "CVE-2020-12888", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12888" } ], "notes": [ { "category": "general", "text": "The VFIO PCI driver in the Linux kernel through 5.6.13 mishandles attempts to access disabled memory space.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.23.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12888", "url": "https://www.suse.com/security/cve/CVE-2020-12888" }, { "category": "external", "summary": "SUSE Bug 1159281 for CVE-2020-12888", "url": "https://bugzilla.suse.com/1159281" }, { "category": "external", "summary": "SUSE Bug 1171868 for CVE-2020-12888", "url": "https://bugzilla.suse.com/1171868" }, { "category": "external", "summary": "SUSE Bug 1176979 for CVE-2020-12888", "url": "https://bugzilla.suse.com/1176979" }, { "category": "external", "summary": "SUSE Bug 1179612 for CVE-2020-12888", "url": "https://bugzilla.suse.com/1179612" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.23.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.23.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-06T18:03:08Z", "details": "moderate" } ], "title": "CVE-2020-12888" }, { "cve": "CVE-2020-13143", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-13143" } ], "notes": [ { "category": "general", "text": "gadget_dev_desc_UDC_store in drivers/usb/gadget/configfs.c in the Linux kernel 3.16 through 5.6.13 relies on kstrdup without considering the possibility of an internal \u0027\\0\u0027 value, which allows attackers to trigger an out-of-bounds read, aka CID-15753588bcd4.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.23.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-13143", "url": "https://www.suse.com/security/cve/CVE-2020-13143" }, { "category": "external", "summary": "SUSE Bug 1171982 for CVE-2020-13143", "url": "https://bugzilla.suse.com/1171982" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.23.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.23.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-06T18:03:08Z", "details": "moderate" } ], "title": "CVE-2020-13143" }, { "cve": "CVE-2020-13974", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-13974" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel 4.4 through 5.7.1. drivers/tty/vt/keyboard.c has an integer overflow if k_ascii is called several times in a row, aka CID-b86dab054059. NOTE: Members in the community argue that the integer overflow does not lead to a security issue in this case.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.23.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-13974", "url": "https://www.suse.com/security/cve/CVE-2020-13974" }, { "category": "external", "summary": "SUSE Bug 1172775 for CVE-2020-13974", "url": "https://bugzilla.suse.com/1172775" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.23.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.23.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-06T18:03:08Z", "details": "moderate" } ], "title": "CVE-2020-13974" }, { "cve": "CVE-2020-14416", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14416" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 5.4.16, a race condition in tty-\u003edisc_data handling in the slip and slcan line discipline could lead to a use-after-free, aka CID-0ace17d56824. This affects drivers/net/slip/slip.c and drivers/net/can/slcan.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.23.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14416", "url": "https://www.suse.com/security/cve/CVE-2020-14416" }, { "category": "external", "summary": "SUSE Bug 1162002 for CVE-2020-14416", "url": "https://bugzilla.suse.com/1162002" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.23.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.23.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-06T18:03:08Z", "details": "moderate" } ], "title": "CVE-2020-14416" } ] }
suse-su-2020:1600-1
Vulnerability from csaf_suse
Published
2020-06-10 10:31
Modified
2020-06-10 10:31
Summary
Security update for ucode-intel
Notes
Title of the patch
Security update for ucode-intel
Description of the patch
This update for ucode-intel fixes the following issues:
Updated Intel CPU Microcode to 20200602 (prerelease) (bsc#1172466)
This update contains security mitigations for:
- CVE-2020-0543: Fixed a side channel attack against special registers
which could have resulted in leaking of read values to cores other
than the one which called it. This attack is known as Special Register
Buffer Data Sampling (SRBDS) or 'CrossTalk' (bsc#1154824).
- CVE-2020-0548,CVE-2020-0549: Additional ucode updates were supplied to
mitigate the Vector Register and L1D Eviction Sampling aka 'CacheOutAttack'
attacks. (bsc#1156353)
Microcode Table:
Processor Identifier Version Products
Model Stepping F-MO-S/PI Old->New
---- new platforms ----------------------------------------
---- updated platforms ------------------------------------
HSW C0 6-3c-3/32 00000027->00000028 Core Gen4
BDW-U/Y E0/F0 6-3d-4/c0 0000002e->0000002f Core Gen5
HSW-U C0/D0 6-45-1/72 00000025->00000026 Core Gen4
HSW-H C0 6-46-1/32 0000001b->0000001c Core Gen4
BDW-H/E3 E0/G0 6-47-1/22 00000021->00000022 Core Gen5
SKL-U/Y D0 6-4e-3/c0 000000d6->000000dc Core Gen6 Mobile
SKL-U23e K1 6-4e-3/c0 000000d6->000000dc Core Gen6 Mobile
SKX-SP B1 6-55-3/97 01000151->01000157 Xeon Scalable
SKX-SP H0/M0/U0 6-55-4/b7 02000065->02006906 Xeon Scalable
SKX-D M1 6-55-4/b7 02000065->02006906 Xeon D-21xx
CLX-SP B0 6-55-6/bf 0400002c->04002f01 Xeon Scalable Gen2
CLX-SP B1 6-55-7/bf 0500002c->04002f01 Xeon Scalable Gen2
SKL-H/S R0/N0 6-5e-3/36 000000d6->000000dc Core Gen6; Xeon E3 v5
AML-Y22 H0 6-8e-9/10 000000ca->000000d6 Core Gen8 Mobile
KBL-U/Y H0 6-8e-9/c0 000000ca->000000d6 Core Gen7 Mobile
CFL-U43e D0 6-8e-a/c0 000000ca->000000d6 Core Gen8 Mobile
WHL-U W0 6-8e-b/d0 000000ca->000000d6 Core Gen8 Mobile
AML-Y42 V0 6-8e-c/94 000000ca->000000d6 Core Gen10 Mobile
CML-Y42 V0 6-8e-c/94 000000ca->000000d6 Core Gen10 Mobile
WHL-U V0 6-8e-c/94 000000ca->000000d6 Core Gen8 Mobile
KBL-G/H/S/E3 B0 6-9e-9/2a 000000ca->000000d6 Core Gen7; Xeon E3 v6
CFL-H/S/E3 U0 6-9e-a/22 000000ca->000000d6 Core Gen8 Desktop, Mobile, Xeon E
CFL-S B0 6-9e-b/02 000000ca->000000d6 Core Gen8
CFL-H/S P0 6-9e-c/22 000000ca->000000d6 Core Gen9
CFL-H R0 6-9e-d/22 000000ca->000000d6 Core Gen9 Mobile
Also contains the Intel CPU Microcode update to 20200520:
Processor Identifier Version Products
Model Stepping F-MO-S/PI Old->New
---- new platforms ----------------------------------------
---- updated platforms ------------------------------------
SNB-E/EN/EP C1/M0 6-2d-6/6d 0000061f->00000621 Xeon E3/E5, Core X
SNB-E/EN/EP C2/M1 6-2d-7/6d 00000718->0000071a Xeon E3/E5, Core X
Patchnames
SUSE-2020-1600,SUSE-SLE-Product-HPC-15-2020-1600,SUSE-SLE-Product-SLES_SAP-15-2020-1600
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for ucode-intel", "title": "Title of the patch" }, { "category": "description", "text": "This update for ucode-intel fixes the following issues:\n\nUpdated Intel CPU Microcode to 20200602 (prerelease) (bsc#1172466)\n \nThis update contains security mitigations for:\n\n- CVE-2020-0543: Fixed a side channel attack against special registers\n which could have resulted in leaking of read values to cores other\n than the one which called it. This attack is known as Special Register\n Buffer Data Sampling (SRBDS) or \u0027CrossTalk\u0027 (bsc#1154824).\n- CVE-2020-0548,CVE-2020-0549: Additional ucode updates were supplied to\n mitigate the Vector Register and L1D Eviction Sampling aka \u0027CacheOutAttack\u0027\n attacks. (bsc#1156353)\n\nMicrocode Table:\n\n Processor Identifier Version Products\n Model Stepping F-MO-S/PI Old-\u003eNew\n ---- new platforms ----------------------------------------\n ---- updated platforms ------------------------------------\n HSW C0 6-3c-3/32 00000027-\u003e00000028 Core Gen4\n BDW-U/Y E0/F0 6-3d-4/c0 0000002e-\u003e0000002f Core Gen5\n HSW-U C0/D0 6-45-1/72 00000025-\u003e00000026 Core Gen4\n HSW-H C0 6-46-1/32 0000001b-\u003e0000001c Core Gen4\n BDW-H/E3 E0/G0 6-47-1/22 00000021-\u003e00000022 Core Gen5\n SKL-U/Y D0 6-4e-3/c0 000000d6-\u003e000000dc Core Gen6 Mobile\n SKL-U23e K1 6-4e-3/c0 000000d6-\u003e000000dc Core Gen6 Mobile\n SKX-SP B1 6-55-3/97 01000151-\u003e01000157 Xeon Scalable\n SKX-SP H0/M0/U0 6-55-4/b7 02000065-\u003e02006906 Xeon Scalable\n SKX-D M1 6-55-4/b7 02000065-\u003e02006906 Xeon D-21xx\n CLX-SP B0 6-55-6/bf 0400002c-\u003e04002f01 Xeon Scalable Gen2\n CLX-SP B1 6-55-7/bf 0500002c-\u003e04002f01 Xeon Scalable Gen2\n SKL-H/S R0/N0 6-5e-3/36 000000d6-\u003e000000dc Core Gen6; Xeon E3 v5\n AML-Y22 H0 6-8e-9/10 000000ca-\u003e000000d6 Core Gen8 Mobile\n KBL-U/Y H0 6-8e-9/c0 000000ca-\u003e000000d6 Core Gen7 Mobile\n CFL-U43e D0 6-8e-a/c0 000000ca-\u003e000000d6 Core Gen8 Mobile\n WHL-U W0 6-8e-b/d0 000000ca-\u003e000000d6 Core Gen8 Mobile\n AML-Y42 V0 6-8e-c/94 000000ca-\u003e000000d6 Core Gen10 Mobile\n CML-Y42 V0 6-8e-c/94 000000ca-\u003e000000d6 Core Gen10 Mobile\n WHL-U V0 6-8e-c/94 000000ca-\u003e000000d6 Core Gen8 Mobile\n KBL-G/H/S/E3 B0 6-9e-9/2a 000000ca-\u003e000000d6 Core Gen7; Xeon E3 v6\n CFL-H/S/E3 U0 6-9e-a/22 000000ca-\u003e000000d6 Core Gen8 Desktop, Mobile, Xeon E\n CFL-S B0 6-9e-b/02 000000ca-\u003e000000d6 Core Gen8\n CFL-H/S P0 6-9e-c/22 000000ca-\u003e000000d6 Core Gen9\n CFL-H R0 6-9e-d/22 000000ca-\u003e000000d6 Core Gen9 Mobile\n\nAlso contains the Intel CPU Microcode update to 20200520:\n\n Processor Identifier Version Products\n Model Stepping F-MO-S/PI Old-\u003eNew\n ---- new platforms ----------------------------------------\n ---- updated platforms ------------------------------------\n SNB-E/EN/EP C1/M0 6-2d-6/6d 0000061f-\u003e00000621 Xeon E3/E5, Core X\n SNB-E/EN/EP C2/M1 6-2d-7/6d 00000718-\u003e0000071a Xeon E3/E5, Core X\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2020-1600,SUSE-SLE-Product-HPC-15-2020-1600,SUSE-SLE-Product-SLES_SAP-15-2020-1600", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2020_1600-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2020:1600-1", "url": "https://www.suse.com/support/update/announcement/2020/suse-su-20201600-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2020:1600-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-June/006922.html" }, { "category": "self", "summary": "SUSE Bug 1154824", "url": "https://bugzilla.suse.com/1154824" }, { "category": "self", "summary": "SUSE Bug 1156353", "url": "https://bugzilla.suse.com/1156353" }, { "category": "self", "summary": "SUSE Bug 1172466", "url": "https://bugzilla.suse.com/1172466" }, { "category": "self", "summary": "SUSE CVE CVE-2020-0543 page", "url": "https://www.suse.com/security/cve/CVE-2020-0543/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-0548 page", "url": "https://www.suse.com/security/cve/CVE-2020-0548/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-0549 page", "url": "https://www.suse.com/security/cve/CVE-2020-0549/" } ], "title": "Security update for ucode-intel", "tracking": { "current_release_date": "2020-06-10T10:31:35Z", "generator": { "date": "2020-06-10T10:31:35Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2020:1600-1", "initial_release_date": "2020-06-10T10:31:35Z", "revision_history": [ { "date": "2020-06-10T10:31:35Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "ucode-intel-20200602-3.43.1.i586", "product": { "name": "ucode-intel-20200602-3.43.1.i586", "product_id": "ucode-intel-20200602-3.43.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "ucode-intel-20200602-3.43.1.x86_64", "product": { "name": "ucode-intel-20200602-3.43.1.x86_64", "product_id": "ucode-intel-20200602-3.43.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-espos:15" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15-LTSS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-ltss:15" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 15", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:15" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "ucode-intel-20200602-3.43.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:ucode-intel-20200602-3.43.1.x86_64" }, "product_reference": "ucode-intel-20200602-3.43.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "ucode-intel-20200602-3.43.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:ucode-intel-20200602-3.43.1.x86_64" }, "product_reference": "ucode-intel-20200602-3.43.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "ucode-intel-20200602-3.43.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:ucode-intel-20200602-3.43.1.x86_64" }, "product_reference": "ucode-intel-20200602-3.43.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-0543", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-0543" } ], "notes": [ { "category": "general", "text": "Incomplete cleanup from specific special register read operations in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Performance Computing 15-ESPOS:ucode-intel-20200602-3.43.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:ucode-intel-20200602-3.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:ucode-intel-20200602-3.43.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-0543", "url": "https://www.suse.com/security/cve/CVE-2020-0543" }, { "category": "external", "summary": "SUSE Bug 1154824 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1154824" }, { "category": "external", "summary": "SUSE Bug 1172205 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172205" }, { "category": "external", "summary": "SUSE Bug 1172206 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172206" }, { "category": "external", "summary": "SUSE Bug 1172207 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172207" }, { "category": "external", "summary": "SUSE Bug 1172770 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172770" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Performance Computing 15-ESPOS:ucode-intel-20200602-3.43.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:ucode-intel-20200602-3.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:ucode-intel-20200602-3.43.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Performance Computing 15-ESPOS:ucode-intel-20200602-3.43.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:ucode-intel-20200602-3.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:ucode-intel-20200602-3.43.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-10T10:31:35Z", "details": "moderate" } ], "title": "CVE-2020-0543" }, { "cve": "CVE-2020-0548", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-0548" } ], "notes": [ { "category": "general", "text": "Cleanup errors in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Performance Computing 15-ESPOS:ucode-intel-20200602-3.43.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:ucode-intel-20200602-3.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:ucode-intel-20200602-3.43.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-0548", "url": "https://www.suse.com/security/cve/CVE-2020-0548" }, { "category": "external", "summary": "SUSE Bug 1156353 for CVE-2020-0548", "url": "https://bugzilla.suse.com/1156353" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Performance Computing 15-ESPOS:ucode-intel-20200602-3.43.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:ucode-intel-20200602-3.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:ucode-intel-20200602-3.43.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.8, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Performance Computing 15-ESPOS:ucode-intel-20200602-3.43.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:ucode-intel-20200602-3.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:ucode-intel-20200602-3.43.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-10T10:31:35Z", "details": "moderate" } ], "title": "CVE-2020-0548" }, { "cve": "CVE-2020-0549", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-0549" } ], "notes": [ { "category": "general", "text": "Cleanup errors in some data cache evictions for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Performance Computing 15-ESPOS:ucode-intel-20200602-3.43.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:ucode-intel-20200602-3.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:ucode-intel-20200602-3.43.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-0549", "url": "https://www.suse.com/security/cve/CVE-2020-0549" }, { "category": "external", "summary": "SUSE Bug 1156353 for CVE-2020-0549", "url": "https://bugzilla.suse.com/1156353" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Performance Computing 15-ESPOS:ucode-intel-20200602-3.43.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:ucode-intel-20200602-3.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:ucode-intel-20200602-3.43.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Performance Computing 15-ESPOS:ucode-intel-20200602-3.43.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:ucode-intel-20200602-3.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:ucode-intel-20200602-3.43.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-10T10:31:35Z", "details": "moderate" } ], "title": "CVE-2020-0549" } ] }
suse-su-2020:1602-1
Vulnerability from csaf_suse
Published
2020-06-10 13:28
Modified
2020-06-10 13:28
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 12 SP5 kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2020-0543: Fixed a side channel attack against special registers which could have resulted in leaking of read values to cores other than the one which called it.
This attack is known as Special Register Buffer Data Sampling (SRBDS) or 'CrossTalk' (bsc#1154824).
- CVE-2020-13143: Fixed an out-of-bounds read in gadget_dev_desc_UDC_store in drivers/usb/gadget/configfs.c (bsc#1171982).
- CVE-2020-12769: Fixed an issue which could have allowed attackers to cause a panic via concurrent calls to dw_spi_irq and dw_spi_transfer_one (bsc#1171983).
- CVE-2020-12768: Fixed a memory leak in svm_cpu_uninit in arch/x86/kvm/svm.c (bsc#1171736).
- CVE-2020-12659: Fixed an out-of-bounds write (by a user with the CAP_NET_ADMIN capability) due to improper headroom validation (bsc#1171214).
- CVE-2020-12657: An a use-after-free in block/bfq-iosched.c (bsc#1171205).
- CVE-2020-12656: Fixed an improper handling of certain domain_release calls leadingch could have led to a memory leak (bsc#1171219).
- CVE-2020-12655: Fixed an issue which could have allowed attackers to trigger a sync of excessive duration via an XFS v5 image with crafted metadata (bsc#1171217).
- CVE-2020-12654: Fixed an issue in he wifi driver which could have allowed a remote AP to trigger a heap-based buffer overflow (bsc#1171202).
- CVE-2020-12653: Fixed an issue in the wifi driver which could have allowed local users to gain privileges or cause a denial of service (bsc#1171195).
- CVE-2020-12652: Fixed an issue which could have allowed local users to hold an incorrect lock during the ioctl operation and trigger a race condition (bsc#1171218).
- CVE-2020-12464: Fixed a use-after-free due to a transfer without a reference (bsc#1170901).
- CVE-2020-12114: Fixed a pivot_root race condition which could have allowed local users to cause a denial of service (panic) by corrupting a mountpoint reference counter (bsc#1171098).
- CVE-2020-10757: Fixed an issue where remaping hugepage DAX to anon mmap could have caused user PTE access (bsc#1172317).
- CVE-2020-10751: Fixed an improper implementation in SELinux LSM hook where it was assumed that an skb would only contain a single netlink message (bsc#1171189).
- CVE-2020-10732: Fixed kernel data leak in userspace coredumps due to uninitialized data (bsc#1171220).
- CVE-2020-10720: Fixed a use-after-free read in napi_gro_frags() (bsc#1170778).
- CVE-2020-10711: Fixed a null pointer dereference in SELinux subsystem which could have allowed a remote network user to crash the kernel resulting in a denial of service (bsc#1171191).
- CVE-2020-10690: Fixed the race between the release of ptp_clock and cdev (bsc#1170056).
- CVE-2019-9455: Fixed a pointer leak due to a WARN_ON statement in a video driver. This could lead to local information disclosure with System execution privileges needed (bsc#1170345).
- CVE-2019-20812: Fixed an issue in prb_calc_retire_blk_tmo() which could have resulted in a denial of service (bsc#1172453).
- CVE-2019-20806: Fixed a null pointer dereference which may had lead to denial of service (bsc#1172199).
- CVE-2019-19462: Fixed an issue which could have allowed local user to cause denial of service (bsc#1158265).
- CVE-2018-1000199: Fixed a potential local code execution via ptrace (bsc#1089895).
The following non-security bugs were fixed:
- ACPI: CPPC: Fix reference count leak in acpi_cppc_processor_probe() (bsc#1051510).
- ACPI: sysfs: Fix reference count leak in acpi_sysfs_add_hotplug_profile() (bsc#1051510).
- acpi/x86: ignore unspecified bit positions in the ACPI global lock field (bsc#1051510).
- Add br_netfilter to kernel-default-base (bsc#1169020)
- Add commit for git-fix that's not a fix This commit cleans up debug code but does not fix anything, and it relies on a new kernel function that isn't yet in this version of SLE.
- agp/intel: Reinforce the barrier after GTT updates (bsc#1051510).
- ALSA: ctxfi: Remove unnecessary cast in kfree (bsc#1051510).
- ALSA: doc: Document PC Beep Hidden Register on Realtek ALC256 (bsc#1051510).
- ALSA: dummy: Fix PCM format loop in proc output (bsc#1111666).
- ALSA: hda: Add driver blacklist (bsc#1051510).
- ALSA: hda: Always use jackpoll helper for jack update after resume (bsc#1051510).
- ALSA: hda: call runtime_allow() for all hda controllers (bsc#1051510).
- ALSA: hda: Do not release card at firmware loading error (bsc#1051510).
- ALSA: hda: Explicitly permit using autosuspend if runtime PM is supported (bsc#1051510).
- ALSA: hda/hdmi: fix race in monitor detection during probe (bsc#1051510).
- ALSA: hda/hdmi: fix without unlocked before return (bsc#1051510).
- ALSA: hda: Honor PM disablement in PM freeze and thaw_noirq ops (bsc#1051510).
- ALSA: hda: Keep the controller initialization even if no codecs found (bsc#1051510).
- ALSA: hda: Match both PCI ID and SSID for driver blacklist (bsc#1111666).
- ALSA: hda/realtek - Add a model for Thinkpad T570 without DAC workaround (bsc#1172017).
- ALSA: hda/realtek - Add COEF workaround for ASUS ZenBook UX431DA (git-fixes).
- ALSA: hda/realtek - Add HP new mute led supported for ALC236 (git-fixes).
- ALSA: hda/realtek - Add more fixup entries for Clevo machines (git-fixes).
- ALSA: hda/realtek - Add new codec supported for ALC245 (bsc#1051510).
- ALSA: hda/realtek - Add new codec supported for ALC287 (git-fixes).
- ALSA: hda/realtek: Add quirk for Samsung Notebook (git-fixes).
- ALSA: hda/realtek - Add supported new mute Led for HP (git-fixes).
- ALSA: hda/realtek - Enable headset mic of ASUS GL503VM with ALC295 (git-fixes).
- ALSA: hda/realtek - Enable headset mic of ASUS UX550GE with ALC295 (git-fixes).
- ALSA: hda/realtek: Enable headset mic of ASUS UX581LV with ALC295 (git-fixes).
- ALSA: hda/realtek - Enable the headset mic on Asus FX505DT (bsc#1051510).
- ALSA: hda/realtek - Fix S3 pop noise on Dell Wyse (git-fixes).
- ALSA: hda/realtek - Fix silent output on Gigabyte X570 Aorus Xtreme (bsc#1111666).
- ALSA: hda/realtek - Fix unexpected init_amp override (bsc#1051510).
- ALSA: hda/realtek - Limit int mic boost for Thinkpad T530 (git-fixes bsc#1171293).
- ALSA: hda/realtek - Two front mics on a Lenovo ThinkCenter (bsc#1051510).
- ALSA: hda: Release resources at error in delayed probe (bsc#1051510).
- ALSA: hda: Remove ASUS ROG Zenith from the blacklist (bsc#1051510).
- ALSA: hda: Skip controller resume if not needed (bsc#1051510).
- ALSA: hwdep: fix a left shifting 1 by 31 UB bug (git-fixes).
- ALSA: iec1712: Initialize STDSP24 properly when using the model=staudio option (git-fixes).
- ALSA: opti9xx: shut up gcc-10 range warning (bsc#1051510).
- ALSA: pcm: fix incorrect hw_base increase (git-fixes).
- ALSA: pcm: oss: Place the plugin buffer overflow checks correctly (bsc#1170522).
- ALSA: rawmidi: Fix racy buffer resize under concurrent accesses (git-fixes).
- ALSA: usb-audio: Add connector notifier delegation (bsc#1051510).
- ALSA: usb-audio: Add control message quirk delay for Kingston HyperX headset (git-fixes).
- ALSA: usb-audio: add mapping for ASRock TRX40 Creator (git-fixes).
- ALSA: usb-audio: Add mixer workaround for TRX40 and co (bsc#1051510).
- ALSA: usb-audio: Add quirk for Focusrite Scarlett 2i2 (bsc#1051510).
- ALSA: usb-audio: Add static mapping table for ALC1220-VB-based mobos (bsc#1051510).
- ALSA: usb-audio: Apply async workaround for Scarlett 2i4 2nd gen (bsc#1051510).
- ALSA: usb-audio: Check mapping at creating connector controls, too (bsc#1051510).
- ALSA: usb-audio: Correct a typo of NuPrime DAC-10 USB ID (bsc#1051510).
- ALSA: usb-audio: Do not create jack controls for PCM terminals (bsc#1051510).
- ALSA: usb-audio: Do not override ignore_ctl_error value from the map (bsc#1051510).
- ALSA: usb-audio: Filter error from connector kctl ops, too (bsc#1051510).
- ALSA: usb-audio: Fix usb audio refcnt leak when getting spdif (bsc#1051510).
- ALSA: usb-audio: mixer: volume quirk for ESS Technology Asus USB DAC (git-fixes).
- ALSA: usb-audio: Quirks for Gigabyte TRX40 Aorus Master onboard audio (git-fixes).
- ALSA: usx2y: Fix potential NULL dereference (bsc#1051510).
- ASoC: codecs: hdac_hdmi: Fix incorrect use of list_for_each_entry (bsc#1051510).
- ASoC: dapm: connect virtual mux with default value (bsc#1051510).
- ASoC: dapm: fixup dapm kcontrol widget (bsc#1051510).
- ASoC: dpcm: allow start or stop during pause for backend (bsc#1051510).
- ASoC: fix regwmask (bsc#1051510).
- ASoC: msm8916-wcd-digital: Reset RX interpolation path after use (bsc#1051510).
- ASoC: samsung: Prevent clk_get_rate() calls in atomic context (bsc#1111666).
- ASoC: topology: Check return value of pcm_new_ver (bsc#1051510).
- ASoC: topology: use name_prefix for new kcontrol (bsc#1051510).
- b43legacy: Fix case where channel status is corrupted (bsc#1051510).
- batman-adv: fix batadv_nc_random_weight_tq (git-fixes).
- batman-adv: Fix refcnt leak in batadv_show_throughput_override (git-fixes).
- batman-adv: Fix refcnt leak in batadv_store_throughput_override (git-fixes).
- batman-adv: Fix refcnt leak in batadv_v_ogm_process (git-fixes).
- bcache: avoid unnecessary btree nodes flushing in btree_flush_write() (git fixes (block drivers)).
- bcache: fix incorrect data type usage in btree_flush_write() (git fixes (block drivers)).
- bcache: Revert 'bcache: shrink btree node cache after bch_btree_check()' (git fixes (block drivers)).
- blk-mq: honor IO scheduler for multiqueue devices (bsc#1165478).
- blk-mq: simplify blk_mq_make_request() (bsc#1165478).
- block/drbd: delete invalid function drbd_md_mark_dirty_ (bsc#1171527).
- block: drbd: remove a stray unlock in __drbd_send_protocol() (bsc#1171599).
- block: fix busy device checking in blk_drop_partitions again (bsc#1171948).
- block: fix busy device checking in blk_drop_partitions (bsc#1171948).
- block: fix memleak of bio integrity data (git fixes (block drivers)).
- block: remove the bd_openers checks in blk_drop_partitions (bsc#1171948).
- bnxt_en: fix memory leaks in bnxt_dcbnl_ieee_getets() (networking-stable-20_03_28).
- bnxt_en: Reduce BNXT_MSIX_VEC_MAX value to supported CQs per PF (bsc#1104745).
- bnxt_en: reinitialize IRQs when MTU is modified (networking-stable-20_03_14).
- bnxt_en: Return error if bnxt_alloc_ctx_mem() fails (bsc#1104745 ).
- bnxt_en: Return error when allocating zero size context memory (bsc#1104745).
- bonding/alb: make sure arp header is pulled before accessing it (networking-stable-20_03_14).
- bpf: Fix sk_psock refcnt leak when receiving message (bsc#1083647).
- bpf: Forbid XADD on spilled pointers for unprivileged users (bsc#1083647).
- brcmfmac: abort and release host after error (bsc#1051510).
- btrfs: fix deadlock with memory reclaim during scrub (bsc#1172127).
- btrfs: fix log context list corruption after rename whiteout error (bsc#1172342).
- btrfs: fix partial loss of prealloc extent past i_size after fsync (bsc#1172343).
- btrfs: move the dio_sem higher up the callchain (bsc#1171761).
- btrfs: relocation: add error injection points for cancelling balance (bsc#1171417).
- btrfs: relocation: Check cancel request after each data page read (bsc#1171417).
- btrfs: relocation: Check cancel request after each extent found (bsc#1171417).
- btrfs: relocation: Clear the DEAD_RELOC_TREE bit for orphan roots to prevent runaway balance (bsc#1171417).
- btrfs: relocation: Fix reloc root leakage and the NULL pointer reference caused by the leakage (bsc#1171417).
- btrfs: relocation: Work around dead relocation stage loop (bsc#1171417).
- btrfs: reloc: clear DEAD_RELOC_TREE bit for orphan roots to prevent runaway balance (bsc#1171417 bsc#1160947 bsc#1172366).
- btrfs: reloc: fix reloc root leak and NULL pointer dereference (bsc#1171417 bsc#1160947 bsc#1172366).
- btrfs: setup a nofs context for memory allocation at btrfs_create_tree() (bsc#1172127).
- btrfs: setup a nofs context for memory allocation at __btrfs_set_acl (bsc#1172127).
- btrfs: use nofs context when initializing security xattrs to avoid deadlock (bsc#1172127).
- can: add missing attribute validation for termination (networking-stable-20_03_14).
- cdc-acm: close race betrween suspend() and acm_softint (git-fixes).
- cdc-acm: introduce a cool down (git-fixes).
- ceph: check if file lock exists before sending unlock request (bsc#1168789).
- ceph: demote quotarealm lookup warning to a debug message (bsc#1171692).
- ceph: fix double unlock in handle_cap_export() (bsc#1171694).
- ceph: fix double unlock in handle_cap_export() (bsc#1171694).
- ceph: fix endianness bug when handling MDS session feature bits (bsc#1171695).
- ceph: fix endianness bug when handling MDS session feature bits (bsc#1171695).
- cgroup, netclassid: periodically release file_lock on classid updating (networking-stable-20_03_14).
- CIFS: Allocate crypto structures on the fly for calculating signatures of incoming packets (bsc#1144333).
- CIFS: Allocate encryption header through kmalloc (bsc#1144333).
- CIFS: allow unlock flock and OFD lock across fork (bsc#1144333).
- CIFS: check new file size when extending file by fallocate (bsc#1144333).
- CIFS: cifspdu.h: Replace zero-length array with flexible-array member (bsc#1144333).
- CIFS: clear PF_MEMALLOC before exiting demultiplex thread (bsc#1144333).
- CIFS: do not share tcons with DFS (bsc#1144333).
- CIFS: dump the session id and keys also for SMB2 sessions (bsc#1144333).
- CIFS: ensure correct super block for DFS reconnect (bsc#1144333).
- CIFS: Fix bug which the return value by asynchronous read is error (bsc#1144333).
- CIFS: fix uninitialised lease_key in open_shroot() (bsc#1144333).
- CIFS: improve read performance for page size 64KB & cache=strict & vers=2.1+ (bsc#1144333).
- CIFS: Increment num_remote_opens stats counter even in case of smb2_query_dir_first (bsc#1144333).
- CIFS: minor update to comments around the cifs_tcp_ses_lock mutex (bsc#1144333).
- CIFS: protect updating server->dstaddr with a spinlock (bsc#1144333).
- CIFS: smb2pdu.h: Replace zero-length array with flexible-array member (bsc#1144333).
- CIFS: smbd: Calculate the correct maximum packet size for segmented SMBDirect send/receive (bsc#1144333).
- CIFS: smbd: Check and extend sender credits in interrupt context (bsc#1144333).
- CIFS: smbd: Check send queue size before posting a send (bsc#1144333).
- CIFS: smbd: Do not schedule work to send immediate packet on every receive (bsc#1144333).
- CIFS: smbd: Merge code to track pending packets (bsc#1144333).
- CIFS: smbd: Properly process errors on ib_post_send (bsc#1144333).
- CIFS: smbd: Update receive credits before sending and deal with credits roll back on failure before sending (bsc#1144333).
- CIFS: Warn less noisily on default mount (bsc#1144333).
- clk: Add clk_hw_unregister_composite helper function definition (bsc#1051510).
- clk: imx6ull: use OSC clock during AXI rate change (bsc#1051510).
- clk: imx: make mux parent strings const (bsc#1051510).
- clk: mediatek: correct the clocks for MT2701 HDMI PHY module (bsc#1051510).
- clk: sunxi-ng: a64: Fix gate bit of DSI DPHY (bsc#1051510).
- clocksource/drivers/hyper-v: Set TSC clocksource as default w/ InvariantTSC (bsc#1170620).
- clocksource/drivers/hyper-v: Set TSC clocksource as default w/ InvariantTSC (bsc#1170620, bsc#1170621).
- clocksource: dw_apb_timer_of: Fix missing clockevent timers (bsc#1051510).
- component: Silence bind error on -EPROBE_DEFER (bsc#1051510).
- coresight: do not use the BIT() macro in the UAPI header (git fixes (block drivers)).
- cpufreq: s3c64xx: Remove pointless NULL check in s3c64xx_cpufreq_driver_init (bsc#1051510).
- crypto: ccp - AES CFB mode is a stream cipher (git-fixes).
- crypto: ccp - Change a message to reflect status instead of failure (bsc#1172218).
- crypto: ccp - Clean up and exit correctly on allocation failure (git-fixes).
- crypto: ccp - Cleanup misc_dev on sev_exit() (bsc#1114279).
- crypto: ccp - Cleanup sp_dev_master in psp_dev_destroy() (bsc#1114279).
- cxgb4: fix MPS index overwrite when setting MAC address (bsc#1127355).
- cxgb4: fix Txq restart check during backpressure (bsc#1127354 bsc#1127371).
- debugfs: Add debugfs_create_xul() for hexadecimal unsigned long (git-fixes).
- debugfs_lookup(): switch to lookup_one_len_unlocked() (bsc#1171979).
- devlink: fix return value after hitting end in region read (bsc#1109837).
- devlink: validate length of param values (bsc#1109837).
- devlink: validate length of region addr/len (bsc#1109837).
- dmaengine: dmatest: Fix iteration non-stop logic (bsc#1051510).
- dm mpath: switch paths in dm_blk_ioctl() code path (bsc#1167574).
- dm-raid1: fix invalid return value from dm_mirror (bsc#1172378).
- dm writecache: fix data corruption when reloading the target (git fixes (block drivers)).
- dm writecache: fix incorrect flush sequence when doing SSD mode commit (git fixes (block drivers)).
- dm writecache: verify watermark during resume (git fixes (block drivers)).
- dm zoned: fix invalid memory access (git fixes (block drivers)).
- dm zoned: reduce overhead of backing device checks (git fixes (block drivers)).
- dm zoned: remove duplicate nr_rnd_zones increase in dmz_init_zone() (git fixes (block drivers)).
- dm zoned: support zone sizes smaller than 128MiB (git fixes (block drivers)).
- dp83640: reverse arguments to list_add_tail (git-fixes).
- Drivers: hv: Add a module description line to the hv_vmbus driver (bsc#1172249, bsc#1172251).
- Drivers: hv: Add a module description line to the hv_vmbus driver (bsc#1172253).
- Drivers: HV: Send one page worth of kmsg dump over Hyper-V during panic (bsc#1170618).
- Drivers: hv: vmbus: Fix the issue with freeing up hv_ctl_table_hdr (bsc#1170618).
- Drivers: hv: vmbus: Get rid of MSR access from vmbus_drv.c (bsc#1170618).
- Drivers: hv: vmus: Fix the check for return value from kmsg get dump buffer (bsc#1170618).
- drivers/net/ibmvnic: Update VNIC protocol version reporting (bsc#1065729).
- Drivers: w1: add hwmon support structures (jsc#SLE-11048).
- Drivers: w1: add hwmon temp support for w1_therm (jsc#SLE-11048).
- Drivers: w1: refactor w1_slave_show to make the temp reading functionality separate (jsc#SLE-11048).
- drm: amd/acp: fix broken menu structure (bsc#1114279) * context changes
- drm/amdgpu: Correctly initialize thermal controller for GPUs with Powerplay table v0 (e.g Hawaii) (bsc#1111666).
- drm/amdgpu: Fix oops when pp_funcs is unset in ACPI event (bsc#1111666).
- drm/amd/powerplay: force the trim of the mclk dpm_levels if OD is (bsc#1113956)
- drm/atomic: Take the atomic toys away from X (bsc#1112178) * context changes
- drm/crc: Actually allow to change the crc source (bsc#1114279) * offset changes
- drm/dp_mst: Fix clearing payload state on topology disable (bsc#1051510).
- drm/dp_mst: Reformat drm_dp_check_act_status() a bit (bsc#1051510).
- drm/edid: Fix off-by-one in DispID DTD pixel clock (bsc#1114279)
- drm/etnaviv: fix perfmon domain interation (bsc#1113956)
- drm/etnaviv: rework perfmon query infrastructure (bsc#1112178)
- drm/i915: Apply Wa_1406680159:icl,ehl as an engine workaround (bsc#1112178) * rename gt/intel_workarounds.c to intel_workarounds.c * context changes
- drm/i915/gvt: Init DPLL/DDI vreg for virtual display instead of (bsc#1114279)
- drm/i915: HDCP: fix Ri prime check done during link check (bsc#1112178) * rename display/intel_hdmi.c to intel_hdmi.c * context changes
- drm/i915: properly sanity check batch_start_offset (bsc#1114279) * renamed display/intel_fbc.c -> intel_fb.c * renamed gt/intel_rc6.c -> intel_pm.c * context changes
- drm/meson: Delete an error message in meson_dw_hdmi_bind() (bsc#1051510).
- drm: NULL pointer dereference [null-pointer-deref] (CWE 476) problem (bsc#1114279)
- drm/qxl: qxl_release leak in qxl_draw_dirty_fb() (bsc#1051510).
- drm/qxl: qxl_release leak in qxl_hw_surface_alloc() (bsc#1051510).
- drm/qxl: qxl_release use after free (bsc#1051510).
- drm: Remove PageReserved manipulation from drm_pci_alloc (bsc#1114279) * offset changes
- drm/sun4i: dsi: Allow binding the host without a panel (bsc#1113956)
- drm/sun4i: dsi: Avoid hotplug race with DRM driver bind (bsc#1113956)
- drm/sun4i: dsi: Remove incorrect use of runtime PM (bsc#1113956) * context changes
- drm/sun4i: dsi: Remove unused drv from driver context (bsc#1113956) * context changes * keep include of sun4i_drv.h
- dump_stack: avoid the livelock of the dump_lock (git fixes (block drivers)).
- EDAC/amd64: Add family ops for Family 19h Models 00h-0Fh (jsc#SLE-11833).
- EDAC/amd64: Drop some family checks for newer systems (jsc#SLE-11833).
- EDAC/mce_amd: Always load on SMCA systems (jsc#SLE-11833).
- EDAC/mce_amd: Make fam_ops static global (jsc#SLE-11833).
- EDAC, sb_edac: Add support for systems with segmented PCI buses (bsc#1169525).
- ext4: do not zeroout extents beyond i_disksize (bsc#1167851).
- ext4: fix extent_status fragmentation for plain files (bsc#1171949).
- ext4: use non-movable memory for superblock readahead (bsc#1171952).
- fanotify: fix merging marks masks with FAN_ONDIR (bsc#1171679).
- fbcon: fix null-ptr-deref in fbcon_switch (bsc#1114279) * rename drivers/video/fbdev/core to drivers/video/console * context changes
- fib: add missing attribute validation for tun_id (networking-stable-20_03_14).
- firmware: qcom: scm: fix compilation error when disabled (bsc#1051510).
- Fix a backport bug, where btrfs_put_root() -> btrfs_put_fs_root() modification is not needed due to missing dependency
- fs/cifs: fix gcc warning in sid_to_id (bsc#1144333).
- fs/seq_file.c: simplify seq_file iteration code and interface (bsc#1170125).
- gpio: tegra: mask GPIO IRQs during IRQ shutdown (bsc#1051510).
- gre: fix uninit-value in __iptunnel_pull_header (networking-stable-20_03_14).
- HID: hid-input: clear unmapped usages (git-fixes).
- HID: hyperv: Add a module description line (bsc#1172249, bsc#1172251).
- HID: hyperv: Add a module description line (bsc#1172253).
- HID: i2c-hid: add Trekstor Primebook C11B to descriptor override (git-fixes).
- HID: i2c-hid: override HID descriptors for certain devices (git-fixes).
- HID: multitouch: add eGalaxTouch P80H84 support (bsc#1051510).
- HID: wacom: Read HID_DG_CONTACTMAX directly for non-generic devices (git-fixes).
- hrtimer: Annotate lockless access to timer->state (git fixes (block drivers)).
- hsr: add restart routine into hsr_get_node_list() (networking-stable-20_03_28).
- hsr: check protocol version in hsr_newlink() (networking-stable-20_04_17).
- hsr: fix general protection fault in hsr_addr_is_self() (networking-stable-20_03_28).
- hsr: set .netnsok flag (networking-stable-20_03_28).
- hsr: use rcu_read_lock() in hsr_get_node_{list/status}() (networking-stable-20_03_28).
- i2c: acpi: Force bus speed to 400KHz if a Silead touchscreen is present (git-fixes).
- i2c: acpi: put device when verifying client fails (git-fixes).
- i2c: brcmstb: remove unused struct member (git-fixes).
- i2c: core: Allow empty id_table in ACPI case as well (git-fixes).
- i2c: core: decrease reference count of device node in i2c_unregister_device (git-fixes).
- i2c: dev: Fix the race between the release of i2c_dev and cdev (bsc#1051510).
- i2c: fix missing pm_runtime_put_sync in i2c_device_probe (git-fixes).
- i2c-hid: properly terminate i2c_hid_dmi_desc_override_table array (git-fixes).
- i2c: i801: Do not add ICH_RES_IO_SMI for the iTCO_wdt device (git-fixes).
- i2c: iproc: Stop advertising support of SMBUS quick cmd (git-fixes).
- i2c: isch: Remove unnecessary acpi.h include (git-fixes).
- i2c: mux: demux-pinctrl: Fix an error handling path in 'i2c_demux_pinctrl_probe()' (bsc#1051510).
- i2c: st: fix missing struct parameter description (bsc#1051510).
- IB/ipoib: Add child to parent list only if device initialized (bsc#1168503).
- IB/ipoib: Consolidate checking of the proposed child interface (bsc#1168503).
- IB/ipoib: Do not remove child devices from within the ndo_uninit (bsc#1168503).
- IB/ipoib: Get rid of IPOIB_FLAG_GOING_DOWN (bsc#1168503).
- IB/ipoib: Get rid of the sysfs_mutex (bsc#1168503).
- IB/ipoib: Maintain the child_intfs list from ndo_init/uninit (bsc#1168503).
- IB/ipoib: Move all uninit code into ndo_uninit (bsc#1168503).
- IB/ipoib: Move init code to ndo_init (bsc#1168503).
- IB/ipoib: Replace printk with pr_warn (bsc#1168503).
- IB/ipoib: Use cancel_delayed_work_sync for neigh-clean task (bsc#1168503).
- IB/ipoib: Warn when one port fails to initialize (bsc#1168503).
- IB/mlx5: Fix missing congestion control debugfs on rep rdma device (bsc#1103991).
- ibmvnic: Skip fatal error reset after passive init (bsc#1171078 ltc#184239).
- iio:ad7797: Use correct attribute_group (bsc#1051510).
- iio: adc: stm32-adc: fix device used to request dma (bsc#1051510).
- iio: adc: stm32-adc: fix sleep in atomic context (git-fixes).
- iio: adc: stm32-adc: Use dma_request_chan() instead dma_request_slave_channel() (bsc#1051510).
- iio: dac: vf610: Fix an error handling path in 'vf610_dac_probe()' (bsc#1051510).
- iio: sca3000: Remove an erroneous 'get_device()' (bsc#1051510).
- iio: xilinx-xadc: Fix ADC-B powerdown (bsc#1051510).
- iio: xilinx-xadc: Fix clearing interrupt when enabling trigger (bsc#1051510).
- iio: xilinx-xadc: Fix sequencer configuration for aux channels in simultaneous mode (bsc#1051510).
- ima: Fix return value of ima_write_policy() (git-fixes).
- Input: evdev - call input_flush_device() on release(), not flush() (bsc#1051510).
- Input: hyperv-keyboard - add module description (bsc#1172249, bsc#1172251).
- Input: hyperv-keyboard - add module description (bsc#1172253).
- Input: i8042 - add Acer Aspire 5738z to nomux list (bsc#1051510).
- Input: i8042 - add ThinkPad S230u to i8042 reset list (bsc#1051510).
- Input: raydium_i2c_ts - use true and false for boolean values (bsc#1051510).
- Input: synaptics-rmi4 - fix error return code in rmi_driver_probe() (bsc#1051510).
- Input: synaptics-rmi4 - really fix attn_data use-after-free (git-fixes).
- Input: usbtouchscreen - add support for BonXeon TP (bsc#1051510).
- Input: xpad - add custom init packet for Xbox One S controllers (bsc#1051510).
- iommu/amd: Call domain_flush_complete() in update_domain() (bsc#1172096).
- iommu/amd: Do not flush Device Table in iommu_map_page() (bsc#1172097).
- iommu/amd: Do not loop forever when trying to increase address space (bsc#1172098).
- iommu/amd: Fix legacy interrupt remapping for x2APIC-enabled system (bsc#1172099).
- iommu/amd: Fix over-read of ACPI UID from IVRS table (bsc#1172101).
- iommu/amd: Fix race in increase_address_space()/fetch_pte() (bsc#1172102).
- iommu/amd: Update Device Table in increase_address_space() (bsc#1172103).
- iommu: Fix reference count leak in iommu_group_alloc (bsc#1172397).
- ip6_tunnel: Allow rcv/xmit even if remote address is a local address (bsc#1166978).
- ipmi: fix hung processes in __get_guid() (git-fixes).
- ipv4: fix a RCU-list lock in fib_triestat_seq_show (networking-stable-20_04_02).
- ipv6/addrconf: call ipv6_mc_up() for non-Ethernet interface (networking-stable-20_03_14).
- ipv6: do not auto-add link-local address to lag ports (networking-stable-20_04_09).
- ipv6: fix IPV6_ADDRFORM operation logic (bsc#1171662).
- ipv6: Fix nlmsg_flags when splitting a multipath route (networking-stable-20_03_01).
- ipv6: fix restrict IPV6_ADDRFORM operation (bsc#1171662).
- ipv6: Fix route replacement with dev-only route (networking-stable-20_03_01).
- ipvlan: add cond_resched_rcu() while processing muticast backlog (networking-stable-20_03_14).
- ipvlan: do not deref eth hdr before checking it's set (networking-stable-20_03_14).
- ipvlan: do not use cond_resched_rcu() in ipvlan_process_multicast() (networking-stable-20_03_14).
- iwlwifi: pcie: actually release queue memory in TVQM (bsc#1051510).
- ixgbe: do not check firmware errors (bsc#1170284).
- kabi fix for early XHCI debug (git-fixes).
- kabi for for md: improve handling of bio with REQ_PREFLUSH in md_flush_request() (git-fixes).
- kabi, protect struct ib_device (bsc#1168503).
- kabi/severities: Do not track KVM internal symbols.
- kabi/severities: Ingnore get_dev_data() The function is internal to the AMD IOMMU driver and must not be called by any third party.
- kabi workaround for snd_rawmidi buffer_ref field addition (git-fixes).
- KEYS: reaching the keys quotas correctly (bsc#1051510).
- KVM: arm64: Change hyp_panic()s dependency on tpidr_el2 (bsc#1133021).
- KVM: arm64: Stop save/restoring host tpidr_el1 on VHE (bsc#1133021).
- KVM: Check validity of resolved slot when searching memslots (bsc#1172104).
- KVM: s390: vsie: Fix delivery of addressing exceptions (git-fixes).
- KVM: s390: vsie: Fix possible race when shadowing region 3 tables (git-fixes).
- KVM: s390: vsie: Fix region 1 ASCE sanity shadow address checks (git-fixes).
- KVM: SVM: Fix potential memory leak in svm_cpu_init() (bsc#1171736).
- KVM x86: Extend AMD specific guest behavior to Hygon virtual CPUs (bsc#1152489).
- l2tp: Allow management of tunnels and session in user namespace (networking-stable-20_04_17).
- libata: Remove extra scsi_host_put() in ata_scsi_add_hosts() (bsc#1051510).
- libata: Return correct status in sata_pmp_eh_recover_pm() when ATA_DFLAG_DETACH is set (bsc#1051510).
- lib: raid6: fix awk build warnings (git fixes (block drivers)).
- lib/raid6/test: fix build on distros whose /bin/sh is not bash (git fixes (block drivers)).
- lib/stackdepot.c: fix global out-of-bounds in stack_slabs (git fixes (block drivers)).
- locks: print unsigned ino in /proc/locks (bsc#1171951).
- mac80211: add ieee80211_is_any_nullfunc() (bsc#1051510).
- mac80211_hwsim: Use kstrndup() in place of kasprintf() (bsc#1051510).
- mac80211: mesh: fix discovery timer re-arming issue / crash (bsc#1051510).
- macsec: avoid to set wrong mtu (bsc#1051510).
- macsec: restrict to ethernet devices (networking-stable-20_03_28).
- macvlan: add cond_resched() during multicast processing (networking-stable-20_03_14).
- macvlan: fix null dereference in macvlan_device_event() (bsc#1051510).
- make some Fujitsu systems run (bsc#1141558).
- md: improve handling of bio with REQ_PREFLUSH in md_flush_request() (git-fixes).
- md/raid0: Fix an error message in raid0_make_request() (git fixes (block drivers)).
- md/raid10: prevent access of uninitialized resync_pages offset (git-fixes).
- media: dvb: return -EREMOTEIO on i2c transfer failure (bsc#1051510).
- media: platform: fcp: Set appropriate DMA parameters (bsc#1051510).
- media: ti-vpe: cal: fix disable_irqs to only the intended target (git-fixes).
- mei: release me_cl object reference (bsc#1051510).
- mlxsw: Fix some IS_ERR() vs NULL bugs (networking-stable-20_04_27).
- mlxsw: spectrum_flower: Do not stop at FLOW_ACTION_VLAN_MANGLE (networking-stable-20_04_09).
- mlxsw: spectrum_mr: Fix list iteration in error path (bsc#1112374).
- mmc: atmel-mci: Fix debugfs on 64-bit platforms (git-fixes).
- mmc: core: Check request type before completing the request (git-fixes).
- mmc: core: Fix recursive locking issue in CQE recovery path (git-fixes).
- mmc: cqhci: Avoid false 'cqhci: CQE stuck on' by not open-coding timeout loop (git-fixes).
- mmc: dw_mmc: Fix debugfs on 64-bit platforms (git-fixes).
- mmc: meson-gx: make sure the descriptor is stopped on errors (git-fixes).
- mmc: meson-gx: simplify interrupt handler (git-fixes).
- mmc: renesas_sdhi: limit block count to 16 bit for old revisions (git-fixes).
- mmc: sdhci-esdhc-imx: fix the mask for tuning start point (bsc#1051510).
- mmc: sdhci-msm: Clear tuning done flag while hs400 tuning (bsc#1051510).
- mmc: sdhci-of-at91: fix memleak on clk_get failure (git-fixes).
- mmc: sdhci-pci: Fix eMMC driver strength for BYT-based controllers (bsc#1051510).
- mmc: sdhci-xenon: fix annoying 1.8V regulator warning (bsc#1051510).
- mmc: sdio: Fix potential NULL pointer error in mmc_sdio_init_card() (bsc#1051510).
- mmc: tmio: fix access width of Block Count Register (git-fixes).
- mm: limit boost_watermark on small zones (git fixes (mm/pgalloc)).
- mm: thp: handle page cache THP correctly in PageTransCompoundMap (git fixes (block drivers)).
- mtd: cfi: fix deadloop in cfi_cmdset_0002.c do_write_buffer (bsc#1051510).
- mtd: spi-nor: cadence-quadspi: add a delay in write sequence (git-fixes).
- mtd: spi-nor: enable 4B opcodes for mx66l51235l (git-fixes).
- mtd: spi-nor: fsl-quadspi: Do not let -EINVAL on the bus (git-fixes).
- mwifiex: avoid -Wstringop-overflow warning (bsc#1051510).
- mwifiex: Fix memory corruption in dump_station (bsc#1051510).
- net: bcmgenet: correct per TX/RX ring statistics (networking-stable-20_04_27).
- net: dsa: b53: Fix ARL register definitions (networking-stable-20_04_27).
- net: dsa: b53: Rework ARL bin logic (networking-stable-20_04_27).
- net: dsa: bcm_sf2: Do not register slave MDIO bus with OF (networking-stable-20_04_09).
- net: dsa: bcm_sf2: Ensure correct sub-node is parsed (networking-stable-20_04_09).
- net: dsa: bcm_sf2: Fix overflow checks (git-fixes).
- net: dsa: Fix duplicate frames flooded by learning (networking-stable-20_03_28).
- net: dsa: mv88e6xxx: fix lockup on warm boot (networking-stable-20_03_14).
- net/ethernet: add Google GVE driver (jsc#SLE-10538)
- net: fec: add phy_reset_after_clk_enable() support (git-fixes).
- net: fec: validate the new settings in fec_enet_set_coalesce() (networking-stable-20_03_14).
- net: fib_rules: Correctly set table field when table number exceeds 8 bits (networking-stable-20_03_01).
- net: fix race condition in __inet_lookup_established() (bsc#1151794).
- net: fq: add missing attribute validation for orphan mask (networking-stable-20_03_14).
- net: hns3: fix 'tc qdisc del' failed issue (bsc#1109837).
- net, ip_tunnel: fix interface lookup with no key (networking-stable-20_04_02).
- net: ipv4: devinet: Fix crash when add/del multicast IP with autojoin (networking-stable-20_04_17).
- net: ipv6: do not consider routes via gateways for anycast address check (networking-stable-20_04_17).
- netlink: Use netlink header as base to calculate bad attribute offset (networking-stable-20_03_14).
- net: macsec: update SCI upon MAC address change (networking-stable-20_03_14).
- net: memcg: fix lockdep splat in inet_csk_accept() (networking-stable-20_03_14).
- net: memcg: late association of sock to memcg (networking-stable-20_03_14).
- net/mlx4_en: avoid indirect call in TX completion (networking-stable-20_04_27).
- net/mlx5: Add new fields to Port Type and Speed register (bsc#1171118).
- net/mlx5: Add new fields to Port Type and Speed register (bsc#1171118).
- net/mlx5: Add RoCE RX ICRC encapsulated counter (bsc#1171118).
- net/mlx5e: Fix ethtool self test: link speed (bsc#1171118).
- net/mlx5e: Move port speed code from en_ethtool.c to en/port.c (bsc#1171118).
- net/mlx5: Expose link speed directly (bsc#1171118).
- net/mlx5: Expose link speed directly (bsc#1171118).
- net/mlx5: Expose port speed when possible (bsc#1171118).
- net/mlx5: Expose port speed when possible (bsc#1171118).
- net/mlx5: Fix failing fw tracer allocation on s390 (bsc#1103990 ).
- net: mvneta: Fix the case where the last poll did not process all rx (networking-stable-20_03_28).
- net: netrom: Fix potential nr_neigh refcnt leak in nr_add_node (networking-stable-20_04_27).
- net/packet: tpacket_rcv: do not increment ring index on drop (networking-stable-20_03_14).
- net: phy: restore mdio regs in the iproc mdio driver (networking-stable-20_03_01).
- net: qmi_wwan: add support for ASKEY WWHC050 (networking-stable-20_03_28).
- net: revert default NAPI poll timeout to 2 jiffies (networking-stable-20_04_17).
- net_sched: cls_route: remove the right filter from hashtable (networking-stable-20_03_28).
- net_sched: sch_skbprio: add message validation to skbprio_change() (bsc#1109837).
- net/x25: Fix x25_neigh refcnt leak when receiving frame (networking-stable-20_04_27).
- nfc: add missing attribute validation for SE API (networking-stable-20_03_14).
- nfc: add missing attribute validation for vendor subcommand (networking-stable-20_03_14).
- nfc: pn544: Fix occasional HW initialization failure (networking-stable-20_03_01).
- nfc: st21nfca: add missed kfree_skb() in an error path (bsc#1051510).
- nfp: abm: fix a memory leak bug (bsc#1109837).
- nfsd4: fix up replay_matches_cache() (git-fixes).
- nfsd: Ensure CLONE persists data and metadata changes to the target file (git-fixes).
- nfsd: fix delay timer on 32-bit architectures (git-fixes).
- nfsd: fix jiffies/time_t mixup in LRU list (git-fixes).
- nfs: Directory page cache pages need to be locked when read (git-fixes).
- nfsd: memory corruption in nfsd4_lock() (git-fixes).
- nfs: Do not call generic_error_remove_page() while holding locks (bsc#1170457).
- nfs: Fix memory leaks and corruption in readdir (git-fixes).
- nfs: Fix O_DIRECT accounting of number of bytes read/written (git-fixes).
- nfs: Fix potential posix_acl refcnt leak in nfs3_set_acl (git-fixes).
- nfs: fix racey wait in nfs_set_open_stateid_locked (bsc#1170592).
- nfs/flexfiles: Use the correct TCP timeout for flexfiles I/O (git-fixes).
- nfs/pnfs: Fix pnfs_generic_prepare_to_resend_writes() (git-fixes).
- nfs: Revalidate the file size on a fatal write error (git-fixes).
- NFSv4.0: nfs4_do_fsinfo() should not do implicit lease renewals (git-fixes).
- NFSv4: Do not allow a cached open with a revoked delegation (git-fixes).
- NFSv4: Fix leak of clp->cl_acceptor string (git-fixes).
- NFSv4/pnfs: Return valid stateids in nfs_layout_find_inode_by_stateid() (git-fixes).
- NFSv4: try lease recovery on NFS4ERR_EXPIRED (git-fixes).
- NFSv4.x: Drop the slot if nfs4_delegreturn_prepare waits for layoutreturn (git-fixes).
- nl802154: add missing attribute validation for dev_type (networking-stable-20_03_14).
- nl802154: add missing attribute validation (networking-stable-20_03_14).
- nvme-fc: print proper nvme-fc devloss_tmo value (bsc#1172391).
- objtool: Fix stack offset tracking for indirect CFAs (bsc#1169514).
- objtool: Fix switch table detection in .text.unlikely (bsc#1169514).
- objtool: Make BP scratch register warning more robust (bsc#1169514).
- padata: Remove broken queue flushing (git-fixes).
- Partially revert 'kfifo: fix kfifo_alloc() and kfifo_init()' (git fixes (block drivers)).
- PCI: hv: Add support for protocol 1.3 and support PCI_BUS_RELATIONS2 (bsc#1172201, bsc#1172202).
- PCI: hv: Decouple the func definition in hv_dr_state from VSP message (bsc#1172201, bsc#1172202).
- PCI: sanity test on PCI vendor to be sure we do not touch everything (bsc#1141558).
- perf/x86/amd: Add support for Large Increment per Cycle Events (jsc#SLE-11831).
- perf/x86/amd: Constrain Large Increment per Cycle events (jsc#SLE-11831).
- pinctrl: baytrail: Enable pin configuration setting for GPIO chip (git-fixes).
- pinctrl: cherryview: Add missing spinlock usage in chv_gpio_irq_handler (git-fixes).
- pinctrl: sunrisepoint: Fix PAD lock register offset for SPT-H (git-fixes).
- platform/x86: asus-nb-wmi: Do not load on Asus T100TA and T200TA (bsc#1051510).
- pNFS: Ensure we do clear the return-on-close layout stateid on fatal errors (git-fixes).
- powerpc: Add attributes for setjmp/longjmp (bsc#1065729).
- powerpc/pci/of: Parse unassigned resources (bsc#1065729).
- powerpc/setup_64: Set cache-line-size based on cache-block-size (bsc#1065729).
- powerpc/sstep: Fix DS operand in ld encoding to appropriate value (bsc#1065729).
- qede: Fix race between rdma destroy workqueue and link change event (networking-stable-20_03_01).
- r8152: check disconnect status after long sleep (networking-stable-20_03_14).
- raid6/ppc: Fix build for clang (git fixes (block drivers)).
- random: always use batched entropy for get_random_u{32,64} (bsc#1164871).
- rcu: locking and unlocking need to always be at least barriers (git fixes (block drivers)).
- RDMA/ipoib: Fix use of sizeof() (bsc#1168503).
- RDMA/netdev: Fix netlink support in IPoIB (bsc#1168503).
- RDMA/netdev: Hoist alloc_netdev_mqs out of the driver (bsc#1168503).
- RDMA/netdev: Use priv_destructor for netdev cleanup (bsc#1168503).
- Remove 2 git-fixes that cause build issues. (bsc#1171691)
- Revert 'drm/panel: simple: Add support for Sharp LQ150X1LG11 panels' (bsc#1114279)
- Revert 'ipc,sem: remove uneeded sem_undo_list lock usage in exit_sem()' (bsc#1172221).
- Revert 'RDMA/cma: Simplify rdma_resolve_addr() error flow' (bsc#1103992).
- rtlwifi: Fix a double free in _rtl_usb_tx_urb_setup() (bsc#1051510).
- s390/cpum_cf: Add new extended counters for IBM z15 (bsc#1169762 LTC#185291).
- s390/pci: Fix possible deadlock in recover_store() (bsc#1165183 LTC#184103).
- s390/pci: Recover handle in clp_set_pci_fn() (bsc#1165183 LTC#184103).
- scripts/decodecode: fix trapping instruction formatting (bsc#1065729).
- scripts/dtc: Remove redundant YYLOC global declaration (bsc#1160388).
- scsi: bnx2i: fix potential use after free (bsc#1171600).
- scsi: core: Handle drivers which set sg_tablesize to zero (bsc#1171601)
- scsi: core: save/restore command resid for error handling (bsc#1171602).
- scsi: core: scsi_trace: Use get_unaligned_be*() (bsc#1171604).
- scsi: core: try to get module before removing device (bsc#1171605).
- scsi: csiostor: Adjust indentation in csio_device_reset (bsc#1171606).
- scsi: csiostor: Do not enable IRQs too early (bsc#1171607).
- scsi: esas2r: unlock on error in esas2r_nvram_read_direct() (bsc#1171608).
- scsi: fnic: fix invalid stack access (bsc#1171609).
- scsi: fnic: fix msix interrupt allocation (bsc#1171610).
- scsi: ibmvscsi: Fix WARN_ON during event pool release (bsc#1170791 ltc#185128).
- scsi: iscsi: Avoid potential deadlock in iscsi_if_rx func (bsc#1171611).
- scsi: iscsi: Fix a potential deadlock in the timeout handler (bsc#1171612).
- scsi: iscsi: qla4xxx: fix double free in probe (bsc#1171613).
- scsi: lpfc: Change default queue allocation for reduced memory consumption (bsc#1164780).
- scsi: lpfc: fix: Coverity: lpfc_cmpl_els_rsp(): Null pointer dereferences (bsc#1171614).
- scsi: lpfc: Fix crash in target side cable pulls hitting WAIT_FOR_UNREG (bsc#1171615).
- scsi: lpfc: Fix lpfc_nodelist leak when processing unsolicited event (bsc#1164780).
- scsi: lpfc: Fix MDS Diagnostic Enablement definition (bsc#1164780).
- scsi: lpfc: Fix negation of else clause in lpfc_prep_node_fc4type (bsc#1164780).
- scsi: lpfc: Fix noderef and address space warnings (bsc#1164780).
- scsi: lpfc: Maintain atomic consistency of queue_claimed flag (bsc#1164780).
- scsi: lpfc: remove duplicate unloading checks (bsc#1164780).
- scsi: lpfc: Remove re-binding of nvme rport during registration (bsc#1164780).
- scsi: lpfc: Remove redundant initialization to variable rc (bsc#1164780).
- scsi: lpfc: Remove unnecessary lockdep_assert_held calls (bsc#1164780).
- scsi: lpfc: Update lpfc version to 12.8.0.1 (bsc#1164780).
- scsi: megaraid_sas: Do not initiate OCR if controller is not in ready state (bsc#1171616).
- scsi: qla2xxx: add ring buffer for tracing debug logs (bsc#1157169).
- scsi: qla2xxx: check UNLOADING before posting async work (bsc#1157169).
- scsi: qla2xxx: Delete all sessions before unregister local nvme port (bsc#1157169).
- scsi: qla2xxx: Do not log message when reading port speed via sysfs (bsc#1157169).
- scsi: qla2xxx: Fix hang when issuing nvme disconnect-all in NPIV (bsc#1157169).
- scsi: qla2xxx: Fix regression warnings (bsc#1157169).
- scsi: qla2xxx: Remove non functional code (bsc#1157169).
- scsi: qla2xxx: set UNLOADING before waiting for session deletion (bsc#1157169).
- scsi: qla4xxx: Adjust indentation in qla4xxx_mem_free (bsc#1171617).
- scsi: qla4xxx: fix double free bug (bsc#1171618).
- scsi: sd: Clear sdkp->protection_type if disk is reformatted without PI (bsc#1171619).
- scsi: sg: add sg_remove_request in sg_common_write (bsc#1171620).
- scsi: tracing: Fix handling of TRANSFER LENGTH == 0 for READ(6) and WRITE(6) (bsc#1171621).
- scsi: ufs: change msleep to usleep_range (bsc#1171622).
- scsi: ufs: Clean up ufshcd_scale_clks() and clock scaling error out path (bsc#1171623).
- scsi: ufs: Fix ufshcd_hold() caused scheduling while atomic (bsc#1171624).
- scsi: ufs: Fix ufshcd_probe_hba() reture value in case ufshcd_scsi_add_wlus() fails (bsc#1171625).
- scsi: ufs: Recheck bkops level if bkops is disabled (bsc#1171626).
- sctp: fix possibly using a bad saddr with a given dst (networking-stable-20_04_02).
- sctp: fix refcount bug in sctp_wfree (networking-stable-20_04_02).
- sctp: move the format error check out of __sctp_sf_do_9_1_abort (networking-stable-20_03_01).
- selftests/powerpc: Fix build errors in powerpc ptrace selftests (boo#1124278).
- seq_file: fix problem when seeking mid-record (bsc#1170125).
- sfc: detach from cb_page in efx_copy_channel() (networking-stable-20_03_14).
- signal/pid_namespace: Fix reboot_pid_ns to use send_sig not force_sig (bsc#1172185).
- slcan: not call free_netdev before rtnl_unlock in slcan_open (networking-stable-20_03_28).
- slip: make slhc_compress() more robust against malicious packets (networking-stable-20_03_14).
- smb3: Additional compression structures (bsc#1144333).
- smb3: Add new compression flags (bsc#1144333).
- smb3: change noisy error message to FYI (bsc#1144333).
- smb3: enable swap on SMB3 mounts (bsc#1144333).
- smb3: Minor cleanup of protocol definitions (bsc#1144333).
- smb3: remove overly noisy debug line in signing errors (bsc#1144333).
- smb3: smbdirect support can be configured by default (bsc#1144333).
- smb3: use SMB2_SIGNATURE_SIZE define (bsc#1144333).
- spi: bcm63xx-hsspi: Really keep pll clk enabled (bsc#1051510).
- spi: bcm-qspi: when tx/rx buffer is NULL set to 0 (bsc#1051510).
- spi: dw: Add SPI Rx-done wait method to DMA-based transfer (bsc#1051510).
- spi: dw: Add SPI Tx-done wait method to DMA-based transfer (bsc#1051510).
- spi: dw: Zero DMA Tx and Rx configurations on stack (bsc#1051510).
- spi: pxa2xx: Add CS control clock quirk (bsc#1051510).
- spi: qup: call spi_qup_pm_resume_runtime before suspending (bsc#1051510).
- spi/zynqmp: remove entry that causes a cs glitch (bsc#1051510).
- staging: comedi: dt2815: fix writing hi byte of analog output (bsc#1051510).
- staging: comedi: Fix comedi_device refcnt leak in comedi_open (bsc#1051510).
- staging: iio: ad2s1210: Fix SPI reading (bsc#1051510).
- supported.conf: Add br_netfilter to base (bsc#1169020).
- supported.conf: support w1 core and thermometer support
- svcrdma: Fix double svc_rdma_send_ctxt_put() in an error path (bsc#1103992).
- svcrdma: Fix leak of transport addresses (git-fixes).
- svcrdma: Fix trace point use-after-free race (bsc#1103992 ).
- taskstats: fix data-race (bsc#1172188).
- tcp: cache line align MAX_TCP_HEADER (networking-stable-20_04_27).
- tcp: repair: fix TCP_QUEUE_SEQ implementation (networking-stable-20_03_28).
- team: add missing attribute validation for array index (networking-stable-20_03_14).
- team: add missing attribute validation for port ifindex (networking-stable-20_03_14).
- team: fix hang in team_mode_get() (networking-stable-20_04_27).
- tpm: ibmvtpm: retry on H_CLOSED in tpm_ibmvtpm_send() (bsc#1065729).
- tpm/tpm_tis: Free IRQ if probing fails (bsc#1082555).
- tun: Do not put_page() for all negative return values from XDP program (bsc#1109837).
- Update config files: Build w1 bus on arm64 (jsc#SLE-11048)
- usb: core: Fix misleading driver bug report (bsc#1051510).
- usb: gadget: legacy: fix redundant initialization warnings (bsc#1051510).
- usbnet: silence an unnecessary warning (bsc#1170770).
- video: fbdev: sis: Remove unnecessary parentheses and commented code (bsc#1114279)
- video: fbdev: w100fb: Fix a potential double free (bsc#1051510).
- vrf: Check skb for XFRM_TRANSFORMED flag (networking-stable-20_04_27).
- vxlan: check return value of gro_cells_init() (networking-stable-20_03_28).
- w1: Add subsystem kernel public interface (jsc#SLE-11048).
- w1: Fix slave count on 1-Wire bus (resend) (jsc#SLE-11048).
- w1: keep balance of mutex locks and refcnts (jsc#SLE-11048).
- w1: use put_device() if device_register() fail (jsc#SLE-11048).
- wcn36xx: Fix error handling path in 'wcn36xx_probe()' (bsc#1051510).
- wimax/i2400m: Fix potential urb refcnt leak (bsc#1051510).
- workqueue: do not use wq_select_unbound_cpu() for bound works (bsc#1172130).
- x86/amd_nb: Add Family 19h PCI IDs (jsc#SLE-11834).
- x86/entry/64: Fix unwind hints in kernel exit path (bsc#1058115).
- x86/entry/64: Fix unwind hints in register clearing code (bsc#1058115).
- x86/entry/64: Fix unwind hints in rewind_stack_do_exit() (bsc#1058115).
- x86/entry/64: Fix unwind hints in __switch_to_asm() (bsc#1058115).
- x86/Hyper-V: Allow guests to enable InvariantTSC (bsc#1170620).
- x86/Hyper-V: Allow guests to enable InvariantTSC (bsc#1170621, bsc#1170620).
- x86/Hyper-V: Free hv_panic_page when fail to register kmsg dump (bsc#1170617, bsc#1170618).
- x86/Hyper-V: Free hv_panic_page when fail to register kmsg dump (bsc#1170618).
- x86/Hyper-V: Report crash data in die() when panic_on_oops is set (bsc#1170617, bsc#1170618).
- x86/Hyper-V: Report crash data in die() when panic_on_oops is set (bsc#1170618).
- x86/Hyper-V: Report crash register data or kmsg before running crash kernel (bsc#1170617, bsc#1170618).
- x86/Hyper-V: Report crash register data or kmsg before running crash kernel (bsc#1170618).
- x86/Hyper-V: Report crash register data when sysctl_record_panic_msg is not set (bsc#1170617, bsc#1170618).
- x86/Hyper-V: Report crash register data when sysctl_record_panic_msg is not set (bsc#1170618).
- x86: Hyper-V: report value of misc_features (git fixes).
- x86/Hyper-V: Trigger crash enlightenment only once during system crash (bsc#1170617, bsc#1170618).
- x86/Hyper-V: Trigger crash enlightenment only once during system crash (bsc#1170618).
- x86/Hyper-V: Unload vmbus channel in hv panic callback (bsc#1170617, bsc#1170618).
- x86/Hyper-V: Unload vmbus channel in hv panic callback (bsc#1170618).
- x86/kprobes: Avoid kretprobe recursion bug (bsc#1114279).
- x86/MCE/AMD: Add a KABI workaround for enum smca_bank_types (jsc#SLE-11833).
- x86/MCE/AMD, EDAC/mce_amd: Add new Load Store unit McaType (jsc#SLE-11833).
- x86/microcode/AMD: Increase microcode PATCH_MAX_SIZE (bsc#1169005).
- x86/resctrl: Preserve CDP enable over CPU hotplug (bsc#1114279).
- x86/unwind/orc: Do not skip the first frame for inactive tasks (bsc#1058115).
- x86/unwind/orc: Fix error handling in __unwind_start() (bsc#1058115).
- x86/unwind/orc: Fix error path for bad ORC entry type (bsc#1058115).
- x86/unwind/orc: Fix unwind_get_return_address_ptr() for inactive tasks (bsc#1058115).
- x86/unwind/orc: Prevent unwinding before ORC initialization (bsc#1058115).
- x86/unwind: Prevent false warnings for non-current tasks (bsc#1058115).
- x86/xen: fix booting 32-bit pv guest (bsc#1071995).
- x86/xen: Make the boot CPU idle task reliable (bsc#1071995).
- x86/xen: Make the secondary CPU idle tasks reliable (bsc#1071995).
- xen/pci: reserve MCFG areas earlier (bsc#1170145).
- xfrm: Always set XFRM_TRANSFORMED in xfrm{4,6}_output_finish (networking-stable-20_04_27).
- xfs: Correctly invert xfs_buftarg LRU isolation logic (git-fixes).
- xfs: do not ever return a stale pointer from __xfs_dir3_free_read (git-fixes).
- xprtrdma: Fix completion wait during device removal (git-fixes).
Patchnames
SUSE-2020-1602,SUSE-SLE-HA-12-SP5-2020-1602,SUSE-SLE-Live-Patching-12-SP5-2020-1602,SUSE-SLE-SDK-12-SP5-2020-1602,SUSE-SLE-SERVER-12-SP5-2020-1602,SUSE-SLE-WE-12-SP5-2020-1602
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "The SUSE Linux Enterprise 12 SP5 kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2020-0543: Fixed a side channel attack against special registers which could have resulted in leaking of read values to cores other than the one which called it.\n This attack is known as Special Register Buffer Data Sampling (SRBDS) or \u0027CrossTalk\u0027 (bsc#1154824).\n- CVE-2020-13143: Fixed an out-of-bounds read in gadget_dev_desc_UDC_store in drivers/usb/gadget/configfs.c (bsc#1171982).\n- CVE-2020-12769: Fixed an issue which could have allowed attackers to cause a panic via concurrent calls to dw_spi_irq and dw_spi_transfer_one (bsc#1171983).\n- CVE-2020-12768: Fixed a memory leak in svm_cpu_uninit in arch/x86/kvm/svm.c (bsc#1171736).\n- CVE-2020-12659: Fixed an out-of-bounds write (by a user with the CAP_NET_ADMIN capability) due to improper headroom validation (bsc#1171214).\n- CVE-2020-12657: An a use-after-free in block/bfq-iosched.c (bsc#1171205).\n- CVE-2020-12656: Fixed an improper handling of certain domain_release calls leadingch could have led to a memory leak (bsc#1171219).\n- CVE-2020-12655: Fixed an issue which could have allowed attackers to trigger a sync of excessive duration via an XFS v5 image with crafted metadata (bsc#1171217).\n- CVE-2020-12654: Fixed an issue in he wifi driver which could have allowed a remote AP to trigger a heap-based buffer overflow (bsc#1171202).\n- CVE-2020-12653: Fixed an issue in the wifi driver which could have allowed local users to gain privileges or cause a denial of service (bsc#1171195).\n- CVE-2020-12652: Fixed an issue which could have allowed local users to hold an incorrect lock during the ioctl operation and trigger a race condition (bsc#1171218).\n- CVE-2020-12464: Fixed a use-after-free due to a transfer without a reference (bsc#1170901).\n- CVE-2020-12114: Fixed a pivot_root race condition which could have allowed local users to cause a denial of service (panic) by corrupting a mountpoint reference counter (bsc#1171098).\n- CVE-2020-10757: Fixed an issue where remaping hugepage DAX to anon mmap could have caused user PTE access (bsc#1172317).\n- CVE-2020-10751: Fixed an improper implementation in SELinux LSM hook where it was assumed that an skb would only contain a single netlink message (bsc#1171189).\n- CVE-2020-10732: Fixed kernel data leak in userspace coredumps due to uninitialized data (bsc#1171220).\n- CVE-2020-10720: Fixed a use-after-free read in napi_gro_frags() (bsc#1170778).\n- CVE-2020-10711: Fixed a null pointer dereference in SELinux subsystem which could have allowed a remote network user to crash the kernel resulting in a denial of service (bsc#1171191).\n- CVE-2020-10690: Fixed the race between the release of ptp_clock and cdev (bsc#1170056).\n- CVE-2019-9455: Fixed a pointer leak due to a WARN_ON statement in a video driver. This could lead to local information disclosure with System execution privileges needed (bsc#1170345).\n- CVE-2019-20812: Fixed an issue in prb_calc_retire_blk_tmo() which could have resulted in a denial of service (bsc#1172453).\n- CVE-2019-20806: Fixed a null pointer dereference which may had lead to denial of service (bsc#1172199).\n- CVE-2019-19462: Fixed an issue which could have allowed local user to cause denial of service (bsc#1158265).\n- CVE-2018-1000199: Fixed a potential local code execution via ptrace (bsc#1089895).\n\nThe following non-security bugs were fixed:\n\n- ACPI: CPPC: Fix reference count leak in acpi_cppc_processor_probe() (bsc#1051510).\n- ACPI: sysfs: Fix reference count leak in acpi_sysfs_add_hotplug_profile() (bsc#1051510).\n- acpi/x86: ignore unspecified bit positions in the ACPI global lock field (bsc#1051510).\n- Add br_netfilter to kernel-default-base (bsc#1169020)\n- Add commit for git-fix that\u0027s not a fix This commit cleans up debug code but does not fix anything, and it relies on a new kernel function that isn\u0027t yet in this version of SLE.\n- agp/intel: Reinforce the barrier after GTT updates (bsc#1051510).\n- ALSA: ctxfi: Remove unnecessary cast in kfree (bsc#1051510).\n- ALSA: doc: Document PC Beep Hidden Register on Realtek ALC256 (bsc#1051510).\n- ALSA: dummy: Fix PCM format loop in proc output (bsc#1111666).\n- ALSA: hda: Add driver blacklist (bsc#1051510).\n- ALSA: hda: Always use jackpoll helper for jack update after resume (bsc#1051510).\n- ALSA: hda: call runtime_allow() for all hda controllers (bsc#1051510).\n- ALSA: hda: Do not release card at firmware loading error (bsc#1051510).\n- ALSA: hda: Explicitly permit using autosuspend if runtime PM is supported (bsc#1051510).\n- ALSA: hda/hdmi: fix race in monitor detection during probe (bsc#1051510).\n- ALSA: hda/hdmi: fix without unlocked before return (bsc#1051510).\n- ALSA: hda: Honor PM disablement in PM freeze and thaw_noirq ops (bsc#1051510).\n- ALSA: hda: Keep the controller initialization even if no codecs found (bsc#1051510).\n- ALSA: hda: Match both PCI ID and SSID for driver blacklist (bsc#1111666).\n- ALSA: hda/realtek - Add a model for Thinkpad T570 without DAC workaround (bsc#1172017).\n- ALSA: hda/realtek - Add COEF workaround for ASUS ZenBook UX431DA (git-fixes).\n- ALSA: hda/realtek - Add HP new mute led supported for ALC236 (git-fixes).\n- ALSA: hda/realtek - Add more fixup entries for Clevo machines (git-fixes).\n- ALSA: hda/realtek - Add new codec supported for ALC245 (bsc#1051510).\n- ALSA: hda/realtek - Add new codec supported for ALC287 (git-fixes).\n- ALSA: hda/realtek: Add quirk for Samsung Notebook (git-fixes).\n- ALSA: hda/realtek - Add supported new mute Led for HP (git-fixes).\n- ALSA: hda/realtek - Enable headset mic of ASUS GL503VM with ALC295 (git-fixes).\n- ALSA: hda/realtek - Enable headset mic of ASUS UX550GE with ALC295 (git-fixes).\n- ALSA: hda/realtek: Enable headset mic of ASUS UX581LV with ALC295 (git-fixes).\n- ALSA: hda/realtek - Enable the headset mic on Asus FX505DT (bsc#1051510).\n- ALSA: hda/realtek - Fix S3 pop noise on Dell Wyse (git-fixes).\n- ALSA: hda/realtek - Fix silent output on Gigabyte X570 Aorus Xtreme (bsc#1111666).\n- ALSA: hda/realtek - Fix unexpected init_amp override (bsc#1051510).\n- ALSA: hda/realtek - Limit int mic boost for Thinkpad T530 (git-fixes bsc#1171293).\n- ALSA: hda/realtek - Two front mics on a Lenovo ThinkCenter (bsc#1051510).\n- ALSA: hda: Release resources at error in delayed probe (bsc#1051510).\n- ALSA: hda: Remove ASUS ROG Zenith from the blacklist (bsc#1051510).\n- ALSA: hda: Skip controller resume if not needed (bsc#1051510).\n- ALSA: hwdep: fix a left shifting 1 by 31 UB bug (git-fixes).\n- ALSA: iec1712: Initialize STDSP24 properly when using the model=staudio option (git-fixes).\n- ALSA: opti9xx: shut up gcc-10 range warning (bsc#1051510).\n- ALSA: pcm: fix incorrect hw_base increase (git-fixes).\n- ALSA: pcm: oss: Place the plugin buffer overflow checks correctly (bsc#1170522).\n- ALSA: rawmidi: Fix racy buffer resize under concurrent accesses (git-fixes).\n- ALSA: usb-audio: Add connector notifier delegation (bsc#1051510).\n- ALSA: usb-audio: Add control message quirk delay for Kingston HyperX headset (git-fixes).\n- ALSA: usb-audio: add mapping for ASRock TRX40 Creator (git-fixes).\n- ALSA: usb-audio: Add mixer workaround for TRX40 and co (bsc#1051510).\n- ALSA: usb-audio: Add quirk for Focusrite Scarlett 2i2 (bsc#1051510).\n- ALSA: usb-audio: Add static mapping table for ALC1220-VB-based mobos (bsc#1051510).\n- ALSA: usb-audio: Apply async workaround for Scarlett 2i4 2nd gen (bsc#1051510).\n- ALSA: usb-audio: Check mapping at creating connector controls, too (bsc#1051510).\n- ALSA: usb-audio: Correct a typo of NuPrime DAC-10 USB ID (bsc#1051510).\n- ALSA: usb-audio: Do not create jack controls for PCM terminals (bsc#1051510).\n- ALSA: usb-audio: Do not override ignore_ctl_error value from the map (bsc#1051510).\n- ALSA: usb-audio: Filter error from connector kctl ops, too (bsc#1051510).\n- ALSA: usb-audio: Fix usb audio refcnt leak when getting spdif (bsc#1051510).\n- ALSA: usb-audio: mixer: volume quirk for ESS Technology Asus USB DAC (git-fixes).\n- ALSA: usb-audio: Quirks for Gigabyte TRX40 Aorus Master onboard audio (git-fixes).\n- ALSA: usx2y: Fix potential NULL dereference (bsc#1051510).\n- ASoC: codecs: hdac_hdmi: Fix incorrect use of list_for_each_entry (bsc#1051510).\n- ASoC: dapm: connect virtual mux with default value (bsc#1051510).\n- ASoC: dapm: fixup dapm kcontrol widget (bsc#1051510).\n- ASoC: dpcm: allow start or stop during pause for backend (bsc#1051510).\n- ASoC: fix regwmask (bsc#1051510).\n- ASoC: msm8916-wcd-digital: Reset RX interpolation path after use (bsc#1051510).\n- ASoC: samsung: Prevent clk_get_rate() calls in atomic context (bsc#1111666).\n- ASoC: topology: Check return value of pcm_new_ver (bsc#1051510).\n- ASoC: topology: use name_prefix for new kcontrol (bsc#1051510).\n- b43legacy: Fix case where channel status is corrupted (bsc#1051510).\n- batman-adv: fix batadv_nc_random_weight_tq (git-fixes).\n- batman-adv: Fix refcnt leak in batadv_show_throughput_override (git-fixes).\n- batman-adv: Fix refcnt leak in batadv_store_throughput_override (git-fixes).\n- batman-adv: Fix refcnt leak in batadv_v_ogm_process (git-fixes).\n- bcache: avoid unnecessary btree nodes flushing in btree_flush_write() (git fixes (block drivers)).\n- bcache: fix incorrect data type usage in btree_flush_write() (git fixes (block drivers)).\n- bcache: Revert \u0027bcache: shrink btree node cache after bch_btree_check()\u0027 (git fixes (block drivers)).\n- blk-mq: honor IO scheduler for multiqueue devices (bsc#1165478).\n- blk-mq: simplify blk_mq_make_request() (bsc#1165478).\n- block/drbd: delete invalid function drbd_md_mark_dirty_ (bsc#1171527).\n- block: drbd: remove a stray unlock in __drbd_send_protocol() (bsc#1171599).\n- block: fix busy device checking in blk_drop_partitions again (bsc#1171948).\n- block: fix busy device checking in blk_drop_partitions (bsc#1171948).\n- block: fix memleak of bio integrity data (git fixes (block drivers)).\n- block: remove the bd_openers checks in blk_drop_partitions (bsc#1171948).\n- bnxt_en: fix memory leaks in bnxt_dcbnl_ieee_getets() (networking-stable-20_03_28).\n- bnxt_en: Reduce BNXT_MSIX_VEC_MAX value to supported CQs per PF (bsc#1104745).\n- bnxt_en: reinitialize IRQs when MTU is modified (networking-stable-20_03_14).\n- bnxt_en: Return error if bnxt_alloc_ctx_mem() fails (bsc#1104745 ).\n- bnxt_en: Return error when allocating zero size context memory (bsc#1104745).\n- bonding/alb: make sure arp header is pulled before accessing it (networking-stable-20_03_14).\n- bpf: Fix sk_psock refcnt leak when receiving message (bsc#1083647).\n- bpf: Forbid XADD on spilled pointers for unprivileged users (bsc#1083647).\n- brcmfmac: abort and release host after error (bsc#1051510).\n- btrfs: fix deadlock with memory reclaim during scrub (bsc#1172127).\n- btrfs: fix log context list corruption after rename whiteout error (bsc#1172342).\n- btrfs: fix partial loss of prealloc extent past i_size after fsync (bsc#1172343).\n- btrfs: move the dio_sem higher up the callchain (bsc#1171761).\n- btrfs: relocation: add error injection points for cancelling balance (bsc#1171417).\n- btrfs: relocation: Check cancel request after each data page read (bsc#1171417).\n- btrfs: relocation: Check cancel request after each extent found (bsc#1171417).\n- btrfs: relocation: Clear the DEAD_RELOC_TREE bit for orphan roots to prevent runaway balance (bsc#1171417).\n- btrfs: relocation: Fix reloc root leakage and the NULL pointer reference caused by the leakage (bsc#1171417).\n- btrfs: relocation: Work around dead relocation stage loop (bsc#1171417).\n- btrfs: reloc: clear DEAD_RELOC_TREE bit for orphan roots to prevent runaway balance (bsc#1171417 bsc#1160947 bsc#1172366).\n- btrfs: reloc: fix reloc root leak and NULL pointer dereference (bsc#1171417 bsc#1160947 bsc#1172366).\n- btrfs: setup a nofs context for memory allocation at btrfs_create_tree() (bsc#1172127).\n- btrfs: setup a nofs context for memory allocation at __btrfs_set_acl (bsc#1172127).\n- btrfs: use nofs context when initializing security xattrs to avoid deadlock (bsc#1172127).\n- can: add missing attribute validation for termination (networking-stable-20_03_14).\n- cdc-acm: close race betrween suspend() and acm_softint (git-fixes).\n- cdc-acm: introduce a cool down (git-fixes).\n- ceph: check if file lock exists before sending unlock request (bsc#1168789).\n- ceph: demote quotarealm lookup warning to a debug message (bsc#1171692).\n- ceph: fix double unlock in handle_cap_export() (bsc#1171694).\n- ceph: fix double unlock in handle_cap_export() (bsc#1171694).\n- ceph: fix endianness bug when handling MDS session feature bits (bsc#1171695).\n- ceph: fix endianness bug when handling MDS session feature bits (bsc#1171695).\n- cgroup, netclassid: periodically release file_lock on classid updating (networking-stable-20_03_14).\n- CIFS: Allocate crypto structures on the fly for calculating signatures of incoming packets (bsc#1144333).\n- CIFS: Allocate encryption header through kmalloc (bsc#1144333).\n- CIFS: allow unlock flock and OFD lock across fork (bsc#1144333).\n- CIFS: check new file size when extending file by fallocate (bsc#1144333).\n- CIFS: cifspdu.h: Replace zero-length array with flexible-array member (bsc#1144333).\n- CIFS: clear PF_MEMALLOC before exiting demultiplex thread (bsc#1144333).\n- CIFS: do not share tcons with DFS (bsc#1144333).\n- CIFS: dump the session id and keys also for SMB2 sessions (bsc#1144333).\n- CIFS: ensure correct super block for DFS reconnect (bsc#1144333).\n- CIFS: Fix bug which the return value by asynchronous read is error (bsc#1144333).\n- CIFS: fix uninitialised lease_key in open_shroot() (bsc#1144333).\n- CIFS: improve read performance for page size 64KB \u0026 cache=strict \u0026 vers=2.1+ (bsc#1144333).\n- CIFS: Increment num_remote_opens stats counter even in case of smb2_query_dir_first (bsc#1144333).\n- CIFS: minor update to comments around the cifs_tcp_ses_lock mutex (bsc#1144333).\n- CIFS: protect updating server-\u003edstaddr with a spinlock (bsc#1144333).\n- CIFS: smb2pdu.h: Replace zero-length array with flexible-array member (bsc#1144333).\n- CIFS: smbd: Calculate the correct maximum packet size for segmented SMBDirect send/receive (bsc#1144333).\n- CIFS: smbd: Check and extend sender credits in interrupt context (bsc#1144333).\n- CIFS: smbd: Check send queue size before posting a send (bsc#1144333).\n- CIFS: smbd: Do not schedule work to send immediate packet on every receive (bsc#1144333).\n- CIFS: smbd: Merge code to track pending packets (bsc#1144333).\n- CIFS: smbd: Properly process errors on ib_post_send (bsc#1144333).\n- CIFS: smbd: Update receive credits before sending and deal with credits roll back on failure before sending (bsc#1144333).\n- CIFS: Warn less noisily on default mount (bsc#1144333).\n- clk: Add clk_hw_unregister_composite helper function definition (bsc#1051510).\n- clk: imx6ull: use OSC clock during AXI rate change (bsc#1051510).\n- clk: imx: make mux parent strings const (bsc#1051510).\n- clk: mediatek: correct the clocks for MT2701 HDMI PHY module (bsc#1051510).\n- clk: sunxi-ng: a64: Fix gate bit of DSI DPHY (bsc#1051510).\n- clocksource/drivers/hyper-v: Set TSC clocksource as default w/ InvariantTSC (bsc#1170620).\n- clocksource/drivers/hyper-v: Set TSC clocksource as default w/ InvariantTSC (bsc#1170620, bsc#1170621).\n- clocksource: dw_apb_timer_of: Fix missing clockevent timers (bsc#1051510).\n- component: Silence bind error on -EPROBE_DEFER (bsc#1051510).\n- coresight: do not use the BIT() macro in the UAPI header (git fixes (block drivers)).\n- cpufreq: s3c64xx: Remove pointless NULL check in s3c64xx_cpufreq_driver_init (bsc#1051510).\n- crypto: ccp - AES CFB mode is a stream cipher (git-fixes).\n- crypto: ccp - Change a message to reflect status instead of failure (bsc#1172218).\n- crypto: ccp - Clean up and exit correctly on allocation failure (git-fixes).\n- crypto: ccp - Cleanup misc_dev on sev_exit() (bsc#1114279).\n- crypto: ccp - Cleanup sp_dev_master in psp_dev_destroy() (bsc#1114279).\n- cxgb4: fix MPS index overwrite when setting MAC address (bsc#1127355).\n- cxgb4: fix Txq restart check during backpressure (bsc#1127354 bsc#1127371).\n- debugfs: Add debugfs_create_xul() for hexadecimal unsigned long (git-fixes).\n- debugfs_lookup(): switch to lookup_one_len_unlocked() (bsc#1171979).\n- devlink: fix return value after hitting end in region read (bsc#1109837).\n- devlink: validate length of param values (bsc#1109837).\n- devlink: validate length of region addr/len (bsc#1109837).\n- dmaengine: dmatest: Fix iteration non-stop logic (bsc#1051510).\n- dm mpath: switch paths in dm_blk_ioctl() code path (bsc#1167574).\n- dm-raid1: fix invalid return value from dm_mirror (bsc#1172378).\n- dm writecache: fix data corruption when reloading the target (git fixes (block drivers)).\n- dm writecache: fix incorrect flush sequence when doing SSD mode commit (git fixes (block drivers)).\n- dm writecache: verify watermark during resume (git fixes (block drivers)).\n- dm zoned: fix invalid memory access (git fixes (block drivers)).\n- dm zoned: reduce overhead of backing device checks (git fixes (block drivers)).\n- dm zoned: remove duplicate nr_rnd_zones increase in dmz_init_zone() (git fixes (block drivers)).\n- dm zoned: support zone sizes smaller than 128MiB (git fixes (block drivers)).\n- dp83640: reverse arguments to list_add_tail (git-fixes).\n- Drivers: hv: Add a module description line to the hv_vmbus driver (bsc#1172249, bsc#1172251).\n- Drivers: hv: Add a module description line to the hv_vmbus driver (bsc#1172253).\n- Drivers: HV: Send one page worth of kmsg dump over Hyper-V during panic (bsc#1170618).\n- Drivers: hv: vmbus: Fix the issue with freeing up hv_ctl_table_hdr (bsc#1170618).\n- Drivers: hv: vmbus: Get rid of MSR access from vmbus_drv.c (bsc#1170618).\n- Drivers: hv: vmus: Fix the check for return value from kmsg get dump buffer (bsc#1170618).\n- drivers/net/ibmvnic: Update VNIC protocol version reporting (bsc#1065729).\n- Drivers: w1: add hwmon support structures (jsc#SLE-11048).\n- Drivers: w1: add hwmon temp support for w1_therm (jsc#SLE-11048).\n- Drivers: w1: refactor w1_slave_show to make the temp reading functionality separate (jsc#SLE-11048).\n- drm: amd/acp: fix broken menu structure (bsc#1114279) \t* context changes\n- drm/amdgpu: Correctly initialize thermal controller for GPUs with Powerplay table v0 (e.g Hawaii) (bsc#1111666).\n- drm/amdgpu: Fix oops when pp_funcs is unset in ACPI event (bsc#1111666).\n- drm/amd/powerplay: force the trim of the mclk dpm_levels if OD is (bsc#1113956)\n- drm/atomic: Take the atomic toys away from X (bsc#1112178) \t* context changes\n- drm/crc: Actually allow to change the crc source (bsc#1114279) \t* offset changes\n- drm/dp_mst: Fix clearing payload state on topology disable (bsc#1051510).\n- drm/dp_mst: Reformat drm_dp_check_act_status() a bit (bsc#1051510).\n- drm/edid: Fix off-by-one in DispID DTD pixel clock (bsc#1114279)\n- drm/etnaviv: fix perfmon domain interation (bsc#1113956)\n- drm/etnaviv: rework perfmon query infrastructure (bsc#1112178)\n- drm/i915: Apply Wa_1406680159:icl,ehl as an engine workaround (bsc#1112178) \t* rename gt/intel_workarounds.c to intel_workarounds.c \t* context changes\n- drm/i915/gvt: Init DPLL/DDI vreg for virtual display instead of (bsc#1114279)\n- drm/i915: HDCP: fix Ri prime check done during link check (bsc#1112178) \t* rename display/intel_hdmi.c to intel_hdmi.c \t* context changes\n- drm/i915: properly sanity check batch_start_offset (bsc#1114279) \t* renamed display/intel_fbc.c -\u003e intel_fb.c \t* renamed gt/intel_rc6.c -\u003e intel_pm.c \t* context changes\n- drm/meson: Delete an error message in meson_dw_hdmi_bind() (bsc#1051510).\n- drm: NULL pointer dereference [null-pointer-deref] (CWE 476) problem (bsc#1114279)\n- drm/qxl: qxl_release leak in qxl_draw_dirty_fb() (bsc#1051510).\n- drm/qxl: qxl_release leak in qxl_hw_surface_alloc() (bsc#1051510).\n- drm/qxl: qxl_release use after free (bsc#1051510).\n- drm: Remove PageReserved manipulation from drm_pci_alloc (bsc#1114279) \t* offset changes\n- drm/sun4i: dsi: Allow binding the host without a panel (bsc#1113956)\n- drm/sun4i: dsi: Avoid hotplug race with DRM driver bind (bsc#1113956)\n- drm/sun4i: dsi: Remove incorrect use of runtime PM (bsc#1113956) \t* context changes\n- drm/sun4i: dsi: Remove unused drv from driver context (bsc#1113956) \t* context changes \t* keep include of sun4i_drv.h\n- dump_stack: avoid the livelock of the dump_lock (git fixes (block drivers)).\n- EDAC/amd64: Add family ops for Family 19h Models 00h-0Fh (jsc#SLE-11833).\n- EDAC/amd64: Drop some family checks for newer systems (jsc#SLE-11833).\n- EDAC/mce_amd: Always load on SMCA systems (jsc#SLE-11833).\n- EDAC/mce_amd: Make fam_ops static global (jsc#SLE-11833).\n- EDAC, sb_edac: Add support for systems with segmented PCI buses (bsc#1169525).\n- ext4: do not zeroout extents beyond i_disksize (bsc#1167851).\n- ext4: fix extent_status fragmentation for plain files (bsc#1171949).\n- ext4: use non-movable memory for superblock readahead (bsc#1171952).\n- fanotify: fix merging marks masks with FAN_ONDIR (bsc#1171679).\n- fbcon: fix null-ptr-deref in fbcon_switch (bsc#1114279) \t* rename drivers/video/fbdev/core to drivers/video/console \t* context changes\n- fib: add missing attribute validation for tun_id (networking-stable-20_03_14).\n- firmware: qcom: scm: fix compilation error when disabled (bsc#1051510).\n- Fix a backport bug, where btrfs_put_root() -\u003e btrfs_put_fs_root() modification is not needed due to missing dependency\n- fs/cifs: fix gcc warning in sid_to_id (bsc#1144333).\n- fs/seq_file.c: simplify seq_file iteration code and interface (bsc#1170125).\n- gpio: tegra: mask GPIO IRQs during IRQ shutdown (bsc#1051510).\n- gre: fix uninit-value in __iptunnel_pull_header (networking-stable-20_03_14).\n- HID: hid-input: clear unmapped usages (git-fixes).\n- HID: hyperv: Add a module description line (bsc#1172249, bsc#1172251).\n- HID: hyperv: Add a module description line (bsc#1172253).\n- HID: i2c-hid: add Trekstor Primebook C11B to descriptor override (git-fixes).\n- HID: i2c-hid: override HID descriptors for certain devices (git-fixes).\n- HID: multitouch: add eGalaxTouch P80H84 support (bsc#1051510).\n- HID: wacom: Read HID_DG_CONTACTMAX directly for non-generic devices (git-fixes).\n- hrtimer: Annotate lockless access to timer-\u003estate (git fixes (block drivers)).\n- hsr: add restart routine into hsr_get_node_list() (networking-stable-20_03_28).\n- hsr: check protocol version in hsr_newlink() (networking-stable-20_04_17).\n- hsr: fix general protection fault in hsr_addr_is_self() (networking-stable-20_03_28).\n- hsr: set .netnsok flag (networking-stable-20_03_28).\n- hsr: use rcu_read_lock() in hsr_get_node_{list/status}() (networking-stable-20_03_28).\n- i2c: acpi: Force bus speed to 400KHz if a Silead touchscreen is present (git-fixes).\n- i2c: acpi: put device when verifying client fails (git-fixes).\n- i2c: brcmstb: remove unused struct member (git-fixes).\n- i2c: core: Allow empty id_table in ACPI case as well (git-fixes).\n- i2c: core: decrease reference count of device node in i2c_unregister_device (git-fixes).\n- i2c: dev: Fix the race between the release of i2c_dev and cdev (bsc#1051510).\n- i2c: fix missing pm_runtime_put_sync in i2c_device_probe (git-fixes).\n- i2c-hid: properly terminate i2c_hid_dmi_desc_override_table array (git-fixes).\n- i2c: i801: Do not add ICH_RES_IO_SMI for the iTCO_wdt device (git-fixes).\n- i2c: iproc: Stop advertising support of SMBUS quick cmd (git-fixes).\n- i2c: isch: Remove unnecessary acpi.h include (git-fixes).\n- i2c: mux: demux-pinctrl: Fix an error handling path in \u0027i2c_demux_pinctrl_probe()\u0027 (bsc#1051510).\n- i2c: st: fix missing struct parameter description (bsc#1051510).\n- IB/ipoib: Add child to parent list only if device initialized (bsc#1168503).\n- IB/ipoib: Consolidate checking of the proposed child interface (bsc#1168503).\n- IB/ipoib: Do not remove child devices from within the ndo_uninit (bsc#1168503).\n- IB/ipoib: Get rid of IPOIB_FLAG_GOING_DOWN (bsc#1168503).\n- IB/ipoib: Get rid of the sysfs_mutex (bsc#1168503).\n- IB/ipoib: Maintain the child_intfs list from ndo_init/uninit (bsc#1168503).\n- IB/ipoib: Move all uninit code into ndo_uninit (bsc#1168503).\n- IB/ipoib: Move init code to ndo_init (bsc#1168503).\n- IB/ipoib: Replace printk with pr_warn (bsc#1168503).\n- IB/ipoib: Use cancel_delayed_work_sync for neigh-clean task (bsc#1168503).\n- IB/ipoib: Warn when one port fails to initialize (bsc#1168503).\n- IB/mlx5: Fix missing congestion control debugfs on rep rdma device (bsc#1103991).\n- ibmvnic: Skip fatal error reset after passive init (bsc#1171078 ltc#184239).\n- iio:ad7797: Use correct attribute_group (bsc#1051510).\n- iio: adc: stm32-adc: fix device used to request dma (bsc#1051510).\n- iio: adc: stm32-adc: fix sleep in atomic context (git-fixes).\n- iio: adc: stm32-adc: Use dma_request_chan() instead dma_request_slave_channel() (bsc#1051510).\n- iio: dac: vf610: Fix an error handling path in \u0027vf610_dac_probe()\u0027 (bsc#1051510).\n- iio: sca3000: Remove an erroneous \u0027get_device()\u0027 (bsc#1051510).\n- iio: xilinx-xadc: Fix ADC-B powerdown (bsc#1051510).\n- iio: xilinx-xadc: Fix clearing interrupt when enabling trigger (bsc#1051510).\n- iio: xilinx-xadc: Fix sequencer configuration for aux channels in simultaneous mode (bsc#1051510).\n- ima: Fix return value of ima_write_policy() (git-fixes).\n- Input: evdev - call input_flush_device() on release(), not flush() (bsc#1051510).\n- Input: hyperv-keyboard - add module description (bsc#1172249, bsc#1172251).\n- Input: hyperv-keyboard - add module description (bsc#1172253).\n- Input: i8042 - add Acer Aspire 5738z to nomux list (bsc#1051510).\n- Input: i8042 - add ThinkPad S230u to i8042 reset list (bsc#1051510).\n- Input: raydium_i2c_ts - use true and false for boolean values (bsc#1051510).\n- Input: synaptics-rmi4 - fix error return code in rmi_driver_probe() (bsc#1051510).\n- Input: synaptics-rmi4 - really fix attn_data use-after-free (git-fixes).\n- Input: usbtouchscreen - add support for BonXeon TP (bsc#1051510).\n- Input: xpad - add custom init packet for Xbox One S controllers (bsc#1051510).\n- iommu/amd: Call domain_flush_complete() in update_domain() (bsc#1172096).\n- iommu/amd: Do not flush Device Table in iommu_map_page() (bsc#1172097).\n- iommu/amd: Do not loop forever when trying to increase address space (bsc#1172098).\n- iommu/amd: Fix legacy interrupt remapping for x2APIC-enabled system (bsc#1172099).\n- iommu/amd: Fix over-read of ACPI UID from IVRS table (bsc#1172101).\n- iommu/amd: Fix race in increase_address_space()/fetch_pte() (bsc#1172102).\n- iommu/amd: Update Device Table in increase_address_space() (bsc#1172103).\n- iommu: Fix reference count leak in iommu_group_alloc (bsc#1172397).\n- ip6_tunnel: Allow rcv/xmit even if remote address is a local address (bsc#1166978).\n- ipmi: fix hung processes in __get_guid() (git-fixes).\n- ipv4: fix a RCU-list lock in fib_triestat_seq_show (networking-stable-20_04_02).\n- ipv6/addrconf: call ipv6_mc_up() for non-Ethernet interface (networking-stable-20_03_14).\n- ipv6: do not auto-add link-local address to lag ports (networking-stable-20_04_09).\n- ipv6: fix IPV6_ADDRFORM operation logic (bsc#1171662).\n- ipv6: Fix nlmsg_flags when splitting a multipath route (networking-stable-20_03_01).\n- ipv6: fix restrict IPV6_ADDRFORM operation (bsc#1171662).\n- ipv6: Fix route replacement with dev-only route (networking-stable-20_03_01).\n- ipvlan: add cond_resched_rcu() while processing muticast backlog (networking-stable-20_03_14).\n- ipvlan: do not deref eth hdr before checking it\u0027s set (networking-stable-20_03_14).\n- ipvlan: do not use cond_resched_rcu() in ipvlan_process_multicast() (networking-stable-20_03_14).\n- iwlwifi: pcie: actually release queue memory in TVQM (bsc#1051510).\n- ixgbe: do not check firmware errors (bsc#1170284).\n- kabi fix for early XHCI debug (git-fixes).\n- kabi for for md: improve handling of bio with REQ_PREFLUSH in md_flush_request() (git-fixes).\n- kabi, protect struct ib_device (bsc#1168503).\n- kabi/severities: Do not track KVM internal symbols.\n- kabi/severities: Ingnore get_dev_data() The function is internal to the AMD IOMMU driver and must not be called by any third party.\n- kabi workaround for snd_rawmidi buffer_ref field addition (git-fixes).\n- KEYS: reaching the keys quotas correctly (bsc#1051510).\n- KVM: arm64: Change hyp_panic()s dependency on tpidr_el2 (bsc#1133021).\n- KVM: arm64: Stop save/restoring host tpidr_el1 on VHE (bsc#1133021).\n- KVM: Check validity of resolved slot when searching memslots (bsc#1172104).\n- KVM: s390: vsie: Fix delivery of addressing exceptions (git-fixes).\n- KVM: s390: vsie: Fix possible race when shadowing region 3 tables (git-fixes).\n- KVM: s390: vsie: Fix region 1 ASCE sanity shadow address checks (git-fixes).\n- KVM: SVM: Fix potential memory leak in svm_cpu_init() (bsc#1171736).\n- KVM x86: Extend AMD specific guest behavior to Hygon virtual CPUs (bsc#1152489).\n- l2tp: Allow management of tunnels and session in user namespace (networking-stable-20_04_17).\n- libata: Remove extra scsi_host_put() in ata_scsi_add_hosts() (bsc#1051510).\n- libata: Return correct status in sata_pmp_eh_recover_pm() when ATA_DFLAG_DETACH is set (bsc#1051510).\n- lib: raid6: fix awk build warnings (git fixes (block drivers)).\n- lib/raid6/test: fix build on distros whose /bin/sh is not bash (git fixes (block drivers)).\n- lib/stackdepot.c: fix global out-of-bounds in stack_slabs (git fixes (block drivers)).\n- locks: print unsigned ino in /proc/locks (bsc#1171951). \n- mac80211: add ieee80211_is_any_nullfunc() (bsc#1051510).\n- mac80211_hwsim: Use kstrndup() in place of kasprintf() (bsc#1051510).\n- mac80211: mesh: fix discovery timer re-arming issue / crash (bsc#1051510).\n- macsec: avoid to set wrong mtu (bsc#1051510).\n- macsec: restrict to ethernet devices (networking-stable-20_03_28).\n- macvlan: add cond_resched() during multicast processing (networking-stable-20_03_14).\n- macvlan: fix null dereference in macvlan_device_event() (bsc#1051510).\n- make some Fujitsu systems run (bsc#1141558).\n- md: improve handling of bio with REQ_PREFLUSH in md_flush_request() (git-fixes).\n- md/raid0: Fix an error message in raid0_make_request() (git fixes (block drivers)).\n- md/raid10: prevent access of uninitialized resync_pages offset (git-fixes).\n- media: dvb: return -EREMOTEIO on i2c transfer failure (bsc#1051510).\n- media: platform: fcp: Set appropriate DMA parameters (bsc#1051510).\n- media: ti-vpe: cal: fix disable_irqs to only the intended target (git-fixes).\n- mei: release me_cl object reference (bsc#1051510).\n- mlxsw: Fix some IS_ERR() vs NULL bugs (networking-stable-20_04_27).\n- mlxsw: spectrum_flower: Do not stop at FLOW_ACTION_VLAN_MANGLE (networking-stable-20_04_09).\n- mlxsw: spectrum_mr: Fix list iteration in error path (bsc#1112374).\n- mmc: atmel-mci: Fix debugfs on 64-bit platforms (git-fixes).\n- mmc: core: Check request type before completing the request (git-fixes).\n- mmc: core: Fix recursive locking issue in CQE recovery path (git-fixes).\n- mmc: cqhci: Avoid false \u0027cqhci: CQE stuck on\u0027 by not open-coding timeout loop (git-fixes).\n- mmc: dw_mmc: Fix debugfs on 64-bit platforms (git-fixes).\n- mmc: meson-gx: make sure the descriptor is stopped on errors (git-fixes).\n- mmc: meson-gx: simplify interrupt handler (git-fixes).\n- mmc: renesas_sdhi: limit block count to 16 bit for old revisions (git-fixes).\n- mmc: sdhci-esdhc-imx: fix the mask for tuning start point (bsc#1051510).\n- mmc: sdhci-msm: Clear tuning done flag while hs400 tuning (bsc#1051510).\n- mmc: sdhci-of-at91: fix memleak on clk_get failure (git-fixes).\n- mmc: sdhci-pci: Fix eMMC driver strength for BYT-based controllers (bsc#1051510).\n- mmc: sdhci-xenon: fix annoying 1.8V regulator warning (bsc#1051510).\n- mmc: sdio: Fix potential NULL pointer error in mmc_sdio_init_card() (bsc#1051510).\n- mmc: tmio: fix access width of Block Count Register (git-fixes).\n- mm: limit boost_watermark on small zones (git fixes (mm/pgalloc)).\n- mm: thp: handle page cache THP correctly in PageTransCompoundMap (git fixes (block drivers)).\n- mtd: cfi: fix deadloop in cfi_cmdset_0002.c do_write_buffer (bsc#1051510).\n- mtd: spi-nor: cadence-quadspi: add a delay in write sequence (git-fixes).\n- mtd: spi-nor: enable 4B opcodes for mx66l51235l (git-fixes).\n- mtd: spi-nor: fsl-quadspi: Do not let -EINVAL on the bus (git-fixes).\n- mwifiex: avoid -Wstringop-overflow warning (bsc#1051510).\n- mwifiex: Fix memory corruption in dump_station (bsc#1051510).\n- net: bcmgenet: correct per TX/RX ring statistics (networking-stable-20_04_27).\n- net: dsa: b53: Fix ARL register definitions (networking-stable-20_04_27).\n- net: dsa: b53: Rework ARL bin logic (networking-stable-20_04_27).\n- net: dsa: bcm_sf2: Do not register slave MDIO bus with OF (networking-stable-20_04_09).\n- net: dsa: bcm_sf2: Ensure correct sub-node is parsed (networking-stable-20_04_09).\n- net: dsa: bcm_sf2: Fix overflow checks (git-fixes).\n- net: dsa: Fix duplicate frames flooded by learning (networking-stable-20_03_28).\n- net: dsa: mv88e6xxx: fix lockup on warm boot (networking-stable-20_03_14).\n- net/ethernet: add Google GVE driver (jsc#SLE-10538)\n- net: fec: add phy_reset_after_clk_enable() support (git-fixes).\n- net: fec: validate the new settings in fec_enet_set_coalesce() (networking-stable-20_03_14).\n- net: fib_rules: Correctly set table field when table number exceeds 8 bits (networking-stable-20_03_01).\n- net: fix race condition in __inet_lookup_established() (bsc#1151794).\n- net: fq: add missing attribute validation for orphan mask (networking-stable-20_03_14).\n- net: hns3: fix \u0027tc qdisc del\u0027 failed issue (bsc#1109837).\n- net, ip_tunnel: fix interface lookup with no key (networking-stable-20_04_02).\n- net: ipv4: devinet: Fix crash when add/del multicast IP with autojoin (networking-stable-20_04_17).\n- net: ipv6: do not consider routes via gateways for anycast address check (networking-stable-20_04_17).\n- netlink: Use netlink header as base to calculate bad attribute offset (networking-stable-20_03_14).\n- net: macsec: update SCI upon MAC address change (networking-stable-20_03_14).\n- net: memcg: fix lockdep splat in inet_csk_accept() (networking-stable-20_03_14).\n- net: memcg: late association of sock to memcg (networking-stable-20_03_14).\n- net/mlx4_en: avoid indirect call in TX completion (networking-stable-20_04_27).\n- net/mlx5: Add new fields to Port Type and Speed register (bsc#1171118).\n- net/mlx5: Add new fields to Port Type and Speed register (bsc#1171118).\n- net/mlx5: Add RoCE RX ICRC encapsulated counter (bsc#1171118).\n- net/mlx5e: Fix ethtool self test: link speed (bsc#1171118).\n- net/mlx5e: Move port speed code from en_ethtool.c to en/port.c (bsc#1171118).\n- net/mlx5: Expose link speed directly (bsc#1171118).\n- net/mlx5: Expose link speed directly (bsc#1171118).\n- net/mlx5: Expose port speed when possible (bsc#1171118).\n- net/mlx5: Expose port speed when possible (bsc#1171118).\n- net/mlx5: Fix failing fw tracer allocation on s390 (bsc#1103990 ).\n- net: mvneta: Fix the case where the last poll did not process all rx (networking-stable-20_03_28).\n- net: netrom: Fix potential nr_neigh refcnt leak in nr_add_node (networking-stable-20_04_27).\n- net/packet: tpacket_rcv: do not increment ring index on drop (networking-stable-20_03_14).\n- net: phy: restore mdio regs in the iproc mdio driver (networking-stable-20_03_01).\n- net: qmi_wwan: add support for ASKEY WWHC050 (networking-stable-20_03_28).\n- net: revert default NAPI poll timeout to 2 jiffies (networking-stable-20_04_17).\n- net_sched: cls_route: remove the right filter from hashtable (networking-stable-20_03_28).\n- net_sched: sch_skbprio: add message validation to skbprio_change() (bsc#1109837).\n- net/x25: Fix x25_neigh refcnt leak when receiving frame (networking-stable-20_04_27).\n- nfc: add missing attribute validation for SE API (networking-stable-20_03_14).\n- nfc: add missing attribute validation for vendor subcommand (networking-stable-20_03_14).\n- nfc: pn544: Fix occasional HW initialization failure (networking-stable-20_03_01).\n- nfc: st21nfca: add missed kfree_skb() in an error path (bsc#1051510).\n- nfp: abm: fix a memory leak bug (bsc#1109837).\n- nfsd4: fix up replay_matches_cache() (git-fixes).\n- nfsd: Ensure CLONE persists data and metadata changes to the target file (git-fixes).\n- nfsd: fix delay timer on 32-bit architectures (git-fixes).\n- nfsd: fix jiffies/time_t mixup in LRU list (git-fixes).\n- nfs: Directory page cache pages need to be locked when read (git-fixes).\n- nfsd: memory corruption in nfsd4_lock() (git-fixes).\n- nfs: Do not call generic_error_remove_page() while holding locks (bsc#1170457).\n- nfs: Fix memory leaks and corruption in readdir (git-fixes).\n- nfs: Fix O_DIRECT accounting of number of bytes read/written (git-fixes).\n- nfs: Fix potential posix_acl refcnt leak in nfs3_set_acl (git-fixes).\n- nfs: fix racey wait in nfs_set_open_stateid_locked (bsc#1170592).\n- nfs/flexfiles: Use the correct TCP timeout for flexfiles I/O (git-fixes).\n- nfs/pnfs: Fix pnfs_generic_prepare_to_resend_writes() (git-fixes).\n- nfs: Revalidate the file size on a fatal write error (git-fixes).\n- NFSv4.0: nfs4_do_fsinfo() should not do implicit lease renewals (git-fixes).\n- NFSv4: Do not allow a cached open with a revoked delegation (git-fixes).\n- NFSv4: Fix leak of clp-\u003ecl_acceptor string (git-fixes).\n- NFSv4/pnfs: Return valid stateids in nfs_layout_find_inode_by_stateid() (git-fixes).\n- NFSv4: try lease recovery on NFS4ERR_EXPIRED (git-fixes).\n- NFSv4.x: Drop the slot if nfs4_delegreturn_prepare waits for layoutreturn (git-fixes).\n- nl802154: add missing attribute validation for dev_type (networking-stable-20_03_14).\n- nl802154: add missing attribute validation (networking-stable-20_03_14).\n- nvme-fc: print proper nvme-fc devloss_tmo value (bsc#1172391).\n- objtool: Fix stack offset tracking for indirect CFAs (bsc#1169514).\n- objtool: Fix switch table detection in .text.unlikely (bsc#1169514).\n- objtool: Make BP scratch register warning more robust (bsc#1169514).\n- padata: Remove broken queue flushing (git-fixes).\n- Partially revert \u0027kfifo: fix kfifo_alloc() and kfifo_init()\u0027 (git fixes (block drivers)).\n- PCI: hv: Add support for protocol 1.3 and support PCI_BUS_RELATIONS2 (bsc#1172201, bsc#1172202).\n- PCI: hv: Decouple the func definition in hv_dr_state from VSP message (bsc#1172201, bsc#1172202).\n- PCI: sanity test on PCI vendor to be sure we do not touch everything (bsc#1141558).\n- perf/x86/amd: Add support for Large Increment per Cycle Events (jsc#SLE-11831).\n- perf/x86/amd: Constrain Large Increment per Cycle events (jsc#SLE-11831).\n- pinctrl: baytrail: Enable pin configuration setting for GPIO chip (git-fixes).\n- pinctrl: cherryview: Add missing spinlock usage in chv_gpio_irq_handler (git-fixes).\n- pinctrl: sunrisepoint: Fix PAD lock register offset for SPT-H (git-fixes).\n- platform/x86: asus-nb-wmi: Do not load on Asus T100TA and T200TA (bsc#1051510).\n- pNFS: Ensure we do clear the return-on-close layout stateid on fatal errors (git-fixes).\n- powerpc: Add attributes for setjmp/longjmp (bsc#1065729).\n- powerpc/pci/of: Parse unassigned resources (bsc#1065729).\n- powerpc/setup_64: Set cache-line-size based on cache-block-size (bsc#1065729).\n- powerpc/sstep: Fix DS operand in ld encoding to appropriate value (bsc#1065729).\n- qede: Fix race between rdma destroy workqueue and link change event (networking-stable-20_03_01).\n- r8152: check disconnect status after long sleep (networking-stable-20_03_14).\n- raid6/ppc: Fix build for clang (git fixes (block drivers)).\n- random: always use batched entropy for get_random_u{32,64} (bsc#1164871).\n- rcu: locking and unlocking need to always be at least barriers (git fixes (block drivers)).\n- RDMA/ipoib: Fix use of sizeof() (bsc#1168503).\n- RDMA/netdev: Fix netlink support in IPoIB (bsc#1168503).\n- RDMA/netdev: Hoist alloc_netdev_mqs out of the driver (bsc#1168503).\n- RDMA/netdev: Use priv_destructor for netdev cleanup (bsc#1168503).\n- Remove 2 git-fixes that cause build issues. (bsc#1171691) \n- Revert \u0027drm/panel: simple: Add support for Sharp LQ150X1LG11 panels\u0027 (bsc#1114279) \n- Revert \u0027ipc,sem: remove uneeded sem_undo_list lock usage in exit_sem()\u0027 (bsc#1172221).\n- Revert \u0027RDMA/cma: Simplify rdma_resolve_addr() error flow\u0027 (bsc#1103992).\n- rtlwifi: Fix a double free in _rtl_usb_tx_urb_setup() (bsc#1051510).\n- s390/cpum_cf: Add new extended counters for IBM z15 (bsc#1169762 LTC#185291).\n- s390/pci: Fix possible deadlock in recover_store() (bsc#1165183 LTC#184103).\n- s390/pci: Recover handle in clp_set_pci_fn() (bsc#1165183 LTC#184103).\n- scripts/decodecode: fix trapping instruction formatting (bsc#1065729).\n- scripts/dtc: Remove redundant YYLOC global declaration (bsc#1160388).\n- scsi: bnx2i: fix potential use after free (bsc#1171600).\n- scsi: core: Handle drivers which set sg_tablesize to zero (bsc#1171601) \n- scsi: core: save/restore command resid for error handling (bsc#1171602).\n- scsi: core: scsi_trace: Use get_unaligned_be*() (bsc#1171604).\n- scsi: core: try to get module before removing device (bsc#1171605).\n- scsi: csiostor: Adjust indentation in csio_device_reset (bsc#1171606).\n- scsi: csiostor: Do not enable IRQs too early (bsc#1171607).\n- scsi: esas2r: unlock on error in esas2r_nvram_read_direct() (bsc#1171608).\n- scsi: fnic: fix invalid stack access (bsc#1171609).\n- scsi: fnic: fix msix interrupt allocation (bsc#1171610).\n- scsi: ibmvscsi: Fix WARN_ON during event pool release (bsc#1170791 ltc#185128).\n- scsi: iscsi: Avoid potential deadlock in iscsi_if_rx func (bsc#1171611).\n- scsi: iscsi: Fix a potential deadlock in the timeout handler (bsc#1171612).\n- scsi: iscsi: qla4xxx: fix double free in probe (bsc#1171613).\n- scsi: lpfc: Change default queue allocation for reduced memory consumption (bsc#1164780).\n- scsi: lpfc: fix: Coverity: lpfc_cmpl_els_rsp(): Null pointer dereferences (bsc#1171614).\n- scsi: lpfc: Fix crash in target side cable pulls hitting WAIT_FOR_UNREG (bsc#1171615).\n- scsi: lpfc: Fix lpfc_nodelist leak when processing unsolicited event (bsc#1164780).\n- scsi: lpfc: Fix MDS Diagnostic Enablement definition (bsc#1164780).\n- scsi: lpfc: Fix negation of else clause in lpfc_prep_node_fc4type (bsc#1164780).\n- scsi: lpfc: Fix noderef and address space warnings (bsc#1164780).\n- scsi: lpfc: Maintain atomic consistency of queue_claimed flag (bsc#1164780).\n- scsi: lpfc: remove duplicate unloading checks (bsc#1164780).\n- scsi: lpfc: Remove re-binding of nvme rport during registration (bsc#1164780).\n- scsi: lpfc: Remove redundant initialization to variable rc (bsc#1164780).\n- scsi: lpfc: Remove unnecessary lockdep_assert_held calls (bsc#1164780).\n- scsi: lpfc: Update lpfc version to 12.8.0.1 (bsc#1164780).\n- scsi: megaraid_sas: Do not initiate OCR if controller is not in ready state (bsc#1171616).\n- scsi: qla2xxx: add ring buffer for tracing debug logs (bsc#1157169).\n- scsi: qla2xxx: check UNLOADING before posting async work (bsc#1157169).\n- scsi: qla2xxx: Delete all sessions before unregister local nvme port (bsc#1157169).\n- scsi: qla2xxx: Do not log message when reading port speed via sysfs (bsc#1157169).\n- scsi: qla2xxx: Fix hang when issuing nvme disconnect-all in NPIV (bsc#1157169).\n- scsi: qla2xxx: Fix regression warnings (bsc#1157169).\n- scsi: qla2xxx: Remove non functional code (bsc#1157169).\n- scsi: qla2xxx: set UNLOADING before waiting for session deletion (bsc#1157169).\n- scsi: qla4xxx: Adjust indentation in qla4xxx_mem_free (bsc#1171617).\n- scsi: qla4xxx: fix double free bug (bsc#1171618).\n- scsi: sd: Clear sdkp-\u003eprotection_type if disk is reformatted without PI (bsc#1171619).\n- scsi: sg: add sg_remove_request in sg_common_write (bsc#1171620).\n- scsi: tracing: Fix handling of TRANSFER LENGTH == 0 for READ(6) and WRITE(6) (bsc#1171621).\n- scsi: ufs: change msleep to usleep_range (bsc#1171622).\n- scsi: ufs: Clean up ufshcd_scale_clks() and clock scaling error out path (bsc#1171623).\n- scsi: ufs: Fix ufshcd_hold() caused scheduling while atomic (bsc#1171624).\n- scsi: ufs: Fix ufshcd_probe_hba() reture value in case ufshcd_scsi_add_wlus() fails (bsc#1171625).\n- scsi: ufs: Recheck bkops level if bkops is disabled (bsc#1171626).\n- sctp: fix possibly using a bad saddr with a given dst (networking-stable-20_04_02).\n- sctp: fix refcount bug in sctp_wfree (networking-stable-20_04_02).\n- sctp: move the format error check out of __sctp_sf_do_9_1_abort (networking-stable-20_03_01).\n- selftests/powerpc: Fix build errors in powerpc ptrace selftests (boo#1124278).\n- seq_file: fix problem when seeking mid-record (bsc#1170125).\n- sfc: detach from cb_page in efx_copy_channel() (networking-stable-20_03_14).\n- signal/pid_namespace: Fix reboot_pid_ns to use send_sig not force_sig (bsc#1172185).\n- slcan: not call free_netdev before rtnl_unlock in slcan_open (networking-stable-20_03_28).\n- slip: make slhc_compress() more robust against malicious packets (networking-stable-20_03_14).\n- smb3: Additional compression structures (bsc#1144333).\n- smb3: Add new compression flags (bsc#1144333).\n- smb3: change noisy error message to FYI (bsc#1144333).\n- smb3: enable swap on SMB3 mounts (bsc#1144333).\n- smb3: Minor cleanup of protocol definitions (bsc#1144333).\n- smb3: remove overly noisy debug line in signing errors (bsc#1144333).\n- smb3: smbdirect support can be configured by default (bsc#1144333).\n- smb3: use SMB2_SIGNATURE_SIZE define (bsc#1144333).\n- spi: bcm63xx-hsspi: Really keep pll clk enabled (bsc#1051510).\n- spi: bcm-qspi: when tx/rx buffer is NULL set to 0 (bsc#1051510).\n- spi: dw: Add SPI Rx-done wait method to DMA-based transfer (bsc#1051510).\n- spi: dw: Add SPI Tx-done wait method to DMA-based transfer (bsc#1051510).\n- spi: dw: Zero DMA Tx and Rx configurations on stack (bsc#1051510).\n- spi: pxa2xx: Add CS control clock quirk (bsc#1051510).\n- spi: qup: call spi_qup_pm_resume_runtime before suspending (bsc#1051510).\n- spi/zynqmp: remove entry that causes a cs glitch (bsc#1051510).\n- staging: comedi: dt2815: fix writing hi byte of analog output (bsc#1051510).\n- staging: comedi: Fix comedi_device refcnt leak in comedi_open (bsc#1051510).\n- staging: iio: ad2s1210: Fix SPI reading (bsc#1051510).\n- supported.conf: Add br_netfilter to base (bsc#1169020).\n- supported.conf: support w1 core and thermometer support\n- svcrdma: Fix double svc_rdma_send_ctxt_put() in an error path (bsc#1103992).\n- svcrdma: Fix leak of transport addresses (git-fixes).\n- svcrdma: Fix trace point use-after-free race (bsc#1103992 ).\n- taskstats: fix data-race (bsc#1172188).\n- tcp: cache line align MAX_TCP_HEADER (networking-stable-20_04_27).\n- tcp: repair: fix TCP_QUEUE_SEQ implementation (networking-stable-20_03_28).\n- team: add missing attribute validation for array index (networking-stable-20_03_14).\n- team: add missing attribute validation for port ifindex (networking-stable-20_03_14).\n- team: fix hang in team_mode_get() (networking-stable-20_04_27).\n- tpm: ibmvtpm: retry on H_CLOSED in tpm_ibmvtpm_send() (bsc#1065729).\n- tpm/tpm_tis: Free IRQ if probing fails (bsc#1082555).\n- tun: Do not put_page() for all negative return values from XDP program (bsc#1109837).\n- Update config files: Build w1 bus on arm64 (jsc#SLE-11048)\n- usb: core: Fix misleading driver bug report (bsc#1051510).\n- usb: gadget: legacy: fix redundant initialization warnings (bsc#1051510).\n- usbnet: silence an unnecessary warning (bsc#1170770).\n- video: fbdev: sis: Remove unnecessary parentheses and commented code (bsc#1114279)\n- video: fbdev: w100fb: Fix a potential double free (bsc#1051510).\n- vrf: Check skb for XFRM_TRANSFORMED flag (networking-stable-20_04_27).\n- vxlan: check return value of gro_cells_init() (networking-stable-20_03_28).\n- w1: Add subsystem kernel public interface (jsc#SLE-11048).\n- w1: Fix slave count on 1-Wire bus (resend) (jsc#SLE-11048).\n- w1: keep balance of mutex locks and refcnts (jsc#SLE-11048).\n- w1: use put_device() if device_register() fail (jsc#SLE-11048).\n- wcn36xx: Fix error handling path in \u0027wcn36xx_probe()\u0027 (bsc#1051510).\n- wimax/i2400m: Fix potential urb refcnt leak (bsc#1051510).\n- workqueue: do not use wq_select_unbound_cpu() for bound works (bsc#1172130).\n- x86/amd_nb: Add Family 19h PCI IDs (jsc#SLE-11834).\n- x86/entry/64: Fix unwind hints in kernel exit path (bsc#1058115).\n- x86/entry/64: Fix unwind hints in register clearing code (bsc#1058115).\n- x86/entry/64: Fix unwind hints in rewind_stack_do_exit() (bsc#1058115).\n- x86/entry/64: Fix unwind hints in __switch_to_asm() (bsc#1058115).\n- x86/Hyper-V: Allow guests to enable InvariantTSC (bsc#1170620).\n- x86/Hyper-V: Allow guests to enable InvariantTSC (bsc#1170621, bsc#1170620).\n- x86/Hyper-V: Free hv_panic_page when fail to register kmsg dump (bsc#1170617, bsc#1170618).\n- x86/Hyper-V: Free hv_panic_page when fail to register kmsg dump (bsc#1170618).\n- x86/Hyper-V: Report crash data in die() when panic_on_oops is set (bsc#1170617, bsc#1170618).\n- x86/Hyper-V: Report crash data in die() when panic_on_oops is set (bsc#1170618).\n- x86/Hyper-V: Report crash register data or kmsg before running crash kernel (bsc#1170617, bsc#1170618).\n- x86/Hyper-V: Report crash register data or kmsg before running crash kernel (bsc#1170618).\n- x86/Hyper-V: Report crash register data when sysctl_record_panic_msg is not set (bsc#1170617, bsc#1170618).\n- x86/Hyper-V: Report crash register data when sysctl_record_panic_msg is not set (bsc#1170618).\n- x86: Hyper-V: report value of misc_features (git fixes).\n- x86/Hyper-V: Trigger crash enlightenment only once during system crash (bsc#1170617, bsc#1170618).\n- x86/Hyper-V: Trigger crash enlightenment only once during system crash (bsc#1170618).\n- x86/Hyper-V: Unload vmbus channel in hv panic callback (bsc#1170617, bsc#1170618).\n- x86/Hyper-V: Unload vmbus channel in hv panic callback (bsc#1170618).\n- x86/kprobes: Avoid kretprobe recursion bug (bsc#1114279).\n- x86/MCE/AMD: Add a KABI workaround for enum smca_bank_types (jsc#SLE-11833).\n- x86/MCE/AMD, EDAC/mce_amd: Add new Load Store unit McaType (jsc#SLE-11833).\n- x86/microcode/AMD: Increase microcode PATCH_MAX_SIZE (bsc#1169005).\n- x86/resctrl: Preserve CDP enable over CPU hotplug (bsc#1114279).\n- x86/unwind/orc: Do not skip the first frame for inactive tasks (bsc#1058115).\n- x86/unwind/orc: Fix error handling in __unwind_start() (bsc#1058115).\n- x86/unwind/orc: Fix error path for bad ORC entry type (bsc#1058115).\n- x86/unwind/orc: Fix unwind_get_return_address_ptr() for inactive tasks (bsc#1058115).\n- x86/unwind/orc: Prevent unwinding before ORC initialization (bsc#1058115).\n- x86/unwind: Prevent false warnings for non-current tasks (bsc#1058115).\n- x86/xen: fix booting 32-bit pv guest (bsc#1071995).\n- x86/xen: Make the boot CPU idle task reliable (bsc#1071995).\n- x86/xen: Make the secondary CPU idle tasks reliable (bsc#1071995).\n- xen/pci: reserve MCFG areas earlier (bsc#1170145).\n- xfrm: Always set XFRM_TRANSFORMED in xfrm{4,6}_output_finish (networking-stable-20_04_27).\n- xfs: Correctly invert xfs_buftarg LRU isolation logic (git-fixes).\n- xfs: do not ever return a stale pointer from __xfs_dir3_free_read (git-fixes).\n- xprtrdma: Fix completion wait during device removal (git-fixes).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2020-1602,SUSE-SLE-HA-12-SP5-2020-1602,SUSE-SLE-Live-Patching-12-SP5-2020-1602,SUSE-SLE-SDK-12-SP5-2020-1602,SUSE-SLE-SERVER-12-SP5-2020-1602,SUSE-SLE-WE-12-SP5-2020-1602", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2020_1602-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2020:1602-1", "url": "https://www.suse.com/support/update/announcement/2020/suse-su-20201602-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2020:1602-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-June/006928.html" }, { "category": "self", "summary": "SUSE Bug 1051510", "url": "https://bugzilla.suse.com/1051510" }, { "category": "self", "summary": "SUSE Bug 1058115", "url": "https://bugzilla.suse.com/1058115" }, { "category": "self", "summary": "SUSE Bug 1065729", "url": "https://bugzilla.suse.com/1065729" }, { "category": "self", "summary": "SUSE Bug 1071995", "url": "https://bugzilla.suse.com/1071995" }, { "category": "self", "summary": "SUSE Bug 1082555", "url": "https://bugzilla.suse.com/1082555" }, { "category": "self", "summary": "SUSE Bug 1083647", "url": "https://bugzilla.suse.com/1083647" }, { "category": "self", "summary": "SUSE Bug 1089895", "url": "https://bugzilla.suse.com/1089895" }, { "category": "self", "summary": "SUSE Bug 1103990", "url": "https://bugzilla.suse.com/1103990" }, { "category": "self", "summary": "SUSE Bug 1103991", "url": "https://bugzilla.suse.com/1103991" }, { "category": "self", "summary": "SUSE Bug 1103992", "url": "https://bugzilla.suse.com/1103992" }, { "category": "self", "summary": "SUSE Bug 1104745", "url": "https://bugzilla.suse.com/1104745" }, { "category": "self", "summary": "SUSE Bug 1109837", "url": "https://bugzilla.suse.com/1109837" }, { "category": "self", "summary": "SUSE Bug 1111666", "url": "https://bugzilla.suse.com/1111666" }, { "category": "self", "summary": "SUSE Bug 1112178", "url": "https://bugzilla.suse.com/1112178" }, { "category": "self", "summary": "SUSE Bug 1112374", "url": "https://bugzilla.suse.com/1112374" }, { "category": "self", "summary": "SUSE Bug 1113956", "url": "https://bugzilla.suse.com/1113956" }, { "category": "self", "summary": "SUSE Bug 1114279", "url": "https://bugzilla.suse.com/1114279" }, { "category": "self", "summary": "SUSE Bug 1124278", "url": "https://bugzilla.suse.com/1124278" }, { "category": "self", "summary": "SUSE Bug 1127354", "url": "https://bugzilla.suse.com/1127354" }, { "category": "self", "summary": "SUSE Bug 1127355", "url": "https://bugzilla.suse.com/1127355" }, { "category": "self", "summary": "SUSE Bug 1127371", "url": "https://bugzilla.suse.com/1127371" }, { "category": "self", "summary": "SUSE Bug 1133021", "url": "https://bugzilla.suse.com/1133021" }, { "category": "self", "summary": "SUSE Bug 1141558", "url": "https://bugzilla.suse.com/1141558" }, { "category": "self", "summary": "SUSE Bug 1142685", "url": "https://bugzilla.suse.com/1142685" }, { "category": "self", "summary": "SUSE Bug 1144333", "url": "https://bugzilla.suse.com/1144333" }, { "category": "self", "summary": "SUSE Bug 1151794", "url": "https://bugzilla.suse.com/1151794" }, { "category": "self", "summary": "SUSE Bug 1152489", "url": "https://bugzilla.suse.com/1152489" }, { "category": "self", "summary": "SUSE Bug 1154824", "url": "https://bugzilla.suse.com/1154824" }, { "category": "self", "summary": "SUSE Bug 1157169", "url": "https://bugzilla.suse.com/1157169" }, { "category": "self", "summary": "SUSE Bug 1158265", "url": "https://bugzilla.suse.com/1158265" }, { "category": "self", "summary": "SUSE Bug 1160388", "url": "https://bugzilla.suse.com/1160388" }, { "category": "self", "summary": "SUSE Bug 1160947", "url": "https://bugzilla.suse.com/1160947" }, { "category": "self", "summary": "SUSE Bug 1164780", "url": "https://bugzilla.suse.com/1164780" }, { "category": "self", "summary": "SUSE Bug 1164871", "url": "https://bugzilla.suse.com/1164871" }, { "category": "self", "summary": "SUSE Bug 1165183", "url": "https://bugzilla.suse.com/1165183" }, { "category": "self", "summary": "SUSE Bug 1165478", "url": "https://bugzilla.suse.com/1165478" }, { "category": "self", "summary": "SUSE Bug 1165741", "url": "https://bugzilla.suse.com/1165741" }, { "category": "self", "summary": "SUSE Bug 1166969", "url": "https://bugzilla.suse.com/1166969" }, { "category": "self", "summary": "SUSE Bug 1166978", "url": "https://bugzilla.suse.com/1166978" }, { "category": "self", "summary": "SUSE Bug 1167574", "url": "https://bugzilla.suse.com/1167574" }, { "category": "self", "summary": "SUSE Bug 1167851", "url": "https://bugzilla.suse.com/1167851" }, { "category": "self", "summary": "SUSE Bug 1167867", "url": "https://bugzilla.suse.com/1167867" }, { "category": "self", "summary": "SUSE Bug 1168332", "url": "https://bugzilla.suse.com/1168332" }, { "category": "self", "summary": "SUSE Bug 1168503", "url": "https://bugzilla.suse.com/1168503" }, { "category": "self", "summary": "SUSE Bug 1168670", "url": "https://bugzilla.suse.com/1168670" }, { "category": "self", "summary": "SUSE Bug 1168789", "url": "https://bugzilla.suse.com/1168789" }, { "category": "self", "summary": "SUSE Bug 1169005", "url": "https://bugzilla.suse.com/1169005" }, { "category": "self", "summary": "SUSE Bug 1169020", "url": "https://bugzilla.suse.com/1169020" }, { "category": "self", "summary": "SUSE Bug 1169514", "url": "https://bugzilla.suse.com/1169514" }, { "category": "self", "summary": "SUSE Bug 1169525", "url": "https://bugzilla.suse.com/1169525" }, { "category": "self", "summary": "SUSE Bug 1169762", "url": "https://bugzilla.suse.com/1169762" }, { "category": "self", "summary": "SUSE Bug 1170056", "url": "https://bugzilla.suse.com/1170056" }, { "category": "self", "summary": "SUSE Bug 1170125", "url": "https://bugzilla.suse.com/1170125" }, { "category": "self", "summary": "SUSE Bug 1170145", "url": "https://bugzilla.suse.com/1170145" }, { "category": "self", "summary": "SUSE Bug 1170284", "url": "https://bugzilla.suse.com/1170284" }, { "category": "self", "summary": "SUSE Bug 1170345", "url": "https://bugzilla.suse.com/1170345" }, { "category": "self", "summary": "SUSE Bug 1170457", "url": "https://bugzilla.suse.com/1170457" }, { "category": "self", "summary": "SUSE Bug 1170522", "url": "https://bugzilla.suse.com/1170522" }, { "category": "self", "summary": "SUSE Bug 1170592", "url": "https://bugzilla.suse.com/1170592" }, { "category": "self", "summary": "SUSE Bug 1170617", "url": "https://bugzilla.suse.com/1170617" }, { "category": "self", "summary": "SUSE Bug 1170618", "url": "https://bugzilla.suse.com/1170618" }, { "category": "self", "summary": "SUSE Bug 1170620", "url": "https://bugzilla.suse.com/1170620" }, { "category": "self", "summary": "SUSE Bug 1170621", "url": "https://bugzilla.suse.com/1170621" }, { "category": "self", "summary": "SUSE Bug 1170770", "url": "https://bugzilla.suse.com/1170770" }, { "category": "self", "summary": "SUSE Bug 1170778", "url": "https://bugzilla.suse.com/1170778" }, { "category": "self", "summary": "SUSE Bug 1170791", "url": "https://bugzilla.suse.com/1170791" }, { "category": "self", "summary": "SUSE Bug 1170901", "url": "https://bugzilla.suse.com/1170901" }, { "category": "self", "summary": "SUSE Bug 1171078", "url": "https://bugzilla.suse.com/1171078" }, { "category": "self", "summary": "SUSE Bug 1171098", "url": "https://bugzilla.suse.com/1171098" }, { "category": "self", "summary": "SUSE Bug 1171118", "url": "https://bugzilla.suse.com/1171118" }, { "category": "self", "summary": "SUSE Bug 1171189", "url": "https://bugzilla.suse.com/1171189" }, { "category": "self", "summary": "SUSE Bug 1171191", "url": "https://bugzilla.suse.com/1171191" }, { "category": "self", "summary": "SUSE Bug 1171195", "url": "https://bugzilla.suse.com/1171195" }, { "category": "self", "summary": "SUSE Bug 1171202", "url": "https://bugzilla.suse.com/1171202" }, { "category": "self", "summary": "SUSE Bug 1171205", "url": "https://bugzilla.suse.com/1171205" }, { "category": "self", "summary": "SUSE Bug 1171214", "url": "https://bugzilla.suse.com/1171214" }, { "category": "self", "summary": "SUSE Bug 1171217", "url": "https://bugzilla.suse.com/1171217" }, { "category": "self", "summary": "SUSE Bug 1171218", "url": "https://bugzilla.suse.com/1171218" }, { "category": "self", "summary": "SUSE Bug 1171219", "url": "https://bugzilla.suse.com/1171219" }, { "category": "self", "summary": "SUSE Bug 1171220", "url": "https://bugzilla.suse.com/1171220" }, { "category": "self", "summary": "SUSE Bug 1171244", "url": "https://bugzilla.suse.com/1171244" }, { "category": "self", "summary": "SUSE Bug 1171293", "url": "https://bugzilla.suse.com/1171293" }, { "category": "self", "summary": "SUSE Bug 1171417", "url": "https://bugzilla.suse.com/1171417" }, { "category": "self", "summary": "SUSE Bug 1171527", "url": "https://bugzilla.suse.com/1171527" }, { "category": "self", "summary": "SUSE Bug 1171599", "url": "https://bugzilla.suse.com/1171599" }, { "category": "self", "summary": "SUSE Bug 1171600", "url": "https://bugzilla.suse.com/1171600" }, { "category": "self", "summary": "SUSE Bug 1171601", "url": "https://bugzilla.suse.com/1171601" }, { "category": "self", "summary": "SUSE Bug 1171602", "url": "https://bugzilla.suse.com/1171602" }, { "category": "self", "summary": "SUSE Bug 1171604", "url": "https://bugzilla.suse.com/1171604" }, { "category": "self", "summary": "SUSE Bug 1171605", "url": "https://bugzilla.suse.com/1171605" }, { "category": "self", "summary": "SUSE Bug 1171606", "url": "https://bugzilla.suse.com/1171606" }, { "category": "self", "summary": "SUSE Bug 1171607", "url": "https://bugzilla.suse.com/1171607" }, { "category": "self", "summary": "SUSE Bug 1171608", "url": "https://bugzilla.suse.com/1171608" }, { "category": "self", "summary": "SUSE Bug 1171609", "url": "https://bugzilla.suse.com/1171609" }, { "category": "self", "summary": "SUSE Bug 1171610", "url": "https://bugzilla.suse.com/1171610" }, { "category": "self", "summary": "SUSE Bug 1171611", "url": "https://bugzilla.suse.com/1171611" }, { "category": "self", "summary": "SUSE Bug 1171612", "url": "https://bugzilla.suse.com/1171612" }, { "category": "self", "summary": "SUSE Bug 1171613", "url": "https://bugzilla.suse.com/1171613" }, { "category": "self", "summary": "SUSE Bug 1171614", "url": "https://bugzilla.suse.com/1171614" }, { "category": "self", "summary": "SUSE Bug 1171615", "url": "https://bugzilla.suse.com/1171615" }, { "category": "self", "summary": "SUSE Bug 1171616", "url": "https://bugzilla.suse.com/1171616" }, { "category": "self", "summary": "SUSE Bug 1171617", "url": "https://bugzilla.suse.com/1171617" }, { "category": "self", "summary": "SUSE Bug 1171618", "url": "https://bugzilla.suse.com/1171618" }, { "category": "self", "summary": "SUSE Bug 1171619", "url": "https://bugzilla.suse.com/1171619" }, { "category": "self", "summary": "SUSE Bug 1171620", "url": "https://bugzilla.suse.com/1171620" }, { "category": "self", "summary": "SUSE Bug 1171621", "url": "https://bugzilla.suse.com/1171621" }, { "category": "self", "summary": "SUSE Bug 1171622", "url": "https://bugzilla.suse.com/1171622" }, { "category": "self", "summary": "SUSE Bug 1171623", "url": "https://bugzilla.suse.com/1171623" }, { "category": "self", "summary": "SUSE Bug 1171624", "url": "https://bugzilla.suse.com/1171624" }, { "category": "self", "summary": "SUSE Bug 1171625", "url": "https://bugzilla.suse.com/1171625" }, { "category": "self", "summary": "SUSE Bug 1171626", "url": "https://bugzilla.suse.com/1171626" }, { "category": "self", "summary": "SUSE Bug 1171662", "url": "https://bugzilla.suse.com/1171662" }, { "category": "self", "summary": "SUSE Bug 1171679", "url": "https://bugzilla.suse.com/1171679" }, { "category": "self", "summary": "SUSE Bug 1171691", "url": "https://bugzilla.suse.com/1171691" }, { "category": "self", "summary": "SUSE Bug 1171692", "url": "https://bugzilla.suse.com/1171692" }, { "category": "self", "summary": "SUSE Bug 1171694", "url": "https://bugzilla.suse.com/1171694" }, { "category": "self", "summary": "SUSE Bug 1171695", "url": "https://bugzilla.suse.com/1171695" }, { "category": "self", "summary": "SUSE Bug 1171736", "url": "https://bugzilla.suse.com/1171736" }, { "category": "self", "summary": "SUSE Bug 1171761", "url": "https://bugzilla.suse.com/1171761" }, { "category": "self", "summary": "SUSE Bug 1171817", "url": "https://bugzilla.suse.com/1171817" }, { "category": "self", "summary": "SUSE Bug 1171948", "url": "https://bugzilla.suse.com/1171948" }, { "category": "self", "summary": "SUSE Bug 1171949", "url": "https://bugzilla.suse.com/1171949" }, { "category": "self", "summary": "SUSE Bug 1171951", "url": "https://bugzilla.suse.com/1171951" }, { "category": "self", "summary": "SUSE Bug 1171952", "url": "https://bugzilla.suse.com/1171952" }, { "category": "self", "summary": "SUSE Bug 1171979", "url": "https://bugzilla.suse.com/1171979" }, { "category": "self", "summary": "SUSE Bug 1171982", "url": "https://bugzilla.suse.com/1171982" }, { "category": "self", "summary": "SUSE Bug 1171983", "url": "https://bugzilla.suse.com/1171983" }, { "category": "self", "summary": "SUSE Bug 1172017", "url": "https://bugzilla.suse.com/1172017" }, { "category": "self", "summary": "SUSE Bug 1172096", "url": "https://bugzilla.suse.com/1172096" }, { "category": "self", "summary": "SUSE Bug 1172097", "url": "https://bugzilla.suse.com/1172097" }, { "category": "self", "summary": "SUSE Bug 1172098", "url": "https://bugzilla.suse.com/1172098" }, { "category": "self", "summary": "SUSE Bug 1172099", "url": "https://bugzilla.suse.com/1172099" }, { "category": "self", "summary": "SUSE Bug 1172101", "url": "https://bugzilla.suse.com/1172101" }, { "category": "self", "summary": "SUSE Bug 1172102", "url": "https://bugzilla.suse.com/1172102" }, { "category": "self", "summary": "SUSE Bug 1172103", "url": "https://bugzilla.suse.com/1172103" }, { "category": "self", "summary": "SUSE Bug 1172104", "url": "https://bugzilla.suse.com/1172104" }, { "category": "self", "summary": "SUSE Bug 1172127", "url": "https://bugzilla.suse.com/1172127" }, { "category": "self", "summary": "SUSE Bug 1172130", "url": "https://bugzilla.suse.com/1172130" }, { "category": "self", "summary": "SUSE Bug 1172185", "url": "https://bugzilla.suse.com/1172185" }, { "category": "self", "summary": "SUSE Bug 1172188", "url": "https://bugzilla.suse.com/1172188" }, { "category": "self", "summary": "SUSE Bug 1172199", "url": "https://bugzilla.suse.com/1172199" }, { "category": "self", "summary": "SUSE Bug 1172201", "url": "https://bugzilla.suse.com/1172201" }, { "category": "self", "summary": "SUSE Bug 1172202", "url": "https://bugzilla.suse.com/1172202" }, { "category": "self", "summary": "SUSE Bug 1172218", "url": "https://bugzilla.suse.com/1172218" }, { "category": "self", "summary": "SUSE Bug 1172221", "url": "https://bugzilla.suse.com/1172221" }, { "category": "self", "summary": "SUSE Bug 1172249", "url": "https://bugzilla.suse.com/1172249" }, { "category": "self", "summary": "SUSE Bug 1172251", "url": "https://bugzilla.suse.com/1172251" }, { "category": "self", "summary": "SUSE Bug 1172253", "url": "https://bugzilla.suse.com/1172253" }, { "category": "self", "summary": "SUSE Bug 1172317", "url": "https://bugzilla.suse.com/1172317" }, { "category": "self", "summary": "SUSE Bug 1172342", "url": "https://bugzilla.suse.com/1172342" }, { "category": "self", "summary": "SUSE Bug 1172343", "url": "https://bugzilla.suse.com/1172343" }, { "category": "self", "summary": "SUSE Bug 1172344", "url": "https://bugzilla.suse.com/1172344" }, { "category": "self", "summary": "SUSE Bug 1172366", "url": "https://bugzilla.suse.com/1172366" }, { "category": "self", "summary": "SUSE Bug 1172378", "url": "https://bugzilla.suse.com/1172378" }, { "category": "self", "summary": "SUSE Bug 1172391", "url": "https://bugzilla.suse.com/1172391" }, { "category": "self", "summary": "SUSE Bug 1172397", "url": "https://bugzilla.suse.com/1172397" }, { "category": "self", "summary": "SUSE Bug 1172453", "url": "https://bugzilla.suse.com/1172453" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1000199 page", "url": "https://www.suse.com/security/cve/CVE-2018-1000199/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-19462 page", "url": "https://www.suse.com/security/cve/CVE-2019-19462/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-20806 page", "url": "https://www.suse.com/security/cve/CVE-2019-20806/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-20812 page", "url": "https://www.suse.com/security/cve/CVE-2019-20812/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9455 page", "url": "https://www.suse.com/security/cve/CVE-2019-9455/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-0543 page", "url": "https://www.suse.com/security/cve/CVE-2020-0543/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10690 page", "url": "https://www.suse.com/security/cve/CVE-2020-10690/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10711 page", "url": "https://www.suse.com/security/cve/CVE-2020-10711/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10720 page", "url": "https://www.suse.com/security/cve/CVE-2020-10720/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10732 page", "url": "https://www.suse.com/security/cve/CVE-2020-10732/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10751 page", "url": "https://www.suse.com/security/cve/CVE-2020-10751/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10757 page", "url": "https://www.suse.com/security/cve/CVE-2020-10757/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12114 page", "url": "https://www.suse.com/security/cve/CVE-2020-12114/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12464 page", "url": "https://www.suse.com/security/cve/CVE-2020-12464/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12652 page", "url": "https://www.suse.com/security/cve/CVE-2020-12652/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12653 page", "url": "https://www.suse.com/security/cve/CVE-2020-12653/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12654 page", "url": "https://www.suse.com/security/cve/CVE-2020-12654/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12655 page", "url": "https://www.suse.com/security/cve/CVE-2020-12655/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12656 page", "url": "https://www.suse.com/security/cve/CVE-2020-12656/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12657 page", "url": "https://www.suse.com/security/cve/CVE-2020-12657/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12659 page", "url": "https://www.suse.com/security/cve/CVE-2020-12659/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12768 page", "url": "https://www.suse.com/security/cve/CVE-2020-12768/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12769 page", "url": "https://www.suse.com/security/cve/CVE-2020-12769/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-13143 page", "url": "https://www.suse.com/security/cve/CVE-2020-13143/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2020-06-10T13:28:28Z", "generator": { "date": "2020-06-10T13:28:28Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2020:1602-1", "initial_release_date": "2020-06-10T13:28:28Z", "revision_history": [ { "date": "2020-06-10T13:28:28Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-122.23.1.aarch64", "product": { "name": "cluster-md-kmp-default-4.12.14-122.23.1.aarch64", "product_id": "cluster-md-kmp-default-4.12.14-122.23.1.aarch64" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-122.23.1.aarch64", "product": { "name": "dlm-kmp-default-4.12.14-122.23.1.aarch64", "product_id": "dlm-kmp-default-4.12.14-122.23.1.aarch64" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-122.23.1.aarch64", "product": { "name": "gfs2-kmp-default-4.12.14-122.23.1.aarch64", "product_id": "gfs2-kmp-default-4.12.14-122.23.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-4.12.14-122.23.1.aarch64", "product": { "name": "kernel-default-4.12.14-122.23.1.aarch64", "product_id": "kernel-default-4.12.14-122.23.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-122.23.1.aarch64", "product": { "name": "kernel-default-base-4.12.14-122.23.1.aarch64", "product_id": "kernel-default-base-4.12.14-122.23.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-122.23.1.aarch64", "product": { "name": "kernel-default-devel-4.12.14-122.23.1.aarch64", "product_id": "kernel-default-devel-4.12.14-122.23.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-122.23.1.aarch64", "product": { "name": "kernel-default-extra-4.12.14-122.23.1.aarch64", "product_id": "kernel-default-extra-4.12.14-122.23.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.12.14-122.23.1.aarch64", "product": { "name": "kernel-default-kgraft-4.12.14-122.23.1.aarch64", "product_id": "kernel-default-kgraft-4.12.14-122.23.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-kgraft-devel-4.12.14-122.23.1.aarch64", "product": { "name": "kernel-default-kgraft-devel-4.12.14-122.23.1.aarch64", "product_id": "kernel-default-kgraft-devel-4.12.14-122.23.1.aarch64" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-122.23.1.aarch64", "product": { "name": "kernel-obs-build-4.12.14-122.23.1.aarch64", "product_id": "kernel-obs-build-4.12.14-122.23.1.aarch64" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-122.23.1.aarch64", "product": { "name": "kernel-obs-qa-4.12.14-122.23.1.aarch64", "product_id": "kernel-obs-qa-4.12.14-122.23.1.aarch64" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-122.23.1.aarch64", "product": { "name": "kernel-syms-4.12.14-122.23.1.aarch64", "product_id": "kernel-syms-4.12.14-122.23.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-122.23.1.aarch64", "product": { "name": "kernel-vanilla-4.12.14-122.23.1.aarch64", "product_id": "kernel-vanilla-4.12.14-122.23.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-122.23.1.aarch64", "product": { "name": "kernel-vanilla-base-4.12.14-122.23.1.aarch64", "product_id": "kernel-vanilla-base-4.12.14-122.23.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-122.23.1.aarch64", "product": { "name": "kernel-vanilla-devel-4.12.14-122.23.1.aarch64", "product_id": "kernel-vanilla-devel-4.12.14-122.23.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-kgraft-devel-4.12.14-122.23.1.aarch64", "product": { "name": "kernel-vanilla-kgraft-devel-4.12.14-122.23.1.aarch64", "product_id": "kernel-vanilla-kgraft-devel-4.12.14-122.23.1.aarch64" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-122.23.1.aarch64", "product": { "name": "kselftests-kmp-default-4.12.14-122.23.1.aarch64", "product_id": "kselftests-kmp-default-4.12.14-122.23.1.aarch64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-122.23.1.aarch64", "product": { "name": "ocfs2-kmp-default-4.12.14-122.23.1.aarch64", "product_id": "ocfs2-kmp-default-4.12.14-122.23.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-4.12.14-122.23.1.noarch", "product": { "name": "kernel-devel-4.12.14-122.23.1.noarch", "product_id": "kernel-devel-4.12.14-122.23.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-4.12.14-122.23.1.noarch", "product": { "name": "kernel-docs-4.12.14-122.23.1.noarch", "product_id": "kernel-docs-4.12.14-122.23.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-html-4.12.14-122.23.1.noarch", "product": { "name": "kernel-docs-html-4.12.14-122.23.1.noarch", "product_id": "kernel-docs-html-4.12.14-122.23.1.noarch" } }, { "category": "product_version", "name": "kernel-macros-4.12.14-122.23.1.noarch", "product": { "name": "kernel-macros-4.12.14-122.23.1.noarch", "product_id": "kernel-macros-4.12.14-122.23.1.noarch" } }, { "category": "product_version", "name": "kernel-source-4.12.14-122.23.1.noarch", "product": { "name": "kernel-source-4.12.14-122.23.1.noarch", "product_id": "kernel-source-4.12.14-122.23.1.noarch" } }, { "category": "product_version", "name": "kernel-source-vanilla-4.12.14-122.23.1.noarch", "product": { "name": "kernel-source-vanilla-4.12.14-122.23.1.noarch", "product_id": "kernel-source-vanilla-4.12.14-122.23.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-122.23.1.ppc64le", "product": { "name": "cluster-md-kmp-default-4.12.14-122.23.1.ppc64le", "product_id": "cluster-md-kmp-default-4.12.14-122.23.1.ppc64le" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-122.23.1.ppc64le", "product": { "name": "dlm-kmp-default-4.12.14-122.23.1.ppc64le", "product_id": "dlm-kmp-default-4.12.14-122.23.1.ppc64le" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-122.23.1.ppc64le", "product": { "name": "gfs2-kmp-default-4.12.14-122.23.1.ppc64le", "product_id": "gfs2-kmp-default-4.12.14-122.23.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-4.12.14-122.23.1.ppc64le", "product": { "name": "kernel-debug-4.12.14-122.23.1.ppc64le", "product_id": "kernel-debug-4.12.14-122.23.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-base-4.12.14-122.23.1.ppc64le", "product": { "name": "kernel-debug-base-4.12.14-122.23.1.ppc64le", "product_id": "kernel-debug-base-4.12.14-122.23.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-devel-4.12.14-122.23.1.ppc64le", "product": { "name": "kernel-debug-devel-4.12.14-122.23.1.ppc64le", "product_id": "kernel-debug-devel-4.12.14-122.23.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-kgraft-devel-4.12.14-122.23.1.ppc64le", "product": { "name": "kernel-debug-kgraft-devel-4.12.14-122.23.1.ppc64le", "product_id": "kernel-debug-kgraft-devel-4.12.14-122.23.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-4.12.14-122.23.1.ppc64le", "product": { "name": "kernel-default-4.12.14-122.23.1.ppc64le", "product_id": "kernel-default-4.12.14-122.23.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-122.23.1.ppc64le", "product": { "name": "kernel-default-base-4.12.14-122.23.1.ppc64le", "product_id": "kernel-default-base-4.12.14-122.23.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-122.23.1.ppc64le", "product": { "name": "kernel-default-devel-4.12.14-122.23.1.ppc64le", "product_id": "kernel-default-devel-4.12.14-122.23.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-122.23.1.ppc64le", "product": { "name": "kernel-default-extra-4.12.14-122.23.1.ppc64le", "product_id": "kernel-default-extra-4.12.14-122.23.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.12.14-122.23.1.ppc64le", "product": { "name": "kernel-default-kgraft-4.12.14-122.23.1.ppc64le", "product_id": "kernel-default-kgraft-4.12.14-122.23.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-kgraft-devel-4.12.14-122.23.1.ppc64le", "product": { "name": "kernel-default-kgraft-devel-4.12.14-122.23.1.ppc64le", "product_id": "kernel-default-kgraft-devel-4.12.14-122.23.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-122.23.1.ppc64le", "product": { "name": "kernel-obs-build-4.12.14-122.23.1.ppc64le", "product_id": "kernel-obs-build-4.12.14-122.23.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-122.23.1.ppc64le", "product": { "name": "kernel-obs-qa-4.12.14-122.23.1.ppc64le", "product_id": "kernel-obs-qa-4.12.14-122.23.1.ppc64le" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-122.23.1.ppc64le", "product": { "name": "kernel-syms-4.12.14-122.23.1.ppc64le", "product_id": "kernel-syms-4.12.14-122.23.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-122.23.1.ppc64le", "product": { "name": "kernel-vanilla-4.12.14-122.23.1.ppc64le", "product_id": "kernel-vanilla-4.12.14-122.23.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-122.23.1.ppc64le", "product": { "name": "kernel-vanilla-base-4.12.14-122.23.1.ppc64le", "product_id": "kernel-vanilla-base-4.12.14-122.23.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-122.23.1.ppc64le", "product": { "name": "kernel-vanilla-devel-4.12.14-122.23.1.ppc64le", "product_id": "kernel-vanilla-devel-4.12.14-122.23.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-kgraft-devel-4.12.14-122.23.1.ppc64le", "product": { "name": "kernel-vanilla-kgraft-devel-4.12.14-122.23.1.ppc64le", "product_id": "kernel-vanilla-kgraft-devel-4.12.14-122.23.1.ppc64le" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-122_23-default-1-8.3.1.ppc64le", "product": { "name": "kgraft-patch-4_12_14-122_23-default-1-8.3.1.ppc64le", "product_id": "kgraft-patch-4_12_14-122_23-default-1-8.3.1.ppc64le" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-122.23.1.ppc64le", "product": { "name": "kselftests-kmp-default-4.12.14-122.23.1.ppc64le", "product_id": "kselftests-kmp-default-4.12.14-122.23.1.ppc64le" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-122.23.1.ppc64le", "product": { "name": "ocfs2-kmp-default-4.12.14-122.23.1.ppc64le", "product_id": "ocfs2-kmp-default-4.12.14-122.23.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-122.23.1.s390x", "product": { "name": "cluster-md-kmp-default-4.12.14-122.23.1.s390x", "product_id": "cluster-md-kmp-default-4.12.14-122.23.1.s390x" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-122.23.1.s390x", "product": { "name": "dlm-kmp-default-4.12.14-122.23.1.s390x", "product_id": "dlm-kmp-default-4.12.14-122.23.1.s390x" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-122.23.1.s390x", "product": { "name": "gfs2-kmp-default-4.12.14-122.23.1.s390x", "product_id": "gfs2-kmp-default-4.12.14-122.23.1.s390x" } }, { "category": "product_version", "name": "kernel-default-4.12.14-122.23.1.s390x", "product": { "name": "kernel-default-4.12.14-122.23.1.s390x", "product_id": "kernel-default-4.12.14-122.23.1.s390x" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-122.23.1.s390x", "product": { "name": "kernel-default-base-4.12.14-122.23.1.s390x", "product_id": "kernel-default-base-4.12.14-122.23.1.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-122.23.1.s390x", "product": { "name": "kernel-default-devel-4.12.14-122.23.1.s390x", "product_id": "kernel-default-devel-4.12.14-122.23.1.s390x" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-122.23.1.s390x", "product": { "name": "kernel-default-extra-4.12.14-122.23.1.s390x", "product_id": "kernel-default-extra-4.12.14-122.23.1.s390x" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.12.14-122.23.1.s390x", "product": { "name": "kernel-default-kgraft-4.12.14-122.23.1.s390x", "product_id": "kernel-default-kgraft-4.12.14-122.23.1.s390x" } }, { "category": "product_version", "name": "kernel-default-kgraft-devel-4.12.14-122.23.1.s390x", "product": { "name": "kernel-default-kgraft-devel-4.12.14-122.23.1.s390x", "product_id": "kernel-default-kgraft-devel-4.12.14-122.23.1.s390x" } }, { "category": "product_version", "name": "kernel-default-man-4.12.14-122.23.1.s390x", "product": { "name": "kernel-default-man-4.12.14-122.23.1.s390x", "product_id": "kernel-default-man-4.12.14-122.23.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-122.23.1.s390x", "product": { "name": "kernel-obs-build-4.12.14-122.23.1.s390x", "product_id": "kernel-obs-build-4.12.14-122.23.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-122.23.1.s390x", "product": { "name": "kernel-obs-qa-4.12.14-122.23.1.s390x", "product_id": "kernel-obs-qa-4.12.14-122.23.1.s390x" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-122.23.1.s390x", "product": { "name": "kernel-syms-4.12.14-122.23.1.s390x", "product_id": "kernel-syms-4.12.14-122.23.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-122.23.1.s390x", "product": { "name": "kernel-vanilla-4.12.14-122.23.1.s390x", "product_id": "kernel-vanilla-4.12.14-122.23.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-122.23.1.s390x", "product": { "name": "kernel-vanilla-base-4.12.14-122.23.1.s390x", "product_id": "kernel-vanilla-base-4.12.14-122.23.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-122.23.1.s390x", "product": { "name": "kernel-vanilla-devel-4.12.14-122.23.1.s390x", "product_id": "kernel-vanilla-devel-4.12.14-122.23.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-kgraft-devel-4.12.14-122.23.1.s390x", "product": { "name": "kernel-vanilla-kgraft-devel-4.12.14-122.23.1.s390x", "product_id": "kernel-vanilla-kgraft-devel-4.12.14-122.23.1.s390x" } }, { "category": "product_version", "name": "kernel-zfcpdump-4.12.14-122.23.1.s390x", "product": { "name": "kernel-zfcpdump-4.12.14-122.23.1.s390x", "product_id": "kernel-zfcpdump-4.12.14-122.23.1.s390x" } }, { "category": "product_version", "name": "kernel-zfcpdump-man-4.12.14-122.23.1.s390x", "product": { "name": "kernel-zfcpdump-man-4.12.14-122.23.1.s390x", "product_id": "kernel-zfcpdump-man-4.12.14-122.23.1.s390x" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-122_23-default-1-8.3.1.s390x", "product": { "name": "kgraft-patch-4_12_14-122_23-default-1-8.3.1.s390x", "product_id": "kgraft-patch-4_12_14-122_23-default-1-8.3.1.s390x" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-122.23.1.s390x", "product": { "name": "kselftests-kmp-default-4.12.14-122.23.1.s390x", "product_id": "kselftests-kmp-default-4.12.14-122.23.1.s390x" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-122.23.1.s390x", "product": { "name": "ocfs2-kmp-default-4.12.14-122.23.1.s390x", "product_id": "ocfs2-kmp-default-4.12.14-122.23.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-122.23.1.x86_64", "product": { "name": "cluster-md-kmp-default-4.12.14-122.23.1.x86_64", "product_id": "cluster-md-kmp-default-4.12.14-122.23.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-122.23.1.x86_64", "product": { "name": "dlm-kmp-default-4.12.14-122.23.1.x86_64", "product_id": "dlm-kmp-default-4.12.14-122.23.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-122.23.1.x86_64", "product": { "name": "gfs2-kmp-default-4.12.14-122.23.1.x86_64", "product_id": "gfs2-kmp-default-4.12.14-122.23.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-4.12.14-122.23.1.x86_64", "product": { "name": "kernel-debug-4.12.14-122.23.1.x86_64", "product_id": "kernel-debug-4.12.14-122.23.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-base-4.12.14-122.23.1.x86_64", "product": { "name": "kernel-debug-base-4.12.14-122.23.1.x86_64", "product_id": "kernel-debug-base-4.12.14-122.23.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-devel-4.12.14-122.23.1.x86_64", "product": { "name": "kernel-debug-devel-4.12.14-122.23.1.x86_64", "product_id": "kernel-debug-devel-4.12.14-122.23.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-kgraft-devel-4.12.14-122.23.1.x86_64", "product": { "name": "kernel-debug-kgraft-devel-4.12.14-122.23.1.x86_64", "product_id": "kernel-debug-kgraft-devel-4.12.14-122.23.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-4.12.14-122.23.1.x86_64", "product": { "name": "kernel-default-4.12.14-122.23.1.x86_64", "product_id": "kernel-default-4.12.14-122.23.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-122.23.1.x86_64", "product": { "name": "kernel-default-base-4.12.14-122.23.1.x86_64", "product_id": "kernel-default-base-4.12.14-122.23.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-122.23.1.x86_64", "product": { "name": "kernel-default-devel-4.12.14-122.23.1.x86_64", "product_id": "kernel-default-devel-4.12.14-122.23.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-122.23.1.x86_64", "product": { "name": "kernel-default-extra-4.12.14-122.23.1.x86_64", "product_id": "kernel-default-extra-4.12.14-122.23.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.12.14-122.23.1.x86_64", "product": { "name": "kernel-default-kgraft-4.12.14-122.23.1.x86_64", "product_id": "kernel-default-kgraft-4.12.14-122.23.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-kgraft-devel-4.12.14-122.23.1.x86_64", "product": { "name": "kernel-default-kgraft-devel-4.12.14-122.23.1.x86_64", "product_id": "kernel-default-kgraft-devel-4.12.14-122.23.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-4.12.14-122.23.1.x86_64", "product": { "name": "kernel-kvmsmall-4.12.14-122.23.1.x86_64", "product_id": "kernel-kvmsmall-4.12.14-122.23.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-base-4.12.14-122.23.1.x86_64", "product": { "name": "kernel-kvmsmall-base-4.12.14-122.23.1.x86_64", "product_id": "kernel-kvmsmall-base-4.12.14-122.23.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-devel-4.12.14-122.23.1.x86_64", "product": { "name": "kernel-kvmsmall-devel-4.12.14-122.23.1.x86_64", "product_id": "kernel-kvmsmall-devel-4.12.14-122.23.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-kgraft-devel-4.12.14-122.23.1.x86_64", "product": { "name": "kernel-kvmsmall-kgraft-devel-4.12.14-122.23.1.x86_64", "product_id": "kernel-kvmsmall-kgraft-devel-4.12.14-122.23.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-122.23.1.x86_64", "product": { "name": "kernel-obs-build-4.12.14-122.23.1.x86_64", "product_id": "kernel-obs-build-4.12.14-122.23.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-122.23.1.x86_64", "product": { "name": "kernel-obs-qa-4.12.14-122.23.1.x86_64", "product_id": "kernel-obs-qa-4.12.14-122.23.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-122.23.1.x86_64", "product": { "name": "kernel-syms-4.12.14-122.23.1.x86_64", "product_id": "kernel-syms-4.12.14-122.23.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-122.23.1.x86_64", "product": { "name": "kernel-vanilla-4.12.14-122.23.1.x86_64", "product_id": "kernel-vanilla-4.12.14-122.23.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-122.23.1.x86_64", "product": { "name": "kernel-vanilla-base-4.12.14-122.23.1.x86_64", "product_id": "kernel-vanilla-base-4.12.14-122.23.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-122.23.1.x86_64", "product": { "name": "kernel-vanilla-devel-4.12.14-122.23.1.x86_64", "product_id": "kernel-vanilla-devel-4.12.14-122.23.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-kgraft-devel-4.12.14-122.23.1.x86_64", "product": { "name": "kernel-vanilla-kgraft-devel-4.12.14-122.23.1.x86_64", "product_id": "kernel-vanilla-kgraft-devel-4.12.14-122.23.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-122_23-default-1-8.3.1.x86_64", "product": { "name": "kgraft-patch-4_12_14-122_23-default-1-8.3.1.x86_64", "product_id": "kgraft-patch-4_12_14-122_23-default-1-8.3.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-122.23.1.x86_64", "product": { "name": "kselftests-kmp-default-4.12.14-122.23.1.x86_64", "product_id": "kselftests-kmp-default-4.12.14-122.23.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-122.23.1.x86_64", "product": { "name": "ocfs2-kmp-default-4.12.14-122.23.1.x86_64", "product_id": "ocfs2-kmp-default-4.12.14-122.23.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise High Availability Extension 12 SP5", "product": { "name": "SUSE Linux Enterprise High Availability Extension 12 SP5", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-ha:12:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12 SP5", "product": { "name": "SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Software Development Kit 12 SP5", "product": { "name": "SUSE Linux Enterprise Software Development Kit 12 SP5", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-sdk:12:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP5", "product": { "name": "SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sles:12:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Workstation Extension 12 SP5", "product": { "name": "SUSE Linux Enterprise Workstation Extension 12 SP5", "product_id": "SUSE Linux Enterprise Workstation Extension 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-we:12:sp5" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-122.23.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP5", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.ppc64le" }, "product_reference": "cluster-md-kmp-default-4.12.14-122.23.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-122.23.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP5", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.s390x" }, "product_reference": "cluster-md-kmp-default-4.12.14-122.23.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-122.23.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP5", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.x86_64" }, "product_reference": "cluster-md-kmp-default-4.12.14-122.23.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-122.23.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP5", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.ppc64le" }, "product_reference": "dlm-kmp-default-4.12.14-122.23.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-122.23.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP5", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.s390x" }, "product_reference": "dlm-kmp-default-4.12.14-122.23.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-122.23.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP5", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.x86_64" }, "product_reference": "dlm-kmp-default-4.12.14-122.23.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-122.23.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP5", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.ppc64le" }, "product_reference": "gfs2-kmp-default-4.12.14-122.23.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-122.23.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP5", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.s390x" }, "product_reference": "gfs2-kmp-default-4.12.14-122.23.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-122.23.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP5", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.x86_64" }, "product_reference": "gfs2-kmp-default-4.12.14-122.23.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-122.23.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP5", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.ppc64le" }, "product_reference": "ocfs2-kmp-default-4.12.14-122.23.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-122.23.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP5", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.s390x" }, "product_reference": "ocfs2-kmp-default-4.12.14-122.23.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-122.23.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP5", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.x86_64" }, "product_reference": "ocfs2-kmp-default-4.12.14-122.23.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-kgraft-4.12.14-122.23.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.ppc64le" }, "product_reference": "kernel-default-kgraft-4.12.14-122.23.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-kgraft-4.12.14-122.23.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.s390x" }, "product_reference": "kernel-default-kgraft-4.12.14-122.23.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-kgraft-4.12.14-122.23.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.x86_64" }, "product_reference": "kernel-default-kgraft-4.12.14-122.23.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-kgraft-devel-4.12.14-122.23.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.ppc64le" }, "product_reference": "kernel-default-kgraft-devel-4.12.14-122.23.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-kgraft-devel-4.12.14-122.23.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.s390x" }, "product_reference": "kernel-default-kgraft-devel-4.12.14-122.23.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-kgraft-devel-4.12.14-122.23.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.x86_64" }, "product_reference": "kernel-default-kgraft-devel-4.12.14-122.23.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_23-default-1-8.3.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_23-default-1-8.3.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_23-default-1-8.3.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_23-default-1-8.3.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_23-default-1-8.3.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_23-default-1-8.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-4.12.14-122.23.1.noarch as component of SUSE Linux Enterprise Software Development Kit 12 SP5", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.23.1.noarch" }, "product_reference": "kernel-docs-4.12.14-122.23.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-122.23.1.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.aarch64" }, "product_reference": "kernel-obs-build-4.12.14-122.23.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-122.23.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP5", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.ppc64le" }, "product_reference": "kernel-obs-build-4.12.14-122.23.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-122.23.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP5", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.s390x" }, "product_reference": "kernel-obs-build-4.12.14-122.23.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-122.23.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.x86_64" }, "product_reference": "kernel-obs-build-4.12.14-122.23.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-122.23.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.aarch64" }, "product_reference": "kernel-default-4.12.14-122.23.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-122.23.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.ppc64le" }, "product_reference": "kernel-default-4.12.14-122.23.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-122.23.1.s390x as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.s390x" }, "product_reference": "kernel-default-4.12.14-122.23.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-122.23.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.x86_64" }, "product_reference": "kernel-default-4.12.14-122.23.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-122.23.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.aarch64" }, "product_reference": "kernel-default-base-4.12.14-122.23.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-122.23.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.ppc64le" }, "product_reference": "kernel-default-base-4.12.14-122.23.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-122.23.1.s390x as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.s390x" }, "product_reference": "kernel-default-base-4.12.14-122.23.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-122.23.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.x86_64" }, "product_reference": "kernel-default-base-4.12.14-122.23.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-122.23.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.aarch64" }, "product_reference": "kernel-default-devel-4.12.14-122.23.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-122.23.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.ppc64le" }, "product_reference": "kernel-default-devel-4.12.14-122.23.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-122.23.1.s390x as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.s390x" }, "product_reference": "kernel-default-devel-4.12.14-122.23.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-122.23.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.x86_64" }, "product_reference": "kernel-default-devel-4.12.14-122.23.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-4.12.14-122.23.1.s390x as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.23.1.s390x" }, "product_reference": "kernel-default-man-4.12.14-122.23.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.12.14-122.23.1.noarch as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.23.1.noarch" }, "product_reference": "kernel-devel-4.12.14-122.23.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.12.14-122.23.1.noarch as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.23.1.noarch" }, "product_reference": "kernel-macros-4.12.14-122.23.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.12.14-122.23.1.noarch as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.23.1.noarch" }, "product_reference": "kernel-source-4.12.14-122.23.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-122.23.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.aarch64" }, "product_reference": "kernel-syms-4.12.14-122.23.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-122.23.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.ppc64le" }, "product_reference": "kernel-syms-4.12.14-122.23.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-122.23.1.s390x as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.s390x" }, "product_reference": "kernel-syms-4.12.14-122.23.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-122.23.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.x86_64" }, "product_reference": "kernel-syms-4.12.14-122.23.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-122.23.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.aarch64" }, "product_reference": "kernel-default-4.12.14-122.23.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-122.23.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.ppc64le" }, "product_reference": "kernel-default-4.12.14-122.23.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-122.23.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.s390x" }, "product_reference": "kernel-default-4.12.14-122.23.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-122.23.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.x86_64" }, "product_reference": "kernel-default-4.12.14-122.23.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-122.23.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.aarch64" }, "product_reference": "kernel-default-base-4.12.14-122.23.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-122.23.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.ppc64le" }, "product_reference": "kernel-default-base-4.12.14-122.23.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-122.23.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.s390x" }, "product_reference": "kernel-default-base-4.12.14-122.23.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-122.23.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.x86_64" }, "product_reference": "kernel-default-base-4.12.14-122.23.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-122.23.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.aarch64" }, "product_reference": "kernel-default-devel-4.12.14-122.23.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-122.23.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.ppc64le" }, "product_reference": "kernel-default-devel-4.12.14-122.23.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-122.23.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.s390x" }, "product_reference": "kernel-default-devel-4.12.14-122.23.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-122.23.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.x86_64" }, "product_reference": "kernel-default-devel-4.12.14-122.23.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-4.12.14-122.23.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.23.1.s390x" }, "product_reference": "kernel-default-man-4.12.14-122.23.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.12.14-122.23.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.23.1.noarch" }, "product_reference": "kernel-devel-4.12.14-122.23.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.12.14-122.23.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.23.1.noarch" }, "product_reference": "kernel-macros-4.12.14-122.23.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.12.14-122.23.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.23.1.noarch" }, "product_reference": "kernel-source-4.12.14-122.23.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-122.23.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.aarch64" }, "product_reference": "kernel-syms-4.12.14-122.23.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-122.23.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.ppc64le" }, "product_reference": "kernel-syms-4.12.14-122.23.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-122.23.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.s390x" }, "product_reference": "kernel-syms-4.12.14-122.23.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-122.23.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.x86_64" }, "product_reference": "kernel-syms-4.12.14-122.23.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-extra-4.12.14-122.23.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 12 SP5", "product_id": "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.23.1.x86_64" }, "product_reference": "kernel-default-extra-4.12.14-122.23.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 12 SP5" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-1000199", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1000199" } ], "notes": [ { "category": "general", "text": "The Linux Kernel version 3.18 contains a dangerous feature vulnerability in modify_user_hw_breakpoint() that can result in crash and possibly memory corruption. This attack appear to be exploitable via local code execution and the ability to use ptrace. This vulnerability appears to have been fixed in git commit f67b15037a7a50c57f72e69a6d59941ad90a0f0f.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.23.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1000199", "url": "https://www.suse.com/security/cve/CVE-2018-1000199" }, { "category": "external", "summary": "SUSE Bug 1089895 for CVE-2018-1000199", "url": "https://bugzilla.suse.com/1089895" }, { "category": "external", "summary": "SUSE Bug 1090036 for CVE-2018-1000199", "url": "https://bugzilla.suse.com/1090036" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.23.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.23.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-10T13:28:28Z", "details": "important" } ], "title": "CVE-2018-1000199" }, { "cve": "CVE-2019-19462", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-19462" } ], "notes": [ { "category": "general", "text": "relay_open in kernel/relay.c in the Linux kernel through 5.4.1 allows local users to cause a denial of service (such as relay blockage) by triggering a NULL alloc_percpu result.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.23.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-19462", "url": "https://www.suse.com/security/cve/CVE-2019-19462" }, { "category": "external", "summary": "SUSE Bug 1158265 for CVE-2019-19462", "url": "https://bugzilla.suse.com/1158265" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.23.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.23.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-10T13:28:28Z", "details": "low" } ], "title": "CVE-2019-19462" }, { "cve": "CVE-2019-20806", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-20806" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.2. There is a NULL pointer dereference in tw5864_handle_frame() in drivers/media/pci/tw5864/tw5864-video.c, which may cause denial of service, aka CID-2e7682ebfc75.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.23.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-20806", "url": "https://www.suse.com/security/cve/CVE-2019-20806" }, { "category": "external", "summary": "SUSE Bug 1172199 for CVE-2019-20806", "url": "https://bugzilla.suse.com/1172199" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.23.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.9, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.23.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-10T13:28:28Z", "details": "low" } ], "title": "CVE-2019-20806" }, { "cve": "CVE-2019-20812", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-20812" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.4.7. The prb_calc_retire_blk_tmo() function in net/packet/af_packet.c can result in a denial of service (CPU consumption and soft lockup) in a certain failure case involving TPACKET_V3, aka CID-b43d1f9f7067.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.23.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-20812", "url": "https://www.suse.com/security/cve/CVE-2019-20812" }, { "category": "external", "summary": "SUSE Bug 1172453 for CVE-2019-20812", "url": "https://bugzilla.suse.com/1172453" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.23.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.23.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-10T13:28:28Z", "details": "moderate" } ], "title": "CVE-2019-20812" }, { "cve": "CVE-2019-9455", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9455" } ], "notes": [ { "category": "general", "text": "In the Android kernel in the video driver there is a kernel pointer leak due to a WARN_ON statement. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.23.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9455", "url": "https://www.suse.com/security/cve/CVE-2019-9455" }, { "category": "external", "summary": "SUSE Bug 1170345 for CVE-2019-9455", "url": "https://bugzilla.suse.com/1170345" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.23.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.23.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-10T13:28:28Z", "details": "moderate" } ], "title": "CVE-2019-9455" }, { "cve": "CVE-2020-0543", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-0543" } ], "notes": [ { "category": "general", "text": "Incomplete cleanup from specific special register read operations in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.23.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-0543", "url": "https://www.suse.com/security/cve/CVE-2020-0543" }, { "category": "external", "summary": "SUSE Bug 1154824 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1154824" }, { "category": "external", "summary": "SUSE Bug 1172205 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172205" }, { "category": "external", "summary": "SUSE Bug 1172206 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172206" }, { "category": "external", "summary": "SUSE Bug 1172207 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172207" }, { "category": "external", "summary": "SUSE Bug 1172770 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172770" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.23.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.23.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-10T13:28:28Z", "details": "moderate" } ], "title": "CVE-2020-0543" }, { "cve": "CVE-2020-10690", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10690" } ], "notes": [ { "category": "general", "text": "There is a use-after-free in kernel versions before 5.5 due to a race condition between the release of ptp_clock and cdev while resource deallocation. When a (high privileged) process allocates a ptp device file (like /dev/ptpX) and voluntarily goes to sleep. During this time if the underlying device is removed, it can cause an exploitable condition as the process wakes up to terminate and clean all attached files. The system crashes due to the cdev structure being invalid (as already freed) which is pointed to by the inode.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.23.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10690", "url": "https://www.suse.com/security/cve/CVE-2020-10690" }, { "category": "external", "summary": "SUSE Bug 1170056 for CVE-2020-10690", "url": "https://bugzilla.suse.com/1170056" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.23.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.23.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-10T13:28:28Z", "details": "moderate" } ], "title": "CVE-2020-10690" }, { "cve": "CVE-2020-10711", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10711" } ], "notes": [ { "category": "general", "text": "A NULL pointer dereference flaw was found in the Linux kernel\u0027s SELinux subsystem in versions before 5.7. This flaw occurs while importing the Commercial IP Security Option (CIPSO) protocol\u0027s category bitmap into the SELinux extensible bitmap via the\u0027 ebitmap_netlbl_import\u0027 routine. While processing the CIPSO restricted bitmap tag in the \u0027cipso_v4_parsetag_rbm\u0027 routine, it sets the security attribute to indicate that the category bitmap is present, even if it has not been allocated. This issue leads to a NULL pointer dereference issue while importing the same category bitmap into SELinux. This flaw allows a remote network user to crash the system kernel, resulting in a denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.23.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10711", "url": "https://www.suse.com/security/cve/CVE-2020-10711" }, { "category": "external", "summary": "SUSE Bug 1171191 for CVE-2020-10711", "url": "https://bugzilla.suse.com/1171191" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.23.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.23.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-10T13:28:28Z", "details": "moderate" } ], "title": "CVE-2020-10711" }, { "cve": "CVE-2020-10720", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10720" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s implementation of GRO in versions before 5.2. This flaw allows an attacker with local access to crash the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.23.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10720", "url": "https://www.suse.com/security/cve/CVE-2020-10720" }, { "category": "external", "summary": "SUSE Bug 1170778 for CVE-2020-10720", "url": "https://bugzilla.suse.com/1170778" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.23.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.23.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-10T13:28:28Z", "details": "moderate" } ], "title": "CVE-2020-10720" }, { "cve": "CVE-2020-10732", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10732" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s implementation of Userspace core dumps. This flaw allows an attacker with a local account to crash a trivial program and exfiltrate private kernel data.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.23.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10732", "url": "https://www.suse.com/security/cve/CVE-2020-10732" }, { "category": "external", "summary": "SUSE Bug 1171220 for CVE-2020-10732", "url": "https://bugzilla.suse.com/1171220" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.23.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.23.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-10T13:28:28Z", "details": "low" } ], "title": "CVE-2020-10732" }, { "cve": "CVE-2020-10751", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10751" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernels SELinux LSM hook implementation before version 5.7, where it incorrectly assumed that an skb would only contain a single netlink message. The hook would incorrectly only validate the first netlink message in the skb and allow or deny the rest of the messages within the skb with the granted permission without further processing.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.23.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10751", "url": "https://www.suse.com/security/cve/CVE-2020-10751" }, { "category": "external", "summary": "SUSE Bug 1171189 for CVE-2020-10751", "url": "https://bugzilla.suse.com/1171189" }, { "category": "external", "summary": "SUSE Bug 1174963 for CVE-2020-10751", "url": "https://bugzilla.suse.com/1174963" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.23.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.23.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-10T13:28:28Z", "details": "moderate" } ], "title": "CVE-2020-10751" }, { "cve": "CVE-2020-10757", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10757" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux Kernel in versions after 4.5-rc1 in the way mremap handled DAX Huge Pages. This flaw allows a local attacker with access to a DAX enabled storage to escalate their privileges on the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.23.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10757", "url": "https://www.suse.com/security/cve/CVE-2020-10757" }, { "category": "external", "summary": "SUSE Bug 1159281 for CVE-2020-10757", "url": "https://bugzilla.suse.com/1159281" }, { "category": "external", "summary": "SUSE Bug 1172317 for CVE-2020-10757", "url": "https://bugzilla.suse.com/1172317" }, { "category": "external", "summary": "SUSE Bug 1172437 for CVE-2020-10757", "url": "https://bugzilla.suse.com/1172437" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.23.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.23.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-10T13:28:28Z", "details": "important" } ], "title": "CVE-2020-10757" }, { "cve": "CVE-2020-12114", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12114" } ], "notes": [ { "category": "general", "text": "A pivot_root race condition in fs/namespace.c in the Linux kernel 4.4.x before 4.4.221, 4.9.x before 4.9.221, 4.14.x before 4.14.178, 4.19.x before 4.19.119, and 5.x before 5.3 allows local users to cause a denial of service (panic) by corrupting a mountpoint reference counter.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.23.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12114", "url": "https://www.suse.com/security/cve/CVE-2020-12114" }, { "category": "external", "summary": "SUSE Bug 1171098 for CVE-2020-12114", "url": "https://bugzilla.suse.com/1171098" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.23.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.23.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-10T13:28:28Z", "details": "moderate" } ], "title": "CVE-2020-12114" }, { "cve": "CVE-2020-12464", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12464" } ], "notes": [ { "category": "general", "text": "usb_sg_cancel in drivers/usb/core/message.c in the Linux kernel before 5.6.8 has a use-after-free because a transfer occurs without a reference, aka CID-056ad39ee925.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.23.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12464", "url": "https://www.suse.com/security/cve/CVE-2020-12464" }, { "category": "external", "summary": "SUSE Bug 1170901 for CVE-2020-12464", "url": "https://bugzilla.suse.com/1170901" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.23.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 1.8, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.23.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-10T13:28:28Z", "details": "low" } ], "title": "CVE-2020-12464" }, { "cve": "CVE-2020-12652", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12652" } ], "notes": [ { "category": "general", "text": "The __mptctl_ioctl function in drivers/message/fusion/mptctl.c in the Linux kernel before 5.4.14 allows local users to hold an incorrect lock during the ioctl operation and trigger a race condition, i.e., a \"double fetch\" vulnerability, aka CID-28d76df18f0a. NOTE: the vendor states \"The security impact of this bug is not as bad as it could have been because these operations are all privileged and root already has enormous destructive power.\"", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.23.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12652", "url": "https://www.suse.com/security/cve/CVE-2020-12652" }, { "category": "external", "summary": "SUSE Bug 1171218 for CVE-2020-12652", "url": "https://bugzilla.suse.com/1171218" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.23.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.23.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-10T13:28:28Z", "details": "moderate" } ], "title": "CVE-2020-12652" }, { "cve": "CVE-2020-12653", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12653" } ], "notes": [ { "category": "general", "text": "An issue was found in Linux kernel before 5.5.4. The mwifiex_cmd_append_vsie_tlv() function in drivers/net/wireless/marvell/mwifiex/scan.c allows local users to gain privileges or cause a denial of service because of an incorrect memcpy and buffer overflow, aka CID-b70261a288ea.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.23.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12653", "url": "https://www.suse.com/security/cve/CVE-2020-12653" }, { "category": "external", "summary": "SUSE Bug 1159281 for CVE-2020-12653", "url": "https://bugzilla.suse.com/1159281" }, { "category": "external", "summary": "SUSE Bug 1171195 for CVE-2020-12653", "url": "https://bugzilla.suse.com/1171195" }, { "category": "external", "summary": "SUSE Bug 1171254 for CVE-2020-12653", "url": "https://bugzilla.suse.com/1171254" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.23.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.23.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-10T13:28:28Z", "details": "important" } ], "title": "CVE-2020-12653" }, { "cve": "CVE-2020-12654", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12654" } ], "notes": [ { "category": "general", "text": "An issue was found in Linux kernel before 5.5.4. mwifiex_ret_wmm_get_status() in drivers/net/wireless/marvell/mwifiex/wmm.c allows a remote AP to trigger a heap-based buffer overflow because of an incorrect memcpy, aka CID-3a9b153c5591.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.23.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12654", "url": "https://www.suse.com/security/cve/CVE-2020-12654" }, { "category": "external", "summary": "SUSE Bug 1159281 for CVE-2020-12654", "url": "https://bugzilla.suse.com/1159281" }, { "category": "external", "summary": "SUSE Bug 1171202 for CVE-2020-12654", "url": "https://bugzilla.suse.com/1171202" }, { "category": "external", "summary": "SUSE Bug 1171252 for CVE-2020-12654", "url": "https://bugzilla.suse.com/1171252" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.23.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.23.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-10T13:28:28Z", "details": "important" } ], "title": "CVE-2020-12654" }, { "cve": "CVE-2020-12655", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12655" } ], "notes": [ { "category": "general", "text": "An issue was discovered in xfs_agf_verify in fs/xfs/libxfs/xfs_alloc.c in the Linux kernel through 5.6.10. Attackers may trigger a sync of excessive duration via an XFS v5 image with crafted metadata, aka CID-d0c7feaf8767.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.23.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12655", "url": "https://www.suse.com/security/cve/CVE-2020-12655" }, { "category": "external", "summary": "SUSE Bug 1171217 for CVE-2020-12655", "url": "https://bugzilla.suse.com/1171217" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.23.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.8, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.23.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-10T13:28:28Z", "details": "moderate" } ], "title": "CVE-2020-12655" }, { "cve": "CVE-2020-12656", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12656" } ], "notes": [ { "category": "general", "text": "gss_mech_free in net/sunrpc/auth_gss/gss_mech_switch.c in the rpcsec_gss_krb5 implementation in the Linux kernel through 5.6.10 lacks certain domain_release calls, leading to a memory leak. Note: This was disputed with the assertion that the issue does not grant any access not already available. It is a problem that on unloading a specific kernel module some memory is leaked, but loading kernel modules is a privileged operation. A user could also write a kernel module to consume any amount of memory they like and load that replicating the effect of this bug", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.23.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12656", "url": "https://www.suse.com/security/cve/CVE-2020-12656" }, { "category": "external", "summary": "SUSE Bug 1171219 for CVE-2020-12656", "url": "https://bugzilla.suse.com/1171219" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.23.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.9, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.23.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-10T13:28:28Z", "details": "low" } ], "title": "CVE-2020-12656" }, { "cve": "CVE-2020-12657", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12657" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.6.5. There is a use-after-free in block/bfq-iosched.c related to bfq_idle_slice_timer_body.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.23.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12657", "url": "https://www.suse.com/security/cve/CVE-2020-12657" }, { "category": "external", "summary": "SUSE Bug 1171205 for CVE-2020-12657", "url": "https://bugzilla.suse.com/1171205" }, { "category": "external", "summary": "SUSE Bug 1201585 for CVE-2020-12657", "url": "https://bugzilla.suse.com/1201585" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.23.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.23.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-10T13:28:28Z", "details": "important" } ], "title": "CVE-2020-12657" }, { "cve": "CVE-2020-12659", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12659" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.6.7. xdp_umem_reg in net/xdp/xdp_umem.c has an out-of-bounds write (by a user with the CAP_NET_ADMIN capability) because of a lack of headroom validation.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.23.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12659", "url": "https://www.suse.com/security/cve/CVE-2020-12659" }, { "category": "external", "summary": "SUSE Bug 1171214 for CVE-2020-12659", "url": "https://bugzilla.suse.com/1171214" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.23.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.23.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-10T13:28:28Z", "details": "moderate" } ], "title": "CVE-2020-12659" }, { "cve": "CVE-2020-12768", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12768" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.6. svm_cpu_uninit in arch/x86/kvm/svm.c has a memory leak, aka CID-d80b64ff297e. NOTE: third parties dispute this issue because it\u0027s a one-time leak at the boot, the size is negligible, and it can\u0027t be triggered at will", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.23.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12768", "url": "https://www.suse.com/security/cve/CVE-2020-12768" }, { "category": "external", "summary": "SUSE Bug 1171736 for CVE-2020-12768", "url": "https://bugzilla.suse.com/1171736" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.23.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.23.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-10T13:28:28Z", "details": "moderate" } ], "title": "CVE-2020-12768" }, { "cve": "CVE-2020-12769", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12769" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.4.17. drivers/spi/spi-dw.c allows attackers to cause a panic via concurrent calls to dw_spi_irq and dw_spi_transfer_one, aka CID-19b61392c5a8.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.23.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12769", "url": "https://www.suse.com/security/cve/CVE-2020-12769" }, { "category": "external", "summary": "SUSE Bug 1171983 for CVE-2020-12769", "url": "https://bugzilla.suse.com/1171983" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.23.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.23.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-10T13:28:28Z", "details": "moderate" } ], "title": "CVE-2020-12769" }, { "cve": "CVE-2020-13143", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-13143" } ], "notes": [ { "category": "general", "text": "gadget_dev_desc_UDC_store in drivers/usb/gadget/configfs.c in the Linux kernel 3.16 through 5.6.13 relies on kstrdup without considering the possibility of an internal \u0027\\0\u0027 value, which allows attackers to trigger an out-of-bounds read, aka CID-15753588bcd4.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.23.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-13143", "url": "https://www.suse.com/security/cve/CVE-2020-13143" }, { "category": "external", "summary": "SUSE Bug 1171982 for CVE-2020-13143", "url": "https://bugzilla.suse.com/1171982" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.23.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.23.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.23.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.23.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-10T13:28:28Z", "details": "moderate" } ], "title": "CVE-2020-13143" } ] }
suse-su-2020:1595-1
Vulnerability from csaf_suse
Published
2020-06-10 08:21
Modified
2020-06-10 08:21
Summary
Security update for ucode-intel
Notes
Title of the patch
Security update for ucode-intel
Description of the patch
This update for ucode-intel fixes the following issues:
Updated Intel CPU Microcode to 20200602 (prerelease) (bsc#1172466)
This update contains security mitigations for:
- CVE-2020-0543: Fixed a side channel attack against special registers
which could have resulted in leaking of read values to cores other
than the one which called it. This attack is known as Special Register
Buffer Data Sampling (SRBDS) or 'CrossTalk' (bsc#1154824).
- CVE-2020-0548,CVE-2020-0549: Additional ucode updates were supplied to
mitigate the Vector Register and L1D Eviction Sampling aka 'CacheOutAttack'
attacks. (bsc#1156353)
Microcode Table:
Processor Identifier Version Products
Model Stepping F-MO-S/PI Old->New
---- new platforms ----------------------------------------
---- updated platforms ------------------------------------
HSW C0 6-3c-3/32 00000027->00000028 Core Gen4
BDW-U/Y E0/F0 6-3d-4/c0 0000002e->0000002f Core Gen5
HSW-U C0/D0 6-45-1/72 00000025->00000026 Core Gen4
HSW-H C0 6-46-1/32 0000001b->0000001c Core Gen4
BDW-H/E3 E0/G0 6-47-1/22 00000021->00000022 Core Gen5
SKL-U/Y D0 6-4e-3/c0 000000d6->000000dc Core Gen6 Mobile
SKL-U23e K1 6-4e-3/c0 000000d6->000000dc Core Gen6 Mobile
SKX-SP B1 6-55-3/97 01000151->01000157 Xeon Scalable
SKX-SP H0/M0/U0 6-55-4/b7 02000065->02006906 Xeon Scalable
SKX-D M1 6-55-4/b7 02000065->02006906 Xeon D-21xx
CLX-SP B0 6-55-6/bf 0400002c->04002f01 Xeon Scalable Gen2
CLX-SP B1 6-55-7/bf 0500002c->04002f01 Xeon Scalable Gen2
SKL-H/S R0/N0 6-5e-3/36 000000d6->000000dc Core Gen6; Xeon E3 v5
AML-Y22 H0 6-8e-9/10 000000ca->000000d6 Core Gen8 Mobile
KBL-U/Y H0 6-8e-9/c0 000000ca->000000d6 Core Gen7 Mobile
CFL-U43e D0 6-8e-a/c0 000000ca->000000d6 Core Gen8 Mobile
WHL-U W0 6-8e-b/d0 000000ca->000000d6 Core Gen8 Mobile
AML-Y42 V0 6-8e-c/94 000000ca->000000d6 Core Gen10 Mobile
CML-Y42 V0 6-8e-c/94 000000ca->000000d6 Core Gen10 Mobile
WHL-U V0 6-8e-c/94 000000ca->000000d6 Core Gen8 Mobile
KBL-G/H/S/E3 B0 6-9e-9/2a 000000ca->000000d6 Core Gen7; Xeon E3 v6
CFL-H/S/E3 U0 6-9e-a/22 000000ca->000000d6 Core Gen8 Desktop, Mobile, Xeon E
CFL-S B0 6-9e-b/02 000000ca->000000d6 Core Gen8
CFL-H/S P0 6-9e-c/22 000000ca->000000d6 Core Gen9
CFL-H R0 6-9e-d/22 000000ca->000000d6 Core Gen9 Mobile
Also contains the Intel CPU Microcode update to 20200520:
Processor Identifier Version Products
Model Stepping F-MO-S/PI Old->New
---- new platforms ----------------------------------------
---- updated platforms ------------------------------------
SNB-E/EN/EP C1/M0 6-2d-6/6d 0000061f->00000621 Xeon E3/E5, Core X
SNB-E/EN/EP C2/M1 6-2d-7/6d 00000718->0000071a Xeon E3/E5, Core X
Patchnames
HPE-Helion-OpenStack-8-2020-1595,SUSE-2020-1595,SUSE-OpenStack-Cloud-7-2020-1595,SUSE-OpenStack-Cloud-8-2020-1595,SUSE-OpenStack-Cloud-Crowbar-8-2020-1595,SUSE-SLE-SAP-12-SP2-2020-1595,SUSE-SLE-SAP-12-SP3-2020-1595,SUSE-SLE-SERVER-12-SP2-2020-1595,SUSE-SLE-SERVER-12-SP2-BCL-2020-1595,SUSE-SLE-SERVER-12-SP3-2020-1595,SUSE-SLE-SERVER-12-SP3-BCL-2020-1595,SUSE-SLE-SERVER-12-SP4-2020-1595,SUSE-Storage-5-2020-1595
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for ucode-intel", "title": "Title of the patch" }, { "category": "description", "text": "This update for ucode-intel fixes the following issues:\n\nUpdated Intel CPU Microcode to 20200602 (prerelease) (bsc#1172466)\n \nThis update contains security mitigations for:\n\n- CVE-2020-0543: Fixed a side channel attack against special registers\n which could have resulted in leaking of read values to cores other\n than the one which called it. This attack is known as Special Register\n Buffer Data Sampling (SRBDS) or \u0027CrossTalk\u0027 (bsc#1154824).\n- CVE-2020-0548,CVE-2020-0549: Additional ucode updates were supplied to\n mitigate the Vector Register and L1D Eviction Sampling aka \u0027CacheOutAttack\u0027\n attacks. (bsc#1156353)\n\nMicrocode Table:\n\n Processor Identifier Version Products\n Model Stepping F-MO-S/PI Old-\u003eNew\n ---- new platforms ----------------------------------------\n ---- updated platforms ------------------------------------\n HSW C0 6-3c-3/32 00000027-\u003e00000028 Core Gen4\n BDW-U/Y E0/F0 6-3d-4/c0 0000002e-\u003e0000002f Core Gen5\n HSW-U C0/D0 6-45-1/72 00000025-\u003e00000026 Core Gen4\n HSW-H C0 6-46-1/32 0000001b-\u003e0000001c Core Gen4\n BDW-H/E3 E0/G0 6-47-1/22 00000021-\u003e00000022 Core Gen5\n SKL-U/Y D0 6-4e-3/c0 000000d6-\u003e000000dc Core Gen6 Mobile\n SKL-U23e K1 6-4e-3/c0 000000d6-\u003e000000dc Core Gen6 Mobile\n SKX-SP B1 6-55-3/97 01000151-\u003e01000157 Xeon Scalable\n SKX-SP H0/M0/U0 6-55-4/b7 02000065-\u003e02006906 Xeon Scalable\n SKX-D M1 6-55-4/b7 02000065-\u003e02006906 Xeon D-21xx\n CLX-SP B0 6-55-6/bf 0400002c-\u003e04002f01 Xeon Scalable Gen2\n CLX-SP B1 6-55-7/bf 0500002c-\u003e04002f01 Xeon Scalable Gen2\n SKL-H/S R0/N0 6-5e-3/36 000000d6-\u003e000000dc Core Gen6; Xeon E3 v5\n AML-Y22 H0 6-8e-9/10 000000ca-\u003e000000d6 Core Gen8 Mobile\n KBL-U/Y H0 6-8e-9/c0 000000ca-\u003e000000d6 Core Gen7 Mobile\n CFL-U43e D0 6-8e-a/c0 000000ca-\u003e000000d6 Core Gen8 Mobile\n WHL-U W0 6-8e-b/d0 000000ca-\u003e000000d6 Core Gen8 Mobile\n AML-Y42 V0 6-8e-c/94 000000ca-\u003e000000d6 Core Gen10 Mobile\n CML-Y42 V0 6-8e-c/94 000000ca-\u003e000000d6 Core Gen10 Mobile\n WHL-U V0 6-8e-c/94 000000ca-\u003e000000d6 Core Gen8 Mobile\n KBL-G/H/S/E3 B0 6-9e-9/2a 000000ca-\u003e000000d6 Core Gen7; Xeon E3 v6\n CFL-H/S/E3 U0 6-9e-a/22 000000ca-\u003e000000d6 Core Gen8 Desktop, Mobile, Xeon E\n CFL-S B0 6-9e-b/02 000000ca-\u003e000000d6 Core Gen8\n CFL-H/S P0 6-9e-c/22 000000ca-\u003e000000d6 Core Gen9\n CFL-H R0 6-9e-d/22 000000ca-\u003e000000d6 Core Gen9 Mobile\n\nAlso contains the Intel CPU Microcode update to 20200520:\n\n Processor Identifier Version Products\n Model Stepping F-MO-S/PI Old-\u003eNew\n ---- new platforms ----------------------------------------\n ---- updated platforms ------------------------------------\n SNB-E/EN/EP C1/M0 6-2d-6/6d 0000061f-\u003e00000621 Xeon E3/E5, Core X\n SNB-E/EN/EP C2/M1 6-2d-7/6d 00000718-\u003e0000071a Xeon E3/E5, Core X\n", "title": "Description of the patch" }, { "category": "details", "text": "HPE-Helion-OpenStack-8-2020-1595,SUSE-2020-1595,SUSE-OpenStack-Cloud-7-2020-1595,SUSE-OpenStack-Cloud-8-2020-1595,SUSE-OpenStack-Cloud-Crowbar-8-2020-1595,SUSE-SLE-SAP-12-SP2-2020-1595,SUSE-SLE-SAP-12-SP3-2020-1595,SUSE-SLE-SERVER-12-SP2-2020-1595,SUSE-SLE-SERVER-12-SP2-BCL-2020-1595,SUSE-SLE-SERVER-12-SP3-2020-1595,SUSE-SLE-SERVER-12-SP3-BCL-2020-1595,SUSE-SLE-SERVER-12-SP4-2020-1595,SUSE-Storage-5-2020-1595", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2020_1595-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2020:1595-1", "url": "https://www.suse.com/support/update/announcement/2020/suse-su-20201595-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2020:1595-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-June/006918.html" }, { "category": "self", "summary": "SUSE Bug 1154824", "url": "https://bugzilla.suse.com/1154824" }, { "category": "self", "summary": "SUSE Bug 1156353", "url": "https://bugzilla.suse.com/1156353" }, { "category": "self", "summary": "SUSE Bug 1172466", "url": "https://bugzilla.suse.com/1172466" }, { "category": "self", "summary": "SUSE CVE CVE-2020-0543 page", "url": "https://www.suse.com/security/cve/CVE-2020-0543/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-0548 page", "url": "https://www.suse.com/security/cve/CVE-2020-0548/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-0549 page", "url": "https://www.suse.com/security/cve/CVE-2020-0549/" } ], "title": "Security update for ucode-intel", "tracking": { "current_release_date": "2020-06-10T08:21:55Z", "generator": { "date": "2020-06-10T08:21:55Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2020:1595-1", "initial_release_date": "2020-06-10T08:21:55Z", "revision_history": [ { "date": "2020-06-10T08:21:55Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "ucode-intel-20200602-13.68.1.i586", "product": { "name": "ucode-intel-20200602-13.68.1.i586", "product_id": "ucode-intel-20200602-13.68.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "ucode-intel-20200602-13.68.1.x86_64", "product": { "name": "ucode-intel-20200602-13.68.1.x86_64", "product_id": "ucode-intel-20200602-13.68.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "HPE Helion OpenStack 8", "product": { "name": "HPE Helion OpenStack 8", "product_id": "HPE Helion OpenStack 8", "product_identification_helper": { "cpe": "cpe:/o:suse:hpe-helion-openstack:8" } } }, { "category": "product_name", "name": "SUSE OpenStack Cloud 7", "product": { "name": "SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-openstack-cloud:7" } } }, { "category": "product_name", "name": "SUSE OpenStack Cloud 8", "product": { "name": "SUSE OpenStack Cloud 8", "product_id": "SUSE OpenStack Cloud 8", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-openstack-cloud:8" } } }, { "category": "product_name", "name": "SUSE OpenStack Cloud Crowbar 8", "product": { "name": "SUSE OpenStack Cloud Crowbar 8", "product_id": "SUSE OpenStack Cloud Crowbar 8", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-openstack-cloud-crowbar:8" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP2-BCL", "product": { "name": "SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-bcl:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP3-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP3-BCL", "product": { "name": "SUSE Linux Enterprise Server 12 SP3-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP3-BCL", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-bcl:12:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP4", "product": { "name": "SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sles:12:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp4" } } }, { "category": "product_name", "name": "SUSE Enterprise Storage 5", "product": { "name": "SUSE Enterprise Storage 5", "product_id": "SUSE Enterprise Storage 5", "product_identification_helper": { "cpe": "cpe:/o:suse:ses:5" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "ucode-intel-20200602-13.68.1.x86_64 as component of HPE Helion OpenStack 8", "product_id": "HPE Helion OpenStack 8:ucode-intel-20200602-13.68.1.x86_64" }, "product_reference": "ucode-intel-20200602-13.68.1.x86_64", "relates_to_product_reference": "HPE Helion OpenStack 8" }, { "category": "default_component_of", "full_product_name": { "name": "ucode-intel-20200602-13.68.1.x86_64 as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:ucode-intel-20200602-13.68.1.x86_64" }, "product_reference": "ucode-intel-20200602-13.68.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "ucode-intel-20200602-13.68.1.x86_64 as component of SUSE OpenStack Cloud 8", "product_id": "SUSE OpenStack Cloud 8:ucode-intel-20200602-13.68.1.x86_64" }, "product_reference": "ucode-intel-20200602-13.68.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 8" }, { "category": "default_component_of", "full_product_name": { "name": "ucode-intel-20200602-13.68.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 8", "product_id": "SUSE OpenStack Cloud Crowbar 8:ucode-intel-20200602-13.68.1.x86_64" }, "product_reference": "ucode-intel-20200602-13.68.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8" }, { "category": "default_component_of", "full_product_name": { "name": "ucode-intel-20200602-13.68.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ucode-intel-20200602-13.68.1.x86_64" }, "product_reference": "ucode-intel-20200602-13.68.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "ucode-intel-20200602-13.68.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ucode-intel-20200602-13.68.1.x86_64" }, "product_reference": "ucode-intel-20200602-13.68.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "ucode-intel-20200602-13.68.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:ucode-intel-20200602-13.68.1.x86_64" }, "product_reference": "ucode-intel-20200602-13.68.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "ucode-intel-20200602-13.68.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:ucode-intel-20200602-13.68.1.x86_64" }, "product_reference": "ucode-intel-20200602-13.68.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "ucode-intel-20200602-13.68.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:ucode-intel-20200602-13.68.1.x86_64" }, "product_reference": "ucode-intel-20200602-13.68.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "ucode-intel-20200602-13.68.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:ucode-intel-20200602-13.68.1.x86_64" }, "product_reference": "ucode-intel-20200602-13.68.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "ucode-intel-20200602-13.68.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:ucode-intel-20200602-13.68.1.x86_64" }, "product_reference": "ucode-intel-20200602-13.68.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ucode-intel-20200602-13.68.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:ucode-intel-20200602-13.68.1.x86_64" }, "product_reference": "ucode-intel-20200602-13.68.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ucode-intel-20200602-13.68.1.x86_64 as component of SUSE Enterprise Storage 5", "product_id": "SUSE Enterprise Storage 5:ucode-intel-20200602-13.68.1.x86_64" }, "product_reference": "ucode-intel-20200602-13.68.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 5" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-0543", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-0543" } ], "notes": [ { "category": "general", "text": "Incomplete cleanup from specific special register read operations in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:ucode-intel-20200602-13.68.1.x86_64", "SUSE Enterprise Storage 5:ucode-intel-20200602-13.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:ucode-intel-20200602-13.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:ucode-intel-20200602-13.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:ucode-intel-20200602-13.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:ucode-intel-20200602-13.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:ucode-intel-20200602-13.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ucode-intel-20200602-13.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ucode-intel-20200602-13.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:ucode-intel-20200602-13.68.1.x86_64", "SUSE OpenStack Cloud 7:ucode-intel-20200602-13.68.1.x86_64", "SUSE OpenStack Cloud 8:ucode-intel-20200602-13.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:ucode-intel-20200602-13.68.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-0543", "url": "https://www.suse.com/security/cve/CVE-2020-0543" }, { "category": "external", "summary": "SUSE Bug 1154824 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1154824" }, { "category": "external", "summary": "SUSE Bug 1172205 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172205" }, { "category": "external", "summary": "SUSE Bug 1172206 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172206" }, { "category": "external", "summary": "SUSE Bug 1172207 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172207" }, { "category": "external", "summary": "SUSE Bug 1172770 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172770" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:ucode-intel-20200602-13.68.1.x86_64", "SUSE Enterprise Storage 5:ucode-intel-20200602-13.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:ucode-intel-20200602-13.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:ucode-intel-20200602-13.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:ucode-intel-20200602-13.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:ucode-intel-20200602-13.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:ucode-intel-20200602-13.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ucode-intel-20200602-13.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ucode-intel-20200602-13.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:ucode-intel-20200602-13.68.1.x86_64", "SUSE OpenStack Cloud 7:ucode-intel-20200602-13.68.1.x86_64", "SUSE OpenStack Cloud 8:ucode-intel-20200602-13.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:ucode-intel-20200602-13.68.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "HPE Helion OpenStack 8:ucode-intel-20200602-13.68.1.x86_64", "SUSE Enterprise Storage 5:ucode-intel-20200602-13.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:ucode-intel-20200602-13.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:ucode-intel-20200602-13.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:ucode-intel-20200602-13.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:ucode-intel-20200602-13.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:ucode-intel-20200602-13.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ucode-intel-20200602-13.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ucode-intel-20200602-13.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:ucode-intel-20200602-13.68.1.x86_64", "SUSE OpenStack Cloud 7:ucode-intel-20200602-13.68.1.x86_64", "SUSE OpenStack Cloud 8:ucode-intel-20200602-13.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:ucode-intel-20200602-13.68.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-10T08:21:55Z", "details": "moderate" } ], "title": "CVE-2020-0543" }, { "cve": "CVE-2020-0548", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-0548" } ], "notes": [ { "category": "general", "text": "Cleanup errors in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:ucode-intel-20200602-13.68.1.x86_64", "SUSE Enterprise Storage 5:ucode-intel-20200602-13.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:ucode-intel-20200602-13.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:ucode-intel-20200602-13.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:ucode-intel-20200602-13.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:ucode-intel-20200602-13.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:ucode-intel-20200602-13.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ucode-intel-20200602-13.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ucode-intel-20200602-13.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:ucode-intel-20200602-13.68.1.x86_64", "SUSE OpenStack Cloud 7:ucode-intel-20200602-13.68.1.x86_64", "SUSE OpenStack Cloud 8:ucode-intel-20200602-13.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:ucode-intel-20200602-13.68.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-0548", "url": "https://www.suse.com/security/cve/CVE-2020-0548" }, { "category": "external", "summary": "SUSE Bug 1156353 for CVE-2020-0548", "url": "https://bugzilla.suse.com/1156353" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:ucode-intel-20200602-13.68.1.x86_64", "SUSE Enterprise Storage 5:ucode-intel-20200602-13.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:ucode-intel-20200602-13.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:ucode-intel-20200602-13.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:ucode-intel-20200602-13.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:ucode-intel-20200602-13.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:ucode-intel-20200602-13.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ucode-intel-20200602-13.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ucode-intel-20200602-13.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:ucode-intel-20200602-13.68.1.x86_64", "SUSE OpenStack Cloud 7:ucode-intel-20200602-13.68.1.x86_64", "SUSE OpenStack Cloud 8:ucode-intel-20200602-13.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:ucode-intel-20200602-13.68.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.8, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.1" }, "products": [ "HPE Helion OpenStack 8:ucode-intel-20200602-13.68.1.x86_64", "SUSE Enterprise Storage 5:ucode-intel-20200602-13.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:ucode-intel-20200602-13.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:ucode-intel-20200602-13.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:ucode-intel-20200602-13.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:ucode-intel-20200602-13.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:ucode-intel-20200602-13.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ucode-intel-20200602-13.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ucode-intel-20200602-13.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:ucode-intel-20200602-13.68.1.x86_64", "SUSE OpenStack Cloud 7:ucode-intel-20200602-13.68.1.x86_64", "SUSE OpenStack Cloud 8:ucode-intel-20200602-13.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:ucode-intel-20200602-13.68.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-10T08:21:55Z", "details": "moderate" } ], "title": "CVE-2020-0548" }, { "cve": "CVE-2020-0549", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-0549" } ], "notes": [ { "category": "general", "text": "Cleanup errors in some data cache evictions for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:ucode-intel-20200602-13.68.1.x86_64", "SUSE Enterprise Storage 5:ucode-intel-20200602-13.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:ucode-intel-20200602-13.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:ucode-intel-20200602-13.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:ucode-intel-20200602-13.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:ucode-intel-20200602-13.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:ucode-intel-20200602-13.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ucode-intel-20200602-13.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ucode-intel-20200602-13.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:ucode-intel-20200602-13.68.1.x86_64", "SUSE OpenStack Cloud 7:ucode-intel-20200602-13.68.1.x86_64", "SUSE OpenStack Cloud 8:ucode-intel-20200602-13.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:ucode-intel-20200602-13.68.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-0549", "url": "https://www.suse.com/security/cve/CVE-2020-0549" }, { "category": "external", "summary": "SUSE Bug 1156353 for CVE-2020-0549", "url": "https://bugzilla.suse.com/1156353" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:ucode-intel-20200602-13.68.1.x86_64", "SUSE Enterprise Storage 5:ucode-intel-20200602-13.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:ucode-intel-20200602-13.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:ucode-intel-20200602-13.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:ucode-intel-20200602-13.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:ucode-intel-20200602-13.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:ucode-intel-20200602-13.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ucode-intel-20200602-13.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ucode-intel-20200602-13.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:ucode-intel-20200602-13.68.1.x86_64", "SUSE OpenStack Cloud 7:ucode-intel-20200602-13.68.1.x86_64", "SUSE OpenStack Cloud 8:ucode-intel-20200602-13.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:ucode-intel-20200602-13.68.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "HPE Helion OpenStack 8:ucode-intel-20200602-13.68.1.x86_64", "SUSE Enterprise Storage 5:ucode-intel-20200602-13.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:ucode-intel-20200602-13.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:ucode-intel-20200602-13.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:ucode-intel-20200602-13.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:ucode-intel-20200602-13.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:ucode-intel-20200602-13.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ucode-intel-20200602-13.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ucode-intel-20200602-13.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:ucode-intel-20200602-13.68.1.x86_64", "SUSE OpenStack Cloud 7:ucode-intel-20200602-13.68.1.x86_64", "SUSE OpenStack Cloud 8:ucode-intel-20200602-13.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:ucode-intel-20200602-13.68.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-10T08:21:55Z", "details": "moderate" } ], "title": "CVE-2020-0549" } ] }
suse-su-2020:1634-1
Vulnerability from csaf_suse
Published
2020-06-17 08:35
Modified
2020-06-17 08:35
Summary
Security update for xen
Notes
Title of the patch
Security update for xen
Description of the patch
This update for xen fixes the following issues:
- CVE-2020-0543: Fixed a side channel attack against special registers which could have resulted in leaking of read values to cores other than the one which called it.
This attack is known as Special Register Buffer Data Sampling (SRBDS) or 'CrossTalk' (bsc#1172205).
- CVE-2020-11742: Bad continuation handling in GNTTABOP_copy (bsc#1169392).
- CVE-2020-11740, CVE-2020-11741: xen: XSA-313 multiple xenoprof issues (bsc#1168140).
- CVE-2020-11739: Missing memory barriers in read-write unlock paths (bsc#1168142).
- CVE-2020-11743: Bad error path in GNTTABOP_map_grant (bsc#1168143).
- Xenstored Crashed during VM install (bsc#1167152)
Patchnames
SUSE-2020-1634,SUSE-SLE-Product-HPC-15-2020-1634,SUSE-SLE-Product-SLES_SAP-15-2020-1634
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for xen", "title": "Title of the patch" }, { "category": "description", "text": "This update for xen fixes the following issues:\n\n- CVE-2020-0543: Fixed a side channel attack against special registers which could have resulted in leaking of read values to cores other than the one which called it.\n This attack is known as Special Register Buffer Data Sampling (SRBDS) or \u0027CrossTalk\u0027 (bsc#1172205).\n- CVE-2020-11742: Bad continuation handling in GNTTABOP_copy (bsc#1169392).\n- CVE-2020-11740, CVE-2020-11741: xen: XSA-313 multiple xenoprof issues (bsc#1168140).\n- CVE-2020-11739: Missing memory barriers in read-write unlock paths (bsc#1168142).\n- CVE-2020-11743: Bad error path in GNTTABOP_map_grant (bsc#1168143).\n- Xenstored Crashed during VM install (bsc#1167152)\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2020-1634,SUSE-SLE-Product-HPC-15-2020-1634,SUSE-SLE-Product-SLES_SAP-15-2020-1634", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2020_1634-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2020:1634-1", "url": "https://www.suse.com/support/update/announcement/2020/suse-su-20201634-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2020:1634-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-June/006957.html" }, { "category": "self", "summary": "SUSE Bug 1167152", "url": "https://bugzilla.suse.com/1167152" }, { "category": "self", "summary": "SUSE Bug 1168140", "url": "https://bugzilla.suse.com/1168140" }, { "category": "self", "summary": "SUSE Bug 1168142", "url": "https://bugzilla.suse.com/1168142" }, { "category": "self", "summary": "SUSE Bug 1168143", "url": "https://bugzilla.suse.com/1168143" }, { "category": "self", "summary": "SUSE Bug 1169392", "url": "https://bugzilla.suse.com/1169392" }, { "category": "self", "summary": "SUSE Bug 1172205", "url": "https://bugzilla.suse.com/1172205" }, { "category": "self", "summary": "SUSE CVE CVE-2020-0543 page", "url": "https://www.suse.com/security/cve/CVE-2020-0543/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-11739 page", "url": "https://www.suse.com/security/cve/CVE-2020-11739/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-11740 page", "url": "https://www.suse.com/security/cve/CVE-2020-11740/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-11741 page", "url": "https://www.suse.com/security/cve/CVE-2020-11741/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-11742 page", "url": "https://www.suse.com/security/cve/CVE-2020-11742/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-11743 page", "url": "https://www.suse.com/security/cve/CVE-2020-11743/" } ], "title": "Security update for xen", "tracking": { "current_release_date": "2020-06-17T08:35:43Z", "generator": { "date": "2020-06-17T08:35:43Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2020:1634-1", "initial_release_date": "2020-06-17T08:35:43Z", "revision_history": [ { "date": "2020-06-17T08:35:43Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "xen-4.10.4_10-3.31.1.aarch64", "product": { "name": "xen-4.10.4_10-3.31.1.aarch64", "product_id": "xen-4.10.4_10-3.31.1.aarch64" } }, { "category": "product_version", "name": "xen-devel-4.10.4_10-3.31.1.aarch64", "product": { "name": "xen-devel-4.10.4_10-3.31.1.aarch64", "product_id": "xen-devel-4.10.4_10-3.31.1.aarch64" } }, { "category": "product_version", "name": "xen-doc-html-4.10.4_10-3.31.1.aarch64", "product": { "name": "xen-doc-html-4.10.4_10-3.31.1.aarch64", "product_id": "xen-doc-html-4.10.4_10-3.31.1.aarch64" } }, { "category": "product_version", "name": "xen-libs-4.10.4_10-3.31.1.aarch64", "product": { "name": "xen-libs-4.10.4_10-3.31.1.aarch64", "product_id": "xen-libs-4.10.4_10-3.31.1.aarch64" } }, { "category": "product_version", "name": "xen-tools-4.10.4_10-3.31.1.aarch64", "product": { "name": "xen-tools-4.10.4_10-3.31.1.aarch64", "product_id": "xen-tools-4.10.4_10-3.31.1.aarch64" } }, { "category": "product_version", "name": "xen-tools-domU-4.10.4_10-3.31.1.aarch64", "product": { "name": "xen-tools-domU-4.10.4_10-3.31.1.aarch64", "product_id": "xen-tools-domU-4.10.4_10-3.31.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "xen-libs-64bit-4.10.4_10-3.31.1.aarch64_ilp32", "product": { "name": "xen-libs-64bit-4.10.4_10-3.31.1.aarch64_ilp32", "product_id": "xen-libs-64bit-4.10.4_10-3.31.1.aarch64_ilp32" } } ], "category": "architecture", "name": "aarch64_ilp32" }, { "branches": [ { "category": "product_version", "name": "xen-devel-4.10.4_10-3.31.1.i586", "product": { "name": "xen-devel-4.10.4_10-3.31.1.i586", "product_id": "xen-devel-4.10.4_10-3.31.1.i586" } }, { "category": "product_version", "name": "xen-libs-4.10.4_10-3.31.1.i586", "product": { "name": "xen-libs-4.10.4_10-3.31.1.i586", "product_id": "xen-libs-4.10.4_10-3.31.1.i586" } }, { "category": "product_version", "name": "xen-tools-domU-4.10.4_10-3.31.1.i586", "product": { "name": "xen-tools-domU-4.10.4_10-3.31.1.i586", "product_id": "xen-tools-domU-4.10.4_10-3.31.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "xen-4.10.4_10-3.31.1.x86_64", "product": { "name": "xen-4.10.4_10-3.31.1.x86_64", "product_id": "xen-4.10.4_10-3.31.1.x86_64" } }, { "category": "product_version", "name": "xen-devel-4.10.4_10-3.31.1.x86_64", "product": { "name": "xen-devel-4.10.4_10-3.31.1.x86_64", "product_id": "xen-devel-4.10.4_10-3.31.1.x86_64" } }, { "category": "product_version", "name": "xen-doc-html-4.10.4_10-3.31.1.x86_64", "product": { "name": "xen-doc-html-4.10.4_10-3.31.1.x86_64", "product_id": "xen-doc-html-4.10.4_10-3.31.1.x86_64" } }, { "category": "product_version", "name": "xen-libs-4.10.4_10-3.31.1.x86_64", "product": { "name": "xen-libs-4.10.4_10-3.31.1.x86_64", "product_id": "xen-libs-4.10.4_10-3.31.1.x86_64" } }, { "category": "product_version", "name": "xen-libs-32bit-4.10.4_10-3.31.1.x86_64", "product": { "name": "xen-libs-32bit-4.10.4_10-3.31.1.x86_64", "product_id": "xen-libs-32bit-4.10.4_10-3.31.1.x86_64" } }, { "category": "product_version", "name": "xen-tools-4.10.4_10-3.31.1.x86_64", "product": { "name": "xen-tools-4.10.4_10-3.31.1.x86_64", "product_id": "xen-tools-4.10.4_10-3.31.1.x86_64" } }, { "category": "product_version", "name": "xen-tools-domU-4.10.4_10-3.31.1.x86_64", "product": { "name": "xen-tools-domU-4.10.4_10-3.31.1.x86_64", "product_id": "xen-tools-domU-4.10.4_10-3.31.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-espos:15" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15-LTSS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-ltss:15" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 15", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:15" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "xen-4.10.4_10-3.31.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-4.10.4_10-3.31.1.x86_64" }, "product_reference": "xen-4.10.4_10-3.31.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-devel-4.10.4_10-3.31.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-devel-4.10.4_10-3.31.1.x86_64" }, "product_reference": "xen-devel-4.10.4_10-3.31.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.10.4_10-3.31.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-libs-4.10.4_10-3.31.1.x86_64" }, "product_reference": "xen-libs-4.10.4_10-3.31.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.10.4_10-3.31.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-tools-4.10.4_10-3.31.1.x86_64" }, "product_reference": "xen-tools-4.10.4_10-3.31.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.10.4_10-3.31.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-tools-domU-4.10.4_10-3.31.1.x86_64" }, "product_reference": "xen-tools-domU-4.10.4_10-3.31.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-4.10.4_10-3.31.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-4.10.4_10-3.31.1.x86_64" }, "product_reference": "xen-4.10.4_10-3.31.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-devel-4.10.4_10-3.31.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-devel-4.10.4_10-3.31.1.x86_64" }, "product_reference": "xen-devel-4.10.4_10-3.31.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.10.4_10-3.31.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-libs-4.10.4_10-3.31.1.x86_64" }, "product_reference": "xen-libs-4.10.4_10-3.31.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.10.4_10-3.31.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-tools-4.10.4_10-3.31.1.x86_64" }, "product_reference": "xen-tools-4.10.4_10-3.31.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.10.4_10-3.31.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-tools-domU-4.10.4_10-3.31.1.x86_64" }, "product_reference": "xen-tools-domU-4.10.4_10-3.31.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-4.10.4_10-3.31.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:xen-4.10.4_10-3.31.1.x86_64" }, "product_reference": "xen-4.10.4_10-3.31.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "xen-devel-4.10.4_10-3.31.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:xen-devel-4.10.4_10-3.31.1.x86_64" }, "product_reference": "xen-devel-4.10.4_10-3.31.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.10.4_10-3.31.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:xen-libs-4.10.4_10-3.31.1.x86_64" }, "product_reference": "xen-libs-4.10.4_10-3.31.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.10.4_10-3.31.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:xen-tools-4.10.4_10-3.31.1.x86_64" }, "product_reference": "xen-tools-4.10.4_10-3.31.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.10.4_10-3.31.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:xen-tools-domU-4.10.4_10-3.31.1.x86_64" }, "product_reference": "xen-tools-domU-4.10.4_10-3.31.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-0543", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-0543" } ], "notes": [ { "category": "general", "text": "Incomplete cleanup from specific special register read operations in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-devel-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-libs-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-tools-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-tools-domU-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-devel-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-libs-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-tools-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-tools-domU-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-devel-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-libs-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-tools-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-tools-domU-4.10.4_10-3.31.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-0543", "url": "https://www.suse.com/security/cve/CVE-2020-0543" }, { "category": "external", "summary": "SUSE Bug 1154824 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1154824" }, { "category": "external", "summary": "SUSE Bug 1172205 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172205" }, { "category": "external", "summary": "SUSE Bug 1172206 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172206" }, { "category": "external", "summary": "SUSE Bug 1172207 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172207" }, { "category": "external", "summary": "SUSE Bug 1172770 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172770" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-devel-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-libs-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-tools-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-tools-domU-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-devel-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-libs-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-tools-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-tools-domU-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-devel-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-libs-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-tools-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-tools-domU-4.10.4_10-3.31.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-devel-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-libs-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-tools-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-tools-domU-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-devel-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-libs-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-tools-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-tools-domU-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-devel-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-libs-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-tools-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-tools-domU-4.10.4_10-3.31.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-17T08:35:43Z", "details": "moderate" } ], "title": "CVE-2020-0543" }, { "cve": "CVE-2020-11739", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-11739" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.13.x, allowing guest OS users to cause a denial of service or possibly gain privileges because of missing memory barriers in read-write unlock paths. The read-write unlock paths don\u0027t contain a memory barrier. On Arm, this means a processor is allowed to re-order the memory access with the preceding ones. In other words, the unlock may be seen by another processor before all the memory accesses within the \"critical\" section. As a consequence, it may be possible to have a writer executing a critical section at the same time as readers or another writer. In other words, many of the assumptions (e.g., a variable cannot be modified after a check) in the critical sections are not safe anymore. The read-write locks are used in hypercalls (such as grant-table ones), so a malicious guest could exploit the race. For instance, there is a small window where Xen can leak memory if XENMAPSPACE_grant_table is used concurrently. A malicious guest may be able to leak memory, or cause a hypervisor crash resulting in a Denial of Service (DoS). Information leak and privilege escalation cannot be excluded.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-devel-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-libs-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-tools-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-tools-domU-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-devel-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-libs-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-tools-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-tools-domU-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-devel-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-libs-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-tools-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-tools-domU-4.10.4_10-3.31.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-11739", "url": "https://www.suse.com/security/cve/CVE-2020-11739" }, { "category": "external", "summary": "SUSE Bug 1168142 for CVE-2020-11739", "url": "https://bugzilla.suse.com/1168142" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-devel-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-libs-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-tools-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-tools-domU-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-devel-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-libs-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-tools-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-tools-domU-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-devel-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-libs-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-tools-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-tools-domU-4.10.4_10-3.31.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-devel-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-libs-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-tools-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-tools-domU-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-devel-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-libs-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-tools-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-tools-domU-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-devel-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-libs-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-tools-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-tools-domU-4.10.4_10-3.31.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-17T08:35:43Z", "details": "important" } ], "title": "CVE-2020-11739" }, { "cve": "CVE-2020-11740", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-11740" } ], "notes": [ { "category": "general", "text": "An issue was discovered in xenoprof in Xen through 4.13.x, allowing guest OS users (without active profiling) to obtain sensitive information about other guests. Unprivileged guests can request to map xenoprof buffers, even if profiling has not been enabled for those guests. These buffers were not scrubbed.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-devel-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-libs-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-tools-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-tools-domU-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-devel-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-libs-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-tools-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-tools-domU-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-devel-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-libs-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-tools-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-tools-domU-4.10.4_10-3.31.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-11740", "url": "https://www.suse.com/security/cve/CVE-2020-11740" }, { "category": "external", "summary": "SUSE Bug 1168140 for CVE-2020-11740", "url": "https://bugzilla.suse.com/1168140" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2020-11740", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-devel-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-libs-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-tools-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-tools-domU-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-devel-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-libs-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-tools-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-tools-domU-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-devel-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-libs-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-tools-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-tools-domU-4.10.4_10-3.31.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-devel-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-libs-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-tools-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-tools-domU-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-devel-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-libs-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-tools-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-tools-domU-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-devel-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-libs-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-tools-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-tools-domU-4.10.4_10-3.31.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-17T08:35:43Z", "details": "important" } ], "title": "CVE-2020-11740" }, { "cve": "CVE-2020-11741", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-11741" } ], "notes": [ { "category": "general", "text": "An issue was discovered in xenoprof in Xen through 4.13.x, allowing guest OS users (with active profiling) to obtain sensitive information about other guests, cause a denial of service, or possibly gain privileges. For guests for which \"active\" profiling was enabled by the administrator, the xenoprof code uses the standard Xen shared ring structure. Unfortunately, this code did not treat the guest as a potential adversary: it trusts the guest not to modify buffer size information or modify head / tail pointers in unexpected ways. This can crash the host (DoS). Privilege escalation cannot be ruled out.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-devel-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-libs-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-tools-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-tools-domU-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-devel-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-libs-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-tools-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-tools-domU-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-devel-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-libs-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-tools-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-tools-domU-4.10.4_10-3.31.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-11741", "url": "https://www.suse.com/security/cve/CVE-2020-11741" }, { "category": "external", "summary": "SUSE Bug 1168140 for CVE-2020-11741", "url": "https://bugzilla.suse.com/1168140" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2020-11741", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-devel-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-libs-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-tools-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-tools-domU-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-devel-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-libs-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-tools-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-tools-domU-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-devel-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-libs-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-tools-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-tools-domU-4.10.4_10-3.31.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-devel-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-libs-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-tools-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-tools-domU-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-devel-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-libs-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-tools-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-tools-domU-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-devel-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-libs-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-tools-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-tools-domU-4.10.4_10-3.31.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-17T08:35:43Z", "details": "important" } ], "title": "CVE-2020-11741" }, { "cve": "CVE-2020-11742", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-11742" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.13.x, allowing guest OS users to cause a denial of service because of bad continuation handling in GNTTABOP_copy. Grant table operations are expected to return 0 for success, and a negative number for errors. The fix for CVE-2017-12135 introduced a path through grant copy handling where success may be returned to the caller without any action taken. In particular, the status fields of individual operations are left uninitialised, and may result in errant behaviour in the caller of GNTTABOP_copy. A buggy or malicious guest can construct its grant table in such a way that, when a backend domain tries to copy a grant, it hits the incorrect exit path. This returns success to the caller without doing anything, which may cause crashes or other incorrect behaviour.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-devel-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-libs-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-tools-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-tools-domU-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-devel-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-libs-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-tools-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-tools-domU-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-devel-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-libs-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-tools-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-tools-domU-4.10.4_10-3.31.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-11742", "url": "https://www.suse.com/security/cve/CVE-2020-11742" }, { "category": "external", "summary": "SUSE Bug 1169392 for CVE-2020-11742", "url": "https://bugzilla.suse.com/1169392" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2020-11742", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-devel-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-libs-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-tools-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-tools-domU-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-devel-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-libs-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-tools-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-tools-domU-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-devel-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-libs-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-tools-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-tools-domU-4.10.4_10-3.31.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-devel-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-libs-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-tools-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-tools-domU-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-devel-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-libs-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-tools-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-tools-domU-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-devel-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-libs-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-tools-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-tools-domU-4.10.4_10-3.31.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-17T08:35:43Z", "details": "moderate" } ], "title": "CVE-2020-11742" }, { "cve": "CVE-2020-11743", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-11743" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.13.x, allowing guest OS users to cause a denial of service because of a bad error path in GNTTABOP_map_grant. Grant table operations are expected to return 0 for success, and a negative number for errors. Some misplaced brackets cause one error path to return 1 instead of a negative value. The grant table code in Linux treats this condition as success, and proceeds with incorrectly initialised state. A buggy or malicious guest can construct its grant table in such a way that, when a backend domain tries to map a grant, it hits the incorrect error path. This will crash a Linux based dom0 or backend domain.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-devel-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-libs-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-tools-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-tools-domU-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-devel-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-libs-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-tools-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-tools-domU-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-devel-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-libs-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-tools-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-tools-domU-4.10.4_10-3.31.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-11743", "url": "https://www.suse.com/security/cve/CVE-2020-11743" }, { "category": "external", "summary": "SUSE Bug 1168143 for CVE-2020-11743", "url": "https://bugzilla.suse.com/1168143" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-devel-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-libs-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-tools-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-tools-domU-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-devel-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-libs-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-tools-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-tools-domU-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-devel-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-libs-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-tools-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-tools-domU-4.10.4_10-3.31.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-devel-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-libs-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-tools-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-tools-domU-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-devel-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-libs-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-tools-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-tools-domU-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-devel-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-libs-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-tools-4.10.4_10-3.31.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-tools-domU-4.10.4_10-3.31.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-17T08:35:43Z", "details": "moderate" } ], "title": "CVE-2020-11743" } ] }
suse-su-2020:1887-1
Vulnerability from csaf_suse
Published
2020-07-10 13:49
Modified
2020-07-10 13:49
Summary
Security update for xen
Notes
Title of the patch
Security update for xen
Description of the patch
This update for xen fixes the following issues:
- CVE-2020-15563: Fixed inverted code paths in x86 dirty VRAM tracking (bsc#1173377).
- CVE-2020-15565: Fixed insufficient cache write-back under VT-d (bsc#1173378).
- CVE-2020-15566: Fixed incorrect error handling in event channel port allocation (bsc#1173376).
- CVE-2020-15567: Fixed non-atomic modification of live EPT PTE (bsc#1173380).
- CVE-2020-0543: Special Register Buffer Data Sampling (SRBDS) aka 'CrossTalk' (bsc#1172205).
Additional upstream bug fixes (bsc#1027519)
Patchnames
SUSE-2020-1887,SUSE-SLE-SDK-12-SP5-2020-1887,SUSE-SLE-SERVER-12-SP5-2020-1887
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for xen", "title": "Title of the patch" }, { "category": "description", "text": "This update for xen fixes the following issues:\n\n- CVE-2020-15563: Fixed inverted code paths in x86 dirty VRAM tracking (bsc#1173377).\n- CVE-2020-15565: Fixed insufficient cache write-back under VT-d (bsc#1173378).\n- CVE-2020-15566: Fixed incorrect error handling in event channel port allocation (bsc#1173376).\n- CVE-2020-15567: Fixed non-atomic modification of live EPT PTE (bsc#1173380).\n- CVE-2020-0543: Special Register Buffer Data Sampling (SRBDS) aka \u0027CrossTalk\u0027 (bsc#1172205).\n\nAdditional upstream bug fixes (bsc#1027519)\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2020-1887,SUSE-SLE-SDK-12-SP5-2020-1887,SUSE-SLE-SERVER-12-SP5-2020-1887", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2020_1887-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2020:1887-1", "url": "https://www.suse.com/support/update/announcement/2020/suse-su-20201887-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2020:1887-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-July/007115.html" }, { "category": "self", "summary": "SUSE Bug 1027519", "url": "https://bugzilla.suse.com/1027519" }, { "category": "self", "summary": "SUSE Bug 1172205", "url": "https://bugzilla.suse.com/1172205" }, { "category": "self", "summary": "SUSE Bug 1173376", "url": "https://bugzilla.suse.com/1173376" }, { "category": "self", "summary": "SUSE Bug 1173377", "url": "https://bugzilla.suse.com/1173377" }, { "category": "self", "summary": "SUSE Bug 1173378", "url": "https://bugzilla.suse.com/1173378" }, { "category": "self", "summary": "SUSE Bug 1173380", "url": "https://bugzilla.suse.com/1173380" }, { "category": "self", "summary": "SUSE CVE CVE-2020-0543 page", "url": "https://www.suse.com/security/cve/CVE-2020-0543/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-15563 page", "url": "https://www.suse.com/security/cve/CVE-2020-15563/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-15565 page", "url": "https://www.suse.com/security/cve/CVE-2020-15565/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-15566 page", "url": "https://www.suse.com/security/cve/CVE-2020-15566/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-15567 page", "url": "https://www.suse.com/security/cve/CVE-2020-15567/" } ], "title": "Security update for xen", "tracking": { "current_release_date": "2020-07-10T13:49:58Z", "generator": { "date": "2020-07-10T13:49:58Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2020:1887-1", "initial_release_date": "2020-07-10T13:49:58Z", "revision_history": [ { "date": "2020-07-10T13:49:58Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "xen-4.12.3_04-3.18.1.aarch64", "product": { "name": "xen-4.12.3_04-3.18.1.aarch64", "product_id": "xen-4.12.3_04-3.18.1.aarch64" } }, { "category": "product_version", "name": "xen-devel-4.12.3_04-3.18.1.aarch64", "product": { "name": "xen-devel-4.12.3_04-3.18.1.aarch64", "product_id": "xen-devel-4.12.3_04-3.18.1.aarch64" } }, { "category": "product_version", "name": "xen-doc-html-4.12.3_04-3.18.1.aarch64", "product": { "name": "xen-doc-html-4.12.3_04-3.18.1.aarch64", "product_id": "xen-doc-html-4.12.3_04-3.18.1.aarch64" } }, { "category": "product_version", "name": "xen-libs-4.12.3_04-3.18.1.aarch64", "product": { "name": "xen-libs-4.12.3_04-3.18.1.aarch64", "product_id": "xen-libs-4.12.3_04-3.18.1.aarch64" } }, { "category": "product_version", "name": "xen-tools-4.12.3_04-3.18.1.aarch64", "product": { "name": "xen-tools-4.12.3_04-3.18.1.aarch64", "product_id": "xen-tools-4.12.3_04-3.18.1.aarch64" } }, { "category": "product_version", "name": "xen-tools-domU-4.12.3_04-3.18.1.aarch64", "product": { "name": "xen-tools-domU-4.12.3_04-3.18.1.aarch64", "product_id": "xen-tools-domU-4.12.3_04-3.18.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "xen-libs-64bit-4.12.3_04-3.18.1.aarch64_ilp32", "product": { "name": "xen-libs-64bit-4.12.3_04-3.18.1.aarch64_ilp32", "product_id": "xen-libs-64bit-4.12.3_04-3.18.1.aarch64_ilp32" } } ], "category": "architecture", "name": "aarch64_ilp32" }, { "branches": [ { "category": "product_version", "name": "xen-devel-4.12.3_04-3.18.1.i586", "product": { "name": "xen-devel-4.12.3_04-3.18.1.i586", "product_id": "xen-devel-4.12.3_04-3.18.1.i586" } }, { "category": "product_version", "name": "xen-libs-4.12.3_04-3.18.1.i586", "product": { "name": "xen-libs-4.12.3_04-3.18.1.i586", "product_id": "xen-libs-4.12.3_04-3.18.1.i586" } }, { "category": "product_version", "name": "xen-tools-domU-4.12.3_04-3.18.1.i586", "product": { "name": "xen-tools-domU-4.12.3_04-3.18.1.i586", "product_id": "xen-tools-domU-4.12.3_04-3.18.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "xen-4.12.3_04-3.18.1.x86_64", "product": { "name": "xen-4.12.3_04-3.18.1.x86_64", "product_id": "xen-4.12.3_04-3.18.1.x86_64" } }, { "category": "product_version", "name": "xen-devel-4.12.3_04-3.18.1.x86_64", "product": { "name": "xen-devel-4.12.3_04-3.18.1.x86_64", "product_id": "xen-devel-4.12.3_04-3.18.1.x86_64" } }, { "category": "product_version", "name": "xen-doc-html-4.12.3_04-3.18.1.x86_64", "product": { "name": "xen-doc-html-4.12.3_04-3.18.1.x86_64", "product_id": "xen-doc-html-4.12.3_04-3.18.1.x86_64" } }, { "category": "product_version", "name": "xen-libs-4.12.3_04-3.18.1.x86_64", "product": { "name": "xen-libs-4.12.3_04-3.18.1.x86_64", "product_id": "xen-libs-4.12.3_04-3.18.1.x86_64" } }, { "category": "product_version", "name": "xen-libs-32bit-4.12.3_04-3.18.1.x86_64", "product": { "name": "xen-libs-32bit-4.12.3_04-3.18.1.x86_64", "product_id": "xen-libs-32bit-4.12.3_04-3.18.1.x86_64" } }, { "category": "product_version", "name": "xen-tools-4.12.3_04-3.18.1.x86_64", "product": { "name": "xen-tools-4.12.3_04-3.18.1.x86_64", "product_id": "xen-tools-4.12.3_04-3.18.1.x86_64" } }, { "category": "product_version", "name": "xen-tools-domU-4.12.3_04-3.18.1.x86_64", "product": { "name": "xen-tools-domU-4.12.3_04-3.18.1.x86_64", "product_id": "xen-tools-domU-4.12.3_04-3.18.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Software Development Kit 12 SP5", "product": { "name": "SUSE Linux Enterprise Software Development Kit 12 SP5", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-sdk:12:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP5", "product": { "name": "SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sles:12:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp5" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "xen-devel-4.12.3_04-3.18.1.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:xen-devel-4.12.3_04-3.18.1.aarch64" }, "product_reference": "xen-devel-4.12.3_04-3.18.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "xen-devel-4.12.3_04-3.18.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:xen-devel-4.12.3_04-3.18.1.x86_64" }, "product_reference": "xen-devel-4.12.3_04-3.18.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "xen-4.12.3_04-3.18.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:xen-4.12.3_04-3.18.1.x86_64" }, "product_reference": "xen-4.12.3_04-3.18.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "xen-doc-html-4.12.3_04-3.18.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:xen-doc-html-4.12.3_04-3.18.1.x86_64" }, "product_reference": "xen-doc-html-4.12.3_04-3.18.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.12.3_04-3.18.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:xen-libs-4.12.3_04-3.18.1.x86_64" }, "product_reference": "xen-libs-4.12.3_04-3.18.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-32bit-4.12.3_04-3.18.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:xen-libs-32bit-4.12.3_04-3.18.1.x86_64" }, "product_reference": "xen-libs-32bit-4.12.3_04-3.18.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.12.3_04-3.18.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:xen-tools-4.12.3_04-3.18.1.x86_64" }, "product_reference": "xen-tools-4.12.3_04-3.18.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.12.3_04-3.18.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:xen-tools-domU-4.12.3_04-3.18.1.x86_64" }, "product_reference": "xen-tools-domU-4.12.3_04-3.18.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "xen-4.12.3_04-3.18.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-4.12.3_04-3.18.1.x86_64" }, "product_reference": "xen-4.12.3_04-3.18.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "xen-doc-html-4.12.3_04-3.18.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-doc-html-4.12.3_04-3.18.1.x86_64" }, "product_reference": "xen-doc-html-4.12.3_04-3.18.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.12.3_04-3.18.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-libs-4.12.3_04-3.18.1.x86_64" }, "product_reference": "xen-libs-4.12.3_04-3.18.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-32bit-4.12.3_04-3.18.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-libs-32bit-4.12.3_04-3.18.1.x86_64" }, "product_reference": "xen-libs-32bit-4.12.3_04-3.18.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.12.3_04-3.18.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-tools-4.12.3_04-3.18.1.x86_64" }, "product_reference": "xen-tools-4.12.3_04-3.18.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.12.3_04-3.18.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-tools-domU-4.12.3_04-3.18.1.x86_64" }, "product_reference": "xen-tools-domU-4.12.3_04-3.18.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-0543", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-0543" } ], "notes": [ { "category": "general", "text": "Incomplete cleanup from specific special register read operations in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP5:xen-4.12.3_04-3.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-doc-html-4.12.3_04-3.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-libs-32bit-4.12.3_04-3.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-libs-4.12.3_04-3.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-tools-4.12.3_04-3.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-tools-domU-4.12.3_04-3.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-4.12.3_04-3.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-doc-html-4.12.3_04-3.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-libs-32bit-4.12.3_04-3.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-libs-4.12.3_04-3.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-tools-4.12.3_04-3.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-tools-domU-4.12.3_04-3.18.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:xen-devel-4.12.3_04-3.18.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:xen-devel-4.12.3_04-3.18.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-0543", "url": "https://www.suse.com/security/cve/CVE-2020-0543" }, { "category": "external", "summary": "SUSE Bug 1154824 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1154824" }, { "category": "external", "summary": "SUSE Bug 1172205 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172205" }, { "category": "external", "summary": "SUSE Bug 1172206 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172206" }, { "category": "external", "summary": "SUSE Bug 1172207 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172207" }, { "category": "external", "summary": "SUSE Bug 1172770 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172770" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP5:xen-4.12.3_04-3.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-doc-html-4.12.3_04-3.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-libs-32bit-4.12.3_04-3.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-libs-4.12.3_04-3.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-tools-4.12.3_04-3.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-tools-domU-4.12.3_04-3.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-4.12.3_04-3.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-doc-html-4.12.3_04-3.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-libs-32bit-4.12.3_04-3.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-libs-4.12.3_04-3.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-tools-4.12.3_04-3.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-tools-domU-4.12.3_04-3.18.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:xen-devel-4.12.3_04-3.18.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:xen-devel-4.12.3_04-3.18.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP5:xen-4.12.3_04-3.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-doc-html-4.12.3_04-3.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-libs-32bit-4.12.3_04-3.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-libs-4.12.3_04-3.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-tools-4.12.3_04-3.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-tools-domU-4.12.3_04-3.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-4.12.3_04-3.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-doc-html-4.12.3_04-3.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-libs-32bit-4.12.3_04-3.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-libs-4.12.3_04-3.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-tools-4.12.3_04-3.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-tools-domU-4.12.3_04-3.18.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:xen-devel-4.12.3_04-3.18.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:xen-devel-4.12.3_04-3.18.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-07-10T13:49:58Z", "details": "moderate" } ], "title": "CVE-2020-0543" }, { "cve": "CVE-2020-15563", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-15563" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.13.x, allowing x86 HVM guest OS users to cause a hypervisor crash. An inverted conditional in x86 HVM guests\u0027 dirty video RAM tracking code allows such guests to make Xen de-reference a pointer guaranteed to point at unmapped space. A malicious or buggy HVM guest may cause the hypervisor to crash, resulting in Denial of Service (DoS) affecting the entire host. Xen versions from 4.8 onwards are affected. Xen versions 4.7 and earlier are not affected. Only x86 systems are affected. Arm systems are not affected. Only x86 HVM guests using shadow paging can leverage the vulnerability. In addition, there needs to be an entity actively monitoring a guest\u0027s video frame buffer (typically for display purposes) in order for such a guest to be able to leverage the vulnerability. x86 PV guests, as well as x86 HVM guests using hardware assisted paging (HAP), cannot leverage the vulnerability.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP5:xen-4.12.3_04-3.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-doc-html-4.12.3_04-3.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-libs-32bit-4.12.3_04-3.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-libs-4.12.3_04-3.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-tools-4.12.3_04-3.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-tools-domU-4.12.3_04-3.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-4.12.3_04-3.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-doc-html-4.12.3_04-3.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-libs-32bit-4.12.3_04-3.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-libs-4.12.3_04-3.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-tools-4.12.3_04-3.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-tools-domU-4.12.3_04-3.18.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:xen-devel-4.12.3_04-3.18.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:xen-devel-4.12.3_04-3.18.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-15563", "url": "https://www.suse.com/security/cve/CVE-2020-15563" }, { "category": "external", "summary": "SUSE Bug 1173377 for CVE-2020-15563", "url": "https://bugzilla.suse.com/1173377" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP5:xen-4.12.3_04-3.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-doc-html-4.12.3_04-3.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-libs-32bit-4.12.3_04-3.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-libs-4.12.3_04-3.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-tools-4.12.3_04-3.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-tools-domU-4.12.3_04-3.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-4.12.3_04-3.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-doc-html-4.12.3_04-3.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-libs-32bit-4.12.3_04-3.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-libs-4.12.3_04-3.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-tools-4.12.3_04-3.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-tools-domU-4.12.3_04-3.18.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:xen-devel-4.12.3_04-3.18.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:xen-devel-4.12.3_04-3.18.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP5:xen-4.12.3_04-3.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-doc-html-4.12.3_04-3.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-libs-32bit-4.12.3_04-3.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-libs-4.12.3_04-3.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-tools-4.12.3_04-3.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-tools-domU-4.12.3_04-3.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-4.12.3_04-3.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-doc-html-4.12.3_04-3.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-libs-32bit-4.12.3_04-3.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-libs-4.12.3_04-3.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-tools-4.12.3_04-3.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-tools-domU-4.12.3_04-3.18.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:xen-devel-4.12.3_04-3.18.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:xen-devel-4.12.3_04-3.18.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-07-10T13:49:58Z", "details": "moderate" } ], "title": "CVE-2020-15563" }, { "cve": "CVE-2020-15565", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-15565" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.13.x, allowing x86 Intel HVM guest OS users to cause a host OS denial of service or possibly gain privileges because of insufficient cache write-back under VT-d. When page tables are shared between IOMMU and CPU, changes to them require flushing of both TLBs. Furthermore, IOMMUs may be non-coherent, and hence prior to flushing IOMMU TLBs, a CPU cache also needs writing back to memory after changes were made. Such writing back of cached data was missing in particular when splitting large page mappings into smaller granularity ones. A malicious guest may be able to retain read/write DMA access to frames returned to Xen\u0027s free pool, and later reused for another purpose. Host crashes (leading to a Denial of Service) and privilege escalation cannot be ruled out. Xen versions from at least 3.2 onwards are affected. Only x86 Intel systems are affected. x86 AMD as well as Arm systems are not affected. Only x86 HVM guests using hardware assisted paging (HAP), having a passed through PCI device assigned, and having page table sharing enabled can leverage the vulnerability. Note that page table sharing will be enabled (by default) only if Xen considers IOMMU and CPU large page size support compatible.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP5:xen-4.12.3_04-3.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-doc-html-4.12.3_04-3.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-libs-32bit-4.12.3_04-3.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-libs-4.12.3_04-3.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-tools-4.12.3_04-3.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-tools-domU-4.12.3_04-3.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-4.12.3_04-3.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-doc-html-4.12.3_04-3.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-libs-32bit-4.12.3_04-3.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-libs-4.12.3_04-3.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-tools-4.12.3_04-3.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-tools-domU-4.12.3_04-3.18.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:xen-devel-4.12.3_04-3.18.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:xen-devel-4.12.3_04-3.18.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-15565", "url": "https://www.suse.com/security/cve/CVE-2020-15565" }, { "category": "external", "summary": "SUSE Bug 1173378 for CVE-2020-15565", "url": "https://bugzilla.suse.com/1173378" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP5:xen-4.12.3_04-3.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-doc-html-4.12.3_04-3.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-libs-32bit-4.12.3_04-3.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-libs-4.12.3_04-3.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-tools-4.12.3_04-3.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-tools-domU-4.12.3_04-3.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-4.12.3_04-3.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-doc-html-4.12.3_04-3.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-libs-32bit-4.12.3_04-3.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-libs-4.12.3_04-3.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-tools-4.12.3_04-3.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-tools-domU-4.12.3_04-3.18.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:xen-devel-4.12.3_04-3.18.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:xen-devel-4.12.3_04-3.18.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.9, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP5:xen-4.12.3_04-3.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-doc-html-4.12.3_04-3.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-libs-32bit-4.12.3_04-3.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-libs-4.12.3_04-3.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-tools-4.12.3_04-3.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-tools-domU-4.12.3_04-3.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-4.12.3_04-3.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-doc-html-4.12.3_04-3.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-libs-32bit-4.12.3_04-3.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-libs-4.12.3_04-3.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-tools-4.12.3_04-3.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-tools-domU-4.12.3_04-3.18.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:xen-devel-4.12.3_04-3.18.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:xen-devel-4.12.3_04-3.18.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-07-10T13:49:58Z", "details": "important" } ], "title": "CVE-2020-15565" }, { "cve": "CVE-2020-15566", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-15566" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.13.x, allowing guest OS users to cause a host OS crash because of incorrect error handling in event-channel port allocation. The allocation of an event-channel port may fail for multiple reasons: (1) port is already in use, (2) the memory allocation failed, or (3) the port we try to allocate is higher than what is supported by the ABI (e.g., 2L or FIFO) used by the guest or the limit set by an administrator (max_event_channels in xl cfg). Due to the missing error checks, only (1) will be considered an error. All the other cases will provide a valid port and will result in a crash when trying to access the event channel. When the administrator configured a guest to allow more than 1023 event channels, that guest may be able to crash the host. When Xen is out-of-memory, allocation of new event channels will result in crashing the host rather than reporting an error. Xen versions 4.10 and later are affected. All architectures are affected. The default configuration, when guests are created with xl/libxl, is not vulnerable, because of the default event-channel limit.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP5:xen-4.12.3_04-3.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-doc-html-4.12.3_04-3.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-libs-32bit-4.12.3_04-3.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-libs-4.12.3_04-3.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-tools-4.12.3_04-3.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-tools-domU-4.12.3_04-3.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-4.12.3_04-3.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-doc-html-4.12.3_04-3.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-libs-32bit-4.12.3_04-3.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-libs-4.12.3_04-3.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-tools-4.12.3_04-3.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-tools-domU-4.12.3_04-3.18.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:xen-devel-4.12.3_04-3.18.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:xen-devel-4.12.3_04-3.18.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-15566", "url": "https://www.suse.com/security/cve/CVE-2020-15566" }, { "category": "external", "summary": "SUSE Bug 1173376 for CVE-2020-15566", "url": "https://bugzilla.suse.com/1173376" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP5:xen-4.12.3_04-3.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-doc-html-4.12.3_04-3.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-libs-32bit-4.12.3_04-3.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-libs-4.12.3_04-3.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-tools-4.12.3_04-3.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-tools-domU-4.12.3_04-3.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-4.12.3_04-3.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-doc-html-4.12.3_04-3.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-libs-32bit-4.12.3_04-3.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-libs-4.12.3_04-3.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-tools-4.12.3_04-3.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-tools-domU-4.12.3_04-3.18.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:xen-devel-4.12.3_04-3.18.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:xen-devel-4.12.3_04-3.18.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP5:xen-4.12.3_04-3.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-doc-html-4.12.3_04-3.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-libs-32bit-4.12.3_04-3.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-libs-4.12.3_04-3.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-tools-4.12.3_04-3.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-tools-domU-4.12.3_04-3.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-4.12.3_04-3.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-doc-html-4.12.3_04-3.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-libs-32bit-4.12.3_04-3.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-libs-4.12.3_04-3.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-tools-4.12.3_04-3.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-tools-domU-4.12.3_04-3.18.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:xen-devel-4.12.3_04-3.18.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:xen-devel-4.12.3_04-3.18.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-07-10T13:49:58Z", "details": "moderate" } ], "title": "CVE-2020-15566" }, { "cve": "CVE-2020-15567", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-15567" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.13.x, allowing Intel guest OS users to gain privileges or cause a denial of service because of non-atomic modification of a live EPT PTE. When mapping guest EPT (nested paging) tables, Xen would in some circumstances use a series of non-atomic bitfield writes. Depending on the compiler version and optimisation flags, Xen might expose a dangerous partially written PTE to the hardware, which an attacker might be able to race to exploit. A guest administrator or perhaps even an unprivileged guest user might be able to cause denial of service, data corruption, or privilege escalation. Only systems using Intel CPUs are vulnerable. Systems using AMD CPUs, and Arm systems, are not vulnerable. Only systems using nested paging (hap, aka nested paging, aka in this case Intel EPT) are vulnerable. Only HVM and PVH guests can exploit the vulnerability. The presence and scope of the vulnerability depends on the precise optimisations performed by the compiler used to build Xen. If the compiler generates (a) a single 64-bit write, or (b) a series of read-modify-write operations in the same order as the source code, the hypervisor is not vulnerable. For example, in one test build using GCC 8.3 with normal settings, the compiler generated multiple (unlocked) read-modify-write operations in source-code order, which did not constitute a vulnerability. We have not been able to survey compilers; consequently we cannot say which compiler(s) might produce vulnerable code (with which code-generation options). The source code clearly violates the C rules, and thus should be considered vulnerable.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP5:xen-4.12.3_04-3.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-doc-html-4.12.3_04-3.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-libs-32bit-4.12.3_04-3.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-libs-4.12.3_04-3.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-tools-4.12.3_04-3.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-tools-domU-4.12.3_04-3.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-4.12.3_04-3.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-doc-html-4.12.3_04-3.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-libs-32bit-4.12.3_04-3.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-libs-4.12.3_04-3.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-tools-4.12.3_04-3.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-tools-domU-4.12.3_04-3.18.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:xen-devel-4.12.3_04-3.18.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:xen-devel-4.12.3_04-3.18.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-15567", "url": "https://www.suse.com/security/cve/CVE-2020-15567" }, { "category": "external", "summary": "SUSE Bug 1173380 for CVE-2020-15567", "url": "https://bugzilla.suse.com/1173380" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2020-15567", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP5:xen-4.12.3_04-3.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-doc-html-4.12.3_04-3.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-libs-32bit-4.12.3_04-3.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-libs-4.12.3_04-3.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-tools-4.12.3_04-3.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-tools-domU-4.12.3_04-3.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-4.12.3_04-3.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-doc-html-4.12.3_04-3.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-libs-32bit-4.12.3_04-3.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-libs-4.12.3_04-3.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-tools-4.12.3_04-3.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-tools-domU-4.12.3_04-3.18.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:xen-devel-4.12.3_04-3.18.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:xen-devel-4.12.3_04-3.18.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP5:xen-4.12.3_04-3.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-doc-html-4.12.3_04-3.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-libs-32bit-4.12.3_04-3.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-libs-4.12.3_04-3.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-tools-4.12.3_04-3.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-tools-domU-4.12.3_04-3.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-4.12.3_04-3.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-doc-html-4.12.3_04-3.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-libs-32bit-4.12.3_04-3.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-libs-4.12.3_04-3.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-tools-4.12.3_04-3.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-tools-domU-4.12.3_04-3.18.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:xen-devel-4.12.3_04-3.18.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:xen-devel-4.12.3_04-3.18.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-07-10T13:49:58Z", "details": "moderate" } ], "title": "CVE-2020-15567" } ] }
suse-su-2020:1663-1
Vulnerability from csaf_suse
Published
2020-06-18 09:17
Modified
2020-06-18 09:17
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 15 kernel was updated receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2020-0543: Fixed a side channel attack against special registers which could have resulted in leaking of read values to cores other than the one which called it.
This attack is known as Special Register Buffer Data Sampling (SRBDS) or 'CrossTalk' (bsc#1154824).
- CVE-2020-9383: Fixed an out-of-bounds read due to improper error condition check of FDC index (bsc#1165111).
- CVE-2020-8992: Fixed an issue which could have allowed attackers to cause a soft lockup via a crafted journal size (bsc#1164069).
- CVE-2020-8834: Fixed a stack corruption which could have lead to kernel panic (bsc#1168276).
- CVE-2020-8649: Fixed a use-after-free in the vgacon_invert_region function in drivers/video/console/vgacon.c (bsc#1162931).
- CVE-2020-8648: Fixed a use-after-free in the n_tty_receive_buf_common function in drivers/tty/n_tty.c (bsc#1162928).
- CVE-2020-8647: Fixed a use-after-free in the vc_do_resize function in drivers/tty/vt/vt.c (bsc#1162929).
- CVE-2020-8428: Fixed a use-after-free which could have allowed local users to cause a denial of service (bsc#1162109).
- CVE-2020-7053: Fixed a use-after-free in the i915_ppgtt_close function in drivers/gpu/drm/i915/i915_gem_gtt.c (bsc#1160966).
- CVE-2020-2732: Fixed an issue affecting Intel CPUs where an L2 guest may trick the L0 hypervisor into accessing sensitive L1 resources (bsc#1163971).
- CVE-2020-13143: Fixed an out-of-bounds read in gadget_dev_desc_UDC_store in drivers/usb/gadget/configfs.c (bsc#1171982).
- CVE-2020-12769: Fixed an issue which could have allowed attackers to cause a panic via concurrent calls to dw_spi_irq and dw_spi_transfer_one (bsc#1171983).
- CVE-2020-12657: An a use-after-free in block/bfq-iosched.c (bsc#1171205).
- CVE-2020-12656: Fixed an improper handling of certain domain_release calls leadingch could have led to a memory leak (bsc#1171219).
- CVE-2020-12655: Fixed an issue which could have allowed attackers to trigger a sync of excessive duration via an XFS v5 image with crafted metadata (bsc#1171217).
- CVE-2020-12654: Fixed an issue in he wifi driver which could have allowed a remote AP to trigger a heap-based buffer overflow (bsc#1171202).
- CVE-2020-12653: Fixed an issue in the wifi driver which could have allowed local users to gain privileges or cause a denial of service (bsc#1171195).
- CVE-2020-12652: Fixed an issue which could have allowed local users to hold an incorrect lock during the ioctl operation and trigger a race condition (bsc#1171218).
- CVE-2020-12464: Fixed a use-after-free due to a transfer without a reference (bsc#1170901).
- CVE-2020-12114: Fixed a pivot_root race condition which could have allowed local users to cause a denial of service (panic) by corrupting a mountpoint reference counter (bsc#1171098).
- CVE-2020-11669: Fixed an issue where arch/powerpc/kernel/idle_book3s.S did not have save/restore functionality for PNV_POWERSAVE_AMR, PNV_POWERSAVE_UAMOR, and PNV_POWERSAVE_AMOR (bnc#1169390).
- CVE-2020-11609: Fixed a null pointer dereference due to improper handling of descriptors (bsc#1168854).
- CVE-2020-11608: Fixed a null pointer dereferences via a crafted USB (bsc#1168829).
- CVE-2020-11494: Fixed an issue which could have allowed attackers to read uninitialized can_frame data (bsc#1168424).
- CVE-2020-10942: Fixed a kernel stack corruption via crafted system calls (bsc#1167629).
- CVE-2020-10757: Fixed an issue where remaping hugepage DAX to anon mmap could have caused user PTE access (bsc#1172317).
- CVE-2020-10751: Fixed an improper implementation in SELinux LSM hook where it was assumed that an skb would only contain a single netlink message (bsc#1171189).
- CVE-2020-10732: Fixed kernel data leak in userspace coredumps due to uninitialized data (bsc#1171220).
- CVE-2020-10720: Fixed a use-after-free read in napi_gro_frags() (bsc#1170778).
- CVE-2020-10711: Fixed a null pointer dereference in SELinux subsystem which could have allowed a remote network user to crash the kernel resulting in a denial of service (bsc#1171191).
- CVE-2020-10690: Fixed the race between the release of ptp_clock and cdev (bsc#1170056).
- CVE-2019-9458: Fixed a use after free due to a race condition which could have led to privilege escalation of privilege (bsc#1168295).
- CVE-2019-9455: Fixed a pointer leak due to a WARN_ON statement in a video driver. This could lead to local information disclosure with System execution privileges needed (bsc#1170345).
- CVE-2019-3701: Fixed an issue in can_can_gw_rcv, which could cause a system crash (bsc#1120386).
- CVE-2019-20812: Fixed an issue in prb_calc_retire_blk_tmo() which could have resulted in a denial of service (bsc#1172453).
- CVE-2019-20810: Fixed a memory leak in due to not calling of snd_card_free (bsc#1172458).
- CVE-2019-20096: Fixed a memory leak in __feat_register_sp() in net/dccp/feat.c, which could have caused denial of service (bsc#1159908).
- CVE-2019-20095: Fixed an improper error-handling cases that did not free allocated hostcmd memory which was causing memory leak (bsc#1159909).
- CVE-2019-20054: Fixed a null pointer dereference in drop_sysctl_table() in fs/proc/proc_sysctl.c, related to put_links (bsc#1159910).
- CVE-2019-19966: Fixed a use-after-free in cpia2_exit() which could have caused denial of service (bsc#1159841).
- CVE-2019-19965: Fixed a null pointer dereference, due to mishandling of port disconnection during discovery (bsc#1159911).
- CVE-2019-19770: Fixed a use-after-free in the debugfs_remove function (bsc#1159198).
- CVE-2019-19768: Fixed a use-after-free in the __blk_add_trace function in kernel/trace/blktrace.c (bsc#1159285).
- CVE-2019-19462: Fixed an issue which could have allowed local user to cause denial of service (bsc#1158265).
- CVE-2019-19447: Fixed a user after free via a crafted ext4 filesystem image (bsc#1158819).
- CVE-2019-19319: Fixed a user after free when a large old_size value is used in a memset call (bsc#1158021).
- CVE-2019-19318: Fixed a use after free via a crafted btrfs image (bsc#1158026).
- CVE-2019-19054: Fixed a memory leak in the cx23888_ir_probe() which could have allowed attackers to cause a denial of service (bsc#1161518).
- CVE-2019-19045: Fixed a memory leak in which could have allowed attackers to cause a denial of service (bsc#1161522).
- CVE-2019-19036: Fixed a null pointer dereference in btrfs_root_node (bsc#1157692).
- CVE-2019-16994: Fixed a memory leak which might have caused denial of service (bsc#1161523).
- CVE-2019-14897: Fixed a stack overflow in Marvell Wifi Driver (bsc#1157155).
- CVE-2019-14896: Fixed a heap overflow in Marvell Wifi Driver (bsc#1157157).
- CVE-2019-14615: Fixed an improper control flow in certain data structures which could have led to information disclosure (bsc#1160195).
- CVE-2018-1000199: Fixed a potential local code execution via ptrace (bsc#1089895).
The following non-security bugs were fixed:
- 6pack,mkiss: fix possible deadlock (bsc#1051510).
- ACPI / APEI: Switch estatus pool to use vmalloc memory (bsc#1051510).
- ACPI: bus: Fix NULL pointer check in acpi_bus_get_private_data() (bsc#1051510).
- ACPI: fix acpi_find_child_device() invocation in acpi_preset_companion() (bsc#1051510).
- af_packet: set defaule value for tmo (bsc#1051510).
- ALSA: control: remove useless assignment in .info callback of PCM chmap element (git-fixes).
- ALSA: hda: Add Clevo W65_67SB the power_save blacklist (git-fixes).
- ALSA: hda - Add docking station support for Lenovo Thinkpad T420s (git-fixes).
- ALSA: hda/analog - Minor optimization for SPDIF mux connections (git-fixes).
- ALSA: hda/ca0132 - Avoid endless loop (git-fixes).
- ALSA: hda/ca0132 - Fix work handling in delayed HP detection (git-fixes).
- ALSA: hda/ca0132 - Keep power on during processing DSP response (git-fixes).
- ALSA: hda - Downgrade error message for single-cmd fallback (git-fixes).
- ALSA: hda/hdmi - add retry logic to parse_intel_hdmi() (git-fixes).
- ALSA: hda/hdmi - fix atpx_present when CLASS is not VGA (bsc#1051510).
- ALSA: hda/realtek - Add headset Mic no shutup for ALC283 (bsc#1051510).
- ALSA: ice1724: Fix sleep-in-atomic in Infrasonic Quartet support code (bsc#1051510).
- ALSA: pcm: Avoid possible info leaks from PCM stream buffers (git-fixes).
- ALSA: seq: Fix racy access for queue timer in proc read (bsc#1051510).
- ALSA: sh: Fix compile warning wrt const (git-fixes).
- ALSA: usb-audio: fix set_format altsetting sanity check (bsc#1051510).
- ALSA: usb-audio: fix sync-ep altsetting sanity check (bsc#1051510).
- ar5523: check NULL before memcpy() in ar5523_cmd() (bsc#1051510).
- arm64: Revert support for execute-only user mappings (bsc#1160218).
- ASoC: au8540: use 64-bit arithmetic instead of 32-bit (bsc#1051510).
- ASoC: cs4349: Use PM ops 'cs4349_runtime_pm' (bsc#1051510).
- ASoC: Jack: Fix NULL pointer dereference in snd_soc_jack_report (bsc#1051510).
- ASoC: msm8916-wcd-analog: Fix selected events for MIC BIAS External1 (bsc#1051510).
- ASoC: wm8962: fix lambda value (git-fixes).
- ath10k: fix fw crash by moving chip reset after napi disabled (bsc#1051510).
- ath9k: fix storage endpoint lookup (git-fixes).
- a typo in %kernel_base_conflicts macro name
- batman-adv: Fix DAT candidate selection on little endian systems (bsc#1051510).
- bcma: remove set but not used variable 'sizel' (git-fixes).
- blk: Fix kabi due to blk_trace_mutex addition (bsc#1159285).
- blktrace: fix dereference after null check (bsc#1159285).
- blktrace: fix trace mutex deadlock (bsc#1159285).
- bonding: fix active-backup transition after link failure (git-fixes).
- bonding: fix potential NULL deref in bond_update_slave_arr (bsc#1051510).
- bonding: fix unexpected IFF_BONDING bit unset (bsc#1051510).
- brcmfmac: fix interface sanity check (git-fixes).
- brcmfmac: Fix memory leak in brcmf_usbdev_qinit (git-fixes).
- brcmfmac: Fix use after free in brcmf_sdio_readframes() (git-fixes).
- btrfs: abort transaction after failed inode updates in create_subvol (bsc#1161936).
- btrfs: add missing extents release on file extent cluster relocation error (bsc#1159483).
- btrfs: avoid fallback to transaction commit during fsync of files with holes (bsc#1159569).
- btrfs: dev-replace: remove warning for unknown return codes when finished (dependency for bsc#1162067).
- btrfs: do not call synchronize_srcu() in inode_tree_del (bsc#1161934).
- btrfs: Ensure we trim ranges across block group boundary (bsc#1151910).
- btrfs: fix block group remaining RO forever after error during device replace (bsc#1160442).
- btrfs: fix btrfs_write_inode vs delayed iput deadlock (bsc#1154243).
- btrfs: fix infinite loop during nocow writeback due to race (bsc#1160804).
- btrfs: fix integer overflow in calc_reclaim_items_nr (bsc#1160433).
- btrfs: fix missing data checksums after replaying a log tree (bsc#1161931).
- btrfs: fix negative subv_writers counter and data space leak after buffered write (bsc#1160802).
- btrfs: fix removal logic of the tree mod log that leads to use-after-free issues (bsc#1160803).
- btrfs: fix selftests failure due to uninitialized i_mode in test inodes (Fix for dependency of bsc#1157692).
- btrfs: handle ENOENT in btrfs_uuid_tree_iterate (bsc#1161937).
- btrfs: harden agaist duplicate fsid on scanned devices (bsc#1134973).
- btrfs: inode: Verify inode mode to avoid NULL pointer dereference (dependency for bsc#1157692).
- btrfs: make tree checker detect checksum items with overlapping ranges (bsc#1161931).
- btrfs: Move btrfs_check_chunk_valid() to tree-check.[ch] and export it (dependency for bsc#1157692).
- btrfs: record all roots for rename exchange on a subvol (bsc#1161933).
- btrfs: relocation: fix reloc_root lifespan and access (bsc#1159588).
- btrfs: scrub: Require mandatory block group RO for dev-replace (bsc#1162067).
- btrfs: send, skip backreference walking for extents with many references (bsc#1162139).
- btrfs: skip log replay on orphaned roots (bsc#1161935).
- btrfs: tree-checker: Check chunk item at tree block read time (dependency for bsc#1157692).
- btrfs: tree-checker: Check level for leaves and nodes (dependency for bsc#1157692).
- btrfs: tree-checker: Enhance chunk checker to validate chunk profile (dependency for bsc#1157692).
- btrfs: tree-checker: Fix wrong check on max devid (fixes for dependency of bsc#1157692).
- btrfs: tree-checker: get fs_info from eb in block_group_err (dependency for bsc#1157692).
- btrfs: tree-checker: get fs_info from eb in check_block_group_item (dependency for bsc#1157692).
- btrfs: tree-checker: get fs_info from eb in check_csum_item (dependency for bsc#1157692).
- btrfs: tree-checker: get fs_info from eb in check_dev_item (dependency for bsc#1157692).
- btrfs: tree-checker: get fs_info from eb in check_dir_item (dependency for bsc#1157692).
- btrfs: tree-checker: get fs_info from eb in check_extent_data_item (dependency for bsc#1157692).
- btrfs: tree-checker: get fs_info from eb in check_inode_item (dependency for bsc#1157692).
- btrfs: tree-checker: get fs_info from eb in check_leaf (dependency for bsc#1157692).
- btrfs: tree-checker: get fs_info from eb in check_leaf_item (dependency for bsc#1157692).
- btrfs: tree-checker: get fs_info from eb in chunk_err (dependency for bsc#1157692).
- btrfs: tree-checker: get fs_info from eb in dev_item_err (dependency for bsc#1157692).
- btrfs: tree-checker: get fs_info from eb in dir_item_err (dependency for bsc#1157692).
- btrfs: tree-checker: get fs_info from eb in file_extent_err (dependency for bsc#1157692).
- btrfs: tree-checker: get fs_info from eb in generic_err (dependency for bsc#1157692).
- btrfs: tree-checker: Make btrfs_check_chunk_valid() return EUCLEAN instead of EIO (dependency for bsc#1157692).
- btrfs: tree-checker: Make chunk item checker messages more readable (dependency for bsc#1157692).
- btrfs: tree-checker: Verify dev item (dependency for bsc#1157692).
- btrfs: tree-checker: Verify inode item (dependency for bsc#1157692).
- btrfs: volumes: Use more straightforward way to calculate map length (bsc#1151910).
- can: can_dropped_invalid_skb(): ensure an initialized headroom in outgoing CAN sk_buffs (bsc#1051510).
- can: gs_usb: gs_usb_probe(): use descriptors of current altsetting (bsc#1051510).
- can: mscan: mscan_rx_poll(): fix rx path lockup when returning from polling to irq mode (bsc#1051510).
- can, slip: Protect tty->disc_data in write_wakeup and close with RCU (bsc#1051510).
- cfg80211: check for set_wiphy_params (bsc#1051510).
- cfg80211: fix page refcount issue in A-MSDU decap (bsc#1051510).
- cfg80211/mac80211: make ieee80211_send_layer2_update a public function (bsc#1051510).
- cgroup: pids: use atomic64_t for pids->limit (bsc#1161514).
- CIFS: add support for flock (bsc#1144333).
- CIFS: Close cached root handle only if it had a lease (bsc#1144333).
- CIFS: Close open handle after interrupted close (bsc#1144333).
- CIFS: close the shared root handle on tree disconnect (bsc#1144333).
- CIFS: Do not miss cancelled OPEN responses (bsc#1144333).
- CIFS: Fix lookup of root ses in DFS referral cache (bsc#1144333).
- CIFS: Fix memory allocation in __smb2_handle_cancelled_cmd() (bsc#1144333).
- CIFS: Fix mount options set in automount (bsc#1144333).
- CIFS: Fix NULL pointer dereference in mid callback (bsc#1144333).
- CIFS: Fix NULL-pointer dereference in smb2_push_mandatory_locks (bsc#1144333).
- CIFS: Fix potential softlockups while refreshing DFS cache (bsc#1144333).
- CIFS: Fix retrieval of DFS referrals in cifs_mount() (bsc#1144333).
- CIFS: Fix use-after-free bug in cifs_reconnect() (bsc#1144333).
- CIFS: Properly process SMB3 lease breaks (bsc#1144333).
- CIFS: remove set but not used variables 'cinode' and 'netfid' (bsc#1144333).
- CIFS: Respect O_SYNC and O_DIRECT flags during reconnect (bsc#1144333).
- clk: Do not try to enable critical clocks if prepare failed (bsc#1051510).
- clk: rockchip: fix I2S1 clock gate register for rk3328 (bsc#1051510).
- clk: rockchip: fix ID of 8ch clock of I2S1 for rk3328 (bsc#1051510).
- clk: rockchip: fix rk3188 sclk_mac_lbtest parameter ordering (bsc#1051510).
- clk: rockchip: fix rk3188 sclk_smc gate data (bsc#1051510).
- clk: sunxi: sun9i-mmc: Implement reset callback for reset controls (bsc#1051510).
- clocksource/drivers/bcm2835_timer: Fix memory leak of timer (bsc#1051510).
- clocksource/drivers/hyper-v: Set TSC clocksource as default w/ InvariantTSC (bsc#1170621).
- copy/pasted 'Recommends:' instead of 'Provides:', 'Obsoletes:' and 'Conflicts:
- crypto: af_alg - Use bh_lock_sock in sk_destruct (bsc#1051510).
- crypto: api - Check spawn->alg under lock in crypto_drop_spawn (bsc#1051510).
- crypto: api - Fix race condition in crypto_spawn_alg (bsc#1051510).
- crypto: atmel-sha - fix error handling when setting hmac key (bsc#1051510).
- crypto: ccp - fix uninitialized list head (bsc#1051510).
- crypto: chelsio - fix writing tfm flags to wrong place (bsc#1051510).
- crypto: pcrypt - Do not clear MAY_SLEEP flag in original request (bsc#1051510).
- crypto: picoxcell - adjust the position of tasklet_init and fix missed tasklet_kill (bsc#1051510).
- crypto: reexport crypto_shoot_alg() (bsc#1051510, kABI fix).
- debugfs: add support for more elaborate ->d_fsdata (bsc#1159198 bsc#1109911). Prerequisite for bsc#1159198.
- debugfs: call debugfs_real_fops() only after debugfs_file_get() (bsc#1159198 bsc#1109911). Prerequisite for bsc#1159198.
- debugfs: convert to debugfs_file_get() and -put() (bsc#1159198 bsc#1109911). Prerequisite for bsc#1159198.
- debugfs: debugfs_real_fops(): drop __must_hold sparse annotation (bsc#1159198 bsc#1109911). Prerequisite for bsc#1159198.
- debugfs: debugfs_use_start/finish do not exist anymore (bsc#1159198). Prerequisite for bsc#1159198.
- debugfs: defer debugfs_fsdata allocation to first usage (bsc#1159198 bsc#1109911). Prerequisite for bsc#1159198.
- debugfs: fix debugfs_real_fops() build error (bsc#1159198 bsc#1109911). Prerequisite for bsc#1159198.
- debugfs: implement per-file removal protection (bsc#1159198 bsc#1109911). Prerequisite for bsc#1159198.
- debugfs: purge obsolete SRCU based removal protection (bsc#1159198 bsc#1109911). Prerequisite for bsc#1159198.
- debugfs: simplify __debugfs_remove_file() (bsc#1159198). Prerequisite for bsc#1159198.
- dmaengine: coh901318: Fix a double-lock bug (bsc#1051510).
- dmaengine: coh901318: Remove unused variable (bsc#1051510).
- dmaengine: Fix access to uninitialized dma_slave_caps (bsc#1051510).
- dma-mapping: fix return type of dma_set_max_seg_size() (bsc#1051510).
- drivers/base/memory.c: cache blocks in radix tree to accelerate lookup (bsc#1159955 ltc#182993).
- drivers/base/memory.c: do not access uninitialized memmaps in soft_offline_page_store() (bsc#1051510).
- drivers: HV: Send one page worth of kmsg dump over Hyper-V during panic (bsc#1170617).
- drivers: hv: vmbus: Fix the issue with freeing up hv_ctl_table_hdr (bsc#1170617).
- drivers: hv: vmbus: Get rid of MSR access from vmbus_drv.c (bsc#1170618).
- drivers: hv: vmus: Fix the check for return value from kmsg get dump buffer (bsc#1170617).
- drm/amdgpu: add function parameter description in 'amdgpu_gart_bind' (bsc#1051510).
- drm/amdgpu: remove 4 set but not used variable in amdgpu_atombios_get_connector_info_from_object_table (bsc#1051510).
- drm/amdgpu: remove always false comparison in 'amdgpu_atombios_i2c_process_i2c_ch' (bsc#1051510).
- drm/amdgpu: remove set but not used variable 'amdgpu_connector' (bsc#1051510).
- drm/amdgpu: remove set but not used variable 'dig' (bsc#1051510).
- drm/amdgpu: remove set but not used variable 'dig_connector' (bsc#1051510).
- drm/amdgpu: remove set but not used variable 'mc_shared_chmap' (bsc#1051510).
- drm/amdgpu: remove set but not used variable 'mc_shared_chmap' from 'gfx_v6_0.c' and 'gfx_v7_0.c' (bsc#1051510).
- drm: bridge: dw-hdmi: constify copied structure (bsc#1051510).
- drm/dp_mst: correct the shifting in DP_REMOTE_I2C_READ (bsc#1051510).
- drm/fb-helper: Round up bits_per_pixel if possible (bsc#1051510).
- drm/i810: Prevent underflow in ioctl (bsc#1114279)
- drm/i915: Add missing include file <linux/math64.h> (bsc#1051510).
- drm/i915: Fix pid leak with banned clients (bsc#1114279)
- drm: limit to INT_MAX in create_blob ioctl (bsc#1051510).
- drm/mst: Fix MST sideband up-reply failure handling (bsc#1051510).
- drm/nouveau: Fix copy-paste error in nouveau_fence_wait_uevent_handler (bsc#1051510).
- drm/nouveau/secboot/gm20b: initialize pointer in gm20b_secboot_new() (bsc#1051510).
- drm/qxl: Return error if fbdev is not 32 bpp (bsc#1159028)
- drm/radeon: fix r1xx/r2xx register checker for POT textures (bsc#1114279)
- drm/rockchip: lvds: Fix indentation of a #define (bsc#1051510).
- drm/vmwgfx: prevent memory leak in vmw_cmdbuf_res_add (bsc#1051510).
- e100: Fix passing zero to 'PTR_ERR' warning in e100_load_ucode_wait (bsc#1051510).
- exit: panic before exit_mm() on global init exit (bsc#1161549).
- extcon: max8997: Fix lack of path setting in USB device mode (bsc#1051510).
- firestream: fix memory leaks (bsc#1051510).
- fix autofs regression caused by follow_managed() changes (bsc#1159271).
- fix dget_parent() fastpath race (bsc#1159271).
- Fix partial checked out tree build ... so that bisection does not break.
- fjes: fix missed check in fjes_acpi_add (bsc#1051510).
- fs: cifs: Fix atime update check vs mtime (bsc#1144333).
- fs/namei.c: fix missing barriers when checking positivity (bsc#1159271).
- fs/namei.c: pull positivity check into follow_managed() (bsc#1159271).
- fs/xfs: fix f_ffree value for statfs when project quota is set (bsc#1165985).
- ftrace: Avoid potential division by zero in function profiler (bsc#1160784).
- futex: Prevent robust futex exit race (bsc#1161555).
- gpio: Fix error message on out-of-range GPIO in lookup table (bsc#1051510).
- HID: hidraw: Fix returning EPOLLOUT from hidraw_poll (bsc#1051510).
- HID: hidraw, uhid: Always report EPOLLOUT (bsc#1051510).
- hidraw: Return EPOLLOUT from hidraw_poll (bsc#1051510).
- HID: uhid: Fix returning EPOLLOUT from uhid_char_poll (bsc#1051510).
- hwmon: (adt7475) Make volt2reg return same reg as reg2volt input (bsc#1051510).
- hwmon: (core) Do not use device managed functions for memory allocations (bsc#1051510).
- hwmon: (nct7802) Fix voltage limits to wrong registers (bsc#1051510).
- i2c: imx: do not print error message on probe defer (bsc#1051510).
- IB/hfi1: convert to debugfs_file_get() and -put() (bsc#1159198 bsc#1109911). Prerequisite for bsc#1159198.
- ibmveth: Detect unsupported packets before sending to the hypervisor (bsc#1159484 ltc#182983).
- ibmvfc: do not send implicit logouts prior to NPIV login (bsc#1169625 ltc#184611).
- iio: adc: max9611: Fix too short conversion time delay (bsc#1051510).
- iio: buffer: align the size of scan bytes to size of the largest element (bsc#1051510).
- inet: protect against too small mtu values (networking-stable-19_12_16).
- Input: add safety guards to input_set_keycode() (bsc#1168075).
- Input: aiptek - fix endpoint sanity check (bsc#1051510).
- Input: cyttsp4_core - fix use after free bug (bsc#1051510).
- Input: goodix - add upside-down quirk for Teclast X89 tablet (bsc#1051510).
- Input: gtco - fix endpoint sanity check (bsc#1051510).
- Input: keyspan-remote - fix control-message timeouts (bsc#1051510).
- Input: pegasus_notetaker - fix endpoint sanity check (bsc#1051510).
- Input: pm8xxx-vib - fix handling of separate enable register (bsc#1051510).
- Input: rmi_f54 - read from FIFO in 32 byte blocks (bsc#1051510).
- Input: sun4i-ts - add a check for devm_thermal_zone_of_sensor_register (bsc#1051510).
- Input: sur40 - fix interface sanity checks (bsc#1051510).
- Input: synaptics-rmi4 - do not increment rmiaddr for SMBus transfers (bsc#1051510).
- Input: synaptics-rmi4 - simplify data read in rmi_f54_work (bsc#1051510).
- Input: synaptics - switch another X1 Carbon 6 to RMI/SMbus (bsc#1051510).
- iommu: Remove device link to group on failure (bsc#1160755).
- iommu/vt-d: Unlink device if failed to add to group (bsc#1160756).
- iwlegacy: ensure loop counter addr does not wrap and cause an infinite loop (git-fixes).
- iwlwifi: mvm: Send non offchannel traffic via AP sta (bsc#1051510).
- iwlwifi: mvm: synchronize TID queue removal (bsc#1051510).
- kABI: protect struct sctp_ep_common (kabi).
- kABI: restore debugfs_remove_recursive() (bsc#1159198).
- kABI workaround for can/skb.h inclusion (bsc#1051510).
- kernel/trace: Fix do not unregister tracepoints when register sched_migrate_task fail (bsc#1160787).
- KEYS: reaching the keys quotas correctly (bsc#1171689).
- KVM: fix spectrev1 gadgets (bsc#1164705).
- KVM: x86: Host feature SSBD does not imply guest feature SPEC_CTRL_SSBD (bsc#1160476).
- KVM: x86: Protect DR-based index computations from Spectre-v1/L1TF attacks (bsc#1164734).
- KVM: x86: Protect ioapic_read_indirect() from Spectre-v1/L1TF attacks (bsc#1164728).
- KVM: x86: Protect ioapic_write_indirect() from Spectre-v1/L1TF attacks (bsc#1164729).
- KVM: x86: Protect kvm_hv_msr_[get|set]_crash_data() from Spectre-v1/L1TF attacks (bsc#1164712).
- KVM: x86: Protect kvm_lapic_reg_write() from Spectre-v1/L1TF attacks (bsc#1164730).
- KVM: x86: Protect MSR-based index computations from Spectre-v1/L1TF attacks in x86.c (bsc#1164733).
- KVM: x86: Protect MSR-based index computations in fixed_msr_to_seg_unit() from Spectre-v1/L1TF attacks (bsc#1164731).
- KVM: x86: Protect MSR-based index computations in pmu.h from Spectre-v1/L1TF attacks (bsc#1164732).
- KVM: x86: Protect pmu_intel.c from Spectre-v1/L1TF attacks (bsc#1164735).
- KVM: x86: Protect x86_decode_insn from Spectre-v1/L1TF attacks (bsc#1164705).
- KVM: x86: Refactor picdev_write() to prevent Spectre-v1/L1TF attacks (bsc#1164727).
- leds: Allow to call led_classdev_unregister() unconditionally (bsc#1161674).
- leds: class: ensure workqueue is initialized before setting brightness (bsc#1161674).
- lib/scatterlist.c: adjust indentation in __sg_alloc_table (bsc#1051510).
- lib/test_kasan.c: fix memory leak in kmalloc_oob_krealloc_more() (bsc#1051510).
- livepatch/samples/selftest: Use klp_shadow_alloc() API correctly (bsc#1071995).
- livepatch/selftest: Clean up shadow variable names and type (bsc#1071995).
- mac80211: Do not send Layer 2 Update frame before authorization (bsc#1051510).
- macvlan: do not assume mac_header is set in macvlan_broadcast() (bsc#1051510).
- macvlan: use skb_reset_mac_header() in macvlan_queue_xmit() (bsc#1051510).
- md/raid0: Fix buffer overflow at debug print (bsc#1164051).
- media: cec.h: CEC_OP_REC_FLAG_ values were swapped (bsc#1051510).
- media: cec: report Vendor ID after initialization (bsc#1051510).
- media: iguanair: fix endpoint sanity check (bsc#1051510).
- media: ov519: add missing endpoint sanity checks (bsc#1168829).
- media: pulse8-cec: return 0 when invalidating the logical address (bsc#1051510).
- media: stkwebcam: Bugfix for wrong return values (bsc#1051510).
- media: stv06xx: add missing descriptor sanity checks (bsc#1168854).
- media: uvcvideo: Avoid cyclic entity chains due to malformed USB descriptors (bsc#1051510).
- media: v4l2-ioctl.c: zero reserved fields for S/TRY_FMT (bsc#1051510).
- media: v4l2-rect.h: fix v4l2_rect_map_inside() top/left adjustments (bsc#1051510).
- missing escaping of backslashes in macro expansions Fixes: f3b74b0ae86b ('rpm/kernel-subpackage-spec: Unify dependency handling.') Fixes: 3fd22e219f77 ('rpm/kernel-subpackage-spec: Fix empty Recommends tag (bsc#1143959)')
- mmc: mediatek: fix CMD_TA to 2 for MT8173 HS200/HS400 mode (bsc#1051510).
- mmc: sdhci: fix minimum clock rate for v3 controller (bsc#1051510).
- mmc: sdhci-of-esdhc: fix P2020 errata handling (bsc#1051510).
- mmc: sdhci-of-esdhc: Revert 'mmc: sdhci-of-esdhc: add erratum A-009204 support' (bsc#1051510).
- mmc: tegra: fix SDR50 tuning override (bsc#1051510).
- mm: memory_hotplug: use put_device() if device_register fail (bsc#1159955 ltc#182993).
- mm/page-writeback.c: fix range_cyclic writeback vs writepages deadlock (bsc#1159394).
- mwifiex: drop most magic numbers from mwifiex_process_tdls_action_frame() (git-fixes).
- net: bridge: deny dev_set_mac_address() when unregistering (networking-stable-19_12_16).
- net: ena: Add PCI shutdown handler to allow safe kexec (bsc#1167421, bsc#1167423).
- net: ethernet: ti: cpsw: fix extra rx interrupt (networking-stable-19_12_16).
- netfilter: nf_queue: enqueue skbs with NULL dst (git-fixes).
- net/mlx4_en: fix mlx4 ethtool -N insertion (networking-stable-19_11_25).
- net/mlx5e: Fix set vf link state error flow (networking-stable-19_11_25).
- net/mlxfw: Fix out-of-memory error in mfa2 flash burning (bsc#1051858).
- net: psample: fix skb_over_panic (networking-stable-19_12_03).
- net: rtnetlink: prevent underflows in do_setvfinfo() (networking-stable-19_11_25).
- net/sched: act_pedit: fix WARN() in the traffic path (networking-stable-19_11_25).
- net: sched: fix `tc -s class show` no bstats on class with nolock subqueues (networking-stable-19_12_03).
- net: usb: lan78xx: limit size of local TSO packets (bsc#1051510).
- net: usb: qmi_wwan: add support for Foxconn T77W968 LTE modules (networking-stable-19_11_18).
- new helper: lookup_positive_unlocked() (bsc#1159271).
- NFC: pn533: fix bulk-message timeout (bsc#1051510).
- NFC: pn544: Adjust indentation in pn544_hci_check_presence (git-fixes).
- objtool: Fix stack offset tracking for indirect CFAs (bsc#1169514).
- openvswitch: drop unneeded BUG_ON() in ovs_flow_cmd_build_info() (networking-stable-19_12_03).
- openvswitch: remove another BUG_ON() (networking-stable-19_12_03).
- openvswitch: support asymmetric conntrack (networking-stable-19_12_16).
- orinoco_usb: fix interface sanity check (git-fixes).
- PCI: Do not disable bridge BARs when assigning bus resources (bsc#1051510).
- PCI/switchtec: Fix vep_vector_number ioread width (bsc#1051510).
- phy: qualcomm: Adjust indentation in read_poll_timeout (bsc#1051510).
- pinctrl: qcom: ssbi-gpio: fix gpio-hog related boot issues (bsc#1051510).
- pinctrl: sh-pfc: r8a7778: Fix duplicate SDSELF_B and SD1_CLK_B (bsc#1051510).
- platform/x86: asus-wmi: Fix keyboard brightness cannot be set to 0 (bsc#1051510).
- platform/x86: hp-wmi: Make buffer for HPWMI_FEATURE2_QUERY 128 bytes (bsc#1051510).
- platform/x86: pmc_atom: Add Siemens CONNECT X300 to critclk_systems DMI table (bsc#1051510).
- powerpc: Allow 64bit VDSO __kernel_sync_dicache to work across ranges >4GB (bnc#1151927 5.3.17).
- powerpc: Allow flush_icache_range to work across ranges >4GB (bnc#1151927 5.3.17).
- powerpc/archrandom: fix arch_get_random_seed_int() (bsc#1065729).
- powerpc: Fix vDSO clock_getres() (bsc#1065729).
- powerpc/irq: fix stack overflow verification (bsc#1065729).
- powerpc/mm: drop #ifdef CONFIG_MMU in is_ioremap_addr() (bsc#1065729).
- powerpc/mm: Remove kvm radix prefetch workaround for Power9 DD2.2 (bsc#1061840).
- powerpc/pkeys: remove unused pkey_allows_readwrite (bsc#1065729).
- powerpc/powernv: Disable native PCIe port management (bsc#1065729).
- powerpc/security: Fix debugfs data leak on 32-bit (bsc#1065729).
- powerpc/tm: Fix clearing MSR[TS] in current when reclaiming on signal delivery (bsc#1118338 ltc#173734).
- powerpc/tools: Do not quote $objdump in scripts (bsc#1065729).
- powerpc/xive: Discard ESB load value when interrupt is invalid (bsc#1085030).
- powerpc/xive: Skip ioremap() of ESB pages for LSI interrupts (bsc#1085030).
- powerpc/xmon: do not access ASDR in VMs (bsc#1065729).
- ppp: Adjust indentation into ppp_async_input (git-fixes).
- prevent active file list thrashing due to refault detection (VM Performance, bsc#1156286).
- pstore/ram: Write new dumps to start of recycled zones (bsc#1051510).
- qede: Disable hardware gro when xdp prog is installed (bsc#1086314 bsc#1086313 bsc#1086301 ).
- r8152: add missing endpoint sanity check (bsc#1051510).
- random: always use batched entropy for get_random_u{32,64} (bsc#1164871).
- RDMA/bnxt_re: Avoid freeing MR resources if dereg fails (bsc#1050244).
- regulator: Fix return value of _set_load() stub (bsc#1051510).
- regulator: rk808: Lower log level on optional GPIOs being not available (bsc#1051510).
- regulator: rn5t618: fix module aliases (bsc#1051510).
- Revert 'Input: synaptics-rmi4 - do not increment rmiaddr for SMBus transfers' (bsc#1051510).
- Revert 'ipc,sem: remove uneeded sem_undo_list lock usage in exit_sem()' (bsc#1172221).
- Revert 'mmc: sdhci: Fix incorrect switch to HS mode' (bsc#1051510).
- rtc: dt-binding: abx80x: fix resistance scale (bsc#1051510).
- rtc: max8997: Fix the returned value in case of error in 'max8997_rtc_read_alarm()' (bsc#1051510).
- rtc: msm6242: Fix reading of 10-hour digit (bsc#1051510).
- rtc: pcf8523: set xtal load capacitance from DT (bsc#1051510).
- rtc: s35390a: Change buf's type to u8 in s35390a_init (bsc#1051510).
- scsi: ibmvfc: Avoid loss of all paths during SVC node reboot (bsc#1161951 ltc#183551).
- scsi: ibmvfc: Fix NULL return compiler warning (bsc#1161951 ltc#183551).
- scsi: qla2xxx: Add a shadow variable to hold disc_state history of fcport (bsc#1158013).
- scsi: qla2xxx: Add D-Port Diagnostic reason explanation logs (bsc#1158013).
- scsi: qla2xxx: Cleanup unused async_logout_done (bsc#1158013).
- scsi: qla2xxx: Consolidate fabric scan (bsc#1158013).
- scsi: qla2xxx: Correct fcport flags handling (bsc#1158013).
- scsi: qla2xxx: Fix fabric scan hang (bsc#1158013).
- scsi: qla2xxx: Fix mtcp dump collection failure (bsc#1158013).
- scsi: qla2xxx: Fix RIDA Format-2 (bsc#1158013).
- scsi: qla2xxx: Fix stuck login session using prli_pend_timer (bsc#1158013).
- scsi: qla2xxx: Fix stuck session in GNL (bsc#1158013).
- scsi: qla2xxx: Fix the endianness of the qla82xx_get_fw_size() return type (bsc#1158013).
- scsi: qla2xxx: Fix update_fcport for current_topology (bsc#1158013).
- scsi: qla2xxx: Improve readability of the code that handles qla_flt_header (bsc#1158013).
- scsi: qla2xxx: Remove defer flag to indicate immeadiate port loss (bsc#1158013).
- scsi: qla2xxx: Update driver version to 10.01.00.22-k (bsc#1158013).
- scsi: qla2xxx: Use common routine to free fcport struct (bsc#1158013).
- scsi: qla2xxx: Use get_unaligned_*() instead of open-coding these functions (bsc#1158013).
- sctp: cache netns in sctp_ep_common (networking-stable-19_12_03).
- serial: 8250_bcm2835aux: Fix line mismatch on driver unbind (bsc#1051510).
- serial: ifx6x60: add missed pm_runtime_disable (bsc#1051510).
- serial: pl011: Fix DMA ->flush_buffer() (bsc#1051510).
- serial: serial_core: Perform NULL checks for break_ctl ops (bsc#1051510).
- serial: stm32: fix transmit_chars when tx is stopped (bsc#1051510).
- sfc: Only cancel the PPS workqueue if it exists (networking-stable-19_11_25).
- sh_eth: check sh_eth_cpu_data::dual_port when dumping registers (bsc#1051510).
- sh_eth: fix dumping ARSTR (bsc#1051510).
- sh_eth: fix invalid context bug while calling auto-negotiation by ethtool (bsc#1051510).
- sh_eth: fix invalid context bug while changing link options by ethtool (bsc#1051510).
- sh_eth: fix TSU init on SH7734/R8A7740 (bsc#1051510).
- sh_eth: fix TXALCR1 offsets (bsc#1051510).
- sh_eth: TSU_QTAG0/1 registers the same as TSU_QTAGM0/1 (bsc#1051510).
- smb3: Fix crash in SMB2_open_init due to uninitialized field in compounding path (bsc#1144333).
- smb3: Fix persistent handles reconnect (bsc#1144333).
- smb3: fix refcount underflow warning on unmount when no directory leases (bsc#1144333).
- smb3: remove confusing dmesg when mounting with encryption ('seal') (bsc#1144333).
- soc: renesas: rcar-sysc: Add goto to of_node_put() before return (bsc#1051510).
- spi: tegra114: clear packed bit for unpacked mode (bsc#1051510).
- spi: tegra114: configure dma burst size to fifo trig level (bsc#1051510).
- spi: tegra114: fix for unpacked mode transfers (bsc#1051510).
- spi: tegra114: flush fifos (bsc#1051510).
- spi: tegra114: terminate dma and reset on transfer timeout (bsc#1051510).
- staging: comedi: adv_pci1710: fix AI channels 16-31 for PCI-1713 (bsc#1051510).
- Staging: iio: adt7316: Fix i2c data reading, set the data field (bsc#1051510).
- staging: rtl8188eu: fix interface sanity check (bsc#1051510).
- staging: wlan-ng: ensure error return is actually returned (bsc#1051510).
- tcp: clear tp->packets_out when purging write queue (bsc#1160560).
- tcp: exit if nothing to retransmit on RTO timeout (bsc#1160560, stable 4.14.159).
- tcp: md5: fix potential overestimation of TCP option space (networking-stable-19_12_16).
- tracing: Have the histogram compare functions convert to u64 first (bsc#1160210).
- tracing: xen: Ordered comparison of function pointers (git-fixes).
- tty: n_hdlc: fix build on SPARC (bsc#1051510).
- tty/serial: atmel: Add is_half_duplex helper (bsc#1051510).
- tty: serial: msm_serial: Fix lockup for sysrq and oops (bsc#1051510).
- tty: vt: keyboard: reject invalid keycodes (bsc#1051510).
- USB: Allow USB device to be warm reset in suspended state (bsc#1051510).
- USB: atm: ueagle-atm: add missing endpoint check (bsc#1051510).
- USB: chipidea: host: Disable port power only if previously enabled (bsc#1051510).
- USB: core: hub: Improved device recognition on remote wakeup (bsc#1051510).
- USB: core: urb: fix URB structure initialization function (bsc#1051510).
- USB: documentation: flags on usb-storage versus UAS (bsc#1051510).
- USB: dwc3: debugfs: Properly print/set link state for HS (bsc#1051510).
- USB: dwc3: do not log probe deferrals; but do log other error codes (bsc#1051510).
- USB: dwc3: ep0: Clear started flag on completion (bsc#1051510).
- USB: dwc3: turn off VBUS when leaving host mode (bsc#1051510).
- USB: gadget: f_ecm: Use atomic_t to track in-flight request (bsc#1051510).
- USB: gadget: f_ncm: Use atomic_t to track in-flight request (bsc#1051510).
- USB: gadget: pch_udc: fix use after free (bsc#1051510).
- USB: gadget: u_serial: add missing port entry locking (bsc#1051510).
- USB: gadget: Zero ffs_io_data (bsc#1051510).
- USB: host: xhci-hub: fix extra endianness conversion (bsc#1051510).
- usbip: Fix receive error in vhci-hcd when using scatter-gather (bsc#1051510).
- USB: mtu3: fix dbginfo in qmu_tx_zlp_error_handler (bsc#1051510).
- USB: musb: dma: Correct parameter passed to IRQ handler (bsc#1051510).
- USB: musb: fix idling for suspend after disconnect interrupt (bsc#1051510).
- USB: serial: ch341: handle unbound port at reset_resume (bsc#1051510).
- USB: serial: io_edgeport: add missing active-port sanity check (bsc#1051510).
- USB: serial: io_edgeport: handle unbound ports on URB completion (bsc#1051510).
- USB: serial: io_edgeport: use irqsave() in USB's complete callback (bsc#1051510).
- USB: serial: ir-usb: add missing endpoint sanity check (bsc#1051510).
- USB: serial: ir-usb: fix IrLAP framing (bsc#1051510).
- USB: serial: ir-usb: fix link-speed handling (bsc#1051510).
- USB: serial: keyspan: handle unbound ports (bsc#1051510).
- USB: serial: opticon: fix control-message timeouts (bsc#1051510).
- USB: serial: option: Add support for Quectel RM500Q (bsc#1051510).
- USB: serial: quatech2: handle unbound ports (bsc#1051510).
- USB: serial: simple: Add Motorola Solutions TETRA MTP3xxx and MTP85xx (bsc#1051510).
- USB: serial: suppress driver bind attributes (bsc#1051510).
- USB: typec: tcpci: mask event interrupts when remove driver (bsc#1051510).
- USB: uas: heed CAPACITY_HEURISTICS (bsc#1051510).
- USB: uas: honor flag to avoid CAPACITY16 (bsc#1051510).
- USB: xhci: Fix build warning seen with CONFIG_PM=n (bsc#1051510).
- workqueue: Fix pwq ref leak in rescuer_thread() (bsc#1160211).
- x86/entry/64: Fix unwind hints in kernel exit path (bsc#1058115).
- x86/entry/64: Fix unwind hints in register clearing code (bsc#1058115).
- x86/entry/64: Fix unwind hints in rewind_stack_do_exit() (bsc#1058115).
- x86/entry/64: Fix unwind hints in __switch_to_asm() (bsc#1058115).
- x86/Hyper-V: Allow guests to enable InvariantTSC (bsc#1170621).
- x86/Hyper-V: Free hv_panic_page when fail to register kmsg dump (bsc#1170617).
- x86/Hyper-V: Report crash data in die() when panic_on_oops is set (bsc#1170617).
- x86/Hyper-V: Report crash register data or kmsg before running crash kernel (bsc#1170617).
- x86/Hyper-V: Report crash register data when sysctl_record_panic_msg is not set (bsc#1170617).
- x86/Hyper-V: report value of misc_features (git-fixes).
- x86/Hyper-V: Trigger crash enlightenment only once during system crash (bsc#1170617).
- x86/Hyper-V: Unload vmbus channel in hv panic callback (bsc#1170617).
- x86/kgbd: Use NMI_VECTOR not APIC_DM_NMI (bsc#1114279).
- x86/mce/AMD: Allow any CPU to initialize the smca_banks array (bsc#1114279).
- x86/MCE/AMD: Allow Reserved types to be overwritten in smca_banks (bsc#1114279).
- x86/MCE/AMD: Do not use rdmsr_safe_on_cpu() in smca_configure() (bsc#1114279).
- x86/mce: Fix possibly incorrect severity calculation on AMD (bsc#1114279).
- x86/mm: Split vmalloc_sync_all() (bsc#1165741).
- x86/resctrl: Fix an imbalance in domain_remove_cpu() (bsc#1114279).
- x86/resctrl: Fix potential memory leak (bsc#1114279).
- x86/unwind/orc: Do not skip the first frame for inactive tasks (bsc#1058115).
- x86/unwind/orc: Fix error handling in __unwind_start() (bsc#1058115).
- x86/unwind/orc: Fix error path for bad ORC entry type (bsc#1058115).
- x86/unwind/orc: Fix unwind_get_return_address_ptr() for inactive tasks (bsc#1058115).
- x86/unwind/orc: Prevent unwinding before ORC initialization (bsc#1058115).
- x86/unwind: Prevent false warnings for non-current tasks (bsc#1058115).
- x86/xen: fix booting 32-bit pv guest (bsc#1071995).
- x86/xen: Make the boot CPU idle task reliable (bsc#1071995).
- x86/xen: Make the secondary CPU idle tasks reliable (bsc#1071995).
- xen/blkfront: Adjust indentation in xlvbd_alloc_gendisk (bsc#1065600).
- xen-blkfront: switch kcalloc to kvcalloc for large array allocation (bsc#1160917).
- xfrm: Fix transport mode skb control buffer usage (bsc#1161552).
- xfs: also remove cached ACLs when removing the underlying attr (bsc#1165873).
- xfs: bulkstat should copy lastip whenever userspace supplies one (bsc#1165984).
- xfs: Fix tail rounding in xfs_alloc_file_space() (bsc#1161087, bsc#1153917).
- xhci: Fix memory leak in xhci_add_in_port() (bsc#1051510).
- xhci: fix USB3 device initiated resume race with roothub autosuspend (bsc#1051510).
- xhci: handle some XHCI_TRUST_TX_LENGTH quirks cases as default behaviour (bsc#1051510).
- xhci: make sure interrupts are restored to correct state (bsc#1051510).
- zd1211rw: fix storage endpoint lookup (git-fixes).
Patchnames
SUSE-2020-1663,SUSE-SLE-Module-Live-Patching-15-2020-1663,SUSE-SLE-Product-HA-15-2020-1663,SUSE-SLE-Product-HPC-15-2020-1663,SUSE-SLE-Product-SLES-15-2020-1663,SUSE-SLE-Product-SLES_SAP-15-2020-1663
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "The SUSE Linux Enterprise 15 kernel was updated receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2020-0543: Fixed a side channel attack against special registers which could have resulted in leaking of read values to cores other than the one which called it.\n This attack is known as Special Register Buffer Data Sampling (SRBDS) or \u0027CrossTalk\u0027 (bsc#1154824).\n- CVE-2020-9383: Fixed an out-of-bounds read due to improper error condition check of FDC index (bsc#1165111).\n- CVE-2020-8992: Fixed an issue which could have allowed attackers to cause a soft lockup via a crafted journal size (bsc#1164069).\n- CVE-2020-8834: Fixed a stack corruption which could have lead to kernel panic (bsc#1168276).\n- CVE-2020-8649: Fixed a use-after-free in the vgacon_invert_region function in drivers/video/console/vgacon.c (bsc#1162931).\n- CVE-2020-8648: Fixed a use-after-free in the n_tty_receive_buf_common function in drivers/tty/n_tty.c (bsc#1162928).\n- CVE-2020-8647: Fixed a use-after-free in the vc_do_resize function in drivers/tty/vt/vt.c (bsc#1162929).\n- CVE-2020-8428: Fixed a use-after-free which could have allowed local users to cause a denial of service (bsc#1162109).\n- CVE-2020-7053: Fixed a use-after-free in the i915_ppgtt_close function in drivers/gpu/drm/i915/i915_gem_gtt.c (bsc#1160966).\n- CVE-2020-2732: Fixed an issue affecting Intel CPUs where an L2 guest may trick the L0 hypervisor into accessing sensitive L1 resources (bsc#1163971).\n- CVE-2020-13143: Fixed an out-of-bounds read in gadget_dev_desc_UDC_store in drivers/usb/gadget/configfs.c (bsc#1171982).\n- CVE-2020-12769: Fixed an issue which could have allowed attackers to cause a panic via concurrent calls to dw_spi_irq and dw_spi_transfer_one (bsc#1171983).\n- CVE-2020-12657: An a use-after-free in block/bfq-iosched.c (bsc#1171205).\n- CVE-2020-12656: Fixed an improper handling of certain domain_release calls leadingch could have led to a memory leak (bsc#1171219).\n- CVE-2020-12655: Fixed an issue which could have allowed attackers to trigger a sync of excessive duration via an XFS v5 image with crafted metadata (bsc#1171217).\n- CVE-2020-12654: Fixed an issue in he wifi driver which could have allowed a remote AP to trigger a heap-based buffer overflow (bsc#1171202).\n- CVE-2020-12653: Fixed an issue in the wifi driver which could have allowed local users to gain privileges or cause a denial of service (bsc#1171195).\n- CVE-2020-12652: Fixed an issue which could have allowed local users to hold an incorrect lock during the ioctl operation and trigger a race condition (bsc#1171218).\n- CVE-2020-12464: Fixed a use-after-free due to a transfer without a reference (bsc#1170901).\n- CVE-2020-12114: Fixed a pivot_root race condition which could have allowed local users to cause a denial of service (panic) by corrupting a mountpoint reference counter (bsc#1171098).\n- CVE-2020-11669: Fixed an issue where arch/powerpc/kernel/idle_book3s.S did not have save/restore functionality for PNV_POWERSAVE_AMR, PNV_POWERSAVE_UAMOR, and PNV_POWERSAVE_AMOR (bnc#1169390).\n- CVE-2020-11609: Fixed a null pointer dereference due to improper handling of descriptors (bsc#1168854).\n- CVE-2020-11608: Fixed a null pointer dereferences via a crafted USB (bsc#1168829).\n- CVE-2020-11494: Fixed an issue which could have allowed attackers to read uninitialized can_frame data (bsc#1168424).\n- CVE-2020-10942: Fixed a kernel stack corruption via crafted system calls (bsc#1167629).\n- CVE-2020-10757: Fixed an issue where remaping hugepage DAX to anon mmap could have caused user PTE access (bsc#1172317).\n- CVE-2020-10751: Fixed an improper implementation in SELinux LSM hook where it was assumed that an skb would only contain a single netlink message (bsc#1171189).\n- CVE-2020-10732: Fixed kernel data leak in userspace coredumps due to uninitialized data (bsc#1171220).\n- CVE-2020-10720: Fixed a use-after-free read in napi_gro_frags() (bsc#1170778).\n- CVE-2020-10711: Fixed a null pointer dereference in SELinux subsystem which could have allowed a remote network user to crash the kernel resulting in a denial of service (bsc#1171191).\n- CVE-2020-10690: Fixed the race between the release of ptp_clock and cdev (bsc#1170056).\n- CVE-2019-9458: Fixed a use after free due to a race condition which could have led to privilege escalation of privilege (bsc#1168295).\n- CVE-2019-9455: Fixed a pointer leak due to a WARN_ON statement in a video driver. This could lead to local information disclosure with System execution privileges needed (bsc#1170345).\n- CVE-2019-3701: Fixed an issue in can_can_gw_rcv, which could cause a system crash (bsc#1120386).\n- CVE-2019-20812: Fixed an issue in prb_calc_retire_blk_tmo() which could have resulted in a denial of service (bsc#1172453).\n- CVE-2019-20810: Fixed a memory leak in due to not calling of snd_card_free (bsc#1172458).\n- CVE-2019-20096: Fixed a memory leak in __feat_register_sp() in net/dccp/feat.c, which could have caused denial of service (bsc#1159908).\n- CVE-2019-20095: Fixed an improper error-handling cases that did not free allocated hostcmd memory which was causing memory leak (bsc#1159909).\n- CVE-2019-20054: Fixed a null pointer dereference in drop_sysctl_table() in fs/proc/proc_sysctl.c, related to put_links (bsc#1159910).\n- CVE-2019-19966: Fixed a use-after-free in cpia2_exit() which could have caused denial of service (bsc#1159841).\n- CVE-2019-19965: Fixed a null pointer dereference, due to mishandling of port disconnection during discovery (bsc#1159911).\n- CVE-2019-19770: Fixed a use-after-free in the debugfs_remove function (bsc#1159198).\n- CVE-2019-19768: Fixed a use-after-free in the __blk_add_trace function in kernel/trace/blktrace.c (bsc#1159285).\n- CVE-2019-19462: Fixed an issue which could have allowed local user to cause denial of service (bsc#1158265).\n- CVE-2019-19447: Fixed a user after free via a crafted ext4 filesystem image (bsc#1158819).\n- CVE-2019-19319: Fixed a user after free when a large old_size value is used in a memset call (bsc#1158021).\n- CVE-2019-19318: Fixed a use after free via a crafted btrfs image (bsc#1158026).\n- CVE-2019-19054: Fixed a memory leak in the cx23888_ir_probe() which could have allowed attackers to cause a denial of service (bsc#1161518).\n- CVE-2019-19045: Fixed a memory leak in which could have allowed attackers to cause a denial of service (bsc#1161522).\n- CVE-2019-19036: Fixed a null pointer dereference in btrfs_root_node (bsc#1157692).\n- CVE-2019-16994: Fixed a memory leak which might have caused denial of service (bsc#1161523).\n- CVE-2019-14897: Fixed a stack overflow in Marvell Wifi Driver (bsc#1157155).\n- CVE-2019-14896: Fixed a heap overflow in Marvell Wifi Driver (bsc#1157157).\n- CVE-2019-14615: Fixed an improper control flow in certain data structures which could have led to information disclosure (bsc#1160195).\n- CVE-2018-1000199: Fixed a potential local code execution via ptrace (bsc#1089895).\n\nThe following non-security bugs were fixed:\n\n- 6pack,mkiss: fix possible deadlock (bsc#1051510).\n- ACPI / APEI: Switch estatus pool to use vmalloc memory (bsc#1051510).\n- ACPI: bus: Fix NULL pointer check in acpi_bus_get_private_data() (bsc#1051510).\n- ACPI: fix acpi_find_child_device() invocation in acpi_preset_companion() (bsc#1051510).\n- af_packet: set defaule value for tmo (bsc#1051510).\n- ALSA: control: remove useless assignment in .info callback of PCM chmap element (git-fixes).\n- ALSA: hda: Add Clevo W65_67SB the power_save blacklist (git-fixes).\n- ALSA: hda - Add docking station support for Lenovo Thinkpad T420s (git-fixes).\n- ALSA: hda/analog - Minor optimization for SPDIF mux connections (git-fixes).\n- ALSA: hda/ca0132 - Avoid endless loop (git-fixes).\n- ALSA: hda/ca0132 - Fix work handling in delayed HP detection (git-fixes).\n- ALSA: hda/ca0132 - Keep power on during processing DSP response (git-fixes).\n- ALSA: hda - Downgrade error message for single-cmd fallback (git-fixes).\n- ALSA: hda/hdmi - add retry logic to parse_intel_hdmi() (git-fixes).\n- ALSA: hda/hdmi - fix atpx_present when CLASS is not VGA (bsc#1051510).\n- ALSA: hda/realtek - Add headset Mic no shutup for ALC283 (bsc#1051510).\n- ALSA: ice1724: Fix sleep-in-atomic in Infrasonic Quartet support code (bsc#1051510).\n- ALSA: pcm: Avoid possible info leaks from PCM stream buffers (git-fixes).\n- ALSA: seq: Fix racy access for queue timer in proc read (bsc#1051510).\n- ALSA: sh: Fix compile warning wrt const (git-fixes).\n- ALSA: usb-audio: fix set_format altsetting sanity check (bsc#1051510).\n- ALSA: usb-audio: fix sync-ep altsetting sanity check (bsc#1051510).\n- ar5523: check NULL before memcpy() in ar5523_cmd() (bsc#1051510).\n- arm64: Revert support for execute-only user mappings (bsc#1160218).\n- ASoC: au8540: use 64-bit arithmetic instead of 32-bit (bsc#1051510).\n- ASoC: cs4349: Use PM ops \u0027cs4349_runtime_pm\u0027 (bsc#1051510).\n- ASoC: Jack: Fix NULL pointer dereference in snd_soc_jack_report (bsc#1051510).\n- ASoC: msm8916-wcd-analog: Fix selected events for MIC BIAS External1 (bsc#1051510).\n- ASoC: wm8962: fix lambda value (git-fixes).\n- ath10k: fix fw crash by moving chip reset after napi disabled (bsc#1051510).\n- ath9k: fix storage endpoint lookup (git-fixes).\n- a typo in %kernel_base_conflicts macro name\n- batman-adv: Fix DAT candidate selection on little endian systems (bsc#1051510).\n- bcma: remove set but not used variable \u0027sizel\u0027 (git-fixes).\n- blk: Fix kabi due to blk_trace_mutex addition (bsc#1159285).\n- blktrace: fix dereference after null check (bsc#1159285).\n- blktrace: fix trace mutex deadlock (bsc#1159285).\n- bonding: fix active-backup transition after link failure (git-fixes).\n- bonding: fix potential NULL deref in bond_update_slave_arr (bsc#1051510).\n- bonding: fix unexpected IFF_BONDING bit unset (bsc#1051510).\n- brcmfmac: fix interface sanity check (git-fixes).\n- brcmfmac: Fix memory leak in brcmf_usbdev_qinit (git-fixes).\n- brcmfmac: Fix use after free in brcmf_sdio_readframes() (git-fixes).\n- btrfs: abort transaction after failed inode updates in create_subvol (bsc#1161936).\n- btrfs: add missing extents release on file extent cluster relocation error (bsc#1159483).\n- btrfs: avoid fallback to transaction commit during fsync of files with holes (bsc#1159569).\n- btrfs: dev-replace: remove warning for unknown return codes when finished (dependency for bsc#1162067).\n- btrfs: do not call synchronize_srcu() in inode_tree_del (bsc#1161934).\n- btrfs: Ensure we trim ranges across block group boundary (bsc#1151910).\n- btrfs: fix block group remaining RO forever after error during device replace (bsc#1160442).\n- btrfs: fix btrfs_write_inode vs delayed iput deadlock (bsc#1154243).\n- btrfs: fix infinite loop during nocow writeback due to race (bsc#1160804).\n- btrfs: fix integer overflow in calc_reclaim_items_nr (bsc#1160433).\n- btrfs: fix missing data checksums after replaying a log tree (bsc#1161931).\n- btrfs: fix negative subv_writers counter and data space leak after buffered write (bsc#1160802).\n- btrfs: fix removal logic of the tree mod log that leads to use-after-free issues (bsc#1160803).\n- btrfs: fix selftests failure due to uninitialized i_mode in test inodes (Fix for dependency of bsc#1157692).\n- btrfs: handle ENOENT in btrfs_uuid_tree_iterate (bsc#1161937).\n- btrfs: harden agaist duplicate fsid on scanned devices (bsc#1134973).\n- btrfs: inode: Verify inode mode to avoid NULL pointer dereference (dependency for bsc#1157692).\n- btrfs: make tree checker detect checksum items with overlapping ranges (bsc#1161931).\n- btrfs: Move btrfs_check_chunk_valid() to tree-check.[ch] and export it (dependency for bsc#1157692).\n- btrfs: record all roots for rename exchange on a subvol (bsc#1161933).\n- btrfs: relocation: fix reloc_root lifespan and access (bsc#1159588).\n- btrfs: scrub: Require mandatory block group RO for dev-replace (bsc#1162067).\n- btrfs: send, skip backreference walking for extents with many references (bsc#1162139).\n- btrfs: skip log replay on orphaned roots (bsc#1161935).\n- btrfs: tree-checker: Check chunk item at tree block read time (dependency for bsc#1157692).\n- btrfs: tree-checker: Check level for leaves and nodes (dependency for bsc#1157692).\n- btrfs: tree-checker: Enhance chunk checker to validate chunk profile (dependency for bsc#1157692).\n- btrfs: tree-checker: Fix wrong check on max devid (fixes for dependency of bsc#1157692).\n- btrfs: tree-checker: get fs_info from eb in block_group_err (dependency for bsc#1157692).\n- btrfs: tree-checker: get fs_info from eb in check_block_group_item (dependency for bsc#1157692).\n- btrfs: tree-checker: get fs_info from eb in check_csum_item (dependency for bsc#1157692).\n- btrfs: tree-checker: get fs_info from eb in check_dev_item (dependency for bsc#1157692).\n- btrfs: tree-checker: get fs_info from eb in check_dir_item (dependency for bsc#1157692).\n- btrfs: tree-checker: get fs_info from eb in check_extent_data_item (dependency for bsc#1157692).\n- btrfs: tree-checker: get fs_info from eb in check_inode_item (dependency for bsc#1157692).\n- btrfs: tree-checker: get fs_info from eb in check_leaf (dependency for bsc#1157692).\n- btrfs: tree-checker: get fs_info from eb in check_leaf_item (dependency for bsc#1157692).\n- btrfs: tree-checker: get fs_info from eb in chunk_err (dependency for bsc#1157692).\n- btrfs: tree-checker: get fs_info from eb in dev_item_err (dependency for bsc#1157692).\n- btrfs: tree-checker: get fs_info from eb in dir_item_err (dependency for bsc#1157692).\n- btrfs: tree-checker: get fs_info from eb in file_extent_err (dependency for bsc#1157692).\n- btrfs: tree-checker: get fs_info from eb in generic_err (dependency for bsc#1157692).\n- btrfs: tree-checker: Make btrfs_check_chunk_valid() return EUCLEAN instead of EIO (dependency for bsc#1157692).\n- btrfs: tree-checker: Make chunk item checker messages more readable (dependency for bsc#1157692).\n- btrfs: tree-checker: Verify dev item (dependency for bsc#1157692).\n- btrfs: tree-checker: Verify inode item (dependency for bsc#1157692).\n- btrfs: volumes: Use more straightforward way to calculate map length (bsc#1151910).\n- can: can_dropped_invalid_skb(): ensure an initialized headroom in outgoing CAN sk_buffs (bsc#1051510).\n- can: gs_usb: gs_usb_probe(): use descriptors of current altsetting (bsc#1051510).\n- can: mscan: mscan_rx_poll(): fix rx path lockup when returning from polling to irq mode (bsc#1051510).\n- can, slip: Protect tty-\u003edisc_data in write_wakeup and close with RCU (bsc#1051510).\n- cfg80211: check for set_wiphy_params (bsc#1051510).\n- cfg80211: fix page refcount issue in A-MSDU decap (bsc#1051510).\n- cfg80211/mac80211: make ieee80211_send_layer2_update a public function (bsc#1051510).\n- cgroup: pids: use atomic64_t for pids-\u003elimit (bsc#1161514).\n- CIFS: add support for flock (bsc#1144333).\n- CIFS: Close cached root handle only if it had a lease (bsc#1144333).\n- CIFS: Close open handle after interrupted close (bsc#1144333).\n- CIFS: close the shared root handle on tree disconnect (bsc#1144333).\n- CIFS: Do not miss cancelled OPEN responses (bsc#1144333).\n- CIFS: Fix lookup of root ses in DFS referral cache (bsc#1144333).\n- CIFS: Fix memory allocation in __smb2_handle_cancelled_cmd() (bsc#1144333).\n- CIFS: Fix mount options set in automount (bsc#1144333).\n- CIFS: Fix NULL pointer dereference in mid callback (bsc#1144333).\n- CIFS: Fix NULL-pointer dereference in smb2_push_mandatory_locks (bsc#1144333).\n- CIFS: Fix potential softlockups while refreshing DFS cache (bsc#1144333).\n- CIFS: Fix retrieval of DFS referrals in cifs_mount() (bsc#1144333).\n- CIFS: Fix use-after-free bug in cifs_reconnect() (bsc#1144333).\n- CIFS: Properly process SMB3 lease breaks (bsc#1144333).\n- CIFS: remove set but not used variables \u0027cinode\u0027 and \u0027netfid\u0027 (bsc#1144333).\n- CIFS: Respect O_SYNC and O_DIRECT flags during reconnect (bsc#1144333).\n- clk: Do not try to enable critical clocks if prepare failed (bsc#1051510).\n- clk: rockchip: fix I2S1 clock gate register for rk3328 (bsc#1051510).\n- clk: rockchip: fix ID of 8ch clock of I2S1 for rk3328 (bsc#1051510).\n- clk: rockchip: fix rk3188 sclk_mac_lbtest parameter ordering (bsc#1051510).\n- clk: rockchip: fix rk3188 sclk_smc gate data (bsc#1051510).\n- clk: sunxi: sun9i-mmc: Implement reset callback for reset controls (bsc#1051510).\n- clocksource/drivers/bcm2835_timer: Fix memory leak of timer (bsc#1051510).\n- clocksource/drivers/hyper-v: Set TSC clocksource as default w/ InvariantTSC (bsc#1170621).\n- copy/pasted \u0027Recommends:\u0027 instead of \u0027Provides:\u0027, \u0027Obsoletes:\u0027 and \u0027Conflicts:\n- crypto: af_alg - Use bh_lock_sock in sk_destruct (bsc#1051510).\n- crypto: api - Check spawn-\u003ealg under lock in crypto_drop_spawn (bsc#1051510).\n- crypto: api - Fix race condition in crypto_spawn_alg (bsc#1051510).\n- crypto: atmel-sha - fix error handling when setting hmac key (bsc#1051510).\n- crypto: ccp - fix uninitialized list head (bsc#1051510).\n- crypto: chelsio - fix writing tfm flags to wrong place (bsc#1051510).\n- crypto: pcrypt - Do not clear MAY_SLEEP flag in original request (bsc#1051510).\n- crypto: picoxcell - adjust the position of tasklet_init and fix missed tasklet_kill (bsc#1051510).\n- crypto: reexport crypto_shoot_alg() (bsc#1051510, kABI fix).\n- debugfs: add support for more elaborate -\u003ed_fsdata (bsc#1159198 bsc#1109911). Prerequisite for bsc#1159198.\n- debugfs: call debugfs_real_fops() only after debugfs_file_get() (bsc#1159198 bsc#1109911). Prerequisite for bsc#1159198.\n- debugfs: convert to debugfs_file_get() and -put() (bsc#1159198 bsc#1109911). Prerequisite for bsc#1159198.\n- debugfs: debugfs_real_fops(): drop __must_hold sparse annotation (bsc#1159198 bsc#1109911). Prerequisite for bsc#1159198.\n- debugfs: debugfs_use_start/finish do not exist anymore (bsc#1159198). Prerequisite for bsc#1159198.\n- debugfs: defer debugfs_fsdata allocation to first usage (bsc#1159198 bsc#1109911). Prerequisite for bsc#1159198.\n- debugfs: fix debugfs_real_fops() build error (bsc#1159198 bsc#1109911). Prerequisite for bsc#1159198.\n- debugfs: implement per-file removal protection (bsc#1159198 bsc#1109911). Prerequisite for bsc#1159198.\n- debugfs: purge obsolete SRCU based removal protection (bsc#1159198 bsc#1109911). Prerequisite for bsc#1159198.\n- debugfs: simplify __debugfs_remove_file() (bsc#1159198). Prerequisite for bsc#1159198.\n- dmaengine: coh901318: Fix a double-lock bug (bsc#1051510).\n- dmaengine: coh901318: Remove unused variable (bsc#1051510).\n- dmaengine: Fix access to uninitialized dma_slave_caps (bsc#1051510).\n- dma-mapping: fix return type of dma_set_max_seg_size() (bsc#1051510).\n- drivers/base/memory.c: cache blocks in radix tree to accelerate lookup (bsc#1159955 ltc#182993).\n- drivers/base/memory.c: do not access uninitialized memmaps in soft_offline_page_store() (bsc#1051510).\n- drivers: HV: Send one page worth of kmsg dump over Hyper-V during panic (bsc#1170617).\n- drivers: hv: vmbus: Fix the issue with freeing up hv_ctl_table_hdr (bsc#1170617).\n- drivers: hv: vmbus: Get rid of MSR access from vmbus_drv.c (bsc#1170618).\n- drivers: hv: vmus: Fix the check for return value from kmsg get dump buffer (bsc#1170617).\n- drm/amdgpu: add function parameter description in \u0027amdgpu_gart_bind\u0027 (bsc#1051510).\n- drm/amdgpu: remove 4 set but not used variable in amdgpu_atombios_get_connector_info_from_object_table (bsc#1051510).\n- drm/amdgpu: remove always false comparison in \u0027amdgpu_atombios_i2c_process_i2c_ch\u0027 (bsc#1051510).\n- drm/amdgpu: remove set but not used variable \u0027amdgpu_connector\u0027 (bsc#1051510).\n- drm/amdgpu: remove set but not used variable \u0027dig\u0027 (bsc#1051510).\n- drm/amdgpu: remove set but not used variable \u0027dig_connector\u0027 (bsc#1051510).\n- drm/amdgpu: remove set but not used variable \u0027mc_shared_chmap\u0027 (bsc#1051510).\n- drm/amdgpu: remove set but not used variable \u0027mc_shared_chmap\u0027 from \u0027gfx_v6_0.c\u0027 and \u0027gfx_v7_0.c\u0027 (bsc#1051510).\n- drm: bridge: dw-hdmi: constify copied structure (bsc#1051510).\n- drm/dp_mst: correct the shifting in DP_REMOTE_I2C_READ (bsc#1051510).\n- drm/fb-helper: Round up bits_per_pixel if possible (bsc#1051510).\n- drm/i810: Prevent underflow in ioctl (bsc#1114279)\n- drm/i915: Add missing include file \u003clinux/math64.h\u003e (bsc#1051510).\n- drm/i915: Fix pid leak with banned clients (bsc#1114279)\n- drm: limit to INT_MAX in create_blob ioctl (bsc#1051510).\n- drm/mst: Fix MST sideband up-reply failure handling (bsc#1051510).\n- drm/nouveau: Fix copy-paste error in nouveau_fence_wait_uevent_handler (bsc#1051510).\n- drm/nouveau/secboot/gm20b: initialize pointer in gm20b_secboot_new() (bsc#1051510).\n- drm/qxl: Return error if fbdev is not 32 bpp (bsc#1159028)\n- drm/radeon: fix r1xx/r2xx register checker for POT textures (bsc#1114279)\n- drm/rockchip: lvds: Fix indentation of a #define (bsc#1051510).\n- drm/vmwgfx: prevent memory leak in vmw_cmdbuf_res_add (bsc#1051510).\n- e100: Fix passing zero to \u0027PTR_ERR\u0027 warning in e100_load_ucode_wait (bsc#1051510).\n- exit: panic before exit_mm() on global init exit (bsc#1161549).\n- extcon: max8997: Fix lack of path setting in USB device mode (bsc#1051510).\n- firestream: fix memory leaks (bsc#1051510).\n- fix autofs regression caused by follow_managed() changes (bsc#1159271).\n- fix dget_parent() fastpath race (bsc#1159271).\n- Fix partial checked out tree build ... so that bisection does not break.\n- fjes: fix missed check in fjes_acpi_add (bsc#1051510).\n- fs: cifs: Fix atime update check vs mtime (bsc#1144333).\n- fs/namei.c: fix missing barriers when checking positivity (bsc#1159271).\n- fs/namei.c: pull positivity check into follow_managed() (bsc#1159271).\n- fs/xfs: fix f_ffree value for statfs when project quota is set (bsc#1165985).\n- ftrace: Avoid potential division by zero in function profiler (bsc#1160784).\n- futex: Prevent robust futex exit race (bsc#1161555).\n- gpio: Fix error message on out-of-range GPIO in lookup table (bsc#1051510).\n- HID: hidraw: Fix returning EPOLLOUT from hidraw_poll (bsc#1051510).\n- HID: hidraw, uhid: Always report EPOLLOUT (bsc#1051510).\n- hidraw: Return EPOLLOUT from hidraw_poll (bsc#1051510).\n- HID: uhid: Fix returning EPOLLOUT from uhid_char_poll (bsc#1051510).\n- hwmon: (adt7475) Make volt2reg return same reg as reg2volt input (bsc#1051510).\n- hwmon: (core) Do not use device managed functions for memory allocations (bsc#1051510).\n- hwmon: (nct7802) Fix voltage limits to wrong registers (bsc#1051510).\n- i2c: imx: do not print error message on probe defer (bsc#1051510).\n- IB/hfi1: convert to debugfs_file_get() and -put() (bsc#1159198 bsc#1109911). Prerequisite for bsc#1159198.\n- ibmveth: Detect unsupported packets before sending to the hypervisor (bsc#1159484 ltc#182983).\n- ibmvfc: do not send implicit logouts prior to NPIV login (bsc#1169625 ltc#184611).\n- iio: adc: max9611: Fix too short conversion time delay (bsc#1051510).\n- iio: buffer: align the size of scan bytes to size of the largest element (bsc#1051510).\n- inet: protect against too small mtu values (networking-stable-19_12_16).\n- Input: add safety guards to input_set_keycode() (bsc#1168075).\n- Input: aiptek - fix endpoint sanity check (bsc#1051510).\n- Input: cyttsp4_core - fix use after free bug (bsc#1051510).\n- Input: goodix - add upside-down quirk for Teclast X89 tablet (bsc#1051510).\n- Input: gtco - fix endpoint sanity check (bsc#1051510).\n- Input: keyspan-remote - fix control-message timeouts (bsc#1051510).\n- Input: pegasus_notetaker - fix endpoint sanity check (bsc#1051510).\n- Input: pm8xxx-vib - fix handling of separate enable register (bsc#1051510).\n- Input: rmi_f54 - read from FIFO in 32 byte blocks (bsc#1051510).\n- Input: sun4i-ts - add a check for devm_thermal_zone_of_sensor_register (bsc#1051510).\n- Input: sur40 - fix interface sanity checks (bsc#1051510).\n- Input: synaptics-rmi4 - do not increment rmiaddr for SMBus transfers (bsc#1051510).\n- Input: synaptics-rmi4 - simplify data read in rmi_f54_work (bsc#1051510).\n- Input: synaptics - switch another X1 Carbon 6 to RMI/SMbus (bsc#1051510).\n- iommu: Remove device link to group on failure (bsc#1160755).\n- iommu/vt-d: Unlink device if failed to add to group (bsc#1160756).\n- iwlegacy: ensure loop counter addr does not wrap and cause an infinite loop (git-fixes).\n- iwlwifi: mvm: Send non offchannel traffic via AP sta (bsc#1051510).\n- iwlwifi: mvm: synchronize TID queue removal (bsc#1051510).\n- kABI: protect struct sctp_ep_common (kabi).\n- kABI: restore debugfs_remove_recursive() (bsc#1159198).\n- kABI workaround for can/skb.h inclusion (bsc#1051510).\n- kernel/trace: Fix do not unregister tracepoints when register sched_migrate_task fail (bsc#1160787).\n- KEYS: reaching the keys quotas correctly (bsc#1171689).\n- KVM: fix spectrev1 gadgets (bsc#1164705).\n- KVM: x86: Host feature SSBD does not imply guest feature SPEC_CTRL_SSBD (bsc#1160476).\n- KVM: x86: Protect DR-based index computations from Spectre-v1/L1TF attacks (bsc#1164734).\n- KVM: x86: Protect ioapic_read_indirect() from Spectre-v1/L1TF attacks (bsc#1164728).\n- KVM: x86: Protect ioapic_write_indirect() from Spectre-v1/L1TF attacks (bsc#1164729).\n- KVM: x86: Protect kvm_hv_msr_[get|set]_crash_data() from Spectre-v1/L1TF attacks (bsc#1164712).\n- KVM: x86: Protect kvm_lapic_reg_write() from Spectre-v1/L1TF attacks (bsc#1164730).\n- KVM: x86: Protect MSR-based index computations from Spectre-v1/L1TF attacks in x86.c (bsc#1164733).\n- KVM: x86: Protect MSR-based index computations in fixed_msr_to_seg_unit() from Spectre-v1/L1TF attacks (bsc#1164731).\n- KVM: x86: Protect MSR-based index computations in pmu.h from Spectre-v1/L1TF attacks (bsc#1164732).\n- KVM: x86: Protect pmu_intel.c from Spectre-v1/L1TF attacks (bsc#1164735).\n- KVM: x86: Protect x86_decode_insn from Spectre-v1/L1TF attacks (bsc#1164705).\n- KVM: x86: Refactor picdev_write() to prevent Spectre-v1/L1TF attacks (bsc#1164727).\n- leds: Allow to call led_classdev_unregister() unconditionally (bsc#1161674).\n- leds: class: ensure workqueue is initialized before setting brightness (bsc#1161674).\n- lib/scatterlist.c: adjust indentation in __sg_alloc_table (bsc#1051510).\n- lib/test_kasan.c: fix memory leak in kmalloc_oob_krealloc_more() (bsc#1051510).\n- livepatch/samples/selftest: Use klp_shadow_alloc() API correctly (bsc#1071995).\n- livepatch/selftest: Clean up shadow variable names and type (bsc#1071995).\n- mac80211: Do not send Layer 2 Update frame before authorization (bsc#1051510).\n- macvlan: do not assume mac_header is set in macvlan_broadcast() (bsc#1051510).\n- macvlan: use skb_reset_mac_header() in macvlan_queue_xmit() (bsc#1051510).\n- md/raid0: Fix buffer overflow at debug print (bsc#1164051).\n- media: cec.h: CEC_OP_REC_FLAG_ values were swapped (bsc#1051510).\n- media: cec: report Vendor ID after initialization (bsc#1051510).\n- media: iguanair: fix endpoint sanity check (bsc#1051510).\n- media: ov519: add missing endpoint sanity checks (bsc#1168829).\n- media: pulse8-cec: return 0 when invalidating the logical address (bsc#1051510).\n- media: stkwebcam: Bugfix for wrong return values (bsc#1051510).\n- media: stv06xx: add missing descriptor sanity checks (bsc#1168854).\n- media: uvcvideo: Avoid cyclic entity chains due to malformed USB descriptors (bsc#1051510).\n- media: v4l2-ioctl.c: zero reserved fields for S/TRY_FMT (bsc#1051510).\n- media: v4l2-rect.h: fix v4l2_rect_map_inside() top/left adjustments (bsc#1051510).\n- missing escaping of backslashes in macro expansions Fixes: f3b74b0ae86b (\u0027rpm/kernel-subpackage-spec: Unify dependency handling.\u0027) Fixes: 3fd22e219f77 (\u0027rpm/kernel-subpackage-spec: Fix empty Recommends tag (bsc#1143959)\u0027)\n- mmc: mediatek: fix CMD_TA to 2 for MT8173 HS200/HS400 mode (bsc#1051510).\n- mmc: sdhci: fix minimum clock rate for v3 controller (bsc#1051510).\n- mmc: sdhci-of-esdhc: fix P2020 errata handling (bsc#1051510).\n- mmc: sdhci-of-esdhc: Revert \u0027mmc: sdhci-of-esdhc: add erratum A-009204 support\u0027 (bsc#1051510).\n- mmc: tegra: fix SDR50 tuning override (bsc#1051510).\n- mm: memory_hotplug: use put_device() if device_register fail (bsc#1159955 ltc#182993).\n- mm/page-writeback.c: fix range_cyclic writeback vs writepages deadlock (bsc#1159394).\n- mwifiex: drop most magic numbers from mwifiex_process_tdls_action_frame() (git-fixes).\n- net: bridge: deny dev_set_mac_address() when unregistering (networking-stable-19_12_16).\n- net: ena: Add PCI shutdown handler to allow safe kexec (bsc#1167421, bsc#1167423).\n- net: ethernet: ti: cpsw: fix extra rx interrupt (networking-stable-19_12_16).\n- netfilter: nf_queue: enqueue skbs with NULL dst (git-fixes).\n- net/mlx4_en: fix mlx4 ethtool -N insertion (networking-stable-19_11_25).\n- net/mlx5e: Fix set vf link state error flow (networking-stable-19_11_25).\n- net/mlxfw: Fix out-of-memory error in mfa2 flash burning (bsc#1051858).\n- net: psample: fix skb_over_panic (networking-stable-19_12_03).\n- net: rtnetlink: prevent underflows in do_setvfinfo() (networking-stable-19_11_25).\n- net/sched: act_pedit: fix WARN() in the traffic path (networking-stable-19_11_25).\n- net: sched: fix `tc -s class show` no bstats on class with nolock subqueues (networking-stable-19_12_03).\n- net: usb: lan78xx: limit size of local TSO packets (bsc#1051510).\n- net: usb: qmi_wwan: add support for Foxconn T77W968 LTE modules (networking-stable-19_11_18).\n- new helper: lookup_positive_unlocked() (bsc#1159271).\n- NFC: pn533: fix bulk-message timeout (bsc#1051510).\n- NFC: pn544: Adjust indentation in pn544_hci_check_presence (git-fixes).\n- objtool: Fix stack offset tracking for indirect CFAs (bsc#1169514).\n- openvswitch: drop unneeded BUG_ON() in ovs_flow_cmd_build_info() (networking-stable-19_12_03).\n- openvswitch: remove another BUG_ON() (networking-stable-19_12_03).\n- openvswitch: support asymmetric conntrack (networking-stable-19_12_16).\n- orinoco_usb: fix interface sanity check (git-fixes).\n- PCI: Do not disable bridge BARs when assigning bus resources (bsc#1051510).\n- PCI/switchtec: Fix vep_vector_number ioread width (bsc#1051510).\n- phy: qualcomm: Adjust indentation in read_poll_timeout (bsc#1051510).\n- pinctrl: qcom: ssbi-gpio: fix gpio-hog related boot issues (bsc#1051510).\n- pinctrl: sh-pfc: r8a7778: Fix duplicate SDSELF_B and SD1_CLK_B (bsc#1051510).\n- platform/x86: asus-wmi: Fix keyboard brightness cannot be set to 0 (bsc#1051510).\n- platform/x86: hp-wmi: Make buffer for HPWMI_FEATURE2_QUERY 128 bytes (bsc#1051510).\n- platform/x86: pmc_atom: Add Siemens CONNECT X300 to critclk_systems DMI table (bsc#1051510).\n- powerpc: Allow 64bit VDSO __kernel_sync_dicache to work across ranges \u003e4GB (bnc#1151927 5.3.17).\n- powerpc: Allow flush_icache_range to work across ranges \u003e4GB (bnc#1151927 5.3.17).\n- powerpc/archrandom: fix arch_get_random_seed_int() (bsc#1065729).\n- powerpc: Fix vDSO clock_getres() (bsc#1065729).\n- powerpc/irq: fix stack overflow verification (bsc#1065729).\n- powerpc/mm: drop #ifdef CONFIG_MMU in is_ioremap_addr() (bsc#1065729).\n- powerpc/mm: Remove kvm radix prefetch workaround for Power9 DD2.2 (bsc#1061840).\n- powerpc/pkeys: remove unused pkey_allows_readwrite (bsc#1065729).\n- powerpc/powernv: Disable native PCIe port management (bsc#1065729).\n- powerpc/security: Fix debugfs data leak on 32-bit (bsc#1065729).\n- powerpc/tm: Fix clearing MSR[TS] in current when reclaiming on signal delivery (bsc#1118338 ltc#173734).\n- powerpc/tools: Do not quote $objdump in scripts (bsc#1065729).\n- powerpc/xive: Discard ESB load value when interrupt is invalid (bsc#1085030).\n- powerpc/xive: Skip ioremap() of ESB pages for LSI interrupts (bsc#1085030).\n- powerpc/xmon: do not access ASDR in VMs (bsc#1065729).\n- ppp: Adjust indentation into ppp_async_input (git-fixes).\n- prevent active file list thrashing due to refault detection (VM Performance, bsc#1156286).\n- pstore/ram: Write new dumps to start of recycled zones (bsc#1051510).\n- qede: Disable hardware gro when xdp prog is installed (bsc#1086314 bsc#1086313 bsc#1086301 ).\n- r8152: add missing endpoint sanity check (bsc#1051510).\n- random: always use batched entropy for get_random_u{32,64} (bsc#1164871).\n- RDMA/bnxt_re: Avoid freeing MR resources if dereg fails (bsc#1050244).\n- regulator: Fix return value of _set_load() stub (bsc#1051510).\n- regulator: rk808: Lower log level on optional GPIOs being not available (bsc#1051510).\n- regulator: rn5t618: fix module aliases (bsc#1051510).\n- Revert \u0027Input: synaptics-rmi4 - do not increment rmiaddr for SMBus transfers\u0027 (bsc#1051510).\n- Revert \u0027ipc,sem: remove uneeded sem_undo_list lock usage in exit_sem()\u0027 (bsc#1172221).\n- Revert \u0027mmc: sdhci: Fix incorrect switch to HS mode\u0027 (bsc#1051510).\n- rtc: dt-binding: abx80x: fix resistance scale (bsc#1051510).\n- rtc: max8997: Fix the returned value in case of error in \u0027max8997_rtc_read_alarm()\u0027 (bsc#1051510).\n- rtc: msm6242: Fix reading of 10-hour digit (bsc#1051510).\n- rtc: pcf8523: set xtal load capacitance from DT (bsc#1051510).\n- rtc: s35390a: Change buf\u0027s type to u8 in s35390a_init (bsc#1051510).\n- scsi: ibmvfc: Avoid loss of all paths during SVC node reboot (bsc#1161951 ltc#183551).\n- scsi: ibmvfc: Fix NULL return compiler warning (bsc#1161951 ltc#183551).\n- scsi: qla2xxx: Add a shadow variable to hold disc_state history of fcport (bsc#1158013).\n- scsi: qla2xxx: Add D-Port Diagnostic reason explanation logs (bsc#1158013).\n- scsi: qla2xxx: Cleanup unused async_logout_done (bsc#1158013).\n- scsi: qla2xxx: Consolidate fabric scan (bsc#1158013).\n- scsi: qla2xxx: Correct fcport flags handling (bsc#1158013).\n- scsi: qla2xxx: Fix fabric scan hang (bsc#1158013).\n- scsi: qla2xxx: Fix mtcp dump collection failure (bsc#1158013).\n- scsi: qla2xxx: Fix RIDA Format-2 (bsc#1158013).\n- scsi: qla2xxx: Fix stuck login session using prli_pend_timer (bsc#1158013).\n- scsi: qla2xxx: Fix stuck session in GNL (bsc#1158013).\n- scsi: qla2xxx: Fix the endianness of the qla82xx_get_fw_size() return type (bsc#1158013).\n- scsi: qla2xxx: Fix update_fcport for current_topology (bsc#1158013).\n- scsi: qla2xxx: Improve readability of the code that handles qla_flt_header (bsc#1158013).\n- scsi: qla2xxx: Remove defer flag to indicate immeadiate port loss (bsc#1158013).\n- scsi: qla2xxx: Update driver version to 10.01.00.22-k (bsc#1158013).\n- scsi: qla2xxx: Use common routine to free fcport struct (bsc#1158013).\n- scsi: qla2xxx: Use get_unaligned_*() instead of open-coding these functions (bsc#1158013).\n- sctp: cache netns in sctp_ep_common (networking-stable-19_12_03).\n- serial: 8250_bcm2835aux: Fix line mismatch on driver unbind (bsc#1051510).\n- serial: ifx6x60: add missed pm_runtime_disable (bsc#1051510).\n- serial: pl011: Fix DMA -\u003eflush_buffer() (bsc#1051510).\n- serial: serial_core: Perform NULL checks for break_ctl ops (bsc#1051510).\n- serial: stm32: fix transmit_chars when tx is stopped (bsc#1051510).\n- sfc: Only cancel the PPS workqueue if it exists (networking-stable-19_11_25).\n- sh_eth: check sh_eth_cpu_data::dual_port when dumping registers (bsc#1051510).\n- sh_eth: fix dumping ARSTR (bsc#1051510).\n- sh_eth: fix invalid context bug while calling auto-negotiation by ethtool (bsc#1051510).\n- sh_eth: fix invalid context bug while changing link options by ethtool (bsc#1051510).\n- sh_eth: fix TSU init on SH7734/R8A7740 (bsc#1051510).\n- sh_eth: fix TXALCR1 offsets (bsc#1051510).\n- sh_eth: TSU_QTAG0/1 registers the same as TSU_QTAGM0/1 (bsc#1051510).\n- smb3: Fix crash in SMB2_open_init due to uninitialized field in compounding path (bsc#1144333).\n- smb3: Fix persistent handles reconnect (bsc#1144333).\n- smb3: fix refcount underflow warning on unmount when no directory leases (bsc#1144333).\n- smb3: remove confusing dmesg when mounting with encryption (\u0027seal\u0027) (bsc#1144333).\n- soc: renesas: rcar-sysc: Add goto to of_node_put() before return (bsc#1051510).\n- spi: tegra114: clear packed bit for unpacked mode (bsc#1051510).\n- spi: tegra114: configure dma burst size to fifo trig level (bsc#1051510).\n- spi: tegra114: fix for unpacked mode transfers (bsc#1051510).\n- spi: tegra114: flush fifos (bsc#1051510).\n- spi: tegra114: terminate dma and reset on transfer timeout (bsc#1051510).\n- staging: comedi: adv_pci1710: fix AI channels 16-31 for PCI-1713 (bsc#1051510).\n- Staging: iio: adt7316: Fix i2c data reading, set the data field (bsc#1051510).\n- staging: rtl8188eu: fix interface sanity check (bsc#1051510).\n- staging: wlan-ng: ensure error return is actually returned (bsc#1051510).\n- tcp: clear tp-\u003epackets_out when purging write queue (bsc#1160560).\n- tcp: exit if nothing to retransmit on RTO timeout (bsc#1160560, stable 4.14.159).\n- tcp: md5: fix potential overestimation of TCP option space (networking-stable-19_12_16).\n- tracing: Have the histogram compare functions convert to u64 first (bsc#1160210).\n- tracing: xen: Ordered comparison of function pointers (git-fixes).\n- tty: n_hdlc: fix build on SPARC (bsc#1051510).\n- tty/serial: atmel: Add is_half_duplex helper (bsc#1051510).\n- tty: serial: msm_serial: Fix lockup for sysrq and oops (bsc#1051510).\n- tty: vt: keyboard: reject invalid keycodes (bsc#1051510).\n- USB: Allow USB device to be warm reset in suspended state (bsc#1051510).\n- USB: atm: ueagle-atm: add missing endpoint check (bsc#1051510).\n- USB: chipidea: host: Disable port power only if previously enabled (bsc#1051510).\n- USB: core: hub: Improved device recognition on remote wakeup (bsc#1051510).\n- USB: core: urb: fix URB structure initialization function (bsc#1051510).\n- USB: documentation: flags on usb-storage versus UAS (bsc#1051510).\n- USB: dwc3: debugfs: Properly print/set link state for HS (bsc#1051510).\n- USB: dwc3: do not log probe deferrals; but do log other error codes (bsc#1051510).\n- USB: dwc3: ep0: Clear started flag on completion (bsc#1051510).\n- USB: dwc3: turn off VBUS when leaving host mode (bsc#1051510).\n- USB: gadget: f_ecm: Use atomic_t to track in-flight request (bsc#1051510).\n- USB: gadget: f_ncm: Use atomic_t to track in-flight request (bsc#1051510).\n- USB: gadget: pch_udc: fix use after free (bsc#1051510).\n- USB: gadget: u_serial: add missing port entry locking (bsc#1051510).\n- USB: gadget: Zero ffs_io_data (bsc#1051510).\n- USB: host: xhci-hub: fix extra endianness conversion (bsc#1051510).\n- usbip: Fix receive error in vhci-hcd when using scatter-gather (bsc#1051510).\n- USB: mtu3: fix dbginfo in qmu_tx_zlp_error_handler (bsc#1051510).\n- USB: musb: dma: Correct parameter passed to IRQ handler (bsc#1051510).\n- USB: musb: fix idling for suspend after disconnect interrupt (bsc#1051510).\n- USB: serial: ch341: handle unbound port at reset_resume (bsc#1051510).\n- USB: serial: io_edgeport: add missing active-port sanity check (bsc#1051510).\n- USB: serial: io_edgeport: handle unbound ports on URB completion (bsc#1051510).\n- USB: serial: io_edgeport: use irqsave() in USB\u0027s complete callback (bsc#1051510).\n- USB: serial: ir-usb: add missing endpoint sanity check (bsc#1051510).\n- USB: serial: ir-usb: fix IrLAP framing (bsc#1051510).\n- USB: serial: ir-usb: fix link-speed handling (bsc#1051510).\n- USB: serial: keyspan: handle unbound ports (bsc#1051510).\n- USB: serial: opticon: fix control-message timeouts (bsc#1051510).\n- USB: serial: option: Add support for Quectel RM500Q (bsc#1051510).\n- USB: serial: quatech2: handle unbound ports (bsc#1051510).\n- USB: serial: simple: Add Motorola Solutions TETRA MTP3xxx and MTP85xx (bsc#1051510).\n- USB: serial: suppress driver bind attributes (bsc#1051510).\n- USB: typec: tcpci: mask event interrupts when remove driver (bsc#1051510).\n- USB: uas: heed CAPACITY_HEURISTICS (bsc#1051510).\n- USB: uas: honor flag to avoid CAPACITY16 (bsc#1051510).\n- USB: xhci: Fix build warning seen with CONFIG_PM=n (bsc#1051510).\n- workqueue: Fix pwq ref leak in rescuer_thread() (bsc#1160211).\n- x86/entry/64: Fix unwind hints in kernel exit path (bsc#1058115).\n- x86/entry/64: Fix unwind hints in register clearing code (bsc#1058115).\n- x86/entry/64: Fix unwind hints in rewind_stack_do_exit() (bsc#1058115).\n- x86/entry/64: Fix unwind hints in __switch_to_asm() (bsc#1058115).\n- x86/Hyper-V: Allow guests to enable InvariantTSC (bsc#1170621).\n- x86/Hyper-V: Free hv_panic_page when fail to register kmsg dump (bsc#1170617).\n- x86/Hyper-V: Report crash data in die() when panic_on_oops is set (bsc#1170617).\n- x86/Hyper-V: Report crash register data or kmsg before running crash kernel (bsc#1170617).\n- x86/Hyper-V: Report crash register data when sysctl_record_panic_msg is not set (bsc#1170617).\n- x86/Hyper-V: report value of misc_features (git-fixes).\n- x86/Hyper-V: Trigger crash enlightenment only once during system crash (bsc#1170617).\n- x86/Hyper-V: Unload vmbus channel in hv panic callback (bsc#1170617).\n- x86/kgbd: Use NMI_VECTOR not APIC_DM_NMI (bsc#1114279).\n- x86/mce/AMD: Allow any CPU to initialize the smca_banks array (bsc#1114279).\n- x86/MCE/AMD: Allow Reserved types to be overwritten in smca_banks (bsc#1114279).\n- x86/MCE/AMD: Do not use rdmsr_safe_on_cpu() in smca_configure() (bsc#1114279).\n- x86/mce: Fix possibly incorrect severity calculation on AMD (bsc#1114279).\n- x86/mm: Split vmalloc_sync_all() (bsc#1165741).\n- x86/resctrl: Fix an imbalance in domain_remove_cpu() (bsc#1114279).\n- x86/resctrl: Fix potential memory leak (bsc#1114279).\n- x86/unwind/orc: Do not skip the first frame for inactive tasks (bsc#1058115).\n- x86/unwind/orc: Fix error handling in __unwind_start() (bsc#1058115).\n- x86/unwind/orc: Fix error path for bad ORC entry type (bsc#1058115).\n- x86/unwind/orc: Fix unwind_get_return_address_ptr() for inactive tasks (bsc#1058115).\n- x86/unwind/orc: Prevent unwinding before ORC initialization (bsc#1058115).\n- x86/unwind: Prevent false warnings for non-current tasks (bsc#1058115).\n- x86/xen: fix booting 32-bit pv guest (bsc#1071995).\n- x86/xen: Make the boot CPU idle task reliable (bsc#1071995).\n- x86/xen: Make the secondary CPU idle tasks reliable (bsc#1071995).\n- xen/blkfront: Adjust indentation in xlvbd_alloc_gendisk (bsc#1065600).\n- xen-blkfront: switch kcalloc to kvcalloc for large array allocation (bsc#1160917).\n- xfrm: Fix transport mode skb control buffer usage (bsc#1161552).\n- xfs: also remove cached ACLs when removing the underlying attr (bsc#1165873).\n- xfs: bulkstat should copy lastip whenever userspace supplies one (bsc#1165984).\n- xfs: Fix tail rounding in xfs_alloc_file_space() (bsc#1161087, bsc#1153917).\n- xhci: Fix memory leak in xhci_add_in_port() (bsc#1051510).\n- xhci: fix USB3 device initiated resume race with roothub autosuspend (bsc#1051510).\n- xhci: handle some XHCI_TRUST_TX_LENGTH quirks cases as default behaviour (bsc#1051510).\n- xhci: make sure interrupts are restored to correct state (bsc#1051510).\n- zd1211rw: fix storage endpoint lookup (git-fixes).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2020-1663,SUSE-SLE-Module-Live-Patching-15-2020-1663,SUSE-SLE-Product-HA-15-2020-1663,SUSE-SLE-Product-HPC-15-2020-1663,SUSE-SLE-Product-SLES-15-2020-1663,SUSE-SLE-Product-SLES_SAP-15-2020-1663", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2020_1663-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2020:1663-1", "url": "https://www.suse.com/support/update/announcement/2020/suse-su-20201663-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2020:1663-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-June/006971.html" }, { "category": "self", "summary": "SUSE Bug 1050244", "url": "https://bugzilla.suse.com/1050244" }, { "category": "self", "summary": "SUSE Bug 1051510", "url": "https://bugzilla.suse.com/1051510" }, { "category": "self", "summary": "SUSE Bug 1051858", "url": "https://bugzilla.suse.com/1051858" }, { "category": "self", "summary": "SUSE Bug 1058115", "url": "https://bugzilla.suse.com/1058115" }, { "category": "self", "summary": "SUSE Bug 1061840", "url": "https://bugzilla.suse.com/1061840" }, { "category": "self", "summary": "SUSE Bug 1065600", "url": "https://bugzilla.suse.com/1065600" }, { "category": "self", "summary": "SUSE Bug 1065729", "url": "https://bugzilla.suse.com/1065729" }, { "category": "self", "summary": "SUSE Bug 1071995", "url": "https://bugzilla.suse.com/1071995" }, { "category": "self", "summary": "SUSE Bug 1085030", "url": "https://bugzilla.suse.com/1085030" }, { "category": "self", "summary": "SUSE Bug 1086301", "url": "https://bugzilla.suse.com/1086301" }, { "category": "self", "summary": "SUSE Bug 1086313", "url": "https://bugzilla.suse.com/1086313" }, { "category": "self", "summary": "SUSE Bug 1086314", "url": "https://bugzilla.suse.com/1086314" }, { "category": "self", "summary": "SUSE Bug 1089895", "url": "https://bugzilla.suse.com/1089895" }, { "category": "self", "summary": "SUSE Bug 1109911", "url": "https://bugzilla.suse.com/1109911" }, { "category": "self", "summary": "SUSE Bug 1114279", "url": "https://bugzilla.suse.com/1114279" }, { "category": "self", "summary": "SUSE Bug 1118338", "url": "https://bugzilla.suse.com/1118338" }, { "category": "self", "summary": "SUSE Bug 1120386", "url": "https://bugzilla.suse.com/1120386" }, { "category": "self", "summary": "SUSE Bug 1134973", "url": "https://bugzilla.suse.com/1134973" }, { "category": "self", "summary": "SUSE Bug 1143959", "url": "https://bugzilla.suse.com/1143959" }, { "category": "self", "summary": "SUSE Bug 1144333", "url": "https://bugzilla.suse.com/1144333" }, { "category": "self", "summary": "SUSE Bug 1151910", "url": "https://bugzilla.suse.com/1151910" }, { "category": "self", "summary": "SUSE Bug 1151927", "url": "https://bugzilla.suse.com/1151927" }, { "category": "self", "summary": "SUSE Bug 1153917", "url": "https://bugzilla.suse.com/1153917" }, { "category": "self", "summary": "SUSE Bug 1154243", "url": "https://bugzilla.suse.com/1154243" }, { "category": "self", "summary": "SUSE Bug 1154824", "url": "https://bugzilla.suse.com/1154824" }, { "category": "self", "summary": "SUSE Bug 1156286", "url": "https://bugzilla.suse.com/1156286" }, { "category": "self", "summary": "SUSE Bug 1157155", "url": "https://bugzilla.suse.com/1157155" }, { "category": "self", "summary": "SUSE Bug 1157157", "url": "https://bugzilla.suse.com/1157157" }, { "category": "self", "summary": "SUSE Bug 1157692", "url": "https://bugzilla.suse.com/1157692" }, { "category": "self", "summary": "SUSE Bug 1158013", "url": "https://bugzilla.suse.com/1158013" }, { "category": "self", "summary": "SUSE Bug 1158021", "url": "https://bugzilla.suse.com/1158021" }, { "category": "self", "summary": "SUSE Bug 1158026", "url": "https://bugzilla.suse.com/1158026" }, { "category": "self", "summary": "SUSE Bug 1158265", "url": "https://bugzilla.suse.com/1158265" }, { "category": "self", "summary": "SUSE Bug 1158819", "url": "https://bugzilla.suse.com/1158819" }, { "category": "self", "summary": "SUSE Bug 1159028", "url": "https://bugzilla.suse.com/1159028" }, { "category": "self", "summary": "SUSE Bug 1159198", "url": "https://bugzilla.suse.com/1159198" }, { "category": "self", "summary": "SUSE Bug 1159271", "url": "https://bugzilla.suse.com/1159271" }, { "category": "self", "summary": "SUSE Bug 1159285", "url": "https://bugzilla.suse.com/1159285" }, { "category": "self", "summary": "SUSE Bug 1159394", "url": "https://bugzilla.suse.com/1159394" }, { "category": "self", "summary": "SUSE Bug 1159483", "url": "https://bugzilla.suse.com/1159483" }, { "category": "self", "summary": "SUSE Bug 1159484", "url": "https://bugzilla.suse.com/1159484" }, { "category": "self", "summary": "SUSE Bug 1159569", "url": "https://bugzilla.suse.com/1159569" }, { "category": "self", "summary": "SUSE Bug 1159588", "url": "https://bugzilla.suse.com/1159588" }, { "category": "self", "summary": "SUSE Bug 1159841", "url": "https://bugzilla.suse.com/1159841" }, { "category": "self", "summary": "SUSE Bug 1159908", "url": "https://bugzilla.suse.com/1159908" }, { "category": "self", "summary": "SUSE Bug 1159909", "url": "https://bugzilla.suse.com/1159909" }, { "category": "self", "summary": "SUSE Bug 1159910", "url": "https://bugzilla.suse.com/1159910" }, { "category": "self", "summary": "SUSE Bug 1159911", "url": "https://bugzilla.suse.com/1159911" }, { "category": "self", "summary": "SUSE Bug 1159955", "url": "https://bugzilla.suse.com/1159955" }, { "category": "self", "summary": "SUSE Bug 1160195", "url": "https://bugzilla.suse.com/1160195" }, { "category": "self", "summary": "SUSE Bug 1160210", "url": "https://bugzilla.suse.com/1160210" }, { "category": "self", "summary": "SUSE Bug 1160211", "url": "https://bugzilla.suse.com/1160211" }, { "category": "self", "summary": "SUSE Bug 1160218", "url": "https://bugzilla.suse.com/1160218" }, { "category": "self", "summary": "SUSE Bug 1160433", "url": "https://bugzilla.suse.com/1160433" }, { "category": "self", "summary": "SUSE Bug 1160442", "url": "https://bugzilla.suse.com/1160442" }, { "category": "self", "summary": "SUSE Bug 1160476", "url": "https://bugzilla.suse.com/1160476" }, { "category": "self", "summary": "SUSE Bug 1160560", "url": "https://bugzilla.suse.com/1160560" }, { "category": "self", "summary": "SUSE Bug 1160755", "url": "https://bugzilla.suse.com/1160755" }, { "category": "self", "summary": "SUSE Bug 1160756", "url": "https://bugzilla.suse.com/1160756" }, { "category": "self", "summary": "SUSE Bug 1160784", "url": "https://bugzilla.suse.com/1160784" }, { "category": "self", "summary": "SUSE Bug 1160787", "url": "https://bugzilla.suse.com/1160787" }, { "category": "self", "summary": "SUSE Bug 1160802", "url": "https://bugzilla.suse.com/1160802" }, { "category": "self", "summary": "SUSE Bug 1160803", "url": "https://bugzilla.suse.com/1160803" }, { "category": "self", "summary": "SUSE Bug 1160804", "url": "https://bugzilla.suse.com/1160804" }, { "category": "self", "summary": "SUSE Bug 1160917", "url": "https://bugzilla.suse.com/1160917" }, { "category": "self", "summary": "SUSE Bug 1160966", "url": "https://bugzilla.suse.com/1160966" }, { "category": "self", "summary": "SUSE Bug 1161087", "url": "https://bugzilla.suse.com/1161087" }, { "category": "self", "summary": "SUSE Bug 1161514", "url": "https://bugzilla.suse.com/1161514" }, { "category": "self", "summary": "SUSE Bug 1161518", "url": "https://bugzilla.suse.com/1161518" }, { "category": "self", "summary": "SUSE Bug 1161522", "url": "https://bugzilla.suse.com/1161522" }, { "category": "self", "summary": "SUSE Bug 1161523", "url": "https://bugzilla.suse.com/1161523" }, { "category": "self", "summary": "SUSE Bug 1161549", "url": "https://bugzilla.suse.com/1161549" }, { "category": "self", "summary": "SUSE Bug 1161552", "url": "https://bugzilla.suse.com/1161552" }, { "category": "self", "summary": "SUSE Bug 1161555", "url": "https://bugzilla.suse.com/1161555" }, { "category": "self", "summary": "SUSE Bug 1161674", "url": "https://bugzilla.suse.com/1161674" }, { "category": "self", "summary": "SUSE Bug 1161931", "url": "https://bugzilla.suse.com/1161931" }, { "category": "self", "summary": "SUSE Bug 1161933", "url": "https://bugzilla.suse.com/1161933" }, { "category": "self", "summary": "SUSE Bug 1161934", "url": "https://bugzilla.suse.com/1161934" }, { "category": "self", "summary": "SUSE Bug 1161935", "url": "https://bugzilla.suse.com/1161935" }, { "category": "self", "summary": "SUSE Bug 1161936", "url": "https://bugzilla.suse.com/1161936" }, { "category": "self", "summary": "SUSE Bug 1161937", "url": "https://bugzilla.suse.com/1161937" }, { "category": "self", "summary": "SUSE Bug 1161951", "url": "https://bugzilla.suse.com/1161951" }, { "category": "self", "summary": "SUSE Bug 1162067", "url": "https://bugzilla.suse.com/1162067" }, { "category": "self", "summary": "SUSE Bug 1162109", "url": "https://bugzilla.suse.com/1162109" }, { "category": "self", "summary": "SUSE Bug 1162139", "url": "https://bugzilla.suse.com/1162139" }, { "category": "self", "summary": "SUSE Bug 1162928", "url": "https://bugzilla.suse.com/1162928" }, { "category": "self", "summary": "SUSE Bug 1162929", "url": "https://bugzilla.suse.com/1162929" }, { "category": "self", "summary": "SUSE Bug 1162931", "url": "https://bugzilla.suse.com/1162931" }, { "category": "self", "summary": "SUSE Bug 1163971", "url": "https://bugzilla.suse.com/1163971" }, { "category": "self", "summary": "SUSE Bug 1164051", "url": "https://bugzilla.suse.com/1164051" }, { "category": "self", "summary": "SUSE Bug 1164069", "url": "https://bugzilla.suse.com/1164069" }, { "category": "self", "summary": "SUSE Bug 1164078", "url": "https://bugzilla.suse.com/1164078" }, { "category": "self", "summary": "SUSE Bug 1164705", "url": "https://bugzilla.suse.com/1164705" }, { "category": "self", "summary": "SUSE Bug 1164712", "url": "https://bugzilla.suse.com/1164712" }, { "category": "self", "summary": "SUSE Bug 1164727", "url": "https://bugzilla.suse.com/1164727" }, { "category": "self", "summary": "SUSE Bug 1164728", "url": "https://bugzilla.suse.com/1164728" }, { "category": "self", "summary": "SUSE Bug 1164729", "url": "https://bugzilla.suse.com/1164729" }, { "category": "self", "summary": "SUSE Bug 1164730", "url": "https://bugzilla.suse.com/1164730" }, { "category": "self", "summary": "SUSE Bug 1164731", "url": "https://bugzilla.suse.com/1164731" }, { "category": "self", "summary": "SUSE Bug 1164732", "url": "https://bugzilla.suse.com/1164732" }, { "category": "self", "summary": "SUSE Bug 1164733", "url": "https://bugzilla.suse.com/1164733" }, { "category": "self", "summary": "SUSE Bug 1164734", "url": "https://bugzilla.suse.com/1164734" }, { "category": "self", "summary": "SUSE Bug 1164735", "url": "https://bugzilla.suse.com/1164735" }, { "category": "self", "summary": "SUSE Bug 1164871", "url": "https://bugzilla.suse.com/1164871" }, { "category": "self", "summary": "SUSE Bug 1165111", "url": "https://bugzilla.suse.com/1165111" }, { "category": "self", "summary": "SUSE Bug 1165741", "url": "https://bugzilla.suse.com/1165741" }, { "category": "self", "summary": "SUSE Bug 1165873", "url": "https://bugzilla.suse.com/1165873" }, { "category": "self", "summary": "SUSE Bug 1165881", "url": "https://bugzilla.suse.com/1165881" }, { "category": "self", "summary": "SUSE Bug 1165984", "url": "https://bugzilla.suse.com/1165984" }, { "category": "self", "summary": "SUSE Bug 1165985", "url": "https://bugzilla.suse.com/1165985" }, { "category": "self", "summary": "SUSE Bug 1166969", "url": "https://bugzilla.suse.com/1166969" }, { "category": "self", "summary": "SUSE Bug 1167421", "url": "https://bugzilla.suse.com/1167421" }, { "category": "self", "summary": "SUSE Bug 1167423", "url": "https://bugzilla.suse.com/1167423" }, { "category": "self", "summary": "SUSE Bug 1167629", "url": "https://bugzilla.suse.com/1167629" }, { "category": "self", "summary": "SUSE Bug 1168075", "url": "https://bugzilla.suse.com/1168075" }, { "category": "self", "summary": "SUSE Bug 1168276", "url": "https://bugzilla.suse.com/1168276" }, { "category": "self", "summary": "SUSE Bug 1168295", "url": "https://bugzilla.suse.com/1168295" }, { "category": "self", "summary": "SUSE Bug 1168424", "url": "https://bugzilla.suse.com/1168424" }, { "category": "self", "summary": "SUSE Bug 1168670", "url": "https://bugzilla.suse.com/1168670" }, { "category": "self", "summary": "SUSE Bug 1168829", "url": "https://bugzilla.suse.com/1168829" }, { "category": "self", "summary": "SUSE Bug 1168854", "url": "https://bugzilla.suse.com/1168854" }, { "category": "self", "summary": "SUSE Bug 1169390", "url": "https://bugzilla.suse.com/1169390" }, { "category": "self", "summary": "SUSE Bug 1169514", "url": "https://bugzilla.suse.com/1169514" }, { "category": "self", "summary": "SUSE Bug 1169625", "url": "https://bugzilla.suse.com/1169625" }, { "category": "self", "summary": "SUSE Bug 1170056", "url": "https://bugzilla.suse.com/1170056" }, { "category": "self", "summary": "SUSE Bug 1170345", "url": "https://bugzilla.suse.com/1170345" }, { "category": "self", "summary": "SUSE Bug 1170617", "url": "https://bugzilla.suse.com/1170617" }, { "category": "self", "summary": "SUSE Bug 1170618", "url": "https://bugzilla.suse.com/1170618" }, { "category": "self", "summary": "SUSE Bug 1170621", "url": "https://bugzilla.suse.com/1170621" }, { "category": "self", "summary": "SUSE Bug 1170778", "url": "https://bugzilla.suse.com/1170778" }, { "category": "self", "summary": "SUSE Bug 1170901", "url": "https://bugzilla.suse.com/1170901" }, { "category": "self", "summary": "SUSE Bug 1171098", "url": "https://bugzilla.suse.com/1171098" }, { "category": "self", "summary": "SUSE Bug 1171189", "url": "https://bugzilla.suse.com/1171189" }, { "category": "self", "summary": "SUSE Bug 1171191", "url": "https://bugzilla.suse.com/1171191" }, { "category": "self", "summary": "SUSE Bug 1171195", "url": "https://bugzilla.suse.com/1171195" }, { "category": "self", "summary": "SUSE Bug 1171202", "url": "https://bugzilla.suse.com/1171202" }, { "category": "self", "summary": "SUSE Bug 1171205", "url": "https://bugzilla.suse.com/1171205" }, { "category": "self", "summary": "SUSE Bug 1171217", "url": "https://bugzilla.suse.com/1171217" }, { "category": "self", "summary": "SUSE Bug 1171218", "url": "https://bugzilla.suse.com/1171218" }, { "category": "self", "summary": "SUSE Bug 1171219", "url": "https://bugzilla.suse.com/1171219" }, { "category": "self", "summary": "SUSE Bug 1171220", "url": "https://bugzilla.suse.com/1171220" }, { "category": "self", "summary": "SUSE Bug 1171689", "url": "https://bugzilla.suse.com/1171689" }, { "category": "self", "summary": "SUSE Bug 1171982", "url": "https://bugzilla.suse.com/1171982" }, { "category": "self", "summary": "SUSE Bug 1171983", "url": "https://bugzilla.suse.com/1171983" }, { "category": "self", "summary": "SUSE Bug 1172221", "url": "https://bugzilla.suse.com/1172221" }, { "category": "self", "summary": "SUSE Bug 1172317", "url": "https://bugzilla.suse.com/1172317" }, { "category": "self", "summary": "SUSE Bug 1172453", "url": "https://bugzilla.suse.com/1172453" }, { "category": "self", "summary": "SUSE Bug 1172458", "url": "https://bugzilla.suse.com/1172458" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1000199 page", "url": "https://www.suse.com/security/cve/CVE-2018-1000199/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-14615 page", "url": "https://www.suse.com/security/cve/CVE-2019-14615/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-14896 page", "url": "https://www.suse.com/security/cve/CVE-2019-14896/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-14897 page", "url": "https://www.suse.com/security/cve/CVE-2019-14897/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-16994 page", "url": "https://www.suse.com/security/cve/CVE-2019-16994/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-19036 page", "url": "https://www.suse.com/security/cve/CVE-2019-19036/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-19045 page", "url": "https://www.suse.com/security/cve/CVE-2019-19045/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-19054 page", "url": "https://www.suse.com/security/cve/CVE-2019-19054/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-19318 page", "url": "https://www.suse.com/security/cve/CVE-2019-19318/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-19319 page", "url": "https://www.suse.com/security/cve/CVE-2019-19319/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-19447 page", "url": "https://www.suse.com/security/cve/CVE-2019-19447/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-19462 page", "url": "https://www.suse.com/security/cve/CVE-2019-19462/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-19768 page", "url": "https://www.suse.com/security/cve/CVE-2019-19768/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-19770 page", "url": "https://www.suse.com/security/cve/CVE-2019-19770/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-19965 page", "url": "https://www.suse.com/security/cve/CVE-2019-19965/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-19966 page", "url": "https://www.suse.com/security/cve/CVE-2019-19966/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-20054 page", "url": "https://www.suse.com/security/cve/CVE-2019-20054/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-20095 page", "url": "https://www.suse.com/security/cve/CVE-2019-20095/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-20096 page", "url": "https://www.suse.com/security/cve/CVE-2019-20096/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-20810 page", "url": "https://www.suse.com/security/cve/CVE-2019-20810/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-20812 page", "url": "https://www.suse.com/security/cve/CVE-2019-20812/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-3701 page", "url": "https://www.suse.com/security/cve/CVE-2019-3701/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9455 page", "url": "https://www.suse.com/security/cve/CVE-2019-9455/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9458 page", "url": "https://www.suse.com/security/cve/CVE-2019-9458/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-0543 page", "url": "https://www.suse.com/security/cve/CVE-2020-0543/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10690 page", "url": "https://www.suse.com/security/cve/CVE-2020-10690/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10711 page", "url": "https://www.suse.com/security/cve/CVE-2020-10711/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10720 page", "url": "https://www.suse.com/security/cve/CVE-2020-10720/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10732 page", "url": "https://www.suse.com/security/cve/CVE-2020-10732/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10751 page", "url": "https://www.suse.com/security/cve/CVE-2020-10751/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10757 page", "url": "https://www.suse.com/security/cve/CVE-2020-10757/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10942 page", "url": "https://www.suse.com/security/cve/CVE-2020-10942/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-11494 page", "url": "https://www.suse.com/security/cve/CVE-2020-11494/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-11608 page", "url": "https://www.suse.com/security/cve/CVE-2020-11608/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-11609 page", "url": "https://www.suse.com/security/cve/CVE-2020-11609/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-11669 page", "url": "https://www.suse.com/security/cve/CVE-2020-11669/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12114 page", "url": "https://www.suse.com/security/cve/CVE-2020-12114/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12464 page", "url": "https://www.suse.com/security/cve/CVE-2020-12464/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12652 page", "url": "https://www.suse.com/security/cve/CVE-2020-12652/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12653 page", "url": "https://www.suse.com/security/cve/CVE-2020-12653/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12654 page", "url": "https://www.suse.com/security/cve/CVE-2020-12654/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12655 page", "url": "https://www.suse.com/security/cve/CVE-2020-12655/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12656 page", "url": "https://www.suse.com/security/cve/CVE-2020-12656/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12657 page", "url": "https://www.suse.com/security/cve/CVE-2020-12657/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12769 page", "url": "https://www.suse.com/security/cve/CVE-2020-12769/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-13143 page", "url": "https://www.suse.com/security/cve/CVE-2020-13143/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-2732 page", "url": "https://www.suse.com/security/cve/CVE-2020-2732/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-7053 page", "url": "https://www.suse.com/security/cve/CVE-2020-7053/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-8428 page", "url": "https://www.suse.com/security/cve/CVE-2020-8428/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-8647 page", "url": "https://www.suse.com/security/cve/CVE-2020-8647/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-8648 page", "url": "https://www.suse.com/security/cve/CVE-2020-8648/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-8649 page", "url": "https://www.suse.com/security/cve/CVE-2020-8649/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-8834 page", "url": "https://www.suse.com/security/cve/CVE-2020-8834/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-8992 page", "url": "https://www.suse.com/security/cve/CVE-2020-8992/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-9383 page", "url": "https://www.suse.com/security/cve/CVE-2020-9383/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2020-06-18T09:17:44Z", "generator": { "date": "2020-06-18T09:17:44Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2020:1663-1", "initial_release_date": "2020-06-18T09:17:44Z", "revision_history": [ { "date": "2020-06-18T09:17:44Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "product": { "name": "cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "product_id": "cluster-md-kmp-default-4.12.14-150.52.1.aarch64" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-150.52.1.aarch64", "product": { "name": "dlm-kmp-default-4.12.14-150.52.1.aarch64", "product_id": "dlm-kmp-default-4.12.14-150.52.1.aarch64" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-150.52.1.aarch64", "product": { "name": "gfs2-kmp-default-4.12.14-150.52.1.aarch64", "product_id": "gfs2-kmp-default-4.12.14-150.52.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-4.12.14-150.52.1.aarch64", "product": { "name": "kernel-default-4.12.14-150.52.1.aarch64", "product_id": "kernel-default-4.12.14-150.52.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-150.52.1.aarch64", "product": { "name": "kernel-default-base-4.12.14-150.52.1.aarch64", "product_id": "kernel-default-base-4.12.14-150.52.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-150.52.1.aarch64", "product": { "name": "kernel-default-devel-4.12.14-150.52.1.aarch64", "product_id": "kernel-default-devel-4.12.14-150.52.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-150.52.1.aarch64", "product": { "name": "kernel-default-extra-4.12.14-150.52.1.aarch64", "product_id": "kernel-default-extra-4.12.14-150.52.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-livepatch-4.12.14-150.52.1.aarch64", "product": { "name": "kernel-default-livepatch-4.12.14-150.52.1.aarch64", "product_id": "kernel-default-livepatch-4.12.14-150.52.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-livepatch-devel-4.12.14-150.52.1.aarch64", "product": { "name": "kernel-default-livepatch-devel-4.12.14-150.52.1.aarch64", "product_id": "kernel-default-livepatch-devel-4.12.14-150.52.1.aarch64" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-150.52.1.aarch64", "product": { "name": "kernel-obs-build-4.12.14-150.52.1.aarch64", "product_id": "kernel-obs-build-4.12.14-150.52.1.aarch64" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-150.52.1.aarch64", "product": { "name": "kernel-obs-qa-4.12.14-150.52.1.aarch64", "product_id": "kernel-obs-qa-4.12.14-150.52.1.aarch64" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-150.52.1.aarch64", "product": { "name": "kernel-syms-4.12.14-150.52.1.aarch64", "product_id": "kernel-syms-4.12.14-150.52.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-150.52.1.aarch64", "product": { "name": "kernel-vanilla-4.12.14-150.52.1.aarch64", "product_id": "kernel-vanilla-4.12.14-150.52.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-150.52.1.aarch64", "product": { "name": "kernel-vanilla-base-4.12.14-150.52.1.aarch64", "product_id": "kernel-vanilla-base-4.12.14-150.52.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-150.52.1.aarch64", "product": { "name": "kernel-vanilla-devel-4.12.14-150.52.1.aarch64", "product_id": "kernel-vanilla-devel-4.12.14-150.52.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-livepatch-devel-4.12.14-150.52.1.aarch64", "product": { "name": "kernel-vanilla-livepatch-devel-4.12.14-150.52.1.aarch64", "product_id": "kernel-vanilla-livepatch-devel-4.12.14-150.52.1.aarch64" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-150.52.1.aarch64", "product": { "name": "kselftests-kmp-default-4.12.14-150.52.1.aarch64", "product_id": "kselftests-kmp-default-4.12.14-150.52.1.aarch64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "product": { "name": "ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "product_id": "ocfs2-kmp-default-4.12.14-150.52.1.aarch64" } }, { "category": "product_version", "name": "reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "product": { "name": "reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "product_id": "reiserfs-kmp-default-4.12.14-150.52.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-4.12.14-150.52.1.noarch", "product": { "name": "kernel-devel-4.12.14-150.52.1.noarch", "product_id": "kernel-devel-4.12.14-150.52.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-4.12.14-150.52.1.noarch", "product": { "name": "kernel-docs-4.12.14-150.52.1.noarch", "product_id": "kernel-docs-4.12.14-150.52.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-html-4.12.14-150.52.1.noarch", "product": { "name": "kernel-docs-html-4.12.14-150.52.1.noarch", "product_id": "kernel-docs-html-4.12.14-150.52.1.noarch" } }, { "category": "product_version", "name": "kernel-macros-4.12.14-150.52.1.noarch", "product": { "name": "kernel-macros-4.12.14-150.52.1.noarch", "product_id": "kernel-macros-4.12.14-150.52.1.noarch" } }, { "category": "product_version", "name": "kernel-source-4.12.14-150.52.1.noarch", "product": { "name": "kernel-source-4.12.14-150.52.1.noarch", "product_id": "kernel-source-4.12.14-150.52.1.noarch" } }, { "category": "product_version", "name": "kernel-source-vanilla-4.12.14-150.52.1.noarch", "product": { "name": "kernel-source-vanilla-4.12.14-150.52.1.noarch", "product_id": "kernel-source-vanilla-4.12.14-150.52.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "product": { "name": "cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "product_id": "cluster-md-kmp-default-4.12.14-150.52.1.ppc64le" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-150.52.1.ppc64le", "product": { "name": "dlm-kmp-default-4.12.14-150.52.1.ppc64le", "product_id": "dlm-kmp-default-4.12.14-150.52.1.ppc64le" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "product": { "name": "gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "product_id": "gfs2-kmp-default-4.12.14-150.52.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-4.12.14-150.52.1.ppc64le", "product": { "name": "kernel-debug-4.12.14-150.52.1.ppc64le", "product_id": "kernel-debug-4.12.14-150.52.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-base-4.12.14-150.52.1.ppc64le", "product": { "name": "kernel-debug-base-4.12.14-150.52.1.ppc64le", "product_id": "kernel-debug-base-4.12.14-150.52.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-devel-4.12.14-150.52.1.ppc64le", "product": { "name": "kernel-debug-devel-4.12.14-150.52.1.ppc64le", "product_id": "kernel-debug-devel-4.12.14-150.52.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-livepatch-devel-4.12.14-150.52.1.ppc64le", "product": { "name": "kernel-debug-livepatch-devel-4.12.14-150.52.1.ppc64le", "product_id": "kernel-debug-livepatch-devel-4.12.14-150.52.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-4.12.14-150.52.1.ppc64le", "product": { "name": "kernel-default-4.12.14-150.52.1.ppc64le", "product_id": "kernel-default-4.12.14-150.52.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-150.52.1.ppc64le", "product": { "name": "kernel-default-base-4.12.14-150.52.1.ppc64le", "product_id": "kernel-default-base-4.12.14-150.52.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-150.52.1.ppc64le", "product": { "name": "kernel-default-devel-4.12.14-150.52.1.ppc64le", "product_id": "kernel-default-devel-4.12.14-150.52.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-150.52.1.ppc64le", "product": { "name": "kernel-default-extra-4.12.14-150.52.1.ppc64le", "product_id": "kernel-default-extra-4.12.14-150.52.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "product": { "name": "kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "product_id": "kernel-default-livepatch-4.12.14-150.52.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-livepatch-devel-4.12.14-150.52.1.ppc64le", "product": { "name": "kernel-default-livepatch-devel-4.12.14-150.52.1.ppc64le", "product_id": "kernel-default-livepatch-devel-4.12.14-150.52.1.ppc64le" } }, { "category": "product_version", "name": "kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "product": { "name": "kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "product_id": "kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-150.52.1.ppc64le", "product": { "name": "kernel-obs-build-4.12.14-150.52.1.ppc64le", "product_id": "kernel-obs-build-4.12.14-150.52.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-150.52.1.ppc64le", "product": { "name": "kernel-obs-qa-4.12.14-150.52.1.ppc64le", "product_id": "kernel-obs-qa-4.12.14-150.52.1.ppc64le" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-150.52.1.ppc64le", "product": { "name": "kernel-syms-4.12.14-150.52.1.ppc64le", "product_id": "kernel-syms-4.12.14-150.52.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-150.52.1.ppc64le", "product": { "name": "kernel-vanilla-4.12.14-150.52.1.ppc64le", "product_id": "kernel-vanilla-4.12.14-150.52.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "product": { "name": "kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "product_id": "kernel-vanilla-base-4.12.14-150.52.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-150.52.1.ppc64le", "product": { "name": "kernel-vanilla-devel-4.12.14-150.52.1.ppc64le", "product_id": "kernel-vanilla-devel-4.12.14-150.52.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-livepatch-devel-4.12.14-150.52.1.ppc64le", "product": { "name": "kernel-vanilla-livepatch-devel-4.12.14-150.52.1.ppc64le", "product_id": "kernel-vanilla-livepatch-devel-4.12.14-150.52.1.ppc64le" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-150.52.1.ppc64le", "product": { "name": "kselftests-kmp-default-4.12.14-150.52.1.ppc64le", "product_id": "kselftests-kmp-default-4.12.14-150.52.1.ppc64le" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "product": { "name": "ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "product_id": "ocfs2-kmp-default-4.12.14-150.52.1.ppc64le" } }, { "category": "product_version", "name": "reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "product": { "name": "reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "product_id": "reiserfs-kmp-default-4.12.14-150.52.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-150.52.1.s390x", "product": { "name": "cluster-md-kmp-default-4.12.14-150.52.1.s390x", "product_id": "cluster-md-kmp-default-4.12.14-150.52.1.s390x" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-150.52.1.s390x", "product": { "name": "dlm-kmp-default-4.12.14-150.52.1.s390x", "product_id": "dlm-kmp-default-4.12.14-150.52.1.s390x" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-150.52.1.s390x", "product": { "name": "gfs2-kmp-default-4.12.14-150.52.1.s390x", "product_id": "gfs2-kmp-default-4.12.14-150.52.1.s390x" } }, { "category": "product_version", "name": "kernel-default-4.12.14-150.52.1.s390x", "product": { "name": "kernel-default-4.12.14-150.52.1.s390x", "product_id": "kernel-default-4.12.14-150.52.1.s390x" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-150.52.1.s390x", "product": { "name": "kernel-default-base-4.12.14-150.52.1.s390x", "product_id": "kernel-default-base-4.12.14-150.52.1.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-150.52.1.s390x", "product": { "name": "kernel-default-devel-4.12.14-150.52.1.s390x", "product_id": "kernel-default-devel-4.12.14-150.52.1.s390x" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-150.52.1.s390x", "product": { "name": "kernel-default-extra-4.12.14-150.52.1.s390x", "product_id": "kernel-default-extra-4.12.14-150.52.1.s390x" } }, { "category": "product_version", "name": "kernel-default-livepatch-4.12.14-150.52.1.s390x", "product": { "name": "kernel-default-livepatch-4.12.14-150.52.1.s390x", "product_id": "kernel-default-livepatch-4.12.14-150.52.1.s390x" } }, { "category": "product_version", "name": "kernel-default-livepatch-devel-4.12.14-150.52.1.s390x", "product": { "name": "kernel-default-livepatch-devel-4.12.14-150.52.1.s390x", "product_id": "kernel-default-livepatch-devel-4.12.14-150.52.1.s390x" } }, { "category": "product_version", "name": "kernel-default-man-4.12.14-150.52.1.s390x", "product": { "name": "kernel-default-man-4.12.14-150.52.1.s390x", "product_id": "kernel-default-man-4.12.14-150.52.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-150.52.1.s390x", "product": { "name": "kernel-obs-build-4.12.14-150.52.1.s390x", "product_id": "kernel-obs-build-4.12.14-150.52.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-150.52.1.s390x", "product": { "name": "kernel-obs-qa-4.12.14-150.52.1.s390x", "product_id": "kernel-obs-qa-4.12.14-150.52.1.s390x" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-150.52.1.s390x", "product": { "name": "kernel-syms-4.12.14-150.52.1.s390x", "product_id": "kernel-syms-4.12.14-150.52.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-150.52.1.s390x", "product": { "name": "kernel-vanilla-4.12.14-150.52.1.s390x", "product_id": "kernel-vanilla-4.12.14-150.52.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-150.52.1.s390x", "product": { "name": "kernel-vanilla-base-4.12.14-150.52.1.s390x", "product_id": "kernel-vanilla-base-4.12.14-150.52.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-150.52.1.s390x", "product": { "name": "kernel-vanilla-devel-4.12.14-150.52.1.s390x", "product_id": "kernel-vanilla-devel-4.12.14-150.52.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-livepatch-devel-4.12.14-150.52.1.s390x", "product": { "name": "kernel-vanilla-livepatch-devel-4.12.14-150.52.1.s390x", "product_id": "kernel-vanilla-livepatch-devel-4.12.14-150.52.1.s390x" } }, { "category": "product_version", "name": "kernel-zfcpdump-4.12.14-150.52.1.s390x", "product": { "name": "kernel-zfcpdump-4.12.14-150.52.1.s390x", "product_id": "kernel-zfcpdump-4.12.14-150.52.1.s390x" } }, { "category": "product_version", "name": "kernel-zfcpdump-man-4.12.14-150.52.1.s390x", "product": { "name": "kernel-zfcpdump-man-4.12.14-150.52.1.s390x", "product_id": "kernel-zfcpdump-man-4.12.14-150.52.1.s390x" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-150.52.1.s390x", "product": { "name": "kselftests-kmp-default-4.12.14-150.52.1.s390x", "product_id": "kselftests-kmp-default-4.12.14-150.52.1.s390x" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-150.52.1.s390x", "product": { "name": "ocfs2-kmp-default-4.12.14-150.52.1.s390x", "product_id": "ocfs2-kmp-default-4.12.14-150.52.1.s390x" } }, { "category": "product_version", "name": "reiserfs-kmp-default-4.12.14-150.52.1.s390x", "product": { "name": "reiserfs-kmp-default-4.12.14-150.52.1.s390x", "product_id": "reiserfs-kmp-default-4.12.14-150.52.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "product": { "name": "cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "product_id": "cluster-md-kmp-default-4.12.14-150.52.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-150.52.1.x86_64", "product": { "name": "dlm-kmp-default-4.12.14-150.52.1.x86_64", "product_id": "dlm-kmp-default-4.12.14-150.52.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-150.52.1.x86_64", "product": { "name": "gfs2-kmp-default-4.12.14-150.52.1.x86_64", "product_id": "gfs2-kmp-default-4.12.14-150.52.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-4.12.14-150.52.1.x86_64", "product": { "name": "kernel-debug-4.12.14-150.52.1.x86_64", "product_id": "kernel-debug-4.12.14-150.52.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-base-4.12.14-150.52.1.x86_64", "product": { "name": "kernel-debug-base-4.12.14-150.52.1.x86_64", "product_id": "kernel-debug-base-4.12.14-150.52.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-devel-4.12.14-150.52.1.x86_64", "product": { "name": "kernel-debug-devel-4.12.14-150.52.1.x86_64", "product_id": "kernel-debug-devel-4.12.14-150.52.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-livepatch-devel-4.12.14-150.52.1.x86_64", "product": { "name": "kernel-debug-livepatch-devel-4.12.14-150.52.1.x86_64", "product_id": "kernel-debug-livepatch-devel-4.12.14-150.52.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-4.12.14-150.52.1.x86_64", "product": { "name": "kernel-default-4.12.14-150.52.1.x86_64", "product_id": "kernel-default-4.12.14-150.52.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-150.52.1.x86_64", "product": { "name": "kernel-default-base-4.12.14-150.52.1.x86_64", "product_id": "kernel-default-base-4.12.14-150.52.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-150.52.1.x86_64", "product": { "name": "kernel-default-devel-4.12.14-150.52.1.x86_64", "product_id": "kernel-default-devel-4.12.14-150.52.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-150.52.1.x86_64", "product": { "name": "kernel-default-extra-4.12.14-150.52.1.x86_64", "product_id": "kernel-default-extra-4.12.14-150.52.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-livepatch-4.12.14-150.52.1.x86_64", "product": { "name": "kernel-default-livepatch-4.12.14-150.52.1.x86_64", "product_id": "kernel-default-livepatch-4.12.14-150.52.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-livepatch-devel-4.12.14-150.52.1.x86_64", "product": { "name": "kernel-default-livepatch-devel-4.12.14-150.52.1.x86_64", "product_id": "kernel-default-livepatch-devel-4.12.14-150.52.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-4.12.14-150.52.1.x86_64", "product": { "name": "kernel-kvmsmall-4.12.14-150.52.1.x86_64", "product_id": "kernel-kvmsmall-4.12.14-150.52.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-base-4.12.14-150.52.1.x86_64", "product": { "name": "kernel-kvmsmall-base-4.12.14-150.52.1.x86_64", "product_id": "kernel-kvmsmall-base-4.12.14-150.52.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-devel-4.12.14-150.52.1.x86_64", "product": { "name": "kernel-kvmsmall-devel-4.12.14-150.52.1.x86_64", "product_id": "kernel-kvmsmall-devel-4.12.14-150.52.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-livepatch-devel-4.12.14-150.52.1.x86_64", "product": { "name": "kernel-kvmsmall-livepatch-devel-4.12.14-150.52.1.x86_64", "product_id": "kernel-kvmsmall-livepatch-devel-4.12.14-150.52.1.x86_64" } }, { "category": "product_version", "name": "kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "product": { "name": "kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "product_id": "kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-150.52.1.x86_64", "product": { "name": "kernel-obs-build-4.12.14-150.52.1.x86_64", "product_id": "kernel-obs-build-4.12.14-150.52.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-150.52.1.x86_64", "product": { "name": "kernel-obs-qa-4.12.14-150.52.1.x86_64", "product_id": "kernel-obs-qa-4.12.14-150.52.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-150.52.1.x86_64", "product": { "name": "kernel-syms-4.12.14-150.52.1.x86_64", "product_id": "kernel-syms-4.12.14-150.52.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-150.52.1.x86_64", "product": { "name": "kernel-vanilla-4.12.14-150.52.1.x86_64", "product_id": "kernel-vanilla-4.12.14-150.52.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-150.52.1.x86_64", "product": { "name": "kernel-vanilla-base-4.12.14-150.52.1.x86_64", "product_id": "kernel-vanilla-base-4.12.14-150.52.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-150.52.1.x86_64", "product": { "name": "kernel-vanilla-devel-4.12.14-150.52.1.x86_64", "product_id": "kernel-vanilla-devel-4.12.14-150.52.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-livepatch-devel-4.12.14-150.52.1.x86_64", "product": { "name": "kernel-vanilla-livepatch-devel-4.12.14-150.52.1.x86_64", "product_id": "kernel-vanilla-livepatch-devel-4.12.14-150.52.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-150.52.1.x86_64", "product": { "name": "kselftests-kmp-default-4.12.14-150.52.1.x86_64", "product_id": "kselftests-kmp-default-4.12.14-150.52.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "product": { "name": "ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "product_id": "ocfs2-kmp-default-4.12.14-150.52.1.x86_64" } }, { "category": "product_version", "name": "reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "product": { "name": "reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "product_id": "reiserfs-kmp-default-4.12.14-150.52.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 15", "product": { "name": "SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-live-patching:15" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Availability Extension 15", "product": { "name": "SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-ha:15" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-espos:15" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15-LTSS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-ltss:15" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 15-LTSS", "product": { "name": "SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:15" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 15", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:15" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-4.12.14-150.52.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le" }, "product_reference": "kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-4.12.14-150.52.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64" }, "product_reference": "kernel-default-livepatch-4.12.14-150.52.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-150.52.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64" }, "product_reference": "cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-150.52.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le" }, "product_reference": "cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-150.52.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x" }, "product_reference": "cluster-md-kmp-default-4.12.14-150.52.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-150.52.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64" }, "product_reference": "cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-150.52.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64" }, "product_reference": "dlm-kmp-default-4.12.14-150.52.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-150.52.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le" }, "product_reference": "dlm-kmp-default-4.12.14-150.52.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-150.52.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x" }, "product_reference": "dlm-kmp-default-4.12.14-150.52.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-150.52.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64" }, "product_reference": "dlm-kmp-default-4.12.14-150.52.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-150.52.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64" }, "product_reference": "gfs2-kmp-default-4.12.14-150.52.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-150.52.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le" }, "product_reference": "gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-150.52.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x" }, "product_reference": "gfs2-kmp-default-4.12.14-150.52.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-150.52.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64" }, "product_reference": "gfs2-kmp-default-4.12.14-150.52.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-150.52.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64" }, "product_reference": "ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-150.52.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le" }, "product_reference": "ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-150.52.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x" }, "product_reference": "ocfs2-kmp-default-4.12.14-150.52.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-150.52.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64" }, "product_reference": "ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-150.52.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64" }, "product_reference": "kernel-default-4.12.14-150.52.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-150.52.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64" }, "product_reference": "kernel-default-4.12.14-150.52.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-150.52.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64" }, "product_reference": "kernel-default-base-4.12.14-150.52.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-150.52.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64" }, "product_reference": "kernel-default-base-4.12.14-150.52.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-150.52.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64" }, "product_reference": "kernel-default-devel-4.12.14-150.52.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-150.52.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64" }, "product_reference": "kernel-default-devel-4.12.14-150.52.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.12.14-150.52.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch" }, "product_reference": "kernel-devel-4.12.14-150.52.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-4.12.14-150.52.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch" }, "product_reference": "kernel-docs-4.12.14-150.52.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.12.14-150.52.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch" }, "product_reference": "kernel-macros-4.12.14-150.52.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-150.52.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64" }, "product_reference": "kernel-obs-build-4.12.14-150.52.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-150.52.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64" }, "product_reference": "kernel-obs-build-4.12.14-150.52.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.12.14-150.52.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch" }, "product_reference": "kernel-source-4.12.14-150.52.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-150.52.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64" }, "product_reference": "kernel-syms-4.12.14-150.52.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-150.52.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64" }, "product_reference": "kernel-syms-4.12.14-150.52.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-base-4.12.14-150.52.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64" }, "product_reference": "kernel-vanilla-base-4.12.14-150.52.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-base-4.12.14-150.52.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64" }, "product_reference": "kernel-vanilla-base-4.12.14-150.52.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-150.52.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64" }, "product_reference": "kernel-default-4.12.14-150.52.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-150.52.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64" }, "product_reference": "kernel-default-4.12.14-150.52.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-150.52.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64" }, "product_reference": "kernel-default-base-4.12.14-150.52.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-150.52.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64" }, "product_reference": "kernel-default-base-4.12.14-150.52.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-150.52.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64" }, "product_reference": "kernel-default-devel-4.12.14-150.52.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-150.52.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64" }, "product_reference": "kernel-default-devel-4.12.14-150.52.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.12.14-150.52.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch" }, "product_reference": "kernel-devel-4.12.14-150.52.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-4.12.14-150.52.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch" }, "product_reference": "kernel-docs-4.12.14-150.52.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.12.14-150.52.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch" }, "product_reference": "kernel-macros-4.12.14-150.52.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-150.52.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64" }, "product_reference": "kernel-obs-build-4.12.14-150.52.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-150.52.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64" }, "product_reference": "kernel-obs-build-4.12.14-150.52.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.12.14-150.52.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch" }, "product_reference": "kernel-source-4.12.14-150.52.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-150.52.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64" }, "product_reference": "kernel-syms-4.12.14-150.52.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-150.52.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64" }, "product_reference": "kernel-syms-4.12.14-150.52.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-base-4.12.14-150.52.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64" }, "product_reference": "kernel-vanilla-base-4.12.14-150.52.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-base-4.12.14-150.52.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64" }, "product_reference": "kernel-vanilla-base-4.12.14-150.52.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-150.52.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64" }, "product_reference": "kernel-default-4.12.14-150.52.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-150.52.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le" }, "product_reference": "kernel-default-4.12.14-150.52.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-150.52.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x" }, "product_reference": "kernel-default-4.12.14-150.52.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-150.52.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64" }, "product_reference": "kernel-default-4.12.14-150.52.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-150.52.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64" }, "product_reference": "kernel-default-base-4.12.14-150.52.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-150.52.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le" }, "product_reference": "kernel-default-base-4.12.14-150.52.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-150.52.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x" }, "product_reference": "kernel-default-base-4.12.14-150.52.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-150.52.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64" }, "product_reference": "kernel-default-base-4.12.14-150.52.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-150.52.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64" }, "product_reference": "kernel-default-devel-4.12.14-150.52.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-150.52.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le" }, "product_reference": "kernel-default-devel-4.12.14-150.52.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-150.52.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x" }, "product_reference": "kernel-default-devel-4.12.14-150.52.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-150.52.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64" }, "product_reference": "kernel-default-devel-4.12.14-150.52.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-4.12.14-150.52.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x" }, "product_reference": "kernel-default-man-4.12.14-150.52.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.12.14-150.52.1.noarch as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch" }, "product_reference": "kernel-devel-4.12.14-150.52.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-4.12.14-150.52.1.noarch as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch" }, "product_reference": "kernel-docs-4.12.14-150.52.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.12.14-150.52.1.noarch as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch" }, "product_reference": "kernel-macros-4.12.14-150.52.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-150.52.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64" }, "product_reference": "kernel-obs-build-4.12.14-150.52.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-150.52.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le" }, "product_reference": "kernel-obs-build-4.12.14-150.52.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-150.52.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x" }, "product_reference": "kernel-obs-build-4.12.14-150.52.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-150.52.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64" }, "product_reference": "kernel-obs-build-4.12.14-150.52.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.12.14-150.52.1.noarch as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch" }, "product_reference": "kernel-source-4.12.14-150.52.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-150.52.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64" }, "product_reference": "kernel-syms-4.12.14-150.52.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-150.52.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le" }, "product_reference": "kernel-syms-4.12.14-150.52.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-150.52.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x" }, "product_reference": "kernel-syms-4.12.14-150.52.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-150.52.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64" }, "product_reference": "kernel-syms-4.12.14-150.52.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-base-4.12.14-150.52.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64" }, "product_reference": "kernel-vanilla-base-4.12.14-150.52.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-base-4.12.14-150.52.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le" }, "product_reference": "kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-base-4.12.14-150.52.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x" }, "product_reference": "kernel-vanilla-base-4.12.14-150.52.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-base-4.12.14-150.52.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64" }, "product_reference": "kernel-vanilla-base-4.12.14-150.52.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-4.12.14-150.52.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64" }, "product_reference": "reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-4.12.14-150.52.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le" }, "product_reference": "reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-4.12.14-150.52.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x" }, "product_reference": "reiserfs-kmp-default-4.12.14-150.52.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-4.12.14-150.52.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" }, "product_reference": "reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-150.52.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le" }, "product_reference": "kernel-default-4.12.14-150.52.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-150.52.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64" }, "product_reference": "kernel-default-4.12.14-150.52.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-150.52.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le" }, "product_reference": "kernel-default-base-4.12.14-150.52.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-150.52.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64" }, "product_reference": "kernel-default-base-4.12.14-150.52.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-150.52.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le" }, "product_reference": "kernel-default-devel-4.12.14-150.52.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-150.52.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64" }, "product_reference": "kernel-default-devel-4.12.14-150.52.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.12.14-150.52.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch" }, "product_reference": "kernel-devel-4.12.14-150.52.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-4.12.14-150.52.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch" }, "product_reference": "kernel-docs-4.12.14-150.52.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.12.14-150.52.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch" }, "product_reference": "kernel-macros-4.12.14-150.52.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-150.52.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le" }, "product_reference": "kernel-obs-build-4.12.14-150.52.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-150.52.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64" }, "product_reference": "kernel-obs-build-4.12.14-150.52.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.12.14-150.52.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch" }, "product_reference": "kernel-source-4.12.14-150.52.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-150.52.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le" }, "product_reference": "kernel-syms-4.12.14-150.52.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-150.52.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64" }, "product_reference": "kernel-syms-4.12.14-150.52.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-base-4.12.14-150.52.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le" }, "product_reference": "kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-base-4.12.14-150.52.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64" }, "product_reference": "kernel-vanilla-base-4.12.14-150.52.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-4.12.14-150.52.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le" }, "product_reference": "reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-4.12.14-150.52.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" }, "product_reference": "reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-1000199", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1000199" } ], "notes": [ { "category": "general", "text": "The Linux Kernel version 3.18 contains a dangerous feature vulnerability in modify_user_hw_breakpoint() that can result in crash and possibly memory corruption. This attack appear to be exploitable via local code execution and the ability to use ptrace. This vulnerability appears to have been fixed in git commit f67b15037a7a50c57f72e69a6d59941ad90a0f0f.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1000199", "url": "https://www.suse.com/security/cve/CVE-2018-1000199" }, { "category": "external", "summary": "SUSE Bug 1089895 for CVE-2018-1000199", "url": "https://bugzilla.suse.com/1089895" }, { "category": "external", "summary": "SUSE Bug 1090036 for CVE-2018-1000199", "url": "https://bugzilla.suse.com/1090036" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-18T09:17:44Z", "details": "important" } ], "title": "CVE-2018-1000199" }, { "cve": "CVE-2019-14615", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-14615" } ], "notes": [ { "category": "general", "text": "Insufficient control flow in certain data structures for some Intel(R) Processors with Intel(R) Processor Graphics may allow an unauthenticated user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-14615", "url": "https://www.suse.com/security/cve/CVE-2019-14615" }, { "category": "external", "summary": "SUSE Bug 1160195 for CVE-2019-14615", "url": "https://bugzilla.suse.com/1160195" }, { "category": "external", "summary": "SUSE Bug 1165881 for CVE-2019-14615", "url": "https://bugzilla.suse.com/1165881" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-18T09:17:44Z", "details": "moderate" } ], "title": "CVE-2019-14615" }, { "cve": "CVE-2019-14896", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-14896" } ], "notes": [ { "category": "general", "text": "A heap-based buffer overflow vulnerability was found in the Linux kernel, version kernel-2.6.32, in Marvell WiFi chip driver. A remote attacker could cause a denial of service (system crash) or, possibly execute arbitrary code, when the lbs_ibss_join_existing function is called after a STA connects to an AP.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-14896", "url": "https://www.suse.com/security/cve/CVE-2019-14896" }, { "category": "external", "summary": "SUSE Bug 1157157 for CVE-2019-14896", "url": "https://bugzilla.suse.com/1157157" }, { "category": "external", "summary": "SUSE Bug 1160468 for CVE-2019-14896", "url": "https://bugzilla.suse.com/1160468" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-18T09:17:44Z", "details": "important" } ], "title": "CVE-2019-14896" }, { "cve": "CVE-2019-14897", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-14897" } ], "notes": [ { "category": "general", "text": "A stack-based buffer overflow was found in the Linux kernel, version kernel-2.6.32, in Marvell WiFi chip driver. An attacker is able to cause a denial of service (system crash) or, possibly execute arbitrary code, when a STA works in IBSS mode (allows connecting stations together without the use of an AP) and connects to another STA.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-14897", "url": "https://www.suse.com/security/cve/CVE-2019-14897" }, { "category": "external", "summary": "SUSE Bug 1157155 for CVE-2019-14897", "url": "https://bugzilla.suse.com/1157155" }, { "category": "external", "summary": "SUSE Bug 1160467 for CVE-2019-14897", "url": "https://bugzilla.suse.com/1160467" }, { "category": "external", "summary": "SUSE Bug 1160468 for CVE-2019-14897", "url": "https://bugzilla.suse.com/1160468" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-18T09:17:44Z", "details": "important" } ], "title": "CVE-2019-14897" }, { "cve": "CVE-2019-16994", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-16994" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 5.0, a memory leak exists in sit_init_net() in net/ipv6/sit.c when register_netdev() fails to register sitn-\u003efb_tunnel_dev, which may cause denial of service, aka CID-07f12b26e21a.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-16994", "url": "https://www.suse.com/security/cve/CVE-2019-16994" }, { "category": "external", "summary": "SUSE Bug 1161523 for CVE-2019-16994", "url": "https://bugzilla.suse.com/1161523" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-18T09:17:44Z", "details": "moderate" } ], "title": "CVE-2019-16994" }, { "cve": "CVE-2019-19036", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-19036" } ], "notes": [ { "category": "general", "text": "btrfs_root_node in fs/btrfs/ctree.c in the Linux kernel through 5.3.12 allows a NULL pointer dereference because rcu_dereference(root-\u003enode) can be zero.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-19036", "url": "https://www.suse.com/security/cve/CVE-2019-19036" }, { "category": "external", "summary": "SUSE Bug 1157692 for CVE-2019-19036", "url": "https://bugzilla.suse.com/1157692" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-18T09:17:44Z", "details": "moderate" } ], "title": "CVE-2019-19036" }, { "cve": "CVE-2019-19045", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-19045" } ], "notes": [ { "category": "general", "text": "A memory leak in the mlx5_fpga_conn_create_cq() function in drivers/net/ethernet/mellanox/mlx5/core/fpga/conn.c in the Linux kernel before 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering mlx5_vector2eqn() failures, aka CID-c8c2a057fdc7.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-19045", "url": "https://www.suse.com/security/cve/CVE-2019-19045" }, { "category": "external", "summary": "SUSE Bug 1161522 for CVE-2019-19045", "url": "https://bugzilla.suse.com/1161522" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-18T09:17:44Z", "details": "moderate" } ], "title": "CVE-2019-19045" }, { "cve": "CVE-2019-19054", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-19054" } ], "notes": [ { "category": "general", "text": "A memory leak in the cx23888_ir_probe() function in drivers/media/pci/cx23885/cx23888-ir.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering kfifo_alloc() failures, aka CID-a7b2df76b42b.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-19054", "url": "https://www.suse.com/security/cve/CVE-2019-19054" }, { "category": "external", "summary": "SUSE Bug 1161518 for CVE-2019-19054", "url": "https://bugzilla.suse.com/1161518" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.9, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-18T09:17:44Z", "details": "moderate" } ], "title": "CVE-2019-19054" }, { "cve": "CVE-2019-19318", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-19318" } ], "notes": [ { "category": "general", "text": "In the Linux kernel 5.3.11, mounting a crafted btrfs image twice can cause an rwsem_down_write_slowpath use-after-free because (in rwsem_can_spin_on_owner in kernel/locking/rwsem.c) rwsem_owner_flags returns an already freed pointer,", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-19318", "url": "https://www.suse.com/security/cve/CVE-2019-19318" }, { "category": "external", "summary": "SUSE Bug 1158026 for CVE-2019-19318", "url": "https://bugzilla.suse.com/1158026" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-18T09:17:44Z", "details": "moderate" } ], "title": "CVE-2019-19318" }, { "cve": "CVE-2019-19319", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-19319" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 5.2, a setxattr operation, after a mount of a crafted ext4 image, can cause a slab-out-of-bounds write access because of an ext4_xattr_set_entry use-after-free in fs/ext4/xattr.c when a large old_size value is used in a memset call, aka CID-345c0dbf3a30.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-19319", "url": "https://www.suse.com/security/cve/CVE-2019-19319" }, { "category": "external", "summary": "SUSE Bug 1158021 for CVE-2019-19319", "url": "https://bugzilla.suse.com/1158021" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-18T09:17:44Z", "details": "moderate" } ], "title": "CVE-2019-19319" }, { "cve": "CVE-2019-19447", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-19447" } ], "notes": [ { "category": "general", "text": "In the Linux kernel 5.0.21, mounting a crafted ext4 filesystem image, performing some operations, and unmounting can lead to a use-after-free in ext4_put_super in fs/ext4/super.c, related to dump_orphan_list in fs/ext4/super.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-19447", "url": "https://www.suse.com/security/cve/CVE-2019-19447" }, { "category": "external", "summary": "SUSE Bug 1158819 for CVE-2019-19447", "url": "https://bugzilla.suse.com/1158819" }, { "category": "external", "summary": "SUSE Bug 1173869 for CVE-2019-19447", "url": "https://bugzilla.suse.com/1173869" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-18T09:17:44Z", "details": "important" } ], "title": "CVE-2019-19447" }, { "cve": "CVE-2019-19462", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-19462" } ], "notes": [ { "category": "general", "text": "relay_open in kernel/relay.c in the Linux kernel through 5.4.1 allows local users to cause a denial of service (such as relay blockage) by triggering a NULL alloc_percpu result.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-19462", "url": "https://www.suse.com/security/cve/CVE-2019-19462" }, { "category": "external", "summary": "SUSE Bug 1158265 for CVE-2019-19462", "url": "https://bugzilla.suse.com/1158265" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-18T09:17:44Z", "details": "low" } ], "title": "CVE-2019-19462" }, { "cve": "CVE-2019-19768", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-19768" } ], "notes": [ { "category": "general", "text": "In the Linux kernel 5.4.0-rc2, there is a use-after-free (read) in the __blk_add_trace function in kernel/trace/blktrace.c (which is used to fill out a blk_io_trace structure and place it in a per-cpu sub-buffer).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-19768", "url": "https://www.suse.com/security/cve/CVE-2019-19768" }, { "category": "external", "summary": "SUSE Bug 1159285 for CVE-2019-19768", "url": "https://bugzilla.suse.com/1159285" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-18T09:17:44Z", "details": "moderate" } ], "title": "CVE-2019-19768" }, { "cve": "CVE-2019-19770", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-19770" } ], "notes": [ { "category": "general", "text": "In the Linux kernel 4.19.83, there is a use-after-free (read) in the debugfs_remove function in fs/debugfs/inode.c (which is used to remove a file or directory in debugfs that was previously created with a call to another debugfs function such as debugfs_create_file). NOTE: Linux kernel developers dispute this issue as not being an issue with debugfs, instead this is an issue with misuse of debugfs within blktrace", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-19770", "url": "https://www.suse.com/security/cve/CVE-2019-19770" }, { "category": "external", "summary": "SUSE Bug 1159198 for CVE-2019-19770", "url": "https://bugzilla.suse.com/1159198" }, { "category": "external", "summary": "SUSE Bug 1171295 for CVE-2019-19770", "url": "https://bugzilla.suse.com/1171295" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-18T09:17:44Z", "details": "moderate" } ], "title": "CVE-2019-19770" }, { "cve": "CVE-2019-19965", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-19965" } ], "notes": [ { "category": "general", "text": "In the Linux kernel through 5.4.6, there is a NULL pointer dereference in drivers/scsi/libsas/sas_discover.c because of mishandling of port disconnection during discovery, related to a PHY down race condition, aka CID-f70267f379b5.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-19965", "url": "https://www.suse.com/security/cve/CVE-2019-19965" }, { "category": "external", "summary": "SUSE Bug 1159911 for CVE-2019-19965", "url": "https://bugzilla.suse.com/1159911" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-18T09:17:44Z", "details": "moderate" } ], "title": "CVE-2019-19965" }, { "cve": "CVE-2019-19966", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-19966" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 5.1.6, there is a use-after-free in cpia2_exit() in drivers/media/usb/cpia2/cpia2_v4l.c that will cause denial of service, aka CID-dea37a972655.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-19966", "url": "https://www.suse.com/security/cve/CVE-2019-19966" }, { "category": "external", "summary": "SUSE Bug 1159841 for CVE-2019-19966", "url": "https://bugzilla.suse.com/1159841" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.5, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-18T09:17:44Z", "details": "low" } ], "title": "CVE-2019-19966" }, { "cve": "CVE-2019-20054", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-20054" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 5.0.6, there is a NULL pointer dereference in drop_sysctl_table() in fs/proc/proc_sysctl.c, related to put_links, aka CID-23da9588037e.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-20054", "url": "https://www.suse.com/security/cve/CVE-2019-20054" }, { "category": "external", "summary": "SUSE Bug 1159910 for CVE-2019-20054", "url": "https://bugzilla.suse.com/1159910" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-18T09:17:44Z", "details": "moderate" } ], "title": "CVE-2019-20054" }, { "cve": "CVE-2019-20095", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-20095" } ], "notes": [ { "category": "general", "text": "mwifiex_tm_cmd in drivers/net/wireless/marvell/mwifiex/cfg80211.c in the Linux kernel before 5.1.6 has some error-handling cases that did not free allocated hostcmd memory, aka CID-003b686ace82. This will cause a memory leak and denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-20095", "url": "https://www.suse.com/security/cve/CVE-2019-20095" }, { "category": "external", "summary": "SUSE Bug 1159909 for CVE-2019-20095", "url": "https://bugzilla.suse.com/1159909" }, { "category": "external", "summary": "SUSE Bug 1159914 for CVE-2019-20095", "url": "https://bugzilla.suse.com/1159914" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-18T09:17:44Z", "details": "important" } ], "title": "CVE-2019-20095" }, { "cve": "CVE-2019-20096", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-20096" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 5.1, there is a memory leak in __feat_register_sp() in net/dccp/feat.c, which may cause denial of service, aka CID-1d3ff0950e2b.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-20096", "url": "https://www.suse.com/security/cve/CVE-2019-20096" }, { "category": "external", "summary": "SUSE Bug 1159908 for CVE-2019-20096", "url": "https://bugzilla.suse.com/1159908" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-18T09:17:44Z", "details": "moderate" } ], "title": "CVE-2019-20096" }, { "cve": "CVE-2019-20810", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-20810" } ], "notes": [ { "category": "general", "text": "go7007_snd_init in drivers/media/usb/go7007/snd-go7007.c in the Linux kernel before 5.6 does not call snd_card_free for a failure path, which causes a memory leak, aka CID-9453264ef586.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-20810", "url": "https://www.suse.com/security/cve/CVE-2019-20810" }, { "category": "external", "summary": "SUSE Bug 1172458 for CVE-2019-20810", "url": "https://bugzilla.suse.com/1172458" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-18T09:17:44Z", "details": "low" } ], "title": "CVE-2019-20810" }, { "cve": "CVE-2019-20812", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-20812" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.4.7. The prb_calc_retire_blk_tmo() function in net/packet/af_packet.c can result in a denial of service (CPU consumption and soft lockup) in a certain failure case involving TPACKET_V3, aka CID-b43d1f9f7067.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-20812", "url": "https://www.suse.com/security/cve/CVE-2019-20812" }, { "category": "external", "summary": "SUSE Bug 1172453 for CVE-2019-20812", "url": "https://bugzilla.suse.com/1172453" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-18T09:17:44Z", "details": "moderate" } ], "title": "CVE-2019-20812" }, { "cve": "CVE-2019-3701", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-3701" } ], "notes": [ { "category": "general", "text": "An issue was discovered in can_can_gw_rcv in net/can/gw.c in the Linux kernel through 4.19.13. The CAN frame modification rules allow bitwise logical operations that can be also applied to the can_dlc field. The privileged user \"root\" with CAP_NET_ADMIN can create a CAN frame modification rule that makes the data length code a higher value than the available CAN frame data size. In combination with a configured checksum calculation where the result is stored relatively to the end of the data (e.g. cgw_csum_xor_rel) the tail of the skb (e.g. frag_list pointer in skb_shared_info) can be rewritten which finally can cause a system crash. Because of a missing check, the CAN drivers may write arbitrary content beyond the data registers in the CAN controller\u0027s I/O memory when processing can-gw manipulated outgoing frames.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-3701", "url": "https://www.suse.com/security/cve/CVE-2019-3701" }, { "category": "external", "summary": "SUSE Bug 1120386 for CVE-2019-3701", "url": "https://bugzilla.suse.com/1120386" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-18T09:17:44Z", "details": "moderate" } ], "title": "CVE-2019-3701" }, { "cve": "CVE-2019-9455", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9455" } ], "notes": [ { "category": "general", "text": "In the Android kernel in the video driver there is a kernel pointer leak due to a WARN_ON statement. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9455", "url": "https://www.suse.com/security/cve/CVE-2019-9455" }, { "category": "external", "summary": "SUSE Bug 1170345 for CVE-2019-9455", "url": "https://bugzilla.suse.com/1170345" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-18T09:17:44Z", "details": "moderate" } ], "title": "CVE-2019-9455" }, { "cve": "CVE-2019-9458", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9458" } ], "notes": [ { "category": "general", "text": "In the Android kernel in the video driver there is a use after free due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9458", "url": "https://www.suse.com/security/cve/CVE-2019-9458" }, { "category": "external", "summary": "SUSE Bug 1168295 for CVE-2019-9458", "url": "https://bugzilla.suse.com/1168295" }, { "category": "external", "summary": "SUSE Bug 1173963 for CVE-2019-9458", "url": "https://bugzilla.suse.com/1173963" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-18T09:17:44Z", "details": "important" } ], "title": "CVE-2019-9458" }, { "cve": "CVE-2020-0543", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-0543" } ], "notes": [ { "category": "general", "text": "Incomplete cleanup from specific special register read operations in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-0543", "url": "https://www.suse.com/security/cve/CVE-2020-0543" }, { "category": "external", "summary": "SUSE Bug 1154824 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1154824" }, { "category": "external", "summary": "SUSE Bug 1172205 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172205" }, { "category": "external", "summary": "SUSE Bug 1172206 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172206" }, { "category": "external", "summary": "SUSE Bug 1172207 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172207" }, { "category": "external", "summary": "SUSE Bug 1172770 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172770" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-18T09:17:44Z", "details": "moderate" } ], "title": "CVE-2020-0543" }, { "cve": "CVE-2020-10690", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10690" } ], "notes": [ { "category": "general", "text": "There is a use-after-free in kernel versions before 5.5 due to a race condition between the release of ptp_clock and cdev while resource deallocation. When a (high privileged) process allocates a ptp device file (like /dev/ptpX) and voluntarily goes to sleep. During this time if the underlying device is removed, it can cause an exploitable condition as the process wakes up to terminate and clean all attached files. The system crashes due to the cdev structure being invalid (as already freed) which is pointed to by the inode.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10690", "url": "https://www.suse.com/security/cve/CVE-2020-10690" }, { "category": "external", "summary": "SUSE Bug 1170056 for CVE-2020-10690", "url": "https://bugzilla.suse.com/1170056" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-18T09:17:44Z", "details": "moderate" } ], "title": "CVE-2020-10690" }, { "cve": "CVE-2020-10711", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10711" } ], "notes": [ { "category": "general", "text": "A NULL pointer dereference flaw was found in the Linux kernel\u0027s SELinux subsystem in versions before 5.7. This flaw occurs while importing the Commercial IP Security Option (CIPSO) protocol\u0027s category bitmap into the SELinux extensible bitmap via the\u0027 ebitmap_netlbl_import\u0027 routine. While processing the CIPSO restricted bitmap tag in the \u0027cipso_v4_parsetag_rbm\u0027 routine, it sets the security attribute to indicate that the category bitmap is present, even if it has not been allocated. This issue leads to a NULL pointer dereference issue while importing the same category bitmap into SELinux. This flaw allows a remote network user to crash the system kernel, resulting in a denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10711", "url": "https://www.suse.com/security/cve/CVE-2020-10711" }, { "category": "external", "summary": "SUSE Bug 1171191 for CVE-2020-10711", "url": "https://bugzilla.suse.com/1171191" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-18T09:17:44Z", "details": "moderate" } ], "title": "CVE-2020-10711" }, { "cve": "CVE-2020-10720", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10720" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s implementation of GRO in versions before 5.2. This flaw allows an attacker with local access to crash the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10720", "url": "https://www.suse.com/security/cve/CVE-2020-10720" }, { "category": "external", "summary": "SUSE Bug 1170778 for CVE-2020-10720", "url": "https://bugzilla.suse.com/1170778" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-18T09:17:44Z", "details": "moderate" } ], "title": "CVE-2020-10720" }, { "cve": "CVE-2020-10732", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10732" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s implementation of Userspace core dumps. This flaw allows an attacker with a local account to crash a trivial program and exfiltrate private kernel data.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10732", "url": "https://www.suse.com/security/cve/CVE-2020-10732" }, { "category": "external", "summary": "SUSE Bug 1171220 for CVE-2020-10732", "url": "https://bugzilla.suse.com/1171220" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-18T09:17:44Z", "details": "low" } ], "title": "CVE-2020-10732" }, { "cve": "CVE-2020-10751", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10751" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernels SELinux LSM hook implementation before version 5.7, where it incorrectly assumed that an skb would only contain a single netlink message. The hook would incorrectly only validate the first netlink message in the skb and allow or deny the rest of the messages within the skb with the granted permission without further processing.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10751", "url": "https://www.suse.com/security/cve/CVE-2020-10751" }, { "category": "external", "summary": "SUSE Bug 1171189 for CVE-2020-10751", "url": "https://bugzilla.suse.com/1171189" }, { "category": "external", "summary": "SUSE Bug 1174963 for CVE-2020-10751", "url": "https://bugzilla.suse.com/1174963" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-18T09:17:44Z", "details": "moderate" } ], "title": "CVE-2020-10751" }, { "cve": "CVE-2020-10757", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10757" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux Kernel in versions after 4.5-rc1 in the way mremap handled DAX Huge Pages. This flaw allows a local attacker with access to a DAX enabled storage to escalate their privileges on the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10757", "url": "https://www.suse.com/security/cve/CVE-2020-10757" }, { "category": "external", "summary": "SUSE Bug 1159281 for CVE-2020-10757", "url": "https://bugzilla.suse.com/1159281" }, { "category": "external", "summary": "SUSE Bug 1172317 for CVE-2020-10757", "url": "https://bugzilla.suse.com/1172317" }, { "category": "external", "summary": "SUSE Bug 1172437 for CVE-2020-10757", "url": "https://bugzilla.suse.com/1172437" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-18T09:17:44Z", "details": "important" } ], "title": "CVE-2020-10757" }, { "cve": "CVE-2020-10942", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10942" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 5.5.8, get_raw_socket in drivers/vhost/net.c lacks validation of an sk_family field, which might allow attackers to trigger kernel stack corruption via crafted system calls.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10942", "url": "https://www.suse.com/security/cve/CVE-2020-10942" }, { "category": "external", "summary": "SUSE Bug 1167629 for CVE-2020-10942", "url": "https://bugzilla.suse.com/1167629" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-18T09:17:44Z", "details": "moderate" } ], "title": "CVE-2020-10942" }, { "cve": "CVE-2020-11494", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-11494" } ], "notes": [ { "category": "general", "text": "An issue was discovered in slc_bump in drivers/net/can/slcan.c in the Linux kernel 3.16 through 5.6.2. It allows attackers to read uninitialized can_frame data, potentially containing sensitive information from kernel stack memory, if the configuration lacks CONFIG_INIT_STACK_ALL, aka CID-b9258a2cece4.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-11494", "url": "https://www.suse.com/security/cve/CVE-2020-11494" }, { "category": "external", "summary": "SUSE Bug 1168424 for CVE-2020-11494", "url": "https://bugzilla.suse.com/1168424" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-18T09:17:44Z", "details": "moderate" } ], "title": "CVE-2020-11494" }, { "cve": "CVE-2020-11608", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-11608" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.6.1. drivers/media/usb/gspca/ov519.c allows NULL pointer dereferences in ov511_mode_init_regs and ov518_mode_init_regs when there are zero endpoints, aka CID-998912346c0d.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-11608", "url": "https://www.suse.com/security/cve/CVE-2020-11608" }, { "category": "external", "summary": "SUSE Bug 1168829 for CVE-2020-11608", "url": "https://bugzilla.suse.com/1168829" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-18T09:17:44Z", "details": "moderate" } ], "title": "CVE-2020-11608" }, { "cve": "CVE-2020-11609", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-11609" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the stv06xx subsystem in the Linux kernel before 5.6.1. drivers/media/usb/gspca/stv06xx/stv06xx.c and drivers/media/usb/gspca/stv06xx/stv06xx_pb0100.c mishandle invalid descriptors, as demonstrated by a NULL pointer dereference, aka CID-485b06aadb93.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-11609", "url": "https://www.suse.com/security/cve/CVE-2020-11609" }, { "category": "external", "summary": "SUSE Bug 1168854 for CVE-2020-11609", "url": "https://bugzilla.suse.com/1168854" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-18T09:17:44Z", "details": "moderate" } ], "title": "CVE-2020-11609" }, { "cve": "CVE-2020-11669", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-11669" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.2 on the powerpc platform. arch/powerpc/kernel/idle_book3s.S does not have save/restore functionality for PNV_POWERSAVE_AMR, PNV_POWERSAVE_UAMOR, and PNV_POWERSAVE_AMOR, aka CID-53a712bae5dd.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-11669", "url": "https://www.suse.com/security/cve/CVE-2020-11669" }, { "category": "external", "summary": "SUSE Bug 1169390 for CVE-2020-11669", "url": "https://bugzilla.suse.com/1169390" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-18T09:17:44Z", "details": "moderate" } ], "title": "CVE-2020-11669" }, { "cve": "CVE-2020-12114", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12114" } ], "notes": [ { "category": "general", "text": "A pivot_root race condition in fs/namespace.c in the Linux kernel 4.4.x before 4.4.221, 4.9.x before 4.9.221, 4.14.x before 4.14.178, 4.19.x before 4.19.119, and 5.x before 5.3 allows local users to cause a denial of service (panic) by corrupting a mountpoint reference counter.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12114", "url": "https://www.suse.com/security/cve/CVE-2020-12114" }, { "category": "external", "summary": "SUSE Bug 1171098 for CVE-2020-12114", "url": "https://bugzilla.suse.com/1171098" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-18T09:17:44Z", "details": "moderate" } ], "title": "CVE-2020-12114" }, { "cve": "CVE-2020-12464", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12464" } ], "notes": [ { "category": "general", "text": "usb_sg_cancel in drivers/usb/core/message.c in the Linux kernel before 5.6.8 has a use-after-free because a transfer occurs without a reference, aka CID-056ad39ee925.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12464", "url": "https://www.suse.com/security/cve/CVE-2020-12464" }, { "category": "external", "summary": "SUSE Bug 1170901 for CVE-2020-12464", "url": "https://bugzilla.suse.com/1170901" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 1.8, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-18T09:17:44Z", "details": "low" } ], "title": "CVE-2020-12464" }, { "cve": "CVE-2020-12652", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12652" } ], "notes": [ { "category": "general", "text": "The __mptctl_ioctl function in drivers/message/fusion/mptctl.c in the Linux kernel before 5.4.14 allows local users to hold an incorrect lock during the ioctl operation and trigger a race condition, i.e., a \"double fetch\" vulnerability, aka CID-28d76df18f0a. NOTE: the vendor states \"The security impact of this bug is not as bad as it could have been because these operations are all privileged and root already has enormous destructive power.\"", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12652", "url": "https://www.suse.com/security/cve/CVE-2020-12652" }, { "category": "external", "summary": "SUSE Bug 1171218 for CVE-2020-12652", "url": "https://bugzilla.suse.com/1171218" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-18T09:17:44Z", "details": "moderate" } ], "title": "CVE-2020-12652" }, { "cve": "CVE-2020-12653", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12653" } ], "notes": [ { "category": "general", "text": "An issue was found in Linux kernel before 5.5.4. The mwifiex_cmd_append_vsie_tlv() function in drivers/net/wireless/marvell/mwifiex/scan.c allows local users to gain privileges or cause a denial of service because of an incorrect memcpy and buffer overflow, aka CID-b70261a288ea.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12653", "url": "https://www.suse.com/security/cve/CVE-2020-12653" }, { "category": "external", "summary": "SUSE Bug 1159281 for CVE-2020-12653", "url": "https://bugzilla.suse.com/1159281" }, { "category": "external", "summary": "SUSE Bug 1171195 for CVE-2020-12653", "url": "https://bugzilla.suse.com/1171195" }, { "category": "external", "summary": "SUSE Bug 1171254 for CVE-2020-12653", "url": "https://bugzilla.suse.com/1171254" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-18T09:17:44Z", "details": "important" } ], "title": "CVE-2020-12653" }, { "cve": "CVE-2020-12654", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12654" } ], "notes": [ { "category": "general", "text": "An issue was found in Linux kernel before 5.5.4. mwifiex_ret_wmm_get_status() in drivers/net/wireless/marvell/mwifiex/wmm.c allows a remote AP to trigger a heap-based buffer overflow because of an incorrect memcpy, aka CID-3a9b153c5591.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12654", "url": "https://www.suse.com/security/cve/CVE-2020-12654" }, { "category": "external", "summary": "SUSE Bug 1159281 for CVE-2020-12654", "url": "https://bugzilla.suse.com/1159281" }, { "category": "external", "summary": "SUSE Bug 1171202 for CVE-2020-12654", "url": "https://bugzilla.suse.com/1171202" }, { "category": "external", "summary": "SUSE Bug 1171252 for CVE-2020-12654", "url": "https://bugzilla.suse.com/1171252" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-18T09:17:44Z", "details": "important" } ], "title": "CVE-2020-12654" }, { "cve": "CVE-2020-12655", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12655" } ], "notes": [ { "category": "general", "text": "An issue was discovered in xfs_agf_verify in fs/xfs/libxfs/xfs_alloc.c in the Linux kernel through 5.6.10. Attackers may trigger a sync of excessive duration via an XFS v5 image with crafted metadata, aka CID-d0c7feaf8767.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12655", "url": "https://www.suse.com/security/cve/CVE-2020-12655" }, { "category": "external", "summary": "SUSE Bug 1171217 for CVE-2020-12655", "url": "https://bugzilla.suse.com/1171217" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.8, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-18T09:17:44Z", "details": "moderate" } ], "title": "CVE-2020-12655" }, { "cve": "CVE-2020-12656", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12656" } ], "notes": [ { "category": "general", "text": "gss_mech_free in net/sunrpc/auth_gss/gss_mech_switch.c in the rpcsec_gss_krb5 implementation in the Linux kernel through 5.6.10 lacks certain domain_release calls, leading to a memory leak. Note: This was disputed with the assertion that the issue does not grant any access not already available. It is a problem that on unloading a specific kernel module some memory is leaked, but loading kernel modules is a privileged operation. A user could also write a kernel module to consume any amount of memory they like and load that replicating the effect of this bug", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12656", "url": "https://www.suse.com/security/cve/CVE-2020-12656" }, { "category": "external", "summary": "SUSE Bug 1171219 for CVE-2020-12656", "url": "https://bugzilla.suse.com/1171219" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.9, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-18T09:17:44Z", "details": "low" } ], "title": "CVE-2020-12656" }, { "cve": "CVE-2020-12657", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12657" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.6.5. There is a use-after-free in block/bfq-iosched.c related to bfq_idle_slice_timer_body.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12657", "url": "https://www.suse.com/security/cve/CVE-2020-12657" }, { "category": "external", "summary": "SUSE Bug 1171205 for CVE-2020-12657", "url": "https://bugzilla.suse.com/1171205" }, { "category": "external", "summary": "SUSE Bug 1201585 for CVE-2020-12657", "url": "https://bugzilla.suse.com/1201585" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-18T09:17:44Z", "details": "important" } ], "title": "CVE-2020-12657" }, { "cve": "CVE-2020-12769", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12769" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.4.17. drivers/spi/spi-dw.c allows attackers to cause a panic via concurrent calls to dw_spi_irq and dw_spi_transfer_one, aka CID-19b61392c5a8.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12769", "url": "https://www.suse.com/security/cve/CVE-2020-12769" }, { "category": "external", "summary": "SUSE Bug 1171983 for CVE-2020-12769", "url": "https://bugzilla.suse.com/1171983" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-18T09:17:44Z", "details": "moderate" } ], "title": "CVE-2020-12769" }, { "cve": "CVE-2020-13143", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-13143" } ], "notes": [ { "category": "general", "text": "gadget_dev_desc_UDC_store in drivers/usb/gadget/configfs.c in the Linux kernel 3.16 through 5.6.13 relies on kstrdup without considering the possibility of an internal \u0027\\0\u0027 value, which allows attackers to trigger an out-of-bounds read, aka CID-15753588bcd4.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-13143", "url": "https://www.suse.com/security/cve/CVE-2020-13143" }, { "category": "external", "summary": "SUSE Bug 1171982 for CVE-2020-13143", "url": "https://bugzilla.suse.com/1171982" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-18T09:17:44Z", "details": "moderate" } ], "title": "CVE-2020-13143" }, { "cve": "CVE-2020-2732", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-2732" } ], "notes": [ { "category": "general", "text": "A flaw was discovered in the way that the KVM hypervisor handled instruction emulation for an L2 guest when nested virtualisation is enabled. Under some circumstances, an L2 guest may trick the L0 guest into accessing sensitive L1 resources that should be inaccessible to the L2 guest.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-2732", "url": "https://www.suse.com/security/cve/CVE-2020-2732" }, { "category": "external", "summary": "SUSE Bug 1163971 for CVE-2020-2732", "url": "https://bugzilla.suse.com/1163971" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.2, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-18T09:17:44Z", "details": "moderate" } ], "title": "CVE-2020-2732" }, { "cve": "CVE-2020-7053", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-7053" } ], "notes": [ { "category": "general", "text": "In the Linux kernel 4.14 longterm through 4.14.165 and 4.19 longterm through 4.19.96 (and 5.x before 5.2), there is a use-after-free (write) in the i915_ppgtt_close function in drivers/gpu/drm/i915/i915_gem_gtt.c, aka CID-7dc40713618c. This is related to i915_gem_context_destroy_ioctl in drivers/gpu/drm/i915/i915_gem_context.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-7053", "url": "https://www.suse.com/security/cve/CVE-2020-7053" }, { "category": "external", "summary": "SUSE Bug 1160966 for CVE-2020-7053", "url": "https://bugzilla.suse.com/1160966" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-18T09:17:44Z", "details": "moderate" } ], "title": "CVE-2020-7053" }, { "cve": "CVE-2020-8428", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-8428" } ], "notes": [ { "category": "general", "text": "fs/namei.c in the Linux kernel before 5.5 has a may_create_in_sticky use-after-free, which allows local users to cause a denial of service (OOPS) or possibly obtain sensitive information from kernel memory, aka CID-d0cb50185ae9. One attack vector may be an open system call for a UNIX domain socket, if the socket is being moved to a new parent directory and its old parent directory is being removed.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-8428", "url": "https://www.suse.com/security/cve/CVE-2020-8428" }, { "category": "external", "summary": "SUSE Bug 1162109 for CVE-2020-8428", "url": "https://bugzilla.suse.com/1162109" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-18T09:17:44Z", "details": "moderate" } ], "title": "CVE-2020-8428" }, { "cve": "CVE-2020-8647", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-8647" } ], "notes": [ { "category": "general", "text": "There is a use-after-free vulnerability in the Linux kernel through 5.5.2 in the vc_do_resize function in drivers/tty/vt/vt.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-8647", "url": "https://www.suse.com/security/cve/CVE-2020-8647" }, { "category": "external", "summary": "SUSE Bug 1162929 for CVE-2020-8647", "url": "https://bugzilla.suse.com/1162929" }, { "category": "external", "summary": "SUSE Bug 1164078 for CVE-2020-8647", "url": "https://bugzilla.suse.com/1164078" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-18T09:17:44Z", "details": "moderate" } ], "title": "CVE-2020-8647" }, { "cve": "CVE-2020-8648", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-8648" } ], "notes": [ { "category": "general", "text": "There is a use-after-free vulnerability in the Linux kernel through 5.5.2 in the n_tty_receive_buf_common function in drivers/tty/n_tty.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-8648", "url": "https://www.suse.com/security/cve/CVE-2020-8648" }, { "category": "external", "summary": "SUSE Bug 1162928 for CVE-2020-8648", "url": "https://bugzilla.suse.com/1162928" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-18T09:17:44Z", "details": "moderate" } ], "title": "CVE-2020-8648" }, { "cve": "CVE-2020-8649", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-8649" } ], "notes": [ { "category": "general", "text": "There is a use-after-free vulnerability in the Linux kernel through 5.5.2 in the vgacon_invert_region function in drivers/video/console/vgacon.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-8649", "url": "https://www.suse.com/security/cve/CVE-2020-8649" }, { "category": "external", "summary": "SUSE Bug 1162929 for CVE-2020-8649", "url": "https://bugzilla.suse.com/1162929" }, { "category": "external", "summary": "SUSE Bug 1162931 for CVE-2020-8649", "url": "https://bugzilla.suse.com/1162931" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-18T09:17:44Z", "details": "moderate" } ], "title": "CVE-2020-8649" }, { "cve": "CVE-2020-8834", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-8834" } ], "notes": [ { "category": "general", "text": "KVM in the Linux kernel on Power8 processors has a conflicting use of HSTATE_HOST_R1 to store r1 state in kvmppc_hv_entry plus in kvmppc_{save,restore}_tm, leading to a stack corruption. Because of this, an attacker with the ability run code in kernel space of a guest VM can cause the host kernel to panic. There were two commits that, according to the reporter, introduced the vulnerability: f024ee098476 (\"KVM: PPC: Book3S HV: Pull out TM state save/restore into separate procedures\") 87a11bb6a7f7 (\"KVM: PPC: Book3S HV: Work around XER[SO] bug in fake suspend mode\") The former landed in 4.8, the latter in 4.17. This was fixed without realizing the impact in 4.18 with the following three commits, though it\u0027s believed the first is the only strictly necessary commit: 6f597c6b63b6 (\"KVM: PPC: Book3S PR: Add guest MSR parameter for kvmppc_save_tm()/kvmppc_restore_tm()\") 7b0e827c6970 (\"KVM: PPC: Book3S HV: Factor fake-suspend handling out of kvmppc_save/restore_tm\") 009c872a8bc4 (\"KVM: PPC: Book3S PR: Move kvmppc_save_tm/kvmppc_restore_tm to separate file\")", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-8834", "url": "https://www.suse.com/security/cve/CVE-2020-8834" }, { "category": "external", "summary": "SUSE Bug 1168276 for CVE-2020-8834", "url": "https://bugzilla.suse.com/1168276" }, { "category": "external", "summary": "SUSE Bug 1173945 for CVE-2020-8834", "url": "https://bugzilla.suse.com/1173945" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-18T09:17:44Z", "details": "important" } ], "title": "CVE-2020-8834" }, { "cve": "CVE-2020-8992", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-8992" } ], "notes": [ { "category": "general", "text": "ext4_protect_reserved_inode in fs/ext4/block_validity.c in the Linux kernel through 5.5.3 allows attackers to cause a denial of service (soft lockup) via a crafted journal size.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-8992", "url": "https://www.suse.com/security/cve/CVE-2020-8992" }, { "category": "external", "summary": "SUSE Bug 1164069 for CVE-2020-8992", "url": "https://bugzilla.suse.com/1164069" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-18T09:17:44Z", "details": "low" } ], "title": "CVE-2020-8992" }, { "cve": "CVE-2020-9383", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-9383" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel 3.16 through 5.5.6. set_fdc in drivers/block/floppy.c leads to a wait_til_ready out-of-bounds read because the FDC index is not checked for errors before assigning it, aka CID-2e90ca68b0d2.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-9383", "url": "https://www.suse.com/security/cve/CVE-2020-9383" }, { "category": "external", "summary": "SUSE Bug 1165111 for CVE-2020-9383", "url": "https://bugzilla.suse.com/1165111" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-18T09:17:44Z", "details": "moderate" } ], "title": "CVE-2020-9383" } ] }
suse-su-2020:1599-1
Vulnerability from csaf_suse
Published
2020-06-10 09:12
Modified
2020-06-10 09:12
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 15 SP1 kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2020-0543: Fixed a side channel attack against special registers which could have resulted in leaking of read values to cores other than the one which called it.
This attack is known as Special Register Buffer Data Sampling (SRBDS) or 'CrossTalk' (bsc#1154824).
- CVE-2020-13143: Fixed an out-of-bounds read in gadget_dev_desc_UDC_store in drivers/usb/gadget/configfs.c (bsc#1171982).
- CVE-2020-12769: Fixed an issue which could have allowed attackers to cause a panic via concurrent calls to dw_spi_irq and dw_spi_transfer_one (bsc#1171983).
- CVE-2020-12768: Fixed a memory leak in svm_cpu_uninit in arch/x86/kvm/svm.c (bsc#1171736).
- CVE-2020-12659: Fixed an out-of-bounds write (by a user with the CAP_NET_ADMIN capability) due to improper headroom validation (bsc#1171214).
- CVE-2020-12657: An a use-after-free in block/bfq-iosched.c (bsc#1171205).
- CVE-2020-12656: Fixed an improper handling of certain domain_release calls leadingch could have led to a memory leak (bsc#1171219).
- CVE-2020-12655: Fixed an issue which could have allowed attackers to trigger a sync of excessive duration via an XFS v5 image with crafted metadata (bsc#1171217).
- CVE-2020-12654: Fixed an issue in he wifi driver which could have allowed a remote AP to trigger a heap-based buffer overflow (bsc#1171202).
- CVE-2020-12653: Fixed an issue in the wifi driver which could have allowed local users to gain privileges or cause a denial of service (bsc#1171195).
- CVE-2020-12652: Fixed an issue which could have allowed local users to hold an incorrect lock during the ioctl operation and trigger a race condition (bsc#1171218).
- CVE-2020-12464: Fixed a use-after-free due to a transfer without a reference (bsc#1170901).
- CVE-2020-12114: Fixed a pivot_root race condition which could have allowed local users to cause a denial of service (panic) by corrupting a mountpoint reference counter (bsc#1171098).
- CVE-2020-10757: Fixed an issue where remaping hugepage DAX to anon mmap could have caused user PTE access (bsc#1172317).
- CVE-2020-10751: Fixed an improper implementation in SELinux LSM hook where it was assumed that an skb would only contain a single netlink message (bsc#1171189).
- CVE-2020-10732: Fixed kernel data leak in userspace coredumps due to uninitialized data (bsc#1171220).
- CVE-2020-10720: Fixed a use-after-free read in napi_gro_frags() (bsc#1170778).
- CVE-2020-10711: Fixed a null pointer dereference in SELinux subsystem which could have allowed a remote network user to crash the kernel resulting in a denial of service (bsc#1171191).
- CVE-2020-10690: Fixed the race between the release of ptp_clock and cdev (bsc#1170056).
- CVE-2019-9455: Fixed a pointer leak due to a WARN_ON statement in a video driver. This could lead to local information disclosure with System execution privileges needed (bsc#1170345).
- CVE-2019-20812: Fixed an issue in prb_calc_retire_blk_tmo() which could have resulted in a denial of service (bsc#1172453).
- CVE-2019-20806: Fixed a null pointer dereference which may had lead to denial of service (bsc#1172199).
- CVE-2019-19462: Fixed an issue which could have allowed local user to cause denial of service (bsc#1158265).
- CVE-2018-1000199: Fixed a potential local code execution via ptrace (bsc#1089895)
The following non-security bugs were fixed:
- ACPI: CPPC: Fix reference count leak in acpi_cppc_processor_probe() (bsc#1051510).
- ACPI: sysfs: Fix reference count leak in acpi_sysfs_add_hotplug_profile() (bsc#1051510).
- acpi/x86: ignore unspecified bit positions in the ACPI global lock field (bsc#1051510).
- Add br_netfilter to kernel-default-base (bsc#1169020)
- Add commit for git-fix that's not a fix This commit cleans up debug code but does not fix anything, and it relies on a new kernel function that isn't yet in this version of SLE.
- agp/intel: Reinforce the barrier after GTT updates (bsc#1051510).
- ALSA: ctxfi: Remove unnecessary cast in kfree (bsc#1051510).
- ALSA: doc: Document PC Beep Hidden Register on Realtek ALC256 (bsc#1051510).
- ALSA: dummy: Fix PCM format loop in proc output (bsc#1111666).
- ALSA: hda: Add driver blacklist (bsc#1051510).
- ALSA: hda: Always use jackpoll helper for jack update after resume (bsc#1051510).
- ALSA: hda: call runtime_allow() for all hda controllers (bsc#1051510).
- ALSA: hda: Do not release card at firmware loading error (bsc#1051510).
- ALSA: hda: Explicitly permit using autosuspend if runtime PM is supported (bsc#1051510).
- ALSA: hda/hdmi: fix race in monitor detection during probe (bsc#1051510).
- ALSA: hda/hdmi: fix without unlocked before return (bsc#1051510).
- ALSA: hda: Honor PM disablement in PM freeze and thaw_noirq ops (bsc#1051510).
- ALSA: hda: Keep the controller initialization even if no codecs found (bsc#1051510).
- ALSA: hda: Match both PCI ID and SSID for driver blacklist (bsc#1111666).
- ALSA: hda/realtek - Add a model for Thinkpad T570 without DAC workaround (bsc#1172017).
- ALSA: hda/realtek - Add COEF workaround for ASUS ZenBook UX431DA (git-fixes).
- ALSA: hda/realtek - Add HP new mute led supported for ALC236 (git-fixes).
- ALSA: hda/realtek - Add more fixup entries for Clevo machines (git-fixes).
- ALSA: hda/realtek - Add new codec supported for ALC245 (bsc#1051510).
- ALSA: hda/realtek - Add new codec supported for ALC287 (git-fixes).
- ALSA: hda/realtek: Add quirk for Samsung Notebook (git-fixes).
- ALSA: hda/realtek - Add supported new mute Led for HP (git-fixes).
- ALSA: hda/realtek - Enable headset mic of ASUS GL503VM with ALC295 (git-fixes).
- ALSA: hda/realtek - Enable headset mic of ASUS UX550GE with ALC295 (git-fixes).
- ALSA: hda/realtek: Enable headset mic of ASUS UX581LV with ALC295 (git-fixes).
- ALSA: hda/realtek - Enable the headset mic on Asus FX505DT (bsc#1051510).
- ALSA: hda/realtek - Fix S3 pop noise on Dell Wyse (git-fixes).
- ALSA: hda/realtek - Fix silent output on Gigabyte X570 Aorus Xtreme (bsc#1111666).
- ALSA: hda/realtek - Fix unexpected init_amp override (bsc#1051510).
- ALSA: hda/realtek - Limit int mic boost for Thinkpad T530 (git-fixes bsc#1171293).
- ALSA: hda/realtek - Two front mics on a Lenovo ThinkCenter (bsc#1051510).
- ALSA: hda: Release resources at error in delayed probe (bsc#1051510).
- ALSA: hda: Remove ASUS ROG Zenith from the blacklist (bsc#1051510).
- ALSA: hda: Skip controller resume if not needed (bsc#1051510).
- ALSA: hwdep: fix a left shifting 1 by 31 UB bug (git-fixes).
- ALSA: iec1712: Initialize STDSP24 properly when using the model=staudio option (git-fixes).
- ALSA: opti9xx: shut up gcc-10 range warning (bsc#1051510).
- ALSA: pcm: fix incorrect hw_base increase (git-fixes).
- ALSA: pcm: oss: Place the plugin buffer overflow checks correctly (bsc#1170522).
- ALSA: rawmidi: Fix racy buffer resize under concurrent accesses (git-fixes).
- ALSA: usb-audio: Add connector notifier delegation (bsc#1051510).
- ALSA: usb-audio: Add control message quirk delay for Kingston HyperX headset (git-fixes).
- ALSA: usb-audio: add mapping for ASRock TRX40 Creator (git-fixes).
- ALSA: usb-audio: Add mixer workaround for TRX40 and co (bsc#1051510).
- ALSA: usb-audio: Add quirk for Focusrite Scarlett 2i2 (bsc#1051510).
- ALSA: usb-audio: Add static mapping table for ALC1220-VB-based mobos (bsc#1051510).
- ALSA: usb-audio: Apply async workaround for Scarlett 2i4 2nd gen (bsc#1051510).
- ALSA: usb-audio: Check mapping at creating connector controls, too (bsc#1051510).
- ALSA: usb-audio: Correct a typo of NuPrime DAC-10 USB ID (bsc#1051510).
- ALSA: usb-audio: Do not create jack controls for PCM terminals (bsc#1051510).
- ALSA: usb-audio: Do not override ignore_ctl_error value from the map (bsc#1051510).
- ALSA: usb-audio: Filter error from connector kctl ops, too (bsc#1051510).
- ALSA: usb-audio: Fix usb audio refcnt leak when getting spdif (bsc#1051510).
- ALSA: usb-audio: mixer: volume quirk for ESS Technology Asus USB DAC (git-fixes).
- ALSA: usb-audio: Quirks for Gigabyte TRX40 Aorus Master onboard audio (git-fixes).
- ALSA: usx2y: Fix potential NULL dereference (bsc#1051510).
- ASoC: codecs: hdac_hdmi: Fix incorrect use of list_for_each_entry (bsc#1051510).
- ASoC: dapm: connect virtual mux with default value (bsc#1051510).
- ASoC: dapm: fixup dapm kcontrol widget (bsc#1051510).
- ASoC: dpcm: allow start or stop during pause for backend (bsc#1051510).
- ASoC: fix regwmask (bsc#1051510).
- ASoC: msm8916-wcd-digital: Reset RX interpolation path after use (bsc#1051510).
- ASoC: samsung: Prevent clk_get_rate() calls in atomic context (bsc#1111666).
- ASoC: topology: Check return value of pcm_new_ver (bsc#1051510).
- ASoC: topology: use name_prefix for new kcontrol (bsc#1051510).
- b43legacy: Fix case where channel status is corrupted (bsc#1051510).
- batman-adv: fix batadv_nc_random_weight_tq (git-fixes).
- batman-adv: Fix refcnt leak in batadv_show_throughput_override (git-fixes).
- batman-adv: Fix refcnt leak in batadv_store_throughput_override (git-fixes).
- batman-adv: Fix refcnt leak in batadv_v_ogm_process (git-fixes).
- bcache: avoid unnecessary btree nodes flushing in btree_flush_write() (git fixes (block drivers)).
- bcache: fix incorrect data type usage in btree_flush_write() (git fixes (block drivers)).
- bcache: Revert 'bcache: shrink btree node cache after bch_btree_check()' (git fixes (block drivers)).
- blk-mq: honor IO scheduler for multiqueue devices (bsc#1165478).
- blk-mq: simplify blk_mq_make_request() (bsc#1165478).
- block/drbd: delete invalid function drbd_md_mark_dirty_ (bsc#1171527).
- block: drbd: remove a stray unlock in __drbd_send_protocol() (bsc#1171599).
- block: fix busy device checking in blk_drop_partitions again (bsc#1171948).
- block: fix busy device checking in blk_drop_partitions (bsc#1171948).
- block: fix memleak of bio integrity data (git fixes (block drivers)).
- block: remove the bd_openers checks in blk_drop_partitions (bsc#1171948).
- bnxt_en: fix memory leaks in bnxt_dcbnl_ieee_getets() (networking-stable-20_03_28).
- bnxt_en: Reduce BNXT_MSIX_VEC_MAX value to supported CQs per PF (bsc#1104745).
- bnxt_en: reinitialize IRQs when MTU is modified (networking-stable-20_03_14).
- bnxt_en: Return error if bnxt_alloc_ctx_mem() fails (bsc#1104745 ).
- bnxt_en: Return error when allocating zero size context memory (bsc#1104745).
- bonding/alb: make sure arp header is pulled before accessing it (networking-stable-20_03_14).
- bpf: Fix sk_psock refcnt leak when receiving message (bsc#1083647).
- bpf: Forbid XADD on spilled pointers for unprivileged users (bsc#1083647).
- brcmfmac: abort and release host after error (bsc#1051510).
- BTRFS: fix deadlock with memory reclaim during scrub (bsc#1172127).
- BTRFS: fix log context list corruption after rename whiteout error (bsc#1172342).
- BTRFS: fix partial loss of prealloc extent past i_size after fsync (bsc#1172343).
- BTRFS: relocation: add error injection points for cancelling balance (bsc#1171417).
- BTRFS: relocation: Check cancel request after each data page read (bsc#1171417).
- BTRFS: relocation: Check cancel request after each extent found (bsc#1171417).
- BTRFS: relocation: Clear the DEAD_RELOC_TREE bit for orphan roots to prevent runaway balance (bsc#1171417).
- BTRFS: relocation: Fix reloc root leakage and the NULL pointer reference caused by the leakage (bsc#1171417).
- BTRFS: relocation: Work around dead relocation stage loop (bsc#1171417).
- BTRFS: reloc: clear DEAD_RELOC_TREE bit for orphan roots to prevent runaway balance (bsc#1171417 bsc#1160947 bsc#1172366).
- BTRFS: reloc: fix reloc root leak and NULL pointer dereference (bsc#1171417 bsc#1160947 bsc#1172366).
- BTRFS: setup a nofs context for memory allocation at btrfs_create_tree() (bsc#1172127).
- BTRFS: setup a nofs context for memory allocation at __btrfs_set_acl (bsc#1172127).
- BTRFS: use nofs context when initializing security xattrs to avoid deadlock (bsc#1172127).
- can: add missing attribute validation for termination (networking-stable-20_03_14).
- cdc-acm: close race betrween suspend() and acm_softint (git-fixes).
- cdc-acm: introduce a cool down (git-fixes).
- ceph: check if file lock exists before sending unlock request (bsc#1168789).
- ceph: demote quotarealm lookup warning to a debug message (bsc#1171692).
- ceph: fix double unlock in handle_cap_export() (bsc#1171694).
- ceph: fix endianness bug when handling MDS session feature bits (bsc#1171695).
- cgroup, netclassid: periodically release file_lock on classid updating (networking-stable-20_03_14).
- cifs: Allocate crypto structures on the fly for calculating signatures of incoming packets (bsc#1144333).
- cifs: Allocate encryption header through kmalloc (bsc#1144333).
- cifs: allow unlock flock and OFD lock across fork (bsc#1144333).
- cifs: check new file size when extending file by fallocate (bsc#1144333).
- cifs: cifspdu.h: Replace zero-length array with flexible-array member (bsc#1144333).
- cifs: clear PF_MEMALLOC before exiting demultiplex thread (bsc#1144333).
- cifs: do not share tcons with DFS (bsc#1144333).
- cifs: dump the session id and keys also for SMB2 sessions (bsc#1144333).
- cifs: ensure correct super block for DFS reconnect (bsc#1144333).
- cifs: Fix bug which the return value by asynchronous read is error (bsc#1144333).
- cifs: fix uninitialised lease_key in open_shroot() (bsc#1144333).
- cifs: improve read performance for page size 64KB & cache=strict & vers=2.1+ (bsc#1144333).
- cifs: Increment num_remote_opens stats counter even in case of smb2_query_dir_first (bsc#1144333).
- cifs: minor update to comments around the cifs_tcp_ses_lock mutex (bsc#1144333).
- cifs: protect updating server->dstaddr with a spinlock (bsc#1144333).
- cifs: smb2pdu.h: Replace zero-length array with flexible-array member (bsc#1144333).
- cifs: smbd: Calculate the correct maximum packet size for segmented SMBDirect send/receive (bsc#1144333).
- cifs: smbd: Check and extend sender credits in interrupt context (bsc#1144333).
- cifs: smbd: Check send queue size before posting a send (bsc#1144333).
- cifs: smbd: Do not schedule work to send immediate packet on every receive (bsc#1144333).
- cifs: smbd: Merge code to track pending packets (bsc#1144333).
- cifs: smbd: Properly process errors on ib_post_send (bsc#1144333).
- cifs: smbd: Update receive credits before sending and deal with credits roll back on failure before sending (bsc#1144333).
- cifs: Warn less noisily on default mount (bsc#1144333).
- clk: Add clk_hw_unregister_composite helper function definition (bsc#1051510).
- clk: imx6ull: use OSC clock during AXI rate change (bsc#1051510).
- clk: imx: make mux parent strings const (bsc#1051510).
- clk: mediatek: correct the clocks for MT2701 HDMI PHY module (bsc#1051510).
- clk: sunxi-ng: a64: Fix gate bit of DSI DPHY (bsc#1051510).
- clocksource/drivers/hyper-v: Set TSC clocksource as default w/ InvariantTSC (bsc#1170620, bsc#1170621).
- clocksource: dw_apb_timer_of: Fix missing clockevent timers (bsc#1051510).
- component: Silence bind error on -EPROBE_DEFER (bsc#1051510).
- coresight: do not use the BIT() macro in the UAPI header (git fixes (block drivers)).
- cpufreq: s3c64xx: Remove pointless NULL check in s3c64xx_cpufreq_driver_init (bsc#1051510).
- crypto: ccp - AES CFB mode is a stream cipher (git-fixes).
- crypto: ccp - Clean up and exit correctly on allocation failure (git-fixes).
- crypto: ccp - Cleanup misc_dev on sev_exit() (bsc#1114279).
- crypto: ccp - Cleanup sp_dev_master in psp_dev_destroy() (bsc#1114279).
- cxgb4: fix MPS index overwrite when setting MAC address (bsc#1127355).
- cxgb4: fix Txq restart check during backpressure (bsc#1127354 bsc#1127371).
- debugfs: Add debugfs_create_xul() for hexadecimal unsigned long (git-fixes).
- debugfs_lookup(): switch to lookup_one_len_unlocked() (bsc#1171979).
- devlink: fix return value after hitting end in region read (bsc#1109837).
- devlink: validate length of param values (bsc#1109837).
- devlink: validate length of region addr/len (bsc#1109837).
- dmaengine: dmatest: Fix iteration non-stop logic (bsc#1051510).
- dm mpath: switch paths in dm_blk_ioctl() code path (bsc#1167574).
- dm-raid1: fix invalid return value from dm_mirror (bsc#1172378).
- dm writecache: fix data corruption when reloading the target (git fixes (block drivers)).
- dm writecache: fix incorrect flush sequence when doing SSD mode commit (git fixes (block drivers)).
- dm writecache: verify watermark during resume (git fixes (block drivers)).
- dm zoned: fix invalid memory access (git fixes (block drivers)).
- dm zoned: reduce overhead of backing device checks (git fixes (block drivers)).
- dm zoned: remove duplicate nr_rnd_zones increase in dmz_init_zone() (git fixes (block drivers)).
- dm zoned: support zone sizes smaller than 128MiB (git fixes (block drivers)).
- dp83640: reverse arguments to list_add_tail (git-fixes).
- drivers: hv: Add a module description line to the hv_vmbus driver (bsc#1172249, bsc#1172251).
- drivers/net/ibmvnic: Update VNIC protocol version reporting (bsc#1065729).
- drivers: w1: add hwmon support structures (jsc#SLE-11048).
- drivers: w1: add hwmon temp support for w1_therm (jsc#SLE-11048).
- drivers: w1: refactor w1_slave_show to make the temp reading functionality separate (jsc#SLE-11048).
- drm: amd/acp: fix broken menu structure (bsc#1114279) * context changes
- drm/amdgpu: Correctly initialize thermal controller for GPUs with Powerplay table v0 (e.g Hawaii) (bsc#1111666).
- drm/amdgpu: Fix oops when pp_funcs is unset in ACPI event (bsc#1111666).
- drm/amd/powerplay: force the trim of the mclk dpm_levels if OD is (bsc#1113956)
- drm/atomic: Take the atomic toys away from X (bsc#1112178) * context changes
- drm/crc: Actually allow to change the crc source (bsc#1114279) * offset changes
- drm/dp_mst: Fix clearing payload state on topology disable (bsc#1051510).
- drm/dp_mst: Reformat drm_dp_check_act_status() a bit (bsc#1051510).
- drm/edid: Fix off-by-one in DispID DTD pixel clock (bsc#1114279)
- drm/etnaviv: fix perfmon domain interation (bsc#1113956)
- drm/etnaviv: rework perfmon query infrastructure (bsc#1112178)
- drm/i915: Apply Wa_1406680159:icl,ehl as an engine workaround (bsc#1112178) * rename gt/intel_workarounds.c to intel_workarounds.c * context changes
- drm/i915/gvt: Init DPLL/DDI vreg for virtual display instead of (bsc#1114279)
- drm/i915: HDCP: fix Ri prime check done during link check (bsc#1112178) * rename display/intel_hdmi.c to intel_hdmi.c * context changes
- drm/i915: properly sanity check batch_start_offset (bsc#1114279) * renamed display/intel_fbc.c -> intel_fb.c * renamed gt/intel_rc6.c -> intel_pm.c * context changes
- drm/meson: Delete an error message in meson_dw_hdmi_bind() (bsc#1051510).
- drm: NULL pointer dereference [null-pointer-deref] (CWE 476) problem (bsc#1114279)
- drm/qxl: qxl_release leak in qxl_draw_dirty_fb() (bsc#1051510).
- drm/qxl: qxl_release leak in qxl_hw_surface_alloc() (bsc#1051510).
- drm/qxl: qxl_release use after free (bsc#1051510).
- drm: Remove PageReserved manipulation from drm_pci_alloc (bsc#1114279) * offset changes
- drm/sun4i: dsi: Allow binding the host without a panel (bsc#1113956)
- drm/sun4i: dsi: Avoid hotplug race with DRM driver bind (bsc#1113956)
- drm/sun4i: dsi: Remove incorrect use of runtime PM (bsc#1113956) * context changes
- drm/sun4i: dsi: Remove unused drv from driver context (bsc#1113956) * context changes * keep include of sun4i_drv.h
- dump_stack: avoid the livelock of the dump_lock (git fixes (block drivers)).
- EDAC, sb_edac: Add support for systems with segmented PCI buses (bsc#1169525).
- ext4: do not zeroout extents beyond i_disksize (bsc#1167851).
- ext4: fix extent_status fragmentation for plain files (bsc#1171949).
- ext4: use non-movable memory for superblock readahead (bsc#1171952).
- fanotify: fix merging marks masks with FAN_ONDIR (bsc#1171679).
- fbcon: fix null-ptr-deref in fbcon_switch (bsc#1114279) * rename drivers/video/fbdev/core to drivers/video/console * context changes
- fib: add missing attribute validation for tun_id (networking-stable-20_03_14).
- firmware: qcom: scm: fix compilation error when disabled (bsc#1051510).
- fs/cifs: fix gcc warning in sid_to_id (bsc#1144333).
- fs/seq_file.c: simplify seq_file iteration code and interface (bsc#1170125).
- gpio: tegra: mask GPIO IRQs during IRQ shutdown (bsc#1051510).
- gre: fix uninit-value in __iptunnel_pull_header (networking-stable-20_03_14).
- HID: hid-input: clear unmapped usages (git-fixes).
- HID: Hyper-V: Add a module description line (bsc#1172249, bsc#1172251).
- HID: i2c-hid: add Trekstor Primebook C11B to descriptor override (git-fixes).
- HID: i2c-hid: override HID descriptors for certain devices (git-fixes).
- HID: multitouch: add eGalaxTouch P80H84 support (bsc#1051510).
- HID: wacom: Read HID_DG_CONTACTMAX directly for non-generic devices (git-fixes).
- hrtimer: Annotate lockless access to timer->state (git fixes (block drivers)).
- hsr: add restart routine into hsr_get_node_list() (networking-stable-20_03_28).
- hsr: check protocol version in hsr_newlink() (networking-stable-20_04_17).
- hsr: fix general protection fault in hsr_addr_is_self() (networking-stable-20_03_28).
- hsr: set .netnsok flag (networking-stable-20_03_28).
- hsr: use rcu_read_lock() in hsr_get_node_{list/status}() (networking-stable-20_03_28).
- i2c: acpi: Force bus speed to 400KHz if a Silead touchscreen is present (git-fixes).
- i2c: acpi: put device when verifying client fails (git-fixes).
- i2c: brcmstb: remove unused struct member (git-fixes).
- i2c: core: Allow empty id_table in ACPI case as well (git-fixes).
- i2c: core: decrease reference count of device node in i2c_unregister_device (git-fixes).
- i2c: dev: Fix the race between the release of i2c_dev and cdev (bsc#1051510).
- i2c: fix missing pm_runtime_put_sync in i2c_device_probe (git-fixes).
- i2c-hid: properly terminate i2c_hid_dmi_desc_override_table array (git-fixes).
- i2c: i801: Do not add ICH_RES_IO_SMI for the iTCO_wdt device (git-fixes).
- i2c: iproc: Stop advertising support of SMBUS quick cmd (git-fixes).
- i2c: isch: Remove unnecessary acpi.h include (git-fixes).
- i2c: mux: demux-pinctrl: Fix an error handling path in 'i2c_demux_pinctrl_probe()' (bsc#1051510).
- i2c: st: fix missing struct parameter description (bsc#1051510).
- IB/mlx5: Fix missing congestion control debugfs on rep rdma device (bsc#1103991).
- ibmvnic: Skip fatal error reset after passive init (bsc#1171078 ltc#184239).
- iio:ad7797: Use correct attribute_group (bsc#1051510).
- iio: adc: stm32-adc: fix device used to request dma (bsc#1051510).
- iio: adc: stm32-adc: fix sleep in atomic context (git-fixes).
- iio: adc: stm32-adc: Use dma_request_chan() instead dma_request_slave_channel() (bsc#1051510).
- iio: dac: vf610: Fix an error handling path in 'vf610_dac_probe()' (bsc#1051510).
- iio: sca3000: Remove an erroneous 'get_device()' (bsc#1051510).
- iio: xilinx-xadc: Fix ADC-B powerdown (bsc#1051510).
- iio: xilinx-xadc: Fix clearing interrupt when enabling trigger (bsc#1051510).
- iio: xilinx-xadc: Fix sequencer configuration for aux channels in simultaneous mode (bsc#1051510).
- ima: Fix return value of ima_write_policy() (git-fixes).
- Input: evdev - call input_flush_device() on release(), not flush() (bsc#1051510).
- Input: hyperv-keyboard - add module description (bsc#1172249, bsc#1172251).
- Input: i8042 - add Acer Aspire 5738z to nomux list (bsc#1051510).
- Input: i8042 - add ThinkPad S230u to i8042 reset list (bsc#1051510).
- Input: raydium_i2c_ts - use true and false for boolean values (bsc#1051510).
- Input: synaptics-rmi4 - fix error return code in rmi_driver_probe() (bsc#1051510).
- Input: synaptics-rmi4 - really fix attn_data use-after-free (git-fixes).
- Input: usbtouchscreen - add support for BonXeon TP (bsc#1051510).
- Input: xpad - add custom init packet for Xbox One S controllers (bsc#1051510).
- iommu/amd: Call domain_flush_complete() in update_domain() (bsc#1172096).
- iommu/amd: Do not flush Device Table in iommu_map_page() (bsc#1172097).
- iommu/amd: Do not loop forever when trying to increase address space (bsc#1172098).
- iommu/amd: Fix legacy interrupt remapping for x2APIC-enabled system (bsc#1172099).
- iommu/amd: Fix over-read of ACPI UID from IVRS table (bsc#1172101).
- iommu/amd: Fix race in increase_address_space()/fetch_pte() (bsc#1172102).
- iommu/amd: Update Device Table in increase_address_space() (bsc#1172103).
- iommu: Fix reference count leak in iommu_group_alloc (bsc#1172397).
- ip6_tunnel: Allow rcv/xmit even if remote address is a local address (bsc#1166978).
- ipv4: fix a RCU-list lock in fib_triestat_seq_show (networking-stable-20_04_02).
- ipv6/addrconf: call ipv6_mc_up() for non-Ethernet interface (networking-stable-20_03_14).
- ipv6: do not auto-add link-local address to lag ports (networking-stable-20_04_09).
- ipv6: fix IPV6_ADDRFORM operation logic (bsc#1171662).
- ipv6: fix restrict IPV6_ADDRFORM operation (bsc#1171662).
- ipvlan: add cond_resched_rcu() while processing muticast backlog (networking-stable-20_03_14).
- ipvlan: do not deref eth hdr before checking it's set (networking-stable-20_03_14).
- ipvlan: do not use cond_resched_rcu() in ipvlan_process_multicast() (networking-stable-20_03_14).
- iwlwifi: pcie: actually release queue memory in TVQM (bsc#1051510).
- ixgbe: do not check firmware errors (bsc#1170284).
- kabi fix for early XHCI debug (git-fixes).
- kabi for for md: improve handling of bio with REQ_PREFLUSH in md_flush_request() (git-fixes).
- kabi/severities: Do not track KVM internal symbols.
- kabi/severities: Ingnore get_dev_data() The function is internal to the AMD IOMMU driver and must not be called by any third party.
- kabi workaround for snd_rawmidi buffer_ref field addition (git-fixes).
- KEYS: reaching the keys quotas correctly (bsc#1051510).
- KVM: arm64: Change hyp_panic()s dependency on tpidr_el2 (bsc#1133021).
- KVM: arm64: Stop save/restoring host tpidr_el1 on VHE (bsc#1133021).
- KVM: Check validity of resolved slot when searching memslots (bsc#1172104).
- KVM: s390: vsie: Fix delivery of addressing exceptions (git-fixes).
- KVM: SVM: Fix potential memory leak in svm_cpu_init() (bsc#1171736).
- KVM x86: Extend AMD specific guest behavior to Hygon virtual CPUs (bsc#1152489).
- l2tp: Allow management of tunnels and session in user namespace (networking-stable-20_04_17).
- libata: Remove extra scsi_host_put() in ata_scsi_add_hosts() (bsc#1051510).
- libata: Return correct status in sata_pmp_eh_recover_pm() when ATA_DFLAG_DETACH is set (bsc#1051510).
- lib: raid6: fix awk build warnings (git fixes (block drivers)).
- lib/raid6/test: fix build on distros whose /bin/sh is not bash (git fixes (block drivers)).
- lib/stackdepot.c: fix global out-of-bounds in stack_slabs (git fixes (block drivers)).
- locks: print unsigned ino in /proc/locks (bsc#1171951).
- mac80211: add ieee80211_is_any_nullfunc() (bsc#1051510).
- mac80211_hwsim: Use kstrndup() in place of kasprintf() (bsc#1051510).
- mac80211: mesh: fix discovery timer re-arming issue / crash (bsc#1051510).
- macsec: avoid to set wrong mtu (bsc#1051510).
- macsec: restrict to ethernet devices (networking-stable-20_03_28).
- macvlan: add cond_resched() during multicast processing (networking-stable-20_03_14).
- macvlan: fix null dereference in macvlan_device_event() (bsc#1051510).
- md: improve handling of bio with REQ_PREFLUSH in md_flush_request() (git-fixes).
- md/raid0: Fix an error message in raid0_make_request() (git fixes (block drivers)).
- md/raid10: prevent access of uninitialized resync_pages offset (git-fixes).
- media: dvb: return -EREMOTEIO on i2c transfer failure (bsc#1051510).
- media: platform: fcp: Set appropriate DMA parameters (bsc#1051510).
- media: ti-vpe: cal: fix disable_irqs to only the intended target (git-fixes).
- mei: release me_cl object reference (bsc#1051510).
- mlxsw: Fix some IS_ERR() vs NULL bugs (networking-stable-20_04_27).
- mlxsw: spectrum_flower: Do not stop at FLOW_ACTION_VLAN_MANGLE (networking-stable-20_04_09).
- mlxsw: spectrum_mr: Fix list iteration in error path (bsc#1112374).
- mmc: atmel-mci: Fix debugfs on 64-bit platforms (git-fixes).
- mmc: core: Check request type before completing the request (git-fixes).
- mmc: core: Fix recursive locking issue in CQE recovery path (git-fixes).
- mmc: cqhci: Avoid false 'cqhci: CQE stuck on' by not open-coding timeout loop (git-fixes).
- mmc: dw_mmc: Fix debugfs on 64-bit platforms (git-fixes).
- mmc: meson-gx: make sure the descriptor is stopped on errors (git-fixes).
- mmc: meson-gx: simplify interrupt handler (git-fixes).
- mmc: renesas_sdhi: limit block count to 16 bit for old revisions (git-fixes).
- mmc: sdhci-esdhc-imx: fix the mask for tuning start point (bsc#1051510).
- mmc: sdhci-msm: Clear tuning done flag while hs400 tuning (bsc#1051510).
- mmc: sdhci-of-at91: fix memleak on clk_get failure (git-fixes).
- mmc: sdhci-pci: Fix eMMC driver strength for BYT-based controllers (bsc#1051510).
- mmc: sdhci-xenon: fix annoying 1.8V regulator warning (bsc#1051510).
- mmc: sdio: Fix potential NULL pointer error in mmc_sdio_init_card() (bsc#1051510).
- mmc: tmio: fix access width of Block Count Register (git-fixes).
- mm: limit boost_watermark on small zones (git fixes (mm/pgalloc)).
- mm: thp: handle page cache THP correctly in PageTransCompoundMap (git fixes (block drivers)).
- mtd: cfi: fix deadloop in cfi_cmdset_0002.c do_write_buffer (bsc#1051510).
- mtd: spi-nor: cadence-quadspi: add a delay in write sequence (git-fixes).
- mtd: spi-nor: enable 4B opcodes for mx66l51235l (git-fixes).
- mwifiex: avoid -Wstringop-overflow warning (bsc#1051510).
- mwifiex: Fix memory corruption in dump_station (bsc#1051510).
- net: bcmgenet: correct per TX/RX ring statistics (networking-stable-20_04_27).
- net: dsa: b53: Fix ARL register definitions (networking-stable-20_04_27).
- net: dsa: b53: Rework ARL bin logic (networking-stable-20_04_27).
- net: dsa: bcm_sf2: Do not register slave MDIO bus with OF (networking-stable-20_04_09).
- net: dsa: bcm_sf2: Ensure correct sub-node is parsed (networking-stable-20_04_09).
- net: dsa: Fix duplicate frames flooded by learning (networking-stable-20_03_28).
- net: dsa: mv88e6xxx: fix lockup on warm boot (networking-stable-20_03_14).
- net/ethernet: add Google GVE driver (jsc#SLE-10538)
- net: fec: add phy_reset_after_clk_enable() support (git-fixes).
- net: fec: validate the new settings in fec_enet_set_coalesce() (networking-stable-20_03_14).
- net: fix race condition in __inet_lookup_established() (bsc#1151794).
- net: fq: add missing attribute validation for orphan mask (networking-stable-20_03_14).
- net: hns3: fix 'tc qdisc del' failed issue (bsc#1109837).
- net, ip_tunnel: fix interface lookup with no key (networking-stable-20_04_02).
- net: ipv4: devinet: Fix crash when add/del multicast IP with autojoin (networking-stable-20_04_17).
- net: ipv6: do not consider routes via gateways for anycast address check (networking-stable-20_04_17).
- netlink: Use netlink header as base to calculate bad attribute offset (networking-stable-20_03_14).
- net: macsec: update SCI upon MAC address change (networking-stable-20_03_14).
- net: memcg: fix lockdep splat in inet_csk_accept() (networking-stable-20_03_14).
- net: memcg: late association of sock to memcg (networking-stable-20_03_14).
- net/mlx4_en: avoid indirect call in TX completion (networking-stable-20_04_27).
- net/mlx5: Add new fields to Port Type and Speed register (bsc#1171118).
- net/mlx5: Expose link speed directly (bsc#1171118).
- net/mlx5: Expose port speed when possible (bsc#1171118).
- net/mlx5: Fix failing fw tracer allocation on s390 (bsc#1103990 ).
- net: mvneta: Fix the case where the last poll did not process all rx (networking-stable-20_03_28).
- net: netrom: Fix potential nr_neigh refcnt leak in nr_add_node (networking-stable-20_04_27).
- net/packet: tpacket_rcv: do not increment ring index on drop (networking-stable-20_03_14).
- net: qmi_wwan: add support for ASKEY WWHC050 (networking-stable-20_03_28).
- net: revert default NAPI poll timeout to 2 jiffies (networking-stable-20_04_17).
- net_sched: cls_route: remove the right filter from hashtable (networking-stable-20_03_28).
- net_sched: sch_skbprio: add message validation to skbprio_change() (bsc#1109837).
- net/x25: Fix x25_neigh refcnt leak when receiving frame (networking-stable-20_04_27).
- nfc: add missing attribute validation for SE API (networking-stable-20_03_14).
- nfc: add missing attribute validation for vendor subcommand (networking-stable-20_03_14).
- nfc: st21nfca: add missed kfree_skb() in an error path (bsc#1051510).
- nfp: abm: fix a memory leak bug (bsc#1109837).
- nfsd4: fix up replay_matches_cache() (git-fixes).
- nfsd: Ensure CLONE persists data and metadata changes to the target file (git-fixes).
- nfsd: fix delay timer on 32-bit architectures (git-fixes).
- nfsd: fix jiffies/time_t mixup in LRU list (git-fixes).
- NFS: Directory page cache pages need to be locked when read (git-fixes).
- nfsd: memory corruption in nfsd4_lock() (git-fixes).
- NFS: Do not call generic_error_remove_page() while holding locks (bsc#1170457).
- NFS: Fix memory leaks and corruption in readdir (git-fixes).
- NFS: Fix O_DIRECT accounting of number of bytes read/written (git-fixes).
- NFS: Fix potential posix_acl refcnt leak in nfs3_set_acl (git-fixes).
- NFS: fix racey wait in nfs_set_open_stateid_locked (bsc#1170592).
- NFS/flexfiles: Use the correct TCP timeout for flexfiles I/O (git-fixes).
- NFS/pnfs: Fix pnfs_generic_prepare_to_resend_writes() (git-fixes).
- NFS: Revalidate the file size on a fatal write error (git-fixes).
- NFSv4.0: nfs4_do_fsinfo() should not do implicit lease renewals (git-fixes).
- NFSv4: Do not allow a cached open with a revoked delegation (git-fixes).
- NFSv4: Fix leak of clp->cl_acceptor string (git-fixes).
- NFSv4/pnfs: Return valid stateids in nfs_layout_find_inode_by_stateid() (git-fixes).
- NFSv4: try lease recovery on NFS4ERR_EXPIRED (git-fixes).
- NFSv4.x: Drop the slot if nfs4_delegreturn_prepare waits for layoutreturn (git-fixes).
- nl802154: add missing attribute validation for dev_type (networking-stable-20_03_14).
- nl802154: add missing attribute validation (networking-stable-20_03_14).
- nvme-fc: print proper nvme-fc devloss_tmo value (bsc#1172391).
- objtool: Fix stack offset tracking for indirect CFAs (bsc#1169514).
- objtool: Fix switch table detection in .text.unlikely (bsc#1169514).
- objtool: Make BP scratch register warning more robust (bsc#1169514).
- padata: Remove broken queue flushing (git-fixes).
- Partially revert 'kfifo: fix kfifo_alloc() and kfifo_init()' (git fixes (block drivers)).
- PCI: hv: Add support for protocol 1.3 and support PCI_BUS_RELATIONS2 (bsc#1172201, bsc#1172202).
- PCI: hv: Decouple the func definition in hv_dr_state from VSP message (bsc#1172201, bsc#1172202).
- pinctrl: baytrail: Enable pin configuration setting for GPIO chip (git-fixes).
- pinctrl: cherryview: Add missing spinlock usage in chv_gpio_irq_handler (git-fixes).
- pinctrl: sunrisepoint: Fix PAD lock register offset for SPT-H (git-fixes).
- platform/x86: asus-nb-wmi: Do not load on Asus T100TA and T200TA (bsc#1051510).
- pNFS: Ensure we do clear the return-on-close layout stateid on fatal errors (git-fixes).
- powerpc: Add attributes for setjmp/longjmp (bsc#1065729).
- powerpc/pci/of: Parse unassigned resources (bsc#1065729).
- powerpc/setup_64: Set cache-line-size based on cache-block-size (bsc#1065729).
- powerpc/sstep: Fix DS operand in ld encoding to appropriate value (bsc#1065729).
- r8152: check disconnect status after long sleep (networking-stable-20_03_14).
- raid6/ppc: Fix build for clang (git fixes (block drivers)).
- random: always use batched entropy for get_random_u{32,64} (bsc#1164871).
- rcu: locking and unlocking need to always be at least barriers (git fixes (block drivers)).
- Revert 'ALSA: hda/realtek: Fix pop noise on ALC225' (git-fixes).
- Revert 'drm/panel: simple: Add support for Sharp LQ150X1LG11 panels' (bsc#1114279) * offset changes
- Revert 'ipc,sem: remove uneeded sem_undo_list lock usage in exit_sem()' (bsc#1172221).
- Revert 'RDMA/cma: Simplify rdma_resolve_addr() error flow' (bsc#1103992).
- rtlwifi: Fix a double free in _rtl_usb_tx_urb_setup() (bsc#1051510).
- s390/cpum_cf: Add new extended counters for IBM z15 (bsc#1169762 LTC#185291).
- s390/ftrace: fix potential crashes when switching tracers (git-fixes).
- s390/ism: fix error return code in ism_probe() (git-fixes).
- s390/pci: do not set affinity for floating irqs (git-fixes).
- s390/pci: Fix possible deadlock in recover_store() (bsc#1165183 LTC#184103).
- s390/pci: Recover handle in clp_set_pci_fn() (bsc#1165183 LTC#184103).
- scripts/decodecode: fix trapping instruction formatting (bsc#1065729).
- scripts/dtc: Remove redundant YYLOC global declaration (bsc#1160388).
- scsi: bnx2i: fix potential use after free (bsc#1171600).
- scsi: core: Handle drivers which set sg_tablesize to zero (bsc#1171601) This commit also required: > scsi: core: avoid preallocating big SGL for data
- scsi: core: save/restore command resid for error handling (bsc#1171602).
- scsi: core: scsi_trace: Use get_unaligned_be*() (bsc#1171604).
- scsi: core: try to get module before removing device (bsc#1171605).
- scsi: csiostor: Adjust indentation in csio_device_reset (bsc#1171606).
- scsi: csiostor: Do not enable IRQs too early (bsc#1171607).
- scsi: esas2r: unlock on error in esas2r_nvram_read_direct() (bsc#1171608).
- scsi: fnic: fix invalid stack access (bsc#1171609).
- scsi: fnic: fix msix interrupt allocation (bsc#1171610).
- scsi: ibmvscsi: Fix WARN_ON during event pool release (bsc#1170791 ltc#185128).
- scsi: iscsi: Avoid potential deadlock in iscsi_if_rx func (bsc#1171611).
- scsi: iscsi: Fix a potential deadlock in the timeout handler (bsc#1171612).
- scsi: iscsi: qla4xxx: fix double free in probe (bsc#1171613).
- scsi: lpfc: Change default queue allocation for reduced memory consumption (bsc#1164780).
- scsi: lpfc: fix: Coverity: lpfc_cmpl_els_rsp(): Null pointer dereferences (bsc#1171614).
- scsi: lpfc: Fix crash in target side cable pulls hitting WAIT_FOR_UNREG (bsc#1171615).
- scsi: lpfc: Fix lpfc_nodelist leak when processing unsolicited event (bsc#1164780).
- scsi: lpfc: Fix MDS Diagnostic Enablement definition (bsc#1164780).
- scsi: lpfc: Fix negation of else clause in lpfc_prep_node_fc4type (bsc#1164780).
- scsi: lpfc: Fix noderef and address space warnings (bsc#1164780).
- scsi: lpfc: Maintain atomic consistency of queue_claimed flag (bsc#1164780).
- scsi: lpfc: remove duplicate unloading checks (bsc#1164780).
- scsi: lpfc: Remove re-binding of nvme rport during registration (bsc#1164780).
- scsi: lpfc: Remove redundant initialization to variable rc (bsc#1164780).
- scsi: lpfc: Remove unnecessary lockdep_assert_held calls (bsc#1164780).
- scsi: lpfc: Update lpfc version to 12.8.0.1 (bsc#1164780).
- scsi: megaraid_sas: Do not initiate OCR if controller is not in ready state (bsc#1171616).
- scsi: qla2xxx: add ring buffer for tracing debug logs (bsc#1157169).
- scsi: qla2xxx: check UNLOADING before posting async work (bsc#1157169).
- scsi: qla2xxx: Delete all sessions before unregister local nvme port (bsc#1157169).
- scsi: qla2xxx: Do not log message when reading port speed via sysfs (bsc#1157169).
- scsi: qla2xxx: Fix hang when issuing nvme disconnect-all in NPIV (bsc#1157169).
- scsi: qla2xxx: Fix regression warnings (bsc#1157169).
- scsi: qla2xxx: Remove non functional code (bsc#1157169).
- scsi: qla2xxx: set UNLOADING before waiting for session deletion (bsc#1157169).
- scsi: qla4xxx: Adjust indentation in qla4xxx_mem_free (bsc#1171617).
- scsi: qla4xxx: fix double free bug (bsc#1171618).
- scsi: sd: Clear sdkp->protection_type if disk is reformatted without PI (bsc#1171619).
- scsi: sg: add sg_remove_request in sg_common_write (bsc#1171620).
- scsi: tracing: Fix handling of TRANSFER LENGTH == 0 for READ(6) and WRITE(6) (bsc#1171621).
- scsi: ufs: change msleep to usleep_range (bsc#1171622).
- scsi: ufs: Clean up ufshcd_scale_clks() and clock scaling error out path (bsc#1171623).
- scsi: ufs: Fix ufshcd_hold() caused scheduling while atomic (bsc#1171624).
- scsi: ufs: Fix ufshcd_probe_hba() reture value in case ufshcd_scsi_add_wlus() fails (bsc#1171625).
- scsi: ufs: Recheck bkops level if bkops is disabled (bsc#1171626).
- sctp: fix possibly using a bad saddr with a given dst (networking-stable-20_04_02).
- sctp: fix refcount bug in sctp_wfree (networking-stable-20_04_02).
- selftests/powerpc: Fix build errors in powerpc ptrace selftests (boo#1124278).
- Separate one more kABI fixup from the functional change:
- seq_file: fix problem when seeking mid-record (bsc#1170125).
- serial: uartps: Move the spinlock after the read of the tx empty (git-fixes).
- sfc: detach from cb_page in efx_copy_channel() (networking-stable-20_03_14).
- signal/pid_namespace: Fix reboot_pid_ns to use send_sig not force_sig (bsc#1172185).
- slcan: not call free_netdev before rtnl_unlock in slcan_open (networking-stable-20_03_28).
- slip: make slhc_compress() more robust against malicious packets (networking-stable-20_03_14).
- SMB3: Additional compression structures (bsc#1144333).
- SMB3: Add new compression flags (bsc#1144333).
- SMB3: change noisy error message to FYI (bsc#1144333).
- SMB3: enable swap on SMB3 mounts (bsc#1144333).
- SMB3: Minor cleanup of protocol definitions (bsc#1144333).
- SMB3: remove overly noisy debug line in signing errors (bsc#1144333).
- SMB3: smbdirect support can be configured by default (bsc#1144333).
- SMB3: use SMB2_SIGNATURE_SIZE define (bsc#1144333).
- spi: bcm63xx-hsspi: Really keep pll clk enabled (bsc#1051510).
- spi: bcm-qspi: when tx/rx buffer is NULL set to 0 (bsc#1051510).
- spi: dw: Add SPI Rx-done wait method to DMA-based transfer (bsc#1051510).
- spi: dw: Zero DMA Tx and Rx configurations on stack (bsc#1051510).
- spi: pxa2xx: Add CS control clock quirk (bsc#1051510).
- spi: qup: call spi_qup_pm_resume_runtime before suspending (bsc#1051510).
- spi/zynqmp: remove entry that causes a cs glitch (bsc#1051510).
- staging: comedi: dt2815: fix writing hi byte of analog output (bsc#1051510).
- staging: comedi: Fix comedi_device refcnt leak in comedi_open (bsc#1051510).
- staging: iio: ad2s1210: Fix SPI reading (bsc#1051510).
- supported.conf: Add br_netfilter to base (bsc#1169020).
- supported.conf: support w1 core and thermometer support
- svcrdma: Fix double svc_rdma_send_ctxt_put() in an error path (bsc#1103992).
- svcrdma: Fix leak of transport addresses (git-fixes).
- svcrdma: Fix trace point use-after-free race (bsc#1103992 ).
- taskstats: fix data-race (bsc#1172188).
- tcp: cache line align MAX_TCP_HEADER (networking-stable-20_04_27).
- tcp: repair: fix TCP_QUEUE_SEQ implementation (networking-stable-20_03_28).
- team: add missing attribute validation for array index (networking-stable-20_03_14).
- team: add missing attribute validation for port ifindex (networking-stable-20_03_14).
- team: fix hang in team_mode_get() (networking-stable-20_04_27).
- tools lib traceevent: Remove unneeded qsort and uses memmove instead (git-fixes).
- tpm: ibmvtpm: retry on H_CLOSED in tpm_ibmvtpm_send() (bsc#1065729).
- tpm/tpm_tis: Free IRQ if probing fails (bsc#1082555).
- tun: Do not put_page() for all negative return values from XDP program (bsc#1109837).
- Update config files: Build w1 bus on arm64 (jsc#SLE-11048)
- USB: Add USB_QUIRK_DELAY_CTRL_MSG and USB_QUIRK_DELAY_INIT for Corsair K70 RGB RAPIDFIRE (git-fixes).
- USB: cdc-acm: restore capability check order (git-fixes).
- USB: core: Fix misleading driver bug report (bsc#1051510).
- USB: dwc3: do not set gadget->is_otg flag (git-fixes).
- USB: dwc3: gadget: Do link recovery for SS and SSP (git-fixes).
- USB: early: Handle AMD's spec-compliant identifiers, too (git-fixes).
- USB: f_fs: Clear OS Extended descriptor counts to zero in ffs_data_reset() (git-fixes).
- USB: gadget: audio: Fix a missing error return value in audio_bind() (git-fixes).
- USB: gadget: composite: Inform controller driver of self-powered (git-fixes).
- USB: gadget: legacy: fix error return code in cdc_bind() (git-fixes).
- USB: gadget: legacy: fix error return code in gncm_bind() (git-fixes).
- usb: gadget: legacy: fix redundant initialization warnings (bsc#1051510).
- USB: gadget: net2272: Fix a memory leak in an error handling path in 'net2272_plat_probe()' (git-fixes).
- USB: gadget: udc: atmel: Fix vbus disconnect handling (git-fixes).
- USB: gadget: udc: atmel: Make some symbols static (git-fixes).
- USB: gadget: udc: bdc: Remove unnecessary NULL checks in bdc_req_complete (git-fixes).
- USB: host: xhci-plat: keep runtime active when removing host (git-fixes).
- USB: hub: Fix handling of connect changes during sleep (git-fixes).
- usbnet: silence an unnecessary warning (bsc#1170770).
- USB: serial: garmin_gps: add sanity checking for data length (git-fixes).
- USB: serial: option: add BroadMobi BM806U (git-fixes).
- USB: serial: option: add support for ASKEY WWHC050 (git-fixes).
- USB: serial: option: add Wistron Neweb D19Q1 (git-fixes).
- USB: serial: qcserial: Add DW5816e support (git-fixes).
- USB: sisusbvga: Change port variable from signed to unsigned (git-fixes).
- usb-storage: Add unusual_devs entry for JMicron JMS566 (git-fixes).
- USB: uas: add quirk for LaCie 2Big Quadra (git-fixes).
- USB: xhci: Fix NULL pointer dereference when enqueuing trbs from urb sg list (git-fixes).
- video: fbdev: sis: Remove unnecessary parentheses and commented code (bsc#1114279)
- video: fbdev: w100fb: Fix a potential double free (bsc#1051510).
- vrf: Check skb for XFRM_TRANSFORMED flag (networking-stable-20_04_27).
- vxlan: check return value of gro_cells_init() (networking-stable-20_03_28).
- w1: Add subsystem kernel public interface (jsc#SLE-11048).
- w1: Fix slave count on 1-Wire bus (resend) (jsc#SLE-11048).
- w1: keep balance of mutex locks and refcnts (jsc#SLE-11048).
- w1: use put_device() if device_register() fail (jsc#SLE-11048).
- watchdog: reset last_hw_keepalive time at start (git-fixes).
- wcn36xx: Fix error handling path in 'wcn36xx_probe()' (bsc#1051510).
- wil6210: remove reset file from debugfs (git-fixes).
- wimax/i2400m: Fix potential urb refcnt leak (bsc#1051510).
- workqueue: do not use wq_select_unbound_cpu() for bound works (bsc#1172130).
- x86/entry/64: Fix unwind hints in kernel exit path (bsc#1058115).
- x86/entry/64: Fix unwind hints in register clearing code (bsc#1058115).
- x86/entry/64: Fix unwind hints in rewind_stack_do_exit() (bsc#1058115).
- x86/entry/64: Fix unwind hints in __switch_to_asm() (bsc#1058115).
- x86/Hyper-V: Allow guests to enable InvariantTSC (bsc#1170621, bsc#1170620).
- x86/Hyper-V: Free hv_panic_page when fail to register kmsg dump (bsc#1170617, bsc#1170618).
- x86/Hyper-V: Report crash data in die() when panic_on_oops is set (bsc#1170617, bsc#1170618).
- x86/Hyper-V: Report crash register data or kmsg before running crash kernel (bsc#1170617, bsc#1170618).
- x86/Hyper-V: Report crash register data when sysctl_record_panic_msg is not set (bsc#1170617, bsc#1170618).
- x86: Hyper-V: report value of misc_features (git fixes).
- x86/Hyper-V: Trigger crash enlightenment only once during system crash (bsc#1170617, bsc#1170618).
- x86/Hyper-V: Unload vmbus channel in hv panic callback (bsc#1170617, bsc#1170618).
- x86/kprobes: Avoid kretprobe recursion bug (bsc#1114279).
- x86/resctrl: Fix invalid attempt at removing the default resource group (git-fixes).
- x86/resctrl: Preserve CDP enable over CPU hotplug (bsc#1114279).
- x86/unwind/orc: Do not skip the first frame for inactive tasks (bsc#1058115).
- x86/unwind/orc: Fix error handling in __unwind_start() (bsc#1058115).
- x86/unwind/orc: Fix error path for bad ORC entry type (bsc#1058115).
- x86/unwind/orc: Fix unwind_get_return_address_ptr() for inactive tasks (bsc#1058115).
- x86/unwind/orc: Prevent unwinding before ORC initialization (bsc#1058115).
- x86/unwind: Prevent false warnings for non-current tasks (bsc#1058115).
- xen/pci: reserve MCFG areas earlier (bsc#1170145).
- xfrm: Always set XFRM_TRANSFORMED in xfrm{4,6}_output_finish (networking-stable-20_04_27).
- xfs: clear PF_MEMALLOC before exiting xfsaild thread (git-fixes).
- xfs: Correctly invert xfs_buftarg LRU isolation logic (git-fixes).
- xfs: do not ever return a stale pointer from __xfs_dir3_free_read (git-fixes).
- xprtrdma: Fix completion wait during device removal (git-fixes).
Patchnames
SUSE-2020-1599,SUSE-SLE-Module-Basesystem-15-SP1-2020-1599,SUSE-SLE-Module-Development-Tools-15-SP1-2020-1599,SUSE-SLE-Module-Legacy-15-SP1-2020-1599,SUSE-SLE-Module-Live-Patching-15-SP1-2020-1599,SUSE-SLE-Product-HA-15-SP1-2020-1599,SUSE-SLE-Product-WE-15-SP1-2020-1599
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "The SUSE Linux Enterprise 15 SP1 kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2020-0543: Fixed a side channel attack against special registers which could have resulted in leaking of read values to cores other than the one which called it.\n This attack is known as Special Register Buffer Data Sampling (SRBDS) or \u0027CrossTalk\u0027 (bsc#1154824).\n- CVE-2020-13143: Fixed an out-of-bounds read in gadget_dev_desc_UDC_store in drivers/usb/gadget/configfs.c (bsc#1171982).\n- CVE-2020-12769: Fixed an issue which could have allowed attackers to cause a panic via concurrent calls to dw_spi_irq and dw_spi_transfer_one (bsc#1171983).\n- CVE-2020-12768: Fixed a memory leak in svm_cpu_uninit in arch/x86/kvm/svm.c (bsc#1171736).\n- CVE-2020-12659: Fixed an out-of-bounds write (by a user with the CAP_NET_ADMIN capability) due to improper headroom validation (bsc#1171214).\n- CVE-2020-12657: An a use-after-free in block/bfq-iosched.c (bsc#1171205).\n- CVE-2020-12656: Fixed an improper handling of certain domain_release calls leadingch could have led to a memory leak (bsc#1171219).\n- CVE-2020-12655: Fixed an issue which could have allowed attackers to trigger a sync of excessive duration via an XFS v5 image with crafted metadata (bsc#1171217).\n- CVE-2020-12654: Fixed an issue in he wifi driver which could have allowed a remote AP to trigger a heap-based buffer overflow (bsc#1171202).\n- CVE-2020-12653: Fixed an issue in the wifi driver which could have allowed local users to gain privileges or cause a denial of service (bsc#1171195).\n- CVE-2020-12652: Fixed an issue which could have allowed local users to hold an incorrect lock during the ioctl operation and trigger a race condition (bsc#1171218).\n- CVE-2020-12464: Fixed a use-after-free due to a transfer without a reference (bsc#1170901).\n- CVE-2020-12114: Fixed a pivot_root race condition which could have allowed local users to cause a denial of service (panic) by corrupting a mountpoint reference counter (bsc#1171098).\n- CVE-2020-10757: Fixed an issue where remaping hugepage DAX to anon mmap could have caused user PTE access (bsc#1172317).\n- CVE-2020-10751: Fixed an improper implementation in SELinux LSM hook where it was assumed that an skb would only contain a single netlink message (bsc#1171189).\n- CVE-2020-10732: Fixed kernel data leak in userspace coredumps due to uninitialized data (bsc#1171220).\n- CVE-2020-10720: Fixed a use-after-free read in napi_gro_frags() (bsc#1170778).\n- CVE-2020-10711: Fixed a null pointer dereference in SELinux subsystem which could have allowed a remote network user to crash the kernel resulting in a denial of service (bsc#1171191).\n- CVE-2020-10690: Fixed the race between the release of ptp_clock and cdev (bsc#1170056).\n- CVE-2019-9455: Fixed a pointer leak due to a WARN_ON statement in a video driver. This could lead to local information disclosure with System execution privileges needed (bsc#1170345).\n- CVE-2019-20812: Fixed an issue in prb_calc_retire_blk_tmo() which could have resulted in a denial of service (bsc#1172453).\n- CVE-2019-20806: Fixed a null pointer dereference which may had lead to denial of service (bsc#1172199).\n- CVE-2019-19462: Fixed an issue which could have allowed local user to cause denial of service (bsc#1158265).\n- CVE-2018-1000199: Fixed a potential local code execution via ptrace (bsc#1089895)\n\nThe following non-security bugs were fixed:\n\n- ACPI: CPPC: Fix reference count leak in acpi_cppc_processor_probe() (bsc#1051510).\n- ACPI: sysfs: Fix reference count leak in acpi_sysfs_add_hotplug_profile() (bsc#1051510).\n- acpi/x86: ignore unspecified bit positions in the ACPI global lock field (bsc#1051510).\n- Add br_netfilter to kernel-default-base (bsc#1169020)\n- Add commit for git-fix that\u0027s not a fix This commit cleans up debug code but does not fix anything, and it relies on a new kernel function that isn\u0027t yet in this version of SLE.\n- agp/intel: Reinforce the barrier after GTT updates (bsc#1051510).\n- ALSA: ctxfi: Remove unnecessary cast in kfree (bsc#1051510).\n- ALSA: doc: Document PC Beep Hidden Register on Realtek ALC256 (bsc#1051510).\n- ALSA: dummy: Fix PCM format loop in proc output (bsc#1111666).\n- ALSA: hda: Add driver blacklist (bsc#1051510).\n- ALSA: hda: Always use jackpoll helper for jack update after resume (bsc#1051510).\n- ALSA: hda: call runtime_allow() for all hda controllers (bsc#1051510).\n- ALSA: hda: Do not release card at firmware loading error (bsc#1051510).\n- ALSA: hda: Explicitly permit using autosuspend if runtime PM is supported (bsc#1051510).\n- ALSA: hda/hdmi: fix race in monitor detection during probe (bsc#1051510).\n- ALSA: hda/hdmi: fix without unlocked before return (bsc#1051510).\n- ALSA: hda: Honor PM disablement in PM freeze and thaw_noirq ops (bsc#1051510).\n- ALSA: hda: Keep the controller initialization even if no codecs found (bsc#1051510).\n- ALSA: hda: Match both PCI ID and SSID for driver blacklist (bsc#1111666).\n- ALSA: hda/realtek - Add a model for Thinkpad T570 without DAC workaround (bsc#1172017).\n- ALSA: hda/realtek - Add COEF workaround for ASUS ZenBook UX431DA (git-fixes).\n- ALSA: hda/realtek - Add HP new mute led supported for ALC236 (git-fixes).\n- ALSA: hda/realtek - Add more fixup entries for Clevo machines (git-fixes).\n- ALSA: hda/realtek - Add new codec supported for ALC245 (bsc#1051510).\n- ALSA: hda/realtek - Add new codec supported for ALC287 (git-fixes).\n- ALSA: hda/realtek: Add quirk for Samsung Notebook (git-fixes).\n- ALSA: hda/realtek - Add supported new mute Led for HP (git-fixes).\n- ALSA: hda/realtek - Enable headset mic of ASUS GL503VM with ALC295 (git-fixes).\n- ALSA: hda/realtek - Enable headset mic of ASUS UX550GE with ALC295 (git-fixes).\n- ALSA: hda/realtek: Enable headset mic of ASUS UX581LV with ALC295 (git-fixes).\n- ALSA: hda/realtek - Enable the headset mic on Asus FX505DT (bsc#1051510).\n- ALSA: hda/realtek - Fix S3 pop noise on Dell Wyse (git-fixes).\n- ALSA: hda/realtek - Fix silent output on Gigabyte X570 Aorus Xtreme (bsc#1111666).\n- ALSA: hda/realtek - Fix unexpected init_amp override (bsc#1051510).\n- ALSA: hda/realtek - Limit int mic boost for Thinkpad T530 (git-fixes bsc#1171293).\n- ALSA: hda/realtek - Two front mics on a Lenovo ThinkCenter (bsc#1051510).\n- ALSA: hda: Release resources at error in delayed probe (bsc#1051510).\n- ALSA: hda: Remove ASUS ROG Zenith from the blacklist (bsc#1051510).\n- ALSA: hda: Skip controller resume if not needed (bsc#1051510).\n- ALSA: hwdep: fix a left shifting 1 by 31 UB bug (git-fixes).\n- ALSA: iec1712: Initialize STDSP24 properly when using the model=staudio option (git-fixes).\n- ALSA: opti9xx: shut up gcc-10 range warning (bsc#1051510).\n- ALSA: pcm: fix incorrect hw_base increase (git-fixes).\n- ALSA: pcm: oss: Place the plugin buffer overflow checks correctly (bsc#1170522).\n- ALSA: rawmidi: Fix racy buffer resize under concurrent accesses (git-fixes).\n- ALSA: usb-audio: Add connector notifier delegation (bsc#1051510).\n- ALSA: usb-audio: Add control message quirk delay for Kingston HyperX headset (git-fixes).\n- ALSA: usb-audio: add mapping for ASRock TRX40 Creator (git-fixes).\n- ALSA: usb-audio: Add mixer workaround for TRX40 and co (bsc#1051510).\n- ALSA: usb-audio: Add quirk for Focusrite Scarlett 2i2 (bsc#1051510).\n- ALSA: usb-audio: Add static mapping table for ALC1220-VB-based mobos (bsc#1051510).\n- ALSA: usb-audio: Apply async workaround for Scarlett 2i4 2nd gen (bsc#1051510).\n- ALSA: usb-audio: Check mapping at creating connector controls, too (bsc#1051510).\n- ALSA: usb-audio: Correct a typo of NuPrime DAC-10 USB ID (bsc#1051510).\n- ALSA: usb-audio: Do not create jack controls for PCM terminals (bsc#1051510).\n- ALSA: usb-audio: Do not override ignore_ctl_error value from the map (bsc#1051510).\n- ALSA: usb-audio: Filter error from connector kctl ops, too (bsc#1051510).\n- ALSA: usb-audio: Fix usb audio refcnt leak when getting spdif (bsc#1051510).\n- ALSA: usb-audio: mixer: volume quirk for ESS Technology Asus USB DAC (git-fixes).\n- ALSA: usb-audio: Quirks for Gigabyte TRX40 Aorus Master onboard audio (git-fixes).\n- ALSA: usx2y: Fix potential NULL dereference (bsc#1051510).\n- ASoC: codecs: hdac_hdmi: Fix incorrect use of list_for_each_entry (bsc#1051510).\n- ASoC: dapm: connect virtual mux with default value (bsc#1051510).\n- ASoC: dapm: fixup dapm kcontrol widget (bsc#1051510).\n- ASoC: dpcm: allow start or stop during pause for backend (bsc#1051510).\n- ASoC: fix regwmask (bsc#1051510).\n- ASoC: msm8916-wcd-digital: Reset RX interpolation path after use (bsc#1051510).\n- ASoC: samsung: Prevent clk_get_rate() calls in atomic context (bsc#1111666).\n- ASoC: topology: Check return value of pcm_new_ver (bsc#1051510).\n- ASoC: topology: use name_prefix for new kcontrol (bsc#1051510).\n- b43legacy: Fix case where channel status is corrupted (bsc#1051510).\n- batman-adv: fix batadv_nc_random_weight_tq (git-fixes).\n- batman-adv: Fix refcnt leak in batadv_show_throughput_override (git-fixes).\n- batman-adv: Fix refcnt leak in batadv_store_throughput_override (git-fixes).\n- batman-adv: Fix refcnt leak in batadv_v_ogm_process (git-fixes).\n- bcache: avoid unnecessary btree nodes flushing in btree_flush_write() (git fixes (block drivers)).\n- bcache: fix incorrect data type usage in btree_flush_write() (git fixes (block drivers)).\n- bcache: Revert \u0027bcache: shrink btree node cache after bch_btree_check()\u0027 (git fixes (block drivers)).\n- blk-mq: honor IO scheduler for multiqueue devices (bsc#1165478).\n- blk-mq: simplify blk_mq_make_request() (bsc#1165478).\n- block/drbd: delete invalid function drbd_md_mark_dirty_ (bsc#1171527).\n- block: drbd: remove a stray unlock in __drbd_send_protocol() (bsc#1171599).\n- block: fix busy device checking in blk_drop_partitions again (bsc#1171948).\n- block: fix busy device checking in blk_drop_partitions (bsc#1171948).\n- block: fix memleak of bio integrity data (git fixes (block drivers)).\n- block: remove the bd_openers checks in blk_drop_partitions (bsc#1171948).\n- bnxt_en: fix memory leaks in bnxt_dcbnl_ieee_getets() (networking-stable-20_03_28).\n- bnxt_en: Reduce BNXT_MSIX_VEC_MAX value to supported CQs per PF (bsc#1104745).\n- bnxt_en: reinitialize IRQs when MTU is modified (networking-stable-20_03_14).\n- bnxt_en: Return error if bnxt_alloc_ctx_mem() fails (bsc#1104745 ).\n- bnxt_en: Return error when allocating zero size context memory (bsc#1104745).\n- bonding/alb: make sure arp header is pulled before accessing it (networking-stable-20_03_14).\n- bpf: Fix sk_psock refcnt leak when receiving message (bsc#1083647).\n- bpf: Forbid XADD on spilled pointers for unprivileged users (bsc#1083647).\n- brcmfmac: abort and release host after error (bsc#1051510).\n- BTRFS: fix deadlock with memory reclaim during scrub (bsc#1172127).\n- BTRFS: fix log context list corruption after rename whiteout error (bsc#1172342).\n- BTRFS: fix partial loss of prealloc extent past i_size after fsync (bsc#1172343).\n- BTRFS: relocation: add error injection points for cancelling balance (bsc#1171417).\n- BTRFS: relocation: Check cancel request after each data page read (bsc#1171417).\n- BTRFS: relocation: Check cancel request after each extent found (bsc#1171417).\n- BTRFS: relocation: Clear the DEAD_RELOC_TREE bit for orphan roots to prevent runaway balance (bsc#1171417).\n- BTRFS: relocation: Fix reloc root leakage and the NULL pointer reference caused by the leakage (bsc#1171417).\n- BTRFS: relocation: Work around dead relocation stage loop (bsc#1171417).\n- BTRFS: reloc: clear DEAD_RELOC_TREE bit for orphan roots to prevent runaway balance (bsc#1171417 bsc#1160947 bsc#1172366).\n- BTRFS: reloc: fix reloc root leak and NULL pointer dereference (bsc#1171417 bsc#1160947 bsc#1172366).\n- BTRFS: setup a nofs context for memory allocation at btrfs_create_tree() (bsc#1172127).\n- BTRFS: setup a nofs context for memory allocation at __btrfs_set_acl (bsc#1172127).\n- BTRFS: use nofs context when initializing security xattrs to avoid deadlock (bsc#1172127).\n- can: add missing attribute validation for termination (networking-stable-20_03_14).\n- cdc-acm: close race betrween suspend() and acm_softint (git-fixes).\n- cdc-acm: introduce a cool down (git-fixes).\n- ceph: check if file lock exists before sending unlock request (bsc#1168789).\n- ceph: demote quotarealm lookup warning to a debug message (bsc#1171692).\n- ceph: fix double unlock in handle_cap_export() (bsc#1171694).\n- ceph: fix endianness bug when handling MDS session feature bits (bsc#1171695).\n- cgroup, netclassid: periodically release file_lock on classid updating (networking-stable-20_03_14).\n- cifs: Allocate crypto structures on the fly for calculating signatures of incoming packets (bsc#1144333).\n- cifs: Allocate encryption header through kmalloc (bsc#1144333).\n- cifs: allow unlock flock and OFD lock across fork (bsc#1144333).\n- cifs: check new file size when extending file by fallocate (bsc#1144333).\n- cifs: cifspdu.h: Replace zero-length array with flexible-array member (bsc#1144333).\n- cifs: clear PF_MEMALLOC before exiting demultiplex thread (bsc#1144333).\n- cifs: do not share tcons with DFS (bsc#1144333).\n- cifs: dump the session id and keys also for SMB2 sessions (bsc#1144333).\n- cifs: ensure correct super block for DFS reconnect (bsc#1144333).\n- cifs: Fix bug which the return value by asynchronous read is error (bsc#1144333).\n- cifs: fix uninitialised lease_key in open_shroot() (bsc#1144333).\n- cifs: improve read performance for page size 64KB \u0026 cache=strict \u0026 vers=2.1+ (bsc#1144333).\n- cifs: Increment num_remote_opens stats counter even in case of smb2_query_dir_first (bsc#1144333).\n- cifs: minor update to comments around the cifs_tcp_ses_lock mutex (bsc#1144333).\n- cifs: protect updating server-\u003edstaddr with a spinlock (bsc#1144333).\n- cifs: smb2pdu.h: Replace zero-length array with flexible-array member (bsc#1144333).\n- cifs: smbd: Calculate the correct maximum packet size for segmented SMBDirect send/receive (bsc#1144333).\n- cifs: smbd: Check and extend sender credits in interrupt context (bsc#1144333).\n- cifs: smbd: Check send queue size before posting a send (bsc#1144333).\n- cifs: smbd: Do not schedule work to send immediate packet on every receive (bsc#1144333).\n- cifs: smbd: Merge code to track pending packets (bsc#1144333).\n- cifs: smbd: Properly process errors on ib_post_send (bsc#1144333).\n- cifs: smbd: Update receive credits before sending and deal with credits roll back on failure before sending (bsc#1144333).\n- cifs: Warn less noisily on default mount (bsc#1144333).\n- clk: Add clk_hw_unregister_composite helper function definition (bsc#1051510).\n- clk: imx6ull: use OSC clock during AXI rate change (bsc#1051510).\n- clk: imx: make mux parent strings const (bsc#1051510).\n- clk: mediatek: correct the clocks for MT2701 HDMI PHY module (bsc#1051510).\n- clk: sunxi-ng: a64: Fix gate bit of DSI DPHY (bsc#1051510).\n- clocksource/drivers/hyper-v: Set TSC clocksource as default w/ InvariantTSC (bsc#1170620, bsc#1170621).\n- clocksource: dw_apb_timer_of: Fix missing clockevent timers (bsc#1051510).\n- component: Silence bind error on -EPROBE_DEFER (bsc#1051510).\n- coresight: do not use the BIT() macro in the UAPI header (git fixes (block drivers)).\n- cpufreq: s3c64xx: Remove pointless NULL check in s3c64xx_cpufreq_driver_init (bsc#1051510).\n- crypto: ccp - AES CFB mode is a stream cipher (git-fixes).\n- crypto: ccp - Clean up and exit correctly on allocation failure (git-fixes).\n- crypto: ccp - Cleanup misc_dev on sev_exit() (bsc#1114279).\n- crypto: ccp - Cleanup sp_dev_master in psp_dev_destroy() (bsc#1114279).\n- cxgb4: fix MPS index overwrite when setting MAC address (bsc#1127355).\n- cxgb4: fix Txq restart check during backpressure (bsc#1127354 bsc#1127371).\n- debugfs: Add debugfs_create_xul() for hexadecimal unsigned long (git-fixes).\n- debugfs_lookup(): switch to lookup_one_len_unlocked() (bsc#1171979).\n- devlink: fix return value after hitting end in region read (bsc#1109837).\n- devlink: validate length of param values (bsc#1109837).\n- devlink: validate length of region addr/len (bsc#1109837).\n- dmaengine: dmatest: Fix iteration non-stop logic (bsc#1051510).\n- dm mpath: switch paths in dm_blk_ioctl() code path (bsc#1167574).\n- dm-raid1: fix invalid return value from dm_mirror (bsc#1172378).\n- dm writecache: fix data corruption when reloading the target (git fixes (block drivers)).\n- dm writecache: fix incorrect flush sequence when doing SSD mode commit (git fixes (block drivers)).\n- dm writecache: verify watermark during resume (git fixes (block drivers)).\n- dm zoned: fix invalid memory access (git fixes (block drivers)).\n- dm zoned: reduce overhead of backing device checks (git fixes (block drivers)).\n- dm zoned: remove duplicate nr_rnd_zones increase in dmz_init_zone() (git fixes (block drivers)).\n- dm zoned: support zone sizes smaller than 128MiB (git fixes (block drivers)).\n- dp83640: reverse arguments to list_add_tail (git-fixes).\n- drivers: hv: Add a module description line to the hv_vmbus driver (bsc#1172249, bsc#1172251).\n- drivers/net/ibmvnic: Update VNIC protocol version reporting (bsc#1065729).\n- drivers: w1: add hwmon support structures (jsc#SLE-11048).\n- drivers: w1: add hwmon temp support for w1_therm (jsc#SLE-11048).\n- drivers: w1: refactor w1_slave_show to make the temp reading functionality separate (jsc#SLE-11048).\n- drm: amd/acp: fix broken menu structure (bsc#1114279) \t* context changes\n- drm/amdgpu: Correctly initialize thermal controller for GPUs with Powerplay table v0 (e.g Hawaii) (bsc#1111666).\n- drm/amdgpu: Fix oops when pp_funcs is unset in ACPI event (bsc#1111666).\n- drm/amd/powerplay: force the trim of the mclk dpm_levels if OD is (bsc#1113956)\n- drm/atomic: Take the atomic toys away from X (bsc#1112178) \t* context changes\n- drm/crc: Actually allow to change the crc source (bsc#1114279) \t* offset changes\n- drm/dp_mst: Fix clearing payload state on topology disable (bsc#1051510).\n- drm/dp_mst: Reformat drm_dp_check_act_status() a bit (bsc#1051510).\n- drm/edid: Fix off-by-one in DispID DTD pixel clock (bsc#1114279)\n- drm/etnaviv: fix perfmon domain interation (bsc#1113956)\n- drm/etnaviv: rework perfmon query infrastructure (bsc#1112178)\n- drm/i915: Apply Wa_1406680159:icl,ehl as an engine workaround (bsc#1112178) \t* rename gt/intel_workarounds.c to intel_workarounds.c \t* context changes\n- drm/i915/gvt: Init DPLL/DDI vreg for virtual display instead of (bsc#1114279)\n- drm/i915: HDCP: fix Ri prime check done during link check (bsc#1112178) \t* rename display/intel_hdmi.c to intel_hdmi.c \t* context changes\n- drm/i915: properly sanity check batch_start_offset (bsc#1114279) \t* renamed display/intel_fbc.c -\u003e intel_fb.c \t* renamed gt/intel_rc6.c -\u003e intel_pm.c \t* context changes\n- drm/meson: Delete an error message in meson_dw_hdmi_bind() (bsc#1051510).\n- drm: NULL pointer dereference [null-pointer-deref] (CWE 476) problem (bsc#1114279)\n- drm/qxl: qxl_release leak in qxl_draw_dirty_fb() (bsc#1051510).\n- drm/qxl: qxl_release leak in qxl_hw_surface_alloc() (bsc#1051510).\n- drm/qxl: qxl_release use after free (bsc#1051510).\n- drm: Remove PageReserved manipulation from drm_pci_alloc (bsc#1114279) \t* offset changes\n- drm/sun4i: dsi: Allow binding the host without a panel (bsc#1113956)\n- drm/sun4i: dsi: Avoid hotplug race with DRM driver bind (bsc#1113956)\n- drm/sun4i: dsi: Remove incorrect use of runtime PM (bsc#1113956) \t* context changes\n- drm/sun4i: dsi: Remove unused drv from driver context (bsc#1113956) \t* context changes \t* keep include of sun4i_drv.h\n- dump_stack: avoid the livelock of the dump_lock (git fixes (block drivers)).\n- EDAC, sb_edac: Add support for systems with segmented PCI buses (bsc#1169525).\n- ext4: do not zeroout extents beyond i_disksize (bsc#1167851).\n- ext4: fix extent_status fragmentation for plain files (bsc#1171949).\n- ext4: use non-movable memory for superblock readahead (bsc#1171952).\n- fanotify: fix merging marks masks with FAN_ONDIR (bsc#1171679).\n- fbcon: fix null-ptr-deref in fbcon_switch (bsc#1114279) \t* rename drivers/video/fbdev/core to drivers/video/console \t* context changes\n- fib: add missing attribute validation for tun_id (networking-stable-20_03_14).\n- firmware: qcom: scm: fix compilation error when disabled (bsc#1051510).\n- fs/cifs: fix gcc warning in sid_to_id (bsc#1144333).\n- fs/seq_file.c: simplify seq_file iteration code and interface (bsc#1170125).\n- gpio: tegra: mask GPIO IRQs during IRQ shutdown (bsc#1051510).\n- gre: fix uninit-value in __iptunnel_pull_header (networking-stable-20_03_14).\n- HID: hid-input: clear unmapped usages (git-fixes).\n- HID: Hyper-V: Add a module description line (bsc#1172249, bsc#1172251).\n- HID: i2c-hid: add Trekstor Primebook C11B to descriptor override (git-fixes).\n- HID: i2c-hid: override HID descriptors for certain devices (git-fixes).\n- HID: multitouch: add eGalaxTouch P80H84 support (bsc#1051510).\n- HID: wacom: Read HID_DG_CONTACTMAX directly for non-generic devices (git-fixes).\n- hrtimer: Annotate lockless access to timer-\u003estate (git fixes (block drivers)).\n- hsr: add restart routine into hsr_get_node_list() (networking-stable-20_03_28).\n- hsr: check protocol version in hsr_newlink() (networking-stable-20_04_17).\n- hsr: fix general protection fault in hsr_addr_is_self() (networking-stable-20_03_28).\n- hsr: set .netnsok flag (networking-stable-20_03_28).\n- hsr: use rcu_read_lock() in hsr_get_node_{list/status}() (networking-stable-20_03_28).\n- i2c: acpi: Force bus speed to 400KHz if a Silead touchscreen is present (git-fixes).\n- i2c: acpi: put device when verifying client fails (git-fixes).\n- i2c: brcmstb: remove unused struct member (git-fixes).\n- i2c: core: Allow empty id_table in ACPI case as well (git-fixes).\n- i2c: core: decrease reference count of device node in i2c_unregister_device (git-fixes).\n- i2c: dev: Fix the race between the release of i2c_dev and cdev (bsc#1051510).\n- i2c: fix missing pm_runtime_put_sync in i2c_device_probe (git-fixes).\n- i2c-hid: properly terminate i2c_hid_dmi_desc_override_table array (git-fixes).\n- i2c: i801: Do not add ICH_RES_IO_SMI for the iTCO_wdt device (git-fixes).\n- i2c: iproc: Stop advertising support of SMBUS quick cmd (git-fixes).\n- i2c: isch: Remove unnecessary acpi.h include (git-fixes).\n- i2c: mux: demux-pinctrl: Fix an error handling path in \u0027i2c_demux_pinctrl_probe()\u0027 (bsc#1051510).\n- i2c: st: fix missing struct parameter description (bsc#1051510).\n- IB/mlx5: Fix missing congestion control debugfs on rep rdma device (bsc#1103991).\n- ibmvnic: Skip fatal error reset after passive init (bsc#1171078 ltc#184239).\n- iio:ad7797: Use correct attribute_group (bsc#1051510).\n- iio: adc: stm32-adc: fix device used to request dma (bsc#1051510).\n- iio: adc: stm32-adc: fix sleep in atomic context (git-fixes).\n- iio: adc: stm32-adc: Use dma_request_chan() instead dma_request_slave_channel() (bsc#1051510).\n- iio: dac: vf610: Fix an error handling path in \u0027vf610_dac_probe()\u0027 (bsc#1051510).\n- iio: sca3000: Remove an erroneous \u0027get_device()\u0027 (bsc#1051510).\n- iio: xilinx-xadc: Fix ADC-B powerdown (bsc#1051510).\n- iio: xilinx-xadc: Fix clearing interrupt when enabling trigger (bsc#1051510).\n- iio: xilinx-xadc: Fix sequencer configuration for aux channels in simultaneous mode (bsc#1051510).\n- ima: Fix return value of ima_write_policy() (git-fixes).\n- Input: evdev - call input_flush_device() on release(), not flush() (bsc#1051510).\n- Input: hyperv-keyboard - add module description (bsc#1172249, bsc#1172251).\n- Input: i8042 - add Acer Aspire 5738z to nomux list (bsc#1051510).\n- Input: i8042 - add ThinkPad S230u to i8042 reset list (bsc#1051510).\n- Input: raydium_i2c_ts - use true and false for boolean values (bsc#1051510).\n- Input: synaptics-rmi4 - fix error return code in rmi_driver_probe() (bsc#1051510).\n- Input: synaptics-rmi4 - really fix attn_data use-after-free (git-fixes).\n- Input: usbtouchscreen - add support for BonXeon TP (bsc#1051510).\n- Input: xpad - add custom init packet for Xbox One S controllers (bsc#1051510).\n- iommu/amd: Call domain_flush_complete() in update_domain() (bsc#1172096).\n- iommu/amd: Do not flush Device Table in iommu_map_page() (bsc#1172097).\n- iommu/amd: Do not loop forever when trying to increase address space (bsc#1172098).\n- iommu/amd: Fix legacy interrupt remapping for x2APIC-enabled system (bsc#1172099).\n- iommu/amd: Fix over-read of ACPI UID from IVRS table (bsc#1172101).\n- iommu/amd: Fix race in increase_address_space()/fetch_pte() (bsc#1172102).\n- iommu/amd: Update Device Table in increase_address_space() (bsc#1172103).\n- iommu: Fix reference count leak in iommu_group_alloc (bsc#1172397).\n- ip6_tunnel: Allow rcv/xmit even if remote address is a local address (bsc#1166978).\n- ipv4: fix a RCU-list lock in fib_triestat_seq_show (networking-stable-20_04_02).\n- ipv6/addrconf: call ipv6_mc_up() for non-Ethernet interface (networking-stable-20_03_14).\n- ipv6: do not auto-add link-local address to lag ports (networking-stable-20_04_09).\n- ipv6: fix IPV6_ADDRFORM operation logic (bsc#1171662).\n- ipv6: fix restrict IPV6_ADDRFORM operation (bsc#1171662).\n- ipvlan: add cond_resched_rcu() while processing muticast backlog (networking-stable-20_03_14).\n- ipvlan: do not deref eth hdr before checking it\u0027s set (networking-stable-20_03_14).\n- ipvlan: do not use cond_resched_rcu() in ipvlan_process_multicast() (networking-stable-20_03_14).\n- iwlwifi: pcie: actually release queue memory in TVQM (bsc#1051510).\n- ixgbe: do not check firmware errors (bsc#1170284).\n- kabi fix for early XHCI debug (git-fixes).\n- kabi for for md: improve handling of bio with REQ_PREFLUSH in md_flush_request() (git-fixes).\n- kabi/severities: Do not track KVM internal symbols.\n- kabi/severities: Ingnore get_dev_data() The function is internal to the AMD IOMMU driver and must not be called by any third party.\n- kabi workaround for snd_rawmidi buffer_ref field addition (git-fixes).\n- KEYS: reaching the keys quotas correctly (bsc#1051510).\n- KVM: arm64: Change hyp_panic()s dependency on tpidr_el2 (bsc#1133021).\n- KVM: arm64: Stop save/restoring host tpidr_el1 on VHE (bsc#1133021).\n- KVM: Check validity of resolved slot when searching memslots (bsc#1172104).\n- KVM: s390: vsie: Fix delivery of addressing exceptions (git-fixes).\n- KVM: SVM: Fix potential memory leak in svm_cpu_init() (bsc#1171736).\n- KVM x86: Extend AMD specific guest behavior to Hygon virtual CPUs (bsc#1152489).\n- l2tp: Allow management of tunnels and session in user namespace (networking-stable-20_04_17).\n- libata: Remove extra scsi_host_put() in ata_scsi_add_hosts() (bsc#1051510).\n- libata: Return correct status in sata_pmp_eh_recover_pm() when ATA_DFLAG_DETACH is set (bsc#1051510).\n- lib: raid6: fix awk build warnings (git fixes (block drivers)).\n- lib/raid6/test: fix build on distros whose /bin/sh is not bash (git fixes (block drivers)).\n- lib/stackdepot.c: fix global out-of-bounds in stack_slabs (git fixes (block drivers)).\n- locks: print unsigned ino in /proc/locks (bsc#1171951). \n- mac80211: add ieee80211_is_any_nullfunc() (bsc#1051510).\n- mac80211_hwsim: Use kstrndup() in place of kasprintf() (bsc#1051510).\n- mac80211: mesh: fix discovery timer re-arming issue / crash (bsc#1051510).\n- macsec: avoid to set wrong mtu (bsc#1051510).\n- macsec: restrict to ethernet devices (networking-stable-20_03_28).\n- macvlan: add cond_resched() during multicast processing (networking-stable-20_03_14).\n- macvlan: fix null dereference in macvlan_device_event() (bsc#1051510).\n- md: improve handling of bio with REQ_PREFLUSH in md_flush_request() (git-fixes).\n- md/raid0: Fix an error message in raid0_make_request() (git fixes (block drivers)).\n- md/raid10: prevent access of uninitialized resync_pages offset (git-fixes).\n- media: dvb: return -EREMOTEIO on i2c transfer failure (bsc#1051510).\n- media: platform: fcp: Set appropriate DMA parameters (bsc#1051510).\n- media: ti-vpe: cal: fix disable_irqs to only the intended target (git-fixes).\n- mei: release me_cl object reference (bsc#1051510).\n- mlxsw: Fix some IS_ERR() vs NULL bugs (networking-stable-20_04_27).\n- mlxsw: spectrum_flower: Do not stop at FLOW_ACTION_VLAN_MANGLE (networking-stable-20_04_09).\n- mlxsw: spectrum_mr: Fix list iteration in error path (bsc#1112374).\n- mmc: atmel-mci: Fix debugfs on 64-bit platforms (git-fixes).\n- mmc: core: Check request type before completing the request (git-fixes).\n- mmc: core: Fix recursive locking issue in CQE recovery path (git-fixes).\n- mmc: cqhci: Avoid false \u0027cqhci: CQE stuck on\u0027 by not open-coding timeout loop (git-fixes).\n- mmc: dw_mmc: Fix debugfs on 64-bit platforms (git-fixes).\n- mmc: meson-gx: make sure the descriptor is stopped on errors (git-fixes).\n- mmc: meson-gx: simplify interrupt handler (git-fixes).\n- mmc: renesas_sdhi: limit block count to 16 bit for old revisions (git-fixes).\n- mmc: sdhci-esdhc-imx: fix the mask for tuning start point (bsc#1051510).\n- mmc: sdhci-msm: Clear tuning done flag while hs400 tuning (bsc#1051510).\n- mmc: sdhci-of-at91: fix memleak on clk_get failure (git-fixes).\n- mmc: sdhci-pci: Fix eMMC driver strength for BYT-based controllers (bsc#1051510).\n- mmc: sdhci-xenon: fix annoying 1.8V regulator warning (bsc#1051510).\n- mmc: sdio: Fix potential NULL pointer error in mmc_sdio_init_card() (bsc#1051510).\n- mmc: tmio: fix access width of Block Count Register (git-fixes).\n- mm: limit boost_watermark on small zones (git fixes (mm/pgalloc)).\n- mm: thp: handle page cache THP correctly in PageTransCompoundMap (git fixes (block drivers)).\n- mtd: cfi: fix deadloop in cfi_cmdset_0002.c do_write_buffer (bsc#1051510).\n- mtd: spi-nor: cadence-quadspi: add a delay in write sequence (git-fixes).\n- mtd: spi-nor: enable 4B opcodes for mx66l51235l (git-fixes).\n- mwifiex: avoid -Wstringop-overflow warning (bsc#1051510).\n- mwifiex: Fix memory corruption in dump_station (bsc#1051510).\n- net: bcmgenet: correct per TX/RX ring statistics (networking-stable-20_04_27).\n- net: dsa: b53: Fix ARL register definitions (networking-stable-20_04_27).\n- net: dsa: b53: Rework ARL bin logic (networking-stable-20_04_27).\n- net: dsa: bcm_sf2: Do not register slave MDIO bus with OF (networking-stable-20_04_09).\n- net: dsa: bcm_sf2: Ensure correct sub-node is parsed (networking-stable-20_04_09).\n- net: dsa: Fix duplicate frames flooded by learning (networking-stable-20_03_28).\n- net: dsa: mv88e6xxx: fix lockup on warm boot (networking-stable-20_03_14).\n- net/ethernet: add Google GVE driver (jsc#SLE-10538)\n- net: fec: add phy_reset_after_clk_enable() support (git-fixes).\n- net: fec: validate the new settings in fec_enet_set_coalesce() (networking-stable-20_03_14).\n- net: fix race condition in __inet_lookup_established() (bsc#1151794).\n- net: fq: add missing attribute validation for orphan mask (networking-stable-20_03_14).\n- net: hns3: fix \u0027tc qdisc del\u0027 failed issue (bsc#1109837).\n- net, ip_tunnel: fix interface lookup with no key (networking-stable-20_04_02).\n- net: ipv4: devinet: Fix crash when add/del multicast IP with autojoin (networking-stable-20_04_17).\n- net: ipv6: do not consider routes via gateways for anycast address check (networking-stable-20_04_17).\n- netlink: Use netlink header as base to calculate bad attribute offset (networking-stable-20_03_14).\n- net: macsec: update SCI upon MAC address change (networking-stable-20_03_14).\n- net: memcg: fix lockdep splat in inet_csk_accept() (networking-stable-20_03_14).\n- net: memcg: late association of sock to memcg (networking-stable-20_03_14).\n- net/mlx4_en: avoid indirect call in TX completion (networking-stable-20_04_27).\n- net/mlx5: Add new fields to Port Type and Speed register (bsc#1171118).\n- net/mlx5: Expose link speed directly (bsc#1171118).\n- net/mlx5: Expose port speed when possible (bsc#1171118).\n- net/mlx5: Fix failing fw tracer allocation on s390 (bsc#1103990 ).\n- net: mvneta: Fix the case where the last poll did not process all rx (networking-stable-20_03_28).\n- net: netrom: Fix potential nr_neigh refcnt leak in nr_add_node (networking-stable-20_04_27).\n- net/packet: tpacket_rcv: do not increment ring index on drop (networking-stable-20_03_14).\n- net: qmi_wwan: add support for ASKEY WWHC050 (networking-stable-20_03_28).\n- net: revert default NAPI poll timeout to 2 jiffies (networking-stable-20_04_17).\n- net_sched: cls_route: remove the right filter from hashtable (networking-stable-20_03_28).\n- net_sched: sch_skbprio: add message validation to skbprio_change() (bsc#1109837).\n- net/x25: Fix x25_neigh refcnt leak when receiving frame (networking-stable-20_04_27).\n- nfc: add missing attribute validation for SE API (networking-stable-20_03_14).\n- nfc: add missing attribute validation for vendor subcommand (networking-stable-20_03_14).\n- nfc: st21nfca: add missed kfree_skb() in an error path (bsc#1051510).\n- nfp: abm: fix a memory leak bug (bsc#1109837).\n- nfsd4: fix up replay_matches_cache() (git-fixes).\n- nfsd: Ensure CLONE persists data and metadata changes to the target file (git-fixes).\n- nfsd: fix delay timer on 32-bit architectures (git-fixes).\n- nfsd: fix jiffies/time_t mixup in LRU list (git-fixes).\n- NFS: Directory page cache pages need to be locked when read (git-fixes).\n- nfsd: memory corruption in nfsd4_lock() (git-fixes).\n- NFS: Do not call generic_error_remove_page() while holding locks (bsc#1170457).\n- NFS: Fix memory leaks and corruption in readdir (git-fixes).\n- NFS: Fix O_DIRECT accounting of number of bytes read/written (git-fixes).\n- NFS: Fix potential posix_acl refcnt leak in nfs3_set_acl (git-fixes).\n- NFS: fix racey wait in nfs_set_open_stateid_locked (bsc#1170592).\n- NFS/flexfiles: Use the correct TCP timeout for flexfiles I/O (git-fixes).\n- NFS/pnfs: Fix pnfs_generic_prepare_to_resend_writes() (git-fixes).\n- NFS: Revalidate the file size on a fatal write error (git-fixes).\n- NFSv4.0: nfs4_do_fsinfo() should not do implicit lease renewals (git-fixes).\n- NFSv4: Do not allow a cached open with a revoked delegation (git-fixes).\n- NFSv4: Fix leak of clp-\u003ecl_acceptor string (git-fixes).\n- NFSv4/pnfs: Return valid stateids in nfs_layout_find_inode_by_stateid() (git-fixes).\n- NFSv4: try lease recovery on NFS4ERR_EXPIRED (git-fixes).\n- NFSv4.x: Drop the slot if nfs4_delegreturn_prepare waits for layoutreturn (git-fixes).\n- nl802154: add missing attribute validation for dev_type (networking-stable-20_03_14).\n- nl802154: add missing attribute validation (networking-stable-20_03_14).\n- nvme-fc: print proper nvme-fc devloss_tmo value (bsc#1172391).\n- objtool: Fix stack offset tracking for indirect CFAs (bsc#1169514).\n- objtool: Fix switch table detection in .text.unlikely (bsc#1169514).\n- objtool: Make BP scratch register warning more robust (bsc#1169514).\n- padata: Remove broken queue flushing (git-fixes).\n- Partially revert \u0027kfifo: fix kfifo_alloc() and kfifo_init()\u0027 (git fixes (block drivers)).\n- PCI: hv: Add support for protocol 1.3 and support PCI_BUS_RELATIONS2 (bsc#1172201, bsc#1172202).\n- PCI: hv: Decouple the func definition in hv_dr_state from VSP message (bsc#1172201, bsc#1172202).\n- pinctrl: baytrail: Enable pin configuration setting for GPIO chip (git-fixes).\n- pinctrl: cherryview: Add missing spinlock usage in chv_gpio_irq_handler (git-fixes).\n- pinctrl: sunrisepoint: Fix PAD lock register offset for SPT-H (git-fixes).\n- platform/x86: asus-nb-wmi: Do not load on Asus T100TA and T200TA (bsc#1051510).\n- pNFS: Ensure we do clear the return-on-close layout stateid on fatal errors (git-fixes).\n- powerpc: Add attributes for setjmp/longjmp (bsc#1065729).\n- powerpc/pci/of: Parse unassigned resources (bsc#1065729).\n- powerpc/setup_64: Set cache-line-size based on cache-block-size (bsc#1065729).\n- powerpc/sstep: Fix DS operand in ld encoding to appropriate value (bsc#1065729).\n- r8152: check disconnect status after long sleep (networking-stable-20_03_14).\n- raid6/ppc: Fix build for clang (git fixes (block drivers)).\n- random: always use batched entropy for get_random_u{32,64} (bsc#1164871).\n- rcu: locking and unlocking need to always be at least barriers (git fixes (block drivers)).\n- Revert \u0027ALSA: hda/realtek: Fix pop noise on ALC225\u0027 (git-fixes).\n- Revert \u0027drm/panel: simple: Add support for Sharp LQ150X1LG11 panels\u0027 (bsc#1114279) \t* offset changes\n- Revert \u0027ipc,sem: remove uneeded sem_undo_list lock usage in exit_sem()\u0027 (bsc#1172221).\n- Revert \u0027RDMA/cma: Simplify rdma_resolve_addr() error flow\u0027 (bsc#1103992).\n- rtlwifi: Fix a double free in _rtl_usb_tx_urb_setup() (bsc#1051510).\n- s390/cpum_cf: Add new extended counters for IBM z15 (bsc#1169762 LTC#185291).\n- s390/ftrace: fix potential crashes when switching tracers (git-fixes).\n- s390/ism: fix error return code in ism_probe() (git-fixes).\n- s390/pci: do not set affinity for floating irqs (git-fixes).\n- s390/pci: Fix possible deadlock in recover_store() (bsc#1165183 LTC#184103).\n- s390/pci: Recover handle in clp_set_pci_fn() (bsc#1165183 LTC#184103).\n- scripts/decodecode: fix trapping instruction formatting (bsc#1065729).\n- scripts/dtc: Remove redundant YYLOC global declaration (bsc#1160388).\n- scsi: bnx2i: fix potential use after free (bsc#1171600).\n- scsi: core: Handle drivers which set sg_tablesize to zero (bsc#1171601) This commit also required: \u003e scsi: core: avoid preallocating big SGL for data\n- scsi: core: save/restore command resid for error handling (bsc#1171602).\n- scsi: core: scsi_trace: Use get_unaligned_be*() (bsc#1171604).\n- scsi: core: try to get module before removing device (bsc#1171605).\n- scsi: csiostor: Adjust indentation in csio_device_reset (bsc#1171606).\n- scsi: csiostor: Do not enable IRQs too early (bsc#1171607).\n- scsi: esas2r: unlock on error in esas2r_nvram_read_direct() (bsc#1171608).\n- scsi: fnic: fix invalid stack access (bsc#1171609).\n- scsi: fnic: fix msix interrupt allocation (bsc#1171610).\n- scsi: ibmvscsi: Fix WARN_ON during event pool release (bsc#1170791 ltc#185128).\n- scsi: iscsi: Avoid potential deadlock in iscsi_if_rx func (bsc#1171611).\n- scsi: iscsi: Fix a potential deadlock in the timeout handler (bsc#1171612).\n- scsi: iscsi: qla4xxx: fix double free in probe (bsc#1171613).\n- scsi: lpfc: Change default queue allocation for reduced memory consumption (bsc#1164780).\n- scsi: lpfc: fix: Coverity: lpfc_cmpl_els_rsp(): Null pointer dereferences (bsc#1171614).\n- scsi: lpfc: Fix crash in target side cable pulls hitting WAIT_FOR_UNREG (bsc#1171615).\n- scsi: lpfc: Fix lpfc_nodelist leak when processing unsolicited event (bsc#1164780).\n- scsi: lpfc: Fix MDS Diagnostic Enablement definition (bsc#1164780).\n- scsi: lpfc: Fix negation of else clause in lpfc_prep_node_fc4type (bsc#1164780).\n- scsi: lpfc: Fix noderef and address space warnings (bsc#1164780).\n- scsi: lpfc: Maintain atomic consistency of queue_claimed flag (bsc#1164780).\n- scsi: lpfc: remove duplicate unloading checks (bsc#1164780).\n- scsi: lpfc: Remove re-binding of nvme rport during registration (bsc#1164780).\n- scsi: lpfc: Remove redundant initialization to variable rc (bsc#1164780).\n- scsi: lpfc: Remove unnecessary lockdep_assert_held calls (bsc#1164780).\n- scsi: lpfc: Update lpfc version to 12.8.0.1 (bsc#1164780).\n- scsi: megaraid_sas: Do not initiate OCR if controller is not in ready state (bsc#1171616).\n- scsi: qla2xxx: add ring buffer for tracing debug logs (bsc#1157169).\n- scsi: qla2xxx: check UNLOADING before posting async work (bsc#1157169).\n- scsi: qla2xxx: Delete all sessions before unregister local nvme port (bsc#1157169).\n- scsi: qla2xxx: Do not log message when reading port speed via sysfs (bsc#1157169).\n- scsi: qla2xxx: Fix hang when issuing nvme disconnect-all in NPIV (bsc#1157169).\n- scsi: qla2xxx: Fix regression warnings (bsc#1157169).\n- scsi: qla2xxx: Remove non functional code (bsc#1157169).\n- scsi: qla2xxx: set UNLOADING before waiting for session deletion (bsc#1157169).\n- scsi: qla4xxx: Adjust indentation in qla4xxx_mem_free (bsc#1171617).\n- scsi: qla4xxx: fix double free bug (bsc#1171618).\n- scsi: sd: Clear sdkp-\u003eprotection_type if disk is reformatted without PI (bsc#1171619).\n- scsi: sg: add sg_remove_request in sg_common_write (bsc#1171620).\n- scsi: tracing: Fix handling of TRANSFER LENGTH == 0 for READ(6) and WRITE(6) (bsc#1171621).\n- scsi: ufs: change msleep to usleep_range (bsc#1171622).\n- scsi: ufs: Clean up ufshcd_scale_clks() and clock scaling error out path (bsc#1171623).\n- scsi: ufs: Fix ufshcd_hold() caused scheduling while atomic (bsc#1171624).\n- scsi: ufs: Fix ufshcd_probe_hba() reture value in case ufshcd_scsi_add_wlus() fails (bsc#1171625).\n- scsi: ufs: Recheck bkops level if bkops is disabled (bsc#1171626).\n- sctp: fix possibly using a bad saddr with a given dst (networking-stable-20_04_02).\n- sctp: fix refcount bug in sctp_wfree (networking-stable-20_04_02).\n- selftests/powerpc: Fix build errors in powerpc ptrace selftests (boo#1124278).\n- Separate one more kABI fixup from the functional change:\n- seq_file: fix problem when seeking mid-record (bsc#1170125).\n- serial: uartps: Move the spinlock after the read of the tx empty (git-fixes).\n- sfc: detach from cb_page in efx_copy_channel() (networking-stable-20_03_14).\n- signal/pid_namespace: Fix reboot_pid_ns to use send_sig not force_sig (bsc#1172185).\n- slcan: not call free_netdev before rtnl_unlock in slcan_open (networking-stable-20_03_28).\n- slip: make slhc_compress() more robust against malicious packets (networking-stable-20_03_14).\n- SMB3: Additional compression structures (bsc#1144333).\n- SMB3: Add new compression flags (bsc#1144333).\n- SMB3: change noisy error message to FYI (bsc#1144333).\n- SMB3: enable swap on SMB3 mounts (bsc#1144333).\n- SMB3: Minor cleanup of protocol definitions (bsc#1144333).\n- SMB3: remove overly noisy debug line in signing errors (bsc#1144333).\n- SMB3: smbdirect support can be configured by default (bsc#1144333).\n- SMB3: use SMB2_SIGNATURE_SIZE define (bsc#1144333).\n- spi: bcm63xx-hsspi: Really keep pll clk enabled (bsc#1051510).\n- spi: bcm-qspi: when tx/rx buffer is NULL set to 0 (bsc#1051510).\n- spi: dw: Add SPI Rx-done wait method to DMA-based transfer (bsc#1051510).\n- spi: dw: Zero DMA Tx and Rx configurations on stack (bsc#1051510).\n- spi: pxa2xx: Add CS control clock quirk (bsc#1051510).\n- spi: qup: call spi_qup_pm_resume_runtime before suspending (bsc#1051510).\n- spi/zynqmp: remove entry that causes a cs glitch (bsc#1051510).\n- staging: comedi: dt2815: fix writing hi byte of analog output (bsc#1051510).\n- staging: comedi: Fix comedi_device refcnt leak in comedi_open (bsc#1051510).\n- staging: iio: ad2s1210: Fix SPI reading (bsc#1051510).\n- supported.conf: Add br_netfilter to base (bsc#1169020).\n- supported.conf: support w1 core and thermometer support\n- svcrdma: Fix double svc_rdma_send_ctxt_put() in an error path (bsc#1103992).\n- svcrdma: Fix leak of transport addresses (git-fixes).\n- svcrdma: Fix trace point use-after-free race (bsc#1103992 ).\n- taskstats: fix data-race (bsc#1172188).\n- tcp: cache line align MAX_TCP_HEADER (networking-stable-20_04_27).\n- tcp: repair: fix TCP_QUEUE_SEQ implementation (networking-stable-20_03_28).\n- team: add missing attribute validation for array index (networking-stable-20_03_14).\n- team: add missing attribute validation for port ifindex (networking-stable-20_03_14).\n- team: fix hang in team_mode_get() (networking-stable-20_04_27).\n- tools lib traceevent: Remove unneeded qsort and uses memmove instead (git-fixes).\n- tpm: ibmvtpm: retry on H_CLOSED in tpm_ibmvtpm_send() (bsc#1065729).\n- tpm/tpm_tis: Free IRQ if probing fails (bsc#1082555).\n- tun: Do not put_page() for all negative return values from XDP program (bsc#1109837).\n- Update config files: Build w1 bus on arm64 (jsc#SLE-11048)\n- USB: Add USB_QUIRK_DELAY_CTRL_MSG and USB_QUIRK_DELAY_INIT for Corsair K70 RGB RAPIDFIRE (git-fixes).\n- USB: cdc-acm: restore capability check order (git-fixes).\n- USB: core: Fix misleading driver bug report (bsc#1051510).\n- USB: dwc3: do not set gadget-\u003eis_otg flag (git-fixes).\n- USB: dwc3: gadget: Do link recovery for SS and SSP (git-fixes).\n- USB: early: Handle AMD\u0027s spec-compliant identifiers, too (git-fixes).\n- USB: f_fs: Clear OS Extended descriptor counts to zero in ffs_data_reset() (git-fixes).\n- USB: gadget: audio: Fix a missing error return value in audio_bind() (git-fixes).\n- USB: gadget: composite: Inform controller driver of self-powered (git-fixes).\n- USB: gadget: legacy: fix error return code in cdc_bind() (git-fixes).\n- USB: gadget: legacy: fix error return code in gncm_bind() (git-fixes).\n- usb: gadget: legacy: fix redundant initialization warnings (bsc#1051510).\n- USB: gadget: net2272: Fix a memory leak in an error handling path in \u0027net2272_plat_probe()\u0027 (git-fixes).\n- USB: gadget: udc: atmel: Fix vbus disconnect handling (git-fixes).\n- USB: gadget: udc: atmel: Make some symbols static (git-fixes).\n- USB: gadget: udc: bdc: Remove unnecessary NULL checks in bdc_req_complete (git-fixes).\n- USB: host: xhci-plat: keep runtime active when removing host (git-fixes).\n- USB: hub: Fix handling of connect changes during sleep (git-fixes).\n- usbnet: silence an unnecessary warning (bsc#1170770).\n- USB: serial: garmin_gps: add sanity checking for data length (git-fixes).\n- USB: serial: option: add BroadMobi BM806U (git-fixes).\n- USB: serial: option: add support for ASKEY WWHC050 (git-fixes).\n- USB: serial: option: add Wistron Neweb D19Q1 (git-fixes).\n- USB: serial: qcserial: Add DW5816e support (git-fixes).\n- USB: sisusbvga: Change port variable from signed to unsigned (git-fixes).\n- usb-storage: Add unusual_devs entry for JMicron JMS566 (git-fixes).\n- USB: uas: add quirk for LaCie 2Big Quadra (git-fixes).\n- USB: xhci: Fix NULL pointer dereference when enqueuing trbs from urb sg list (git-fixes).\n- video: fbdev: sis: Remove unnecessary parentheses and commented code (bsc#1114279)\n- video: fbdev: w100fb: Fix a potential double free (bsc#1051510).\n- vrf: Check skb for XFRM_TRANSFORMED flag (networking-stable-20_04_27).\n- vxlan: check return value of gro_cells_init() (networking-stable-20_03_28).\n- w1: Add subsystem kernel public interface (jsc#SLE-11048).\n- w1: Fix slave count on 1-Wire bus (resend) (jsc#SLE-11048).\n- w1: keep balance of mutex locks and refcnts (jsc#SLE-11048).\n- w1: use put_device() if device_register() fail (jsc#SLE-11048).\n- watchdog: reset last_hw_keepalive time at start (git-fixes).\n- wcn36xx: Fix error handling path in \u0027wcn36xx_probe()\u0027 (bsc#1051510).\n- wil6210: remove reset file from debugfs (git-fixes).\n- wimax/i2400m: Fix potential urb refcnt leak (bsc#1051510).\n- workqueue: do not use wq_select_unbound_cpu() for bound works (bsc#1172130).\n- x86/entry/64: Fix unwind hints in kernel exit path (bsc#1058115).\n- x86/entry/64: Fix unwind hints in register clearing code (bsc#1058115).\n- x86/entry/64: Fix unwind hints in rewind_stack_do_exit() (bsc#1058115).\n- x86/entry/64: Fix unwind hints in __switch_to_asm() (bsc#1058115).\n- x86/Hyper-V: Allow guests to enable InvariantTSC (bsc#1170621, bsc#1170620).\n- x86/Hyper-V: Free hv_panic_page when fail to register kmsg dump (bsc#1170617, bsc#1170618).\n- x86/Hyper-V: Report crash data in die() when panic_on_oops is set (bsc#1170617, bsc#1170618).\n- x86/Hyper-V: Report crash register data or kmsg before running crash kernel (bsc#1170617, bsc#1170618).\n- x86/Hyper-V: Report crash register data when sysctl_record_panic_msg is not set (bsc#1170617, bsc#1170618).\n- x86: Hyper-V: report value of misc_features (git fixes).\n- x86/Hyper-V: Trigger crash enlightenment only once during system crash (bsc#1170617, bsc#1170618).\n- x86/Hyper-V: Unload vmbus channel in hv panic callback (bsc#1170617, bsc#1170618).\n- x86/kprobes: Avoid kretprobe recursion bug (bsc#1114279).\n- x86/resctrl: Fix invalid attempt at removing the default resource group (git-fixes).\n- x86/resctrl: Preserve CDP enable over CPU hotplug (bsc#1114279).\n- x86/unwind/orc: Do not skip the first frame for inactive tasks (bsc#1058115).\n- x86/unwind/orc: Fix error handling in __unwind_start() (bsc#1058115).\n- x86/unwind/orc: Fix error path for bad ORC entry type (bsc#1058115).\n- x86/unwind/orc: Fix unwind_get_return_address_ptr() for inactive tasks (bsc#1058115).\n- x86/unwind/orc: Prevent unwinding before ORC initialization (bsc#1058115).\n- x86/unwind: Prevent false warnings for non-current tasks (bsc#1058115).\n- xen/pci: reserve MCFG areas earlier (bsc#1170145).\n- xfrm: Always set XFRM_TRANSFORMED in xfrm{4,6}_output_finish (networking-stable-20_04_27).\n- xfs: clear PF_MEMALLOC before exiting xfsaild thread (git-fixes).\n- xfs: Correctly invert xfs_buftarg LRU isolation logic (git-fixes).\n- xfs: do not ever return a stale pointer from __xfs_dir3_free_read (git-fixes).\n- xprtrdma: Fix completion wait during device removal (git-fixes).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2020-1599,SUSE-SLE-Module-Basesystem-15-SP1-2020-1599,SUSE-SLE-Module-Development-Tools-15-SP1-2020-1599,SUSE-SLE-Module-Legacy-15-SP1-2020-1599,SUSE-SLE-Module-Live-Patching-15-SP1-2020-1599,SUSE-SLE-Product-HA-15-SP1-2020-1599,SUSE-SLE-Product-WE-15-SP1-2020-1599", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2020_1599-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2020:1599-1", "url": "https://www.suse.com/support/update/announcement/2020/suse-su-20201599-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2020:1599-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-June/006921.html" }, { "category": "self", "summary": "SUSE Bug 1051510", "url": "https://bugzilla.suse.com/1051510" }, { "category": "self", "summary": "SUSE Bug 1058115", "url": "https://bugzilla.suse.com/1058115" }, { "category": "self", "summary": "SUSE Bug 1065729", "url": "https://bugzilla.suse.com/1065729" }, { "category": "self", "summary": "SUSE Bug 1082555", "url": "https://bugzilla.suse.com/1082555" }, { "category": "self", "summary": "SUSE Bug 1083647", "url": "https://bugzilla.suse.com/1083647" }, { "category": "self", "summary": "SUSE Bug 1089895", "url": "https://bugzilla.suse.com/1089895" }, { "category": "self", "summary": "SUSE Bug 1103990", "url": "https://bugzilla.suse.com/1103990" }, { "category": "self", "summary": "SUSE Bug 1103991", "url": "https://bugzilla.suse.com/1103991" }, { "category": "self", "summary": "SUSE Bug 1103992", "url": "https://bugzilla.suse.com/1103992" }, { "category": "self", "summary": "SUSE Bug 1104745", "url": "https://bugzilla.suse.com/1104745" }, { "category": "self", "summary": "SUSE Bug 1109837", "url": "https://bugzilla.suse.com/1109837" }, { "category": "self", "summary": "SUSE Bug 1111666", "url": "https://bugzilla.suse.com/1111666" }, { "category": "self", "summary": "SUSE Bug 1112178", "url": "https://bugzilla.suse.com/1112178" }, { "category": "self", "summary": "SUSE Bug 1112374", "url": "https://bugzilla.suse.com/1112374" }, { "category": "self", "summary": "SUSE Bug 1113956", "url": "https://bugzilla.suse.com/1113956" }, { "category": "self", "summary": "SUSE Bug 1114279", "url": "https://bugzilla.suse.com/1114279" }, { "category": "self", "summary": "SUSE Bug 1124278", "url": "https://bugzilla.suse.com/1124278" }, { "category": "self", "summary": "SUSE Bug 1127354", "url": "https://bugzilla.suse.com/1127354" }, { "category": "self", "summary": "SUSE Bug 1127355", "url": "https://bugzilla.suse.com/1127355" }, { "category": "self", "summary": "SUSE Bug 1127371", "url": "https://bugzilla.suse.com/1127371" }, { "category": "self", "summary": "SUSE Bug 1133021", "url": "https://bugzilla.suse.com/1133021" }, { "category": "self", "summary": "SUSE Bug 1142685", "url": "https://bugzilla.suse.com/1142685" }, { "category": "self", "summary": "SUSE Bug 1144333", "url": "https://bugzilla.suse.com/1144333" }, { "category": "self", "summary": "SUSE Bug 1151794", "url": "https://bugzilla.suse.com/1151794" }, { "category": "self", "summary": "SUSE Bug 1152489", "url": "https://bugzilla.suse.com/1152489" }, { "category": "self", "summary": "SUSE Bug 1154824", "url": "https://bugzilla.suse.com/1154824" }, { "category": "self", "summary": "SUSE Bug 1157169", "url": "https://bugzilla.suse.com/1157169" }, { "category": "self", "summary": "SUSE Bug 1158265", "url": "https://bugzilla.suse.com/1158265" }, { "category": "self", "summary": "SUSE Bug 1160388", "url": "https://bugzilla.suse.com/1160388" }, { "category": "self", "summary": "SUSE Bug 1160947", "url": "https://bugzilla.suse.com/1160947" }, { "category": "self", "summary": "SUSE Bug 1164780", "url": "https://bugzilla.suse.com/1164780" }, { "category": "self", "summary": "SUSE Bug 1164871", "url": "https://bugzilla.suse.com/1164871" }, { "category": "self", "summary": "SUSE Bug 1165183", "url": "https://bugzilla.suse.com/1165183" }, { "category": "self", "summary": "SUSE Bug 1165478", "url": "https://bugzilla.suse.com/1165478" }, { "category": "self", "summary": "SUSE Bug 1165741", "url": "https://bugzilla.suse.com/1165741" }, { "category": "self", "summary": "SUSE Bug 1166969", "url": "https://bugzilla.suse.com/1166969" }, { "category": "self", "summary": "SUSE Bug 1166978", "url": "https://bugzilla.suse.com/1166978" }, { "category": "self", "summary": "SUSE Bug 1167574", "url": "https://bugzilla.suse.com/1167574" }, { "category": "self", "summary": "SUSE Bug 1167851", "url": "https://bugzilla.suse.com/1167851" }, { "category": "self", "summary": "SUSE Bug 1167867", "url": "https://bugzilla.suse.com/1167867" }, { "category": "self", "summary": "SUSE Bug 1168332", "url": "https://bugzilla.suse.com/1168332" }, { "category": "self", "summary": "SUSE Bug 1168670", "url": "https://bugzilla.suse.com/1168670" }, { "category": "self", "summary": "SUSE Bug 1168789", "url": "https://bugzilla.suse.com/1168789" }, { "category": "self", "summary": "SUSE Bug 1169020", "url": "https://bugzilla.suse.com/1169020" }, { "category": "self", "summary": "SUSE Bug 1169514", "url": "https://bugzilla.suse.com/1169514" }, { "category": "self", "summary": "SUSE Bug 1169525", "url": "https://bugzilla.suse.com/1169525" }, { "category": "self", "summary": "SUSE Bug 1169762", "url": "https://bugzilla.suse.com/1169762" }, { "category": "self", "summary": "SUSE Bug 1170056", "url": "https://bugzilla.suse.com/1170056" }, { "category": "self", "summary": "SUSE Bug 1170125", "url": "https://bugzilla.suse.com/1170125" }, { "category": "self", "summary": "SUSE Bug 1170145", "url": "https://bugzilla.suse.com/1170145" }, { "category": "self", "summary": "SUSE Bug 1170284", "url": "https://bugzilla.suse.com/1170284" }, { "category": "self", "summary": "SUSE Bug 1170345", "url": "https://bugzilla.suse.com/1170345" }, { "category": "self", "summary": "SUSE Bug 1170457", "url": "https://bugzilla.suse.com/1170457" }, { "category": "self", "summary": "SUSE Bug 1170522", "url": "https://bugzilla.suse.com/1170522" }, { "category": "self", "summary": "SUSE Bug 1170592", "url": "https://bugzilla.suse.com/1170592" }, { "category": "self", "summary": "SUSE Bug 1170617", "url": "https://bugzilla.suse.com/1170617" }, { "category": "self", "summary": "SUSE Bug 1170618", "url": "https://bugzilla.suse.com/1170618" }, { "category": "self", "summary": "SUSE Bug 1170620", "url": "https://bugzilla.suse.com/1170620" }, { "category": "self", "summary": "SUSE Bug 1170621", "url": "https://bugzilla.suse.com/1170621" }, { "category": "self", "summary": "SUSE Bug 1170770", "url": "https://bugzilla.suse.com/1170770" }, { "category": "self", "summary": "SUSE Bug 1170778", "url": "https://bugzilla.suse.com/1170778" }, { "category": "self", "summary": "SUSE Bug 1170791", "url": "https://bugzilla.suse.com/1170791" }, { "category": "self", "summary": "SUSE Bug 1170901", "url": "https://bugzilla.suse.com/1170901" }, { "category": "self", "summary": "SUSE Bug 1171078", "url": "https://bugzilla.suse.com/1171078" }, { "category": "self", "summary": "SUSE Bug 1171098", "url": "https://bugzilla.suse.com/1171098" }, { "category": "self", "summary": "SUSE Bug 1171118", "url": "https://bugzilla.suse.com/1171118" }, { "category": "self", "summary": "SUSE Bug 1171189", "url": "https://bugzilla.suse.com/1171189" }, { "category": "self", "summary": "SUSE Bug 1171191", "url": "https://bugzilla.suse.com/1171191" }, { "category": "self", "summary": "SUSE Bug 1171195", "url": "https://bugzilla.suse.com/1171195" }, { "category": "self", "summary": "SUSE Bug 1171202", "url": "https://bugzilla.suse.com/1171202" }, { "category": "self", "summary": "SUSE Bug 1171205", "url": "https://bugzilla.suse.com/1171205" }, { "category": "self", "summary": "SUSE Bug 1171214", "url": "https://bugzilla.suse.com/1171214" }, { "category": "self", "summary": "SUSE Bug 1171217", "url": "https://bugzilla.suse.com/1171217" }, { "category": "self", "summary": "SUSE Bug 1171218", "url": "https://bugzilla.suse.com/1171218" }, { "category": "self", "summary": "SUSE Bug 1171219", "url": "https://bugzilla.suse.com/1171219" }, { "category": "self", "summary": "SUSE Bug 1171220", "url": "https://bugzilla.suse.com/1171220" }, { "category": "self", "summary": "SUSE Bug 1171244", "url": "https://bugzilla.suse.com/1171244" }, { "category": "self", "summary": "SUSE Bug 1171293", "url": "https://bugzilla.suse.com/1171293" }, { "category": "self", "summary": "SUSE Bug 1171417", "url": "https://bugzilla.suse.com/1171417" }, { "category": "self", "summary": "SUSE Bug 1171527", "url": "https://bugzilla.suse.com/1171527" }, { "category": "self", "summary": "SUSE Bug 1171599", "url": "https://bugzilla.suse.com/1171599" }, { "category": "self", "summary": "SUSE Bug 1171600", "url": "https://bugzilla.suse.com/1171600" }, { "category": "self", "summary": "SUSE Bug 1171601", "url": "https://bugzilla.suse.com/1171601" }, { "category": "self", "summary": "SUSE Bug 1171602", "url": "https://bugzilla.suse.com/1171602" }, { "category": "self", "summary": "SUSE Bug 1171604", "url": "https://bugzilla.suse.com/1171604" }, { "category": "self", "summary": "SUSE Bug 1171605", "url": "https://bugzilla.suse.com/1171605" }, { "category": "self", "summary": "SUSE Bug 1171606", "url": "https://bugzilla.suse.com/1171606" }, { "category": "self", "summary": "SUSE Bug 1171607", "url": "https://bugzilla.suse.com/1171607" }, { "category": "self", "summary": "SUSE Bug 1171608", "url": "https://bugzilla.suse.com/1171608" }, { "category": "self", "summary": "SUSE Bug 1171609", "url": "https://bugzilla.suse.com/1171609" }, { "category": "self", "summary": "SUSE Bug 1171610", "url": "https://bugzilla.suse.com/1171610" }, { "category": "self", "summary": "SUSE Bug 1171611", "url": "https://bugzilla.suse.com/1171611" }, { "category": "self", "summary": "SUSE Bug 1171612", "url": "https://bugzilla.suse.com/1171612" }, { "category": "self", "summary": "SUSE Bug 1171613", "url": "https://bugzilla.suse.com/1171613" }, { "category": "self", "summary": "SUSE Bug 1171614", "url": "https://bugzilla.suse.com/1171614" }, { "category": "self", "summary": "SUSE Bug 1171615", "url": "https://bugzilla.suse.com/1171615" }, { "category": "self", "summary": "SUSE Bug 1171616", "url": "https://bugzilla.suse.com/1171616" }, { "category": "self", "summary": "SUSE Bug 1171617", "url": "https://bugzilla.suse.com/1171617" }, { "category": "self", "summary": "SUSE Bug 1171618", "url": "https://bugzilla.suse.com/1171618" }, { "category": "self", "summary": "SUSE Bug 1171619", "url": "https://bugzilla.suse.com/1171619" }, { "category": "self", "summary": "SUSE Bug 1171620", "url": "https://bugzilla.suse.com/1171620" }, { "category": "self", "summary": "SUSE Bug 1171621", "url": "https://bugzilla.suse.com/1171621" }, { "category": "self", "summary": "SUSE Bug 1171622", "url": "https://bugzilla.suse.com/1171622" }, { "category": "self", "summary": "SUSE Bug 1171623", "url": "https://bugzilla.suse.com/1171623" }, { "category": "self", "summary": "SUSE Bug 1171624", "url": "https://bugzilla.suse.com/1171624" }, { "category": "self", "summary": "SUSE Bug 1171625", "url": "https://bugzilla.suse.com/1171625" }, { "category": "self", "summary": "SUSE Bug 1171626", "url": "https://bugzilla.suse.com/1171626" }, { "category": "self", "summary": "SUSE Bug 1171662", "url": "https://bugzilla.suse.com/1171662" }, { "category": "self", "summary": "SUSE Bug 1171679", "url": "https://bugzilla.suse.com/1171679" }, { "category": "self", "summary": "SUSE Bug 1171691", "url": "https://bugzilla.suse.com/1171691" }, { "category": "self", "summary": "SUSE Bug 1171692", "url": "https://bugzilla.suse.com/1171692" }, { "category": "self", "summary": "SUSE Bug 1171694", "url": "https://bugzilla.suse.com/1171694" }, { "category": "self", "summary": "SUSE Bug 1171695", "url": "https://bugzilla.suse.com/1171695" }, { "category": "self", "summary": "SUSE Bug 1171736", "url": "https://bugzilla.suse.com/1171736" }, { "category": "self", "summary": "SUSE Bug 1171817", "url": "https://bugzilla.suse.com/1171817" }, { "category": "self", "summary": "SUSE Bug 1171948", "url": "https://bugzilla.suse.com/1171948" }, { "category": "self", "summary": "SUSE Bug 1171949", "url": "https://bugzilla.suse.com/1171949" }, { "category": "self", "summary": "SUSE Bug 1171951", "url": "https://bugzilla.suse.com/1171951" }, { "category": "self", "summary": "SUSE Bug 1171952", "url": "https://bugzilla.suse.com/1171952" }, { "category": "self", "summary": "SUSE Bug 1171979", "url": "https://bugzilla.suse.com/1171979" }, { "category": "self", "summary": "SUSE Bug 1171982", "url": "https://bugzilla.suse.com/1171982" }, { "category": "self", "summary": "SUSE Bug 1171983", "url": "https://bugzilla.suse.com/1171983" }, { "category": "self", "summary": "SUSE Bug 1172017", "url": "https://bugzilla.suse.com/1172017" }, { "category": "self", "summary": "SUSE Bug 1172096", "url": "https://bugzilla.suse.com/1172096" }, { "category": "self", "summary": "SUSE Bug 1172097", "url": "https://bugzilla.suse.com/1172097" }, { "category": "self", "summary": "SUSE Bug 1172098", "url": "https://bugzilla.suse.com/1172098" }, { "category": "self", "summary": "SUSE Bug 1172099", "url": "https://bugzilla.suse.com/1172099" }, { "category": "self", "summary": "SUSE Bug 1172101", "url": "https://bugzilla.suse.com/1172101" }, { "category": "self", "summary": "SUSE Bug 1172102", "url": "https://bugzilla.suse.com/1172102" }, { "category": "self", "summary": "SUSE Bug 1172103", "url": "https://bugzilla.suse.com/1172103" }, { "category": "self", "summary": "SUSE Bug 1172104", "url": "https://bugzilla.suse.com/1172104" }, { "category": "self", "summary": "SUSE Bug 1172127", "url": "https://bugzilla.suse.com/1172127" }, { "category": "self", "summary": "SUSE Bug 1172130", "url": "https://bugzilla.suse.com/1172130" }, { "category": "self", "summary": "SUSE Bug 1172185", "url": "https://bugzilla.suse.com/1172185" }, { "category": "self", "summary": "SUSE Bug 1172188", "url": "https://bugzilla.suse.com/1172188" }, { "category": "self", "summary": "SUSE Bug 1172199", "url": "https://bugzilla.suse.com/1172199" }, { "category": "self", "summary": "SUSE Bug 1172201", "url": "https://bugzilla.suse.com/1172201" }, { "category": "self", "summary": "SUSE Bug 1172202", "url": "https://bugzilla.suse.com/1172202" }, { "category": "self", "summary": "SUSE Bug 1172221", "url": "https://bugzilla.suse.com/1172221" }, { "category": "self", "summary": "SUSE Bug 1172249", "url": "https://bugzilla.suse.com/1172249" }, { "category": "self", "summary": "SUSE Bug 1172251", "url": "https://bugzilla.suse.com/1172251" }, { "category": "self", "summary": "SUSE Bug 1172317", "url": "https://bugzilla.suse.com/1172317" }, { "category": "self", "summary": "SUSE Bug 1172342", "url": "https://bugzilla.suse.com/1172342" }, { "category": "self", "summary": "SUSE Bug 1172343", "url": "https://bugzilla.suse.com/1172343" }, { "category": "self", "summary": "SUSE Bug 1172344", "url": "https://bugzilla.suse.com/1172344" }, { "category": "self", "summary": "SUSE Bug 1172366", "url": "https://bugzilla.suse.com/1172366" }, { "category": "self", "summary": "SUSE Bug 1172378", "url": "https://bugzilla.suse.com/1172378" }, { "category": "self", "summary": "SUSE Bug 1172391", "url": "https://bugzilla.suse.com/1172391" }, { "category": "self", "summary": "SUSE Bug 1172397", "url": "https://bugzilla.suse.com/1172397" }, { "category": "self", "summary": "SUSE Bug 1172453", "url": "https://bugzilla.suse.com/1172453" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1000199 page", "url": "https://www.suse.com/security/cve/CVE-2018-1000199/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-19462 page", "url": "https://www.suse.com/security/cve/CVE-2019-19462/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-20806 page", "url": "https://www.suse.com/security/cve/CVE-2019-20806/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-20812 page", "url": "https://www.suse.com/security/cve/CVE-2019-20812/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9455 page", "url": "https://www.suse.com/security/cve/CVE-2019-9455/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-0543 page", "url": "https://www.suse.com/security/cve/CVE-2020-0543/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10690 page", "url": "https://www.suse.com/security/cve/CVE-2020-10690/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10711 page", "url": "https://www.suse.com/security/cve/CVE-2020-10711/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10720 page", "url": "https://www.suse.com/security/cve/CVE-2020-10720/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10732 page", "url": "https://www.suse.com/security/cve/CVE-2020-10732/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10751 page", "url": "https://www.suse.com/security/cve/CVE-2020-10751/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10757 page", "url": "https://www.suse.com/security/cve/CVE-2020-10757/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12114 page", "url": "https://www.suse.com/security/cve/CVE-2020-12114/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12464 page", "url": "https://www.suse.com/security/cve/CVE-2020-12464/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12652 page", "url": "https://www.suse.com/security/cve/CVE-2020-12652/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12653 page", "url": "https://www.suse.com/security/cve/CVE-2020-12653/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12654 page", "url": "https://www.suse.com/security/cve/CVE-2020-12654/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12655 page", "url": "https://www.suse.com/security/cve/CVE-2020-12655/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12656 page", "url": "https://www.suse.com/security/cve/CVE-2020-12656/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12657 page", "url": "https://www.suse.com/security/cve/CVE-2020-12657/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12659 page", "url": "https://www.suse.com/security/cve/CVE-2020-12659/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12768 page", "url": "https://www.suse.com/security/cve/CVE-2020-12768/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12769 page", "url": "https://www.suse.com/security/cve/CVE-2020-12769/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-13143 page", "url": "https://www.suse.com/security/cve/CVE-2020-13143/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2020-06-10T09:12:29Z", "generator": { "date": "2020-06-10T09:12:29Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2020:1599-1", "initial_release_date": "2020-06-10T09:12:29Z", "revision_history": [ { "date": "2020-06-10T09:12:29Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-197.45.1.aarch64", "product": { "name": "cluster-md-kmp-default-4.12.14-197.45.1.aarch64", "product_id": "cluster-md-kmp-default-4.12.14-197.45.1.aarch64" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-197.45.1.aarch64", "product": { "name": "dlm-kmp-default-4.12.14-197.45.1.aarch64", "product_id": "dlm-kmp-default-4.12.14-197.45.1.aarch64" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-197.45.1.aarch64", "product": { "name": "gfs2-kmp-default-4.12.14-197.45.1.aarch64", "product_id": "gfs2-kmp-default-4.12.14-197.45.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-4.12.14-197.45.1.aarch64", "product": { "name": "kernel-default-4.12.14-197.45.1.aarch64", "product_id": "kernel-default-4.12.14-197.45.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-197.45.1.aarch64", "product": { "name": "kernel-default-base-4.12.14-197.45.1.aarch64", "product_id": "kernel-default-base-4.12.14-197.45.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-197.45.1.aarch64", "product": { "name": "kernel-default-devel-4.12.14-197.45.1.aarch64", "product_id": "kernel-default-devel-4.12.14-197.45.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-197.45.1.aarch64", "product": { "name": "kernel-default-extra-4.12.14-197.45.1.aarch64", "product_id": "kernel-default-extra-4.12.14-197.45.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-livepatch-4.12.14-197.45.1.aarch64", "product": { "name": "kernel-default-livepatch-4.12.14-197.45.1.aarch64", "product_id": "kernel-default-livepatch-4.12.14-197.45.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-livepatch-devel-4.12.14-197.45.1.aarch64", "product": { "name": "kernel-default-livepatch-devel-4.12.14-197.45.1.aarch64", "product_id": "kernel-default-livepatch-devel-4.12.14-197.45.1.aarch64" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-197.45.1.aarch64", "product": { "name": "kernel-obs-build-4.12.14-197.45.1.aarch64", "product_id": "kernel-obs-build-4.12.14-197.45.1.aarch64" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-197.45.1.aarch64", "product": { "name": "kernel-obs-qa-4.12.14-197.45.1.aarch64", "product_id": "kernel-obs-qa-4.12.14-197.45.1.aarch64" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-197.45.1.aarch64", "product": { "name": "kernel-syms-4.12.14-197.45.1.aarch64", "product_id": "kernel-syms-4.12.14-197.45.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-197.45.1.aarch64", "product": { "name": "kernel-vanilla-4.12.14-197.45.1.aarch64", "product_id": "kernel-vanilla-4.12.14-197.45.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-197.45.1.aarch64", "product": { "name": "kernel-vanilla-base-4.12.14-197.45.1.aarch64", "product_id": "kernel-vanilla-base-4.12.14-197.45.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-197.45.1.aarch64", "product": { "name": "kernel-vanilla-devel-4.12.14-197.45.1.aarch64", "product_id": "kernel-vanilla-devel-4.12.14-197.45.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-livepatch-devel-4.12.14-197.45.1.aarch64", "product": { "name": "kernel-vanilla-livepatch-devel-4.12.14-197.45.1.aarch64", "product_id": "kernel-vanilla-livepatch-devel-4.12.14-197.45.1.aarch64" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-197.45.1.aarch64", "product": { "name": "kselftests-kmp-default-4.12.14-197.45.1.aarch64", "product_id": "kselftests-kmp-default-4.12.14-197.45.1.aarch64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-197.45.1.aarch64", "product": { "name": "ocfs2-kmp-default-4.12.14-197.45.1.aarch64", "product_id": "ocfs2-kmp-default-4.12.14-197.45.1.aarch64" } }, { "category": "product_version", "name": "reiserfs-kmp-default-4.12.14-197.45.1.aarch64", "product": { "name": "reiserfs-kmp-default-4.12.14-197.45.1.aarch64", "product_id": "reiserfs-kmp-default-4.12.14-197.45.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-4.12.14-197.45.1.noarch", "product": { "name": "kernel-devel-4.12.14-197.45.1.noarch", "product_id": "kernel-devel-4.12.14-197.45.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-4.12.14-197.45.1.noarch", "product": { "name": "kernel-docs-4.12.14-197.45.1.noarch", "product_id": "kernel-docs-4.12.14-197.45.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-html-4.12.14-197.45.1.noarch", "product": { "name": "kernel-docs-html-4.12.14-197.45.1.noarch", "product_id": "kernel-docs-html-4.12.14-197.45.1.noarch" } }, { "category": "product_version", "name": "kernel-macros-4.12.14-197.45.1.noarch", "product": { "name": "kernel-macros-4.12.14-197.45.1.noarch", "product_id": "kernel-macros-4.12.14-197.45.1.noarch" } }, { "category": "product_version", "name": "kernel-source-4.12.14-197.45.1.noarch", "product": { "name": "kernel-source-4.12.14-197.45.1.noarch", "product_id": "kernel-source-4.12.14-197.45.1.noarch" } }, { "category": "product_version", "name": "kernel-source-vanilla-4.12.14-197.45.1.noarch", "product": { "name": "kernel-source-vanilla-4.12.14-197.45.1.noarch", "product_id": "kernel-source-vanilla-4.12.14-197.45.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-197.45.1.ppc64le", "product": { "name": "cluster-md-kmp-default-4.12.14-197.45.1.ppc64le", "product_id": "cluster-md-kmp-default-4.12.14-197.45.1.ppc64le" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-197.45.1.ppc64le", "product": { "name": "dlm-kmp-default-4.12.14-197.45.1.ppc64le", "product_id": "dlm-kmp-default-4.12.14-197.45.1.ppc64le" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-197.45.1.ppc64le", "product": { "name": "gfs2-kmp-default-4.12.14-197.45.1.ppc64le", "product_id": "gfs2-kmp-default-4.12.14-197.45.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-4.12.14-197.45.1.ppc64le", "product": { "name": "kernel-debug-4.12.14-197.45.1.ppc64le", "product_id": "kernel-debug-4.12.14-197.45.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-base-4.12.14-197.45.1.ppc64le", "product": { "name": "kernel-debug-base-4.12.14-197.45.1.ppc64le", "product_id": "kernel-debug-base-4.12.14-197.45.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-devel-4.12.14-197.45.1.ppc64le", "product": { "name": "kernel-debug-devel-4.12.14-197.45.1.ppc64le", "product_id": "kernel-debug-devel-4.12.14-197.45.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-livepatch-devel-4.12.14-197.45.1.ppc64le", "product": { "name": "kernel-debug-livepatch-devel-4.12.14-197.45.1.ppc64le", "product_id": "kernel-debug-livepatch-devel-4.12.14-197.45.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-4.12.14-197.45.1.ppc64le", "product": { "name": "kernel-default-4.12.14-197.45.1.ppc64le", "product_id": "kernel-default-4.12.14-197.45.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-197.45.1.ppc64le", "product": { "name": "kernel-default-base-4.12.14-197.45.1.ppc64le", "product_id": "kernel-default-base-4.12.14-197.45.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-197.45.1.ppc64le", "product": { "name": "kernel-default-devel-4.12.14-197.45.1.ppc64le", "product_id": "kernel-default-devel-4.12.14-197.45.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-197.45.1.ppc64le", "product": { "name": "kernel-default-extra-4.12.14-197.45.1.ppc64le", "product_id": "kernel-default-extra-4.12.14-197.45.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-livepatch-4.12.14-197.45.1.ppc64le", "product": { "name": "kernel-default-livepatch-4.12.14-197.45.1.ppc64le", "product_id": "kernel-default-livepatch-4.12.14-197.45.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-livepatch-devel-4.12.14-197.45.1.ppc64le", "product": { "name": "kernel-default-livepatch-devel-4.12.14-197.45.1.ppc64le", "product_id": "kernel-default-livepatch-devel-4.12.14-197.45.1.ppc64le" } }, { "category": "product_version", "name": "kernel-livepatch-4_12_14-197_45-default-1-3.5.1.ppc64le", "product": { "name": "kernel-livepatch-4_12_14-197_45-default-1-3.5.1.ppc64le", "product_id": "kernel-livepatch-4_12_14-197_45-default-1-3.5.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-197.45.1.ppc64le", "product": { "name": "kernel-obs-build-4.12.14-197.45.1.ppc64le", "product_id": "kernel-obs-build-4.12.14-197.45.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-197.45.1.ppc64le", "product": { "name": "kernel-obs-qa-4.12.14-197.45.1.ppc64le", "product_id": "kernel-obs-qa-4.12.14-197.45.1.ppc64le" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-197.45.1.ppc64le", "product": { "name": "kernel-syms-4.12.14-197.45.1.ppc64le", "product_id": "kernel-syms-4.12.14-197.45.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-197.45.1.ppc64le", "product": { "name": "kernel-vanilla-4.12.14-197.45.1.ppc64le", "product_id": "kernel-vanilla-4.12.14-197.45.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-197.45.1.ppc64le", "product": { "name": "kernel-vanilla-base-4.12.14-197.45.1.ppc64le", "product_id": "kernel-vanilla-base-4.12.14-197.45.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-197.45.1.ppc64le", "product": { "name": "kernel-vanilla-devel-4.12.14-197.45.1.ppc64le", "product_id": "kernel-vanilla-devel-4.12.14-197.45.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-livepatch-devel-4.12.14-197.45.1.ppc64le", "product": { "name": "kernel-vanilla-livepatch-devel-4.12.14-197.45.1.ppc64le", "product_id": "kernel-vanilla-livepatch-devel-4.12.14-197.45.1.ppc64le" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-197.45.1.ppc64le", "product": { "name": "kselftests-kmp-default-4.12.14-197.45.1.ppc64le", "product_id": "kselftests-kmp-default-4.12.14-197.45.1.ppc64le" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-197.45.1.ppc64le", "product": { "name": "ocfs2-kmp-default-4.12.14-197.45.1.ppc64le", "product_id": "ocfs2-kmp-default-4.12.14-197.45.1.ppc64le" } }, { "category": "product_version", "name": "reiserfs-kmp-default-4.12.14-197.45.1.ppc64le", "product": { "name": "reiserfs-kmp-default-4.12.14-197.45.1.ppc64le", "product_id": "reiserfs-kmp-default-4.12.14-197.45.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-197.45.1.s390x", "product": { "name": "cluster-md-kmp-default-4.12.14-197.45.1.s390x", "product_id": "cluster-md-kmp-default-4.12.14-197.45.1.s390x" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-197.45.1.s390x", "product": { "name": "dlm-kmp-default-4.12.14-197.45.1.s390x", "product_id": "dlm-kmp-default-4.12.14-197.45.1.s390x" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-197.45.1.s390x", "product": { "name": "gfs2-kmp-default-4.12.14-197.45.1.s390x", "product_id": "gfs2-kmp-default-4.12.14-197.45.1.s390x" } }, { "category": "product_version", "name": "kernel-default-4.12.14-197.45.1.s390x", "product": { "name": "kernel-default-4.12.14-197.45.1.s390x", "product_id": "kernel-default-4.12.14-197.45.1.s390x" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-197.45.1.s390x", "product": { "name": "kernel-default-base-4.12.14-197.45.1.s390x", "product_id": "kernel-default-base-4.12.14-197.45.1.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-197.45.1.s390x", "product": { "name": "kernel-default-devel-4.12.14-197.45.1.s390x", "product_id": "kernel-default-devel-4.12.14-197.45.1.s390x" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-197.45.1.s390x", "product": { "name": "kernel-default-extra-4.12.14-197.45.1.s390x", "product_id": "kernel-default-extra-4.12.14-197.45.1.s390x" } }, { "category": "product_version", "name": "kernel-default-livepatch-4.12.14-197.45.1.s390x", "product": { "name": "kernel-default-livepatch-4.12.14-197.45.1.s390x", "product_id": "kernel-default-livepatch-4.12.14-197.45.1.s390x" } }, { "category": "product_version", "name": "kernel-default-livepatch-devel-4.12.14-197.45.1.s390x", "product": { "name": "kernel-default-livepatch-devel-4.12.14-197.45.1.s390x", "product_id": "kernel-default-livepatch-devel-4.12.14-197.45.1.s390x" } }, { "category": "product_version", "name": "kernel-default-man-4.12.14-197.45.1.s390x", "product": { "name": "kernel-default-man-4.12.14-197.45.1.s390x", "product_id": "kernel-default-man-4.12.14-197.45.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-197.45.1.s390x", "product": { "name": "kernel-obs-build-4.12.14-197.45.1.s390x", "product_id": "kernel-obs-build-4.12.14-197.45.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-197.45.1.s390x", "product": { "name": "kernel-obs-qa-4.12.14-197.45.1.s390x", "product_id": "kernel-obs-qa-4.12.14-197.45.1.s390x" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-197.45.1.s390x", "product": { "name": "kernel-syms-4.12.14-197.45.1.s390x", "product_id": "kernel-syms-4.12.14-197.45.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-197.45.1.s390x", "product": { "name": "kernel-vanilla-4.12.14-197.45.1.s390x", "product_id": "kernel-vanilla-4.12.14-197.45.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-197.45.1.s390x", "product": { "name": "kernel-vanilla-base-4.12.14-197.45.1.s390x", "product_id": "kernel-vanilla-base-4.12.14-197.45.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-197.45.1.s390x", "product": { "name": "kernel-vanilla-devel-4.12.14-197.45.1.s390x", "product_id": "kernel-vanilla-devel-4.12.14-197.45.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-livepatch-devel-4.12.14-197.45.1.s390x", "product": { "name": "kernel-vanilla-livepatch-devel-4.12.14-197.45.1.s390x", "product_id": "kernel-vanilla-livepatch-devel-4.12.14-197.45.1.s390x" } }, { "category": "product_version", "name": "kernel-zfcpdump-4.12.14-197.45.1.s390x", "product": { "name": "kernel-zfcpdump-4.12.14-197.45.1.s390x", "product_id": "kernel-zfcpdump-4.12.14-197.45.1.s390x" } }, { "category": "product_version", "name": "kernel-zfcpdump-man-4.12.14-197.45.1.s390x", "product": { "name": "kernel-zfcpdump-man-4.12.14-197.45.1.s390x", "product_id": "kernel-zfcpdump-man-4.12.14-197.45.1.s390x" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-197.45.1.s390x", "product": { "name": "kselftests-kmp-default-4.12.14-197.45.1.s390x", "product_id": "kselftests-kmp-default-4.12.14-197.45.1.s390x" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-197.45.1.s390x", "product": { "name": "ocfs2-kmp-default-4.12.14-197.45.1.s390x", "product_id": "ocfs2-kmp-default-4.12.14-197.45.1.s390x" } }, { "category": "product_version", "name": "reiserfs-kmp-default-4.12.14-197.45.1.s390x", "product": { "name": "reiserfs-kmp-default-4.12.14-197.45.1.s390x", "product_id": "reiserfs-kmp-default-4.12.14-197.45.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-197.45.1.x86_64", "product": { "name": "cluster-md-kmp-default-4.12.14-197.45.1.x86_64", "product_id": "cluster-md-kmp-default-4.12.14-197.45.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-197.45.1.x86_64", "product": { "name": "dlm-kmp-default-4.12.14-197.45.1.x86_64", "product_id": "dlm-kmp-default-4.12.14-197.45.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-197.45.1.x86_64", "product": { "name": "gfs2-kmp-default-4.12.14-197.45.1.x86_64", "product_id": "gfs2-kmp-default-4.12.14-197.45.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-4.12.14-197.45.1.x86_64", "product": { "name": "kernel-debug-4.12.14-197.45.1.x86_64", "product_id": "kernel-debug-4.12.14-197.45.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-base-4.12.14-197.45.1.x86_64", "product": { "name": "kernel-debug-base-4.12.14-197.45.1.x86_64", "product_id": "kernel-debug-base-4.12.14-197.45.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-devel-4.12.14-197.45.1.x86_64", "product": { "name": "kernel-debug-devel-4.12.14-197.45.1.x86_64", "product_id": "kernel-debug-devel-4.12.14-197.45.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-livepatch-devel-4.12.14-197.45.1.x86_64", "product": { "name": "kernel-debug-livepatch-devel-4.12.14-197.45.1.x86_64", "product_id": "kernel-debug-livepatch-devel-4.12.14-197.45.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-4.12.14-197.45.1.x86_64", "product": { "name": "kernel-default-4.12.14-197.45.1.x86_64", "product_id": "kernel-default-4.12.14-197.45.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-197.45.1.x86_64", "product": { "name": "kernel-default-base-4.12.14-197.45.1.x86_64", "product_id": "kernel-default-base-4.12.14-197.45.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-197.45.1.x86_64", "product": { "name": "kernel-default-devel-4.12.14-197.45.1.x86_64", "product_id": "kernel-default-devel-4.12.14-197.45.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-197.45.1.x86_64", "product": { "name": "kernel-default-extra-4.12.14-197.45.1.x86_64", "product_id": "kernel-default-extra-4.12.14-197.45.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-livepatch-4.12.14-197.45.1.x86_64", "product": { "name": "kernel-default-livepatch-4.12.14-197.45.1.x86_64", "product_id": "kernel-default-livepatch-4.12.14-197.45.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-livepatch-devel-4.12.14-197.45.1.x86_64", "product": { "name": "kernel-default-livepatch-devel-4.12.14-197.45.1.x86_64", "product_id": "kernel-default-livepatch-devel-4.12.14-197.45.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-4.12.14-197.45.1.x86_64", "product": { "name": "kernel-kvmsmall-4.12.14-197.45.1.x86_64", "product_id": "kernel-kvmsmall-4.12.14-197.45.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-base-4.12.14-197.45.1.x86_64", "product": { "name": "kernel-kvmsmall-base-4.12.14-197.45.1.x86_64", "product_id": "kernel-kvmsmall-base-4.12.14-197.45.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-devel-4.12.14-197.45.1.x86_64", "product": { "name": "kernel-kvmsmall-devel-4.12.14-197.45.1.x86_64", "product_id": "kernel-kvmsmall-devel-4.12.14-197.45.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-livepatch-devel-4.12.14-197.45.1.x86_64", "product": { "name": "kernel-kvmsmall-livepatch-devel-4.12.14-197.45.1.x86_64", "product_id": "kernel-kvmsmall-livepatch-devel-4.12.14-197.45.1.x86_64" } }, { "category": "product_version", "name": "kernel-livepatch-4_12_14-197_45-default-1-3.5.1.x86_64", "product": { "name": "kernel-livepatch-4_12_14-197_45-default-1-3.5.1.x86_64", "product_id": "kernel-livepatch-4_12_14-197_45-default-1-3.5.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-197.45.1.x86_64", "product": { "name": "kernel-obs-build-4.12.14-197.45.1.x86_64", "product_id": "kernel-obs-build-4.12.14-197.45.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-197.45.1.x86_64", "product": { "name": "kernel-obs-qa-4.12.14-197.45.1.x86_64", "product_id": "kernel-obs-qa-4.12.14-197.45.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-197.45.1.x86_64", "product": { "name": "kernel-syms-4.12.14-197.45.1.x86_64", "product_id": "kernel-syms-4.12.14-197.45.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-197.45.1.x86_64", "product": { "name": "kernel-vanilla-4.12.14-197.45.1.x86_64", "product_id": "kernel-vanilla-4.12.14-197.45.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-197.45.1.x86_64", "product": { "name": "kernel-vanilla-base-4.12.14-197.45.1.x86_64", "product_id": "kernel-vanilla-base-4.12.14-197.45.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-197.45.1.x86_64", "product": { "name": "kernel-vanilla-devel-4.12.14-197.45.1.x86_64", "product_id": "kernel-vanilla-devel-4.12.14-197.45.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-livepatch-devel-4.12.14-197.45.1.x86_64", "product": { "name": "kernel-vanilla-livepatch-devel-4.12.14-197.45.1.x86_64", "product_id": "kernel-vanilla-livepatch-devel-4.12.14-197.45.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-197.45.1.x86_64", "product": { "name": "kselftests-kmp-default-4.12.14-197.45.1.x86_64", "product_id": "kselftests-kmp-default-4.12.14-197.45.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-197.45.1.x86_64", "product": { "name": "ocfs2-kmp-default-4.12.14-197.45.1.x86_64", "product_id": "ocfs2-kmp-default-4.12.14-197.45.1.x86_64" } }, { "category": "product_version", "name": "reiserfs-kmp-default-4.12.14-197.45.1.x86_64", "product": { "name": "reiserfs-kmp-default-4.12.14-197.45.1.x86_64", "product_id": "reiserfs-kmp-default-4.12.14-197.45.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Module for Basesystem 15 SP1", "product": { "name": "SUSE Linux Enterprise Module for Basesystem 15 SP1", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-basesystem:15:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Module for Development Tools 15 SP1", "product": { "name": "SUSE Linux Enterprise Module for Development Tools 15 SP1", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-development-tools:15:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Module for Legacy 15 SP1", "product": { "name": "SUSE Linux Enterprise Module for Legacy 15 SP1", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-legacy:15:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 15 SP1", "product": { "name": "SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-live-patching:15:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Availability Extension 15 SP1", "product": { "name": "SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-ha:15:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Workstation Extension 15 SP1", "product": { "name": "SUSE Linux Enterprise Workstation Extension 15 SP1", "product_id": "SUSE Linux Enterprise Workstation Extension 15 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-we:15:sp1" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-197.45.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.aarch64" }, "product_reference": "kernel-default-4.12.14-197.45.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-197.45.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.ppc64le" }, "product_reference": "kernel-default-4.12.14-197.45.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-197.45.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.s390x" }, "product_reference": "kernel-default-4.12.14-197.45.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-197.45.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.x86_64" }, "product_reference": "kernel-default-4.12.14-197.45.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-197.45.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.aarch64" }, "product_reference": "kernel-default-base-4.12.14-197.45.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-197.45.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.ppc64le" }, "product_reference": "kernel-default-base-4.12.14-197.45.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-197.45.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.s390x" }, "product_reference": "kernel-default-base-4.12.14-197.45.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-197.45.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.x86_64" }, "product_reference": "kernel-default-base-4.12.14-197.45.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-197.45.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.aarch64" }, "product_reference": "kernel-default-devel-4.12.14-197.45.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-197.45.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.ppc64le" }, "product_reference": "kernel-default-devel-4.12.14-197.45.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-197.45.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.s390x" }, "product_reference": "kernel-default-devel-4.12.14-197.45.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-197.45.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.x86_64" }, "product_reference": "kernel-default-devel-4.12.14-197.45.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-4.12.14-197.45.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.45.1.s390x" }, "product_reference": "kernel-default-man-4.12.14-197.45.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.12.14-197.45.1.noarch as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.45.1.noarch" }, "product_reference": "kernel-devel-4.12.14-197.45.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.12.14-197.45.1.noarch as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.45.1.noarch" }, "product_reference": "kernel-macros-4.12.14-197.45.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-4.12.14-197.45.1.noarch as component of SUSE Linux Enterprise Module for Development Tools 15 SP1", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.45.1.noarch" }, "product_reference": "kernel-docs-4.12.14-197.45.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-197.45.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP1", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.aarch64" }, "product_reference": "kernel-obs-build-4.12.14-197.45.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-197.45.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP1", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.ppc64le" }, "product_reference": "kernel-obs-build-4.12.14-197.45.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-197.45.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP1", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.s390x" }, "product_reference": "kernel-obs-build-4.12.14-197.45.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-197.45.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP1", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.x86_64" }, "product_reference": "kernel-obs-build-4.12.14-197.45.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.12.14-197.45.1.noarch as component of SUSE Linux Enterprise Module for Development Tools 15 SP1", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.45.1.noarch" }, "product_reference": "kernel-source-4.12.14-197.45.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-197.45.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP1", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.aarch64" }, "product_reference": "kernel-syms-4.12.14-197.45.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-197.45.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP1", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.ppc64le" }, "product_reference": "kernel-syms-4.12.14-197.45.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-197.45.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP1", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.s390x" }, "product_reference": "kernel-syms-4.12.14-197.45.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-197.45.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP1", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.x86_64" }, "product_reference": "kernel-syms-4.12.14-197.45.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-4.12.14-197.45.1.aarch64 as component of SUSE Linux Enterprise Module for Legacy 15 SP1", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.aarch64" }, "product_reference": "reiserfs-kmp-default-4.12.14-197.45.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-4.12.14-197.45.1.ppc64le as component of SUSE Linux Enterprise Module for Legacy 15 SP1", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.ppc64le" }, "product_reference": "reiserfs-kmp-default-4.12.14-197.45.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-4.12.14-197.45.1.s390x as component of SUSE Linux Enterprise Module for Legacy 15 SP1", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.s390x" }, "product_reference": "reiserfs-kmp-default-4.12.14-197.45.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-4.12.14-197.45.1.x86_64 as component of SUSE Linux Enterprise Module for Legacy 15 SP1", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.x86_64" }, "product_reference": "reiserfs-kmp-default-4.12.14-197.45.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-4.12.14-197.45.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.45.1.ppc64le" }, "product_reference": "kernel-default-livepatch-4.12.14-197.45.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-4.12.14-197.45.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.45.1.x86_64" }, "product_reference": "kernel-default-livepatch-4.12.14-197.45.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-devel-4.12.14-197.45.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.45.1.ppc64le" }, "product_reference": "kernel-default-livepatch-devel-4.12.14-197.45.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-devel-4.12.14-197.45.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.45.1.x86_64" }, "product_reference": "kernel-default-livepatch-devel-4.12.14-197.45.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_45-default-1-3.5.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_45-default-1-3.5.1.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-197_45-default-1-3.5.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_45-default-1-3.5.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_45-default-1-3.5.1.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-197_45-default-1-3.5.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-197.45.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.aarch64" }, "product_reference": "cluster-md-kmp-default-4.12.14-197.45.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-197.45.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.ppc64le" }, "product_reference": "cluster-md-kmp-default-4.12.14-197.45.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-197.45.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.s390x" }, "product_reference": "cluster-md-kmp-default-4.12.14-197.45.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-197.45.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.x86_64" }, "product_reference": "cluster-md-kmp-default-4.12.14-197.45.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-197.45.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.aarch64" }, "product_reference": "dlm-kmp-default-4.12.14-197.45.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-197.45.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.ppc64le" }, "product_reference": "dlm-kmp-default-4.12.14-197.45.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-197.45.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.s390x" }, "product_reference": "dlm-kmp-default-4.12.14-197.45.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-197.45.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.x86_64" }, "product_reference": "dlm-kmp-default-4.12.14-197.45.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-197.45.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.aarch64" }, "product_reference": "gfs2-kmp-default-4.12.14-197.45.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-197.45.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.ppc64le" }, "product_reference": "gfs2-kmp-default-4.12.14-197.45.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-197.45.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.s390x" }, "product_reference": "gfs2-kmp-default-4.12.14-197.45.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-197.45.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.x86_64" }, "product_reference": "gfs2-kmp-default-4.12.14-197.45.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-197.45.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.aarch64" }, "product_reference": "ocfs2-kmp-default-4.12.14-197.45.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-197.45.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.ppc64le" }, "product_reference": "ocfs2-kmp-default-4.12.14-197.45.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-197.45.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.s390x" }, "product_reference": "ocfs2-kmp-default-4.12.14-197.45.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-197.45.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.x86_64" }, "product_reference": "ocfs2-kmp-default-4.12.14-197.45.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-extra-4.12.14-197.45.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 15 SP1", "product_id": "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.45.1.x86_64" }, "product_reference": "kernel-default-extra-4.12.14-197.45.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 15 SP1" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-1000199", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1000199" } ], "notes": [ { "category": "general", "text": "The Linux Kernel version 3.18 contains a dangerous feature vulnerability in modify_user_hw_breakpoint() that can result in crash and possibly memory corruption. This attack appear to be exploitable via local code execution and the ability to use ptrace. This vulnerability appears to have been fixed in git commit f67b15037a7a50c57f72e69a6d59941ad90a0f0f.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_45-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_45-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.45.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1000199", "url": "https://www.suse.com/security/cve/CVE-2018-1000199" }, { "category": "external", "summary": "SUSE Bug 1089895 for CVE-2018-1000199", "url": "https://bugzilla.suse.com/1089895" }, { "category": "external", "summary": "SUSE Bug 1090036 for CVE-2018-1000199", "url": "https://bugzilla.suse.com/1090036" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_45-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_45-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.45.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_45-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_45-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.45.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-10T09:12:29Z", "details": "important" } ], "title": "CVE-2018-1000199" }, { "cve": "CVE-2019-19462", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-19462" } ], "notes": [ { "category": "general", "text": "relay_open in kernel/relay.c in the Linux kernel through 5.4.1 allows local users to cause a denial of service (such as relay blockage) by triggering a NULL alloc_percpu result.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_45-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_45-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.45.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-19462", "url": "https://www.suse.com/security/cve/CVE-2019-19462" }, { "category": "external", "summary": "SUSE Bug 1158265 for CVE-2019-19462", "url": "https://bugzilla.suse.com/1158265" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_45-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_45-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.45.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_45-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_45-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.45.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-10T09:12:29Z", "details": "low" } ], "title": "CVE-2019-19462" }, { "cve": "CVE-2019-20806", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-20806" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.2. There is a NULL pointer dereference in tw5864_handle_frame() in drivers/media/pci/tw5864/tw5864-video.c, which may cause denial of service, aka CID-2e7682ebfc75.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_45-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_45-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.45.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-20806", "url": "https://www.suse.com/security/cve/CVE-2019-20806" }, { "category": "external", "summary": "SUSE Bug 1172199 for CVE-2019-20806", "url": "https://bugzilla.suse.com/1172199" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_45-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_45-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.45.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.9, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_45-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_45-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.45.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-10T09:12:29Z", "details": "low" } ], "title": "CVE-2019-20806" }, { "cve": "CVE-2019-20812", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-20812" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.4.7. The prb_calc_retire_blk_tmo() function in net/packet/af_packet.c can result in a denial of service (CPU consumption and soft lockup) in a certain failure case involving TPACKET_V3, aka CID-b43d1f9f7067.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_45-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_45-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.45.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-20812", "url": "https://www.suse.com/security/cve/CVE-2019-20812" }, { "category": "external", "summary": "SUSE Bug 1172453 for CVE-2019-20812", "url": "https://bugzilla.suse.com/1172453" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_45-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_45-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.45.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_45-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_45-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.45.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-10T09:12:29Z", "details": "moderate" } ], "title": "CVE-2019-20812" }, { "cve": "CVE-2019-9455", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9455" } ], "notes": [ { "category": "general", "text": "In the Android kernel in the video driver there is a kernel pointer leak due to a WARN_ON statement. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_45-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_45-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.45.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9455", "url": "https://www.suse.com/security/cve/CVE-2019-9455" }, { "category": "external", "summary": "SUSE Bug 1170345 for CVE-2019-9455", "url": "https://bugzilla.suse.com/1170345" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_45-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_45-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.45.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_45-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_45-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.45.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-10T09:12:29Z", "details": "moderate" } ], "title": "CVE-2019-9455" }, { "cve": "CVE-2020-0543", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-0543" } ], "notes": [ { "category": "general", "text": "Incomplete cleanup from specific special register read operations in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_45-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_45-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.45.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-0543", "url": "https://www.suse.com/security/cve/CVE-2020-0543" }, { "category": "external", "summary": "SUSE Bug 1154824 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1154824" }, { "category": "external", "summary": "SUSE Bug 1172205 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172205" }, { "category": "external", "summary": "SUSE Bug 1172206 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172206" }, { "category": "external", "summary": "SUSE Bug 1172207 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172207" }, { "category": "external", "summary": "SUSE Bug 1172770 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172770" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_45-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_45-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.45.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_45-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_45-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.45.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-10T09:12:29Z", "details": "moderate" } ], "title": "CVE-2020-0543" }, { "cve": "CVE-2020-10690", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10690" } ], "notes": [ { "category": "general", "text": "There is a use-after-free in kernel versions before 5.5 due to a race condition between the release of ptp_clock and cdev while resource deallocation. When a (high privileged) process allocates a ptp device file (like /dev/ptpX) and voluntarily goes to sleep. During this time if the underlying device is removed, it can cause an exploitable condition as the process wakes up to terminate and clean all attached files. The system crashes due to the cdev structure being invalid (as already freed) which is pointed to by the inode.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_45-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_45-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.45.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10690", "url": "https://www.suse.com/security/cve/CVE-2020-10690" }, { "category": "external", "summary": "SUSE Bug 1170056 for CVE-2020-10690", "url": "https://bugzilla.suse.com/1170056" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_45-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_45-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.45.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_45-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_45-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.45.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-10T09:12:29Z", "details": "moderate" } ], "title": "CVE-2020-10690" }, { "cve": "CVE-2020-10711", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10711" } ], "notes": [ { "category": "general", "text": "A NULL pointer dereference flaw was found in the Linux kernel\u0027s SELinux subsystem in versions before 5.7. This flaw occurs while importing the Commercial IP Security Option (CIPSO) protocol\u0027s category bitmap into the SELinux extensible bitmap via the\u0027 ebitmap_netlbl_import\u0027 routine. While processing the CIPSO restricted bitmap tag in the \u0027cipso_v4_parsetag_rbm\u0027 routine, it sets the security attribute to indicate that the category bitmap is present, even if it has not been allocated. This issue leads to a NULL pointer dereference issue while importing the same category bitmap into SELinux. This flaw allows a remote network user to crash the system kernel, resulting in a denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_45-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_45-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.45.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10711", "url": "https://www.suse.com/security/cve/CVE-2020-10711" }, { "category": "external", "summary": "SUSE Bug 1171191 for CVE-2020-10711", "url": "https://bugzilla.suse.com/1171191" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_45-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_45-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.45.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_45-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_45-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.45.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-10T09:12:29Z", "details": "moderate" } ], "title": "CVE-2020-10711" }, { "cve": "CVE-2020-10720", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10720" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s implementation of GRO in versions before 5.2. This flaw allows an attacker with local access to crash the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_45-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_45-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.45.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10720", "url": "https://www.suse.com/security/cve/CVE-2020-10720" }, { "category": "external", "summary": "SUSE Bug 1170778 for CVE-2020-10720", "url": "https://bugzilla.suse.com/1170778" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_45-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_45-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.45.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_45-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_45-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.45.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-10T09:12:29Z", "details": "moderate" } ], "title": "CVE-2020-10720" }, { "cve": "CVE-2020-10732", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10732" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s implementation of Userspace core dumps. This flaw allows an attacker with a local account to crash a trivial program and exfiltrate private kernel data.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_45-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_45-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.45.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10732", "url": "https://www.suse.com/security/cve/CVE-2020-10732" }, { "category": "external", "summary": "SUSE Bug 1171220 for CVE-2020-10732", "url": "https://bugzilla.suse.com/1171220" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_45-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_45-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.45.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_45-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_45-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.45.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-10T09:12:29Z", "details": "low" } ], "title": "CVE-2020-10732" }, { "cve": "CVE-2020-10751", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10751" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernels SELinux LSM hook implementation before version 5.7, where it incorrectly assumed that an skb would only contain a single netlink message. The hook would incorrectly only validate the first netlink message in the skb and allow or deny the rest of the messages within the skb with the granted permission without further processing.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_45-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_45-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.45.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10751", "url": "https://www.suse.com/security/cve/CVE-2020-10751" }, { "category": "external", "summary": "SUSE Bug 1171189 for CVE-2020-10751", "url": "https://bugzilla.suse.com/1171189" }, { "category": "external", "summary": "SUSE Bug 1174963 for CVE-2020-10751", "url": "https://bugzilla.suse.com/1174963" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_45-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_45-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.45.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_45-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_45-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.45.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-10T09:12:29Z", "details": "moderate" } ], "title": "CVE-2020-10751" }, { "cve": "CVE-2020-10757", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10757" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux Kernel in versions after 4.5-rc1 in the way mremap handled DAX Huge Pages. This flaw allows a local attacker with access to a DAX enabled storage to escalate their privileges on the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_45-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_45-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.45.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10757", "url": "https://www.suse.com/security/cve/CVE-2020-10757" }, { "category": "external", "summary": "SUSE Bug 1159281 for CVE-2020-10757", "url": "https://bugzilla.suse.com/1159281" }, { "category": "external", "summary": "SUSE Bug 1172317 for CVE-2020-10757", "url": "https://bugzilla.suse.com/1172317" }, { "category": "external", "summary": "SUSE Bug 1172437 for CVE-2020-10757", "url": "https://bugzilla.suse.com/1172437" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_45-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_45-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.45.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_45-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_45-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.45.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-10T09:12:29Z", "details": "important" } ], "title": "CVE-2020-10757" }, { "cve": "CVE-2020-12114", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12114" } ], "notes": [ { "category": "general", "text": "A pivot_root race condition in fs/namespace.c in the Linux kernel 4.4.x before 4.4.221, 4.9.x before 4.9.221, 4.14.x before 4.14.178, 4.19.x before 4.19.119, and 5.x before 5.3 allows local users to cause a denial of service (panic) by corrupting a mountpoint reference counter.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_45-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_45-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.45.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12114", "url": "https://www.suse.com/security/cve/CVE-2020-12114" }, { "category": "external", "summary": "SUSE Bug 1171098 for CVE-2020-12114", "url": "https://bugzilla.suse.com/1171098" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_45-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_45-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.45.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_45-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_45-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.45.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-10T09:12:29Z", "details": "moderate" } ], "title": "CVE-2020-12114" }, { "cve": "CVE-2020-12464", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12464" } ], "notes": [ { "category": "general", "text": "usb_sg_cancel in drivers/usb/core/message.c in the Linux kernel before 5.6.8 has a use-after-free because a transfer occurs without a reference, aka CID-056ad39ee925.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_45-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_45-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.45.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12464", "url": "https://www.suse.com/security/cve/CVE-2020-12464" }, { "category": "external", "summary": "SUSE Bug 1170901 for CVE-2020-12464", "url": "https://bugzilla.suse.com/1170901" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_45-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_45-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.45.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 1.8, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_45-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_45-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.45.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-10T09:12:29Z", "details": "low" } ], "title": "CVE-2020-12464" }, { "cve": "CVE-2020-12652", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12652" } ], "notes": [ { "category": "general", "text": "The __mptctl_ioctl function in drivers/message/fusion/mptctl.c in the Linux kernel before 5.4.14 allows local users to hold an incorrect lock during the ioctl operation and trigger a race condition, i.e., a \"double fetch\" vulnerability, aka CID-28d76df18f0a. NOTE: the vendor states \"The security impact of this bug is not as bad as it could have been because these operations are all privileged and root already has enormous destructive power.\"", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_45-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_45-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.45.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12652", "url": "https://www.suse.com/security/cve/CVE-2020-12652" }, { "category": "external", "summary": "SUSE Bug 1171218 for CVE-2020-12652", "url": "https://bugzilla.suse.com/1171218" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_45-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_45-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.45.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_45-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_45-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.45.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-10T09:12:29Z", "details": "moderate" } ], "title": "CVE-2020-12652" }, { "cve": "CVE-2020-12653", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12653" } ], "notes": [ { "category": "general", "text": "An issue was found in Linux kernel before 5.5.4. The mwifiex_cmd_append_vsie_tlv() function in drivers/net/wireless/marvell/mwifiex/scan.c allows local users to gain privileges or cause a denial of service because of an incorrect memcpy and buffer overflow, aka CID-b70261a288ea.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_45-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_45-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.45.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12653", "url": "https://www.suse.com/security/cve/CVE-2020-12653" }, { "category": "external", "summary": "SUSE Bug 1159281 for CVE-2020-12653", "url": "https://bugzilla.suse.com/1159281" }, { "category": "external", "summary": "SUSE Bug 1171195 for CVE-2020-12653", "url": "https://bugzilla.suse.com/1171195" }, { "category": "external", "summary": "SUSE Bug 1171254 for CVE-2020-12653", "url": "https://bugzilla.suse.com/1171254" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_45-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_45-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.45.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_45-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_45-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.45.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-10T09:12:29Z", "details": "important" } ], "title": "CVE-2020-12653" }, { "cve": "CVE-2020-12654", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12654" } ], "notes": [ { "category": "general", "text": "An issue was found in Linux kernel before 5.5.4. mwifiex_ret_wmm_get_status() in drivers/net/wireless/marvell/mwifiex/wmm.c allows a remote AP to trigger a heap-based buffer overflow because of an incorrect memcpy, aka CID-3a9b153c5591.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_45-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_45-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.45.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12654", "url": "https://www.suse.com/security/cve/CVE-2020-12654" }, { "category": "external", "summary": "SUSE Bug 1159281 for CVE-2020-12654", "url": "https://bugzilla.suse.com/1159281" }, { "category": "external", "summary": "SUSE Bug 1171202 for CVE-2020-12654", "url": "https://bugzilla.suse.com/1171202" }, { "category": "external", "summary": "SUSE Bug 1171252 for CVE-2020-12654", "url": "https://bugzilla.suse.com/1171252" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_45-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_45-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.45.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_45-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_45-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.45.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-10T09:12:29Z", "details": "important" } ], "title": "CVE-2020-12654" }, { "cve": "CVE-2020-12655", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12655" } ], "notes": [ { "category": "general", "text": "An issue was discovered in xfs_agf_verify in fs/xfs/libxfs/xfs_alloc.c in the Linux kernel through 5.6.10. Attackers may trigger a sync of excessive duration via an XFS v5 image with crafted metadata, aka CID-d0c7feaf8767.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_45-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_45-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.45.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12655", "url": "https://www.suse.com/security/cve/CVE-2020-12655" }, { "category": "external", "summary": "SUSE Bug 1171217 for CVE-2020-12655", "url": "https://bugzilla.suse.com/1171217" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_45-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_45-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.45.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.8, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_45-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_45-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.45.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-10T09:12:29Z", "details": "moderate" } ], "title": "CVE-2020-12655" }, { "cve": "CVE-2020-12656", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12656" } ], "notes": [ { "category": "general", "text": "gss_mech_free in net/sunrpc/auth_gss/gss_mech_switch.c in the rpcsec_gss_krb5 implementation in the Linux kernel through 5.6.10 lacks certain domain_release calls, leading to a memory leak. Note: This was disputed with the assertion that the issue does not grant any access not already available. It is a problem that on unloading a specific kernel module some memory is leaked, but loading kernel modules is a privileged operation. A user could also write a kernel module to consume any amount of memory they like and load that replicating the effect of this bug", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_45-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_45-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.45.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12656", "url": "https://www.suse.com/security/cve/CVE-2020-12656" }, { "category": "external", "summary": "SUSE Bug 1171219 for CVE-2020-12656", "url": "https://bugzilla.suse.com/1171219" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_45-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_45-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.45.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.9, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_45-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_45-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.45.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-10T09:12:29Z", "details": "low" } ], "title": "CVE-2020-12656" }, { "cve": "CVE-2020-12657", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12657" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.6.5. There is a use-after-free in block/bfq-iosched.c related to bfq_idle_slice_timer_body.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_45-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_45-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.45.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12657", "url": "https://www.suse.com/security/cve/CVE-2020-12657" }, { "category": "external", "summary": "SUSE Bug 1171205 for CVE-2020-12657", "url": "https://bugzilla.suse.com/1171205" }, { "category": "external", "summary": "SUSE Bug 1201585 for CVE-2020-12657", "url": "https://bugzilla.suse.com/1201585" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_45-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_45-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.45.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_45-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_45-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.45.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-10T09:12:29Z", "details": "important" } ], "title": "CVE-2020-12657" }, { "cve": "CVE-2020-12659", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12659" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.6.7. xdp_umem_reg in net/xdp/xdp_umem.c has an out-of-bounds write (by a user with the CAP_NET_ADMIN capability) because of a lack of headroom validation.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_45-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_45-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.45.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12659", "url": "https://www.suse.com/security/cve/CVE-2020-12659" }, { "category": "external", "summary": "SUSE Bug 1171214 for CVE-2020-12659", "url": "https://bugzilla.suse.com/1171214" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_45-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_45-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.45.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_45-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_45-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.45.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-10T09:12:29Z", "details": "moderate" } ], "title": "CVE-2020-12659" }, { "cve": "CVE-2020-12768", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12768" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.6. svm_cpu_uninit in arch/x86/kvm/svm.c has a memory leak, aka CID-d80b64ff297e. NOTE: third parties dispute this issue because it\u0027s a one-time leak at the boot, the size is negligible, and it can\u0027t be triggered at will", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_45-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_45-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.45.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12768", "url": "https://www.suse.com/security/cve/CVE-2020-12768" }, { "category": "external", "summary": "SUSE Bug 1171736 for CVE-2020-12768", "url": "https://bugzilla.suse.com/1171736" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_45-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_45-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.45.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_45-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_45-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.45.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-10T09:12:29Z", "details": "moderate" } ], "title": "CVE-2020-12768" }, { "cve": "CVE-2020-12769", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12769" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.4.17. drivers/spi/spi-dw.c allows attackers to cause a panic via concurrent calls to dw_spi_irq and dw_spi_transfer_one, aka CID-19b61392c5a8.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_45-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_45-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.45.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12769", "url": "https://www.suse.com/security/cve/CVE-2020-12769" }, { "category": "external", "summary": "SUSE Bug 1171983 for CVE-2020-12769", "url": "https://bugzilla.suse.com/1171983" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_45-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_45-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.45.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_45-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_45-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.45.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-10T09:12:29Z", "details": "moderate" } ], "title": "CVE-2020-12769" }, { "cve": "CVE-2020-13143", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-13143" } ], "notes": [ { "category": "general", "text": "gadget_dev_desc_UDC_store in drivers/usb/gadget/configfs.c in the Linux kernel 3.16 through 5.6.13 relies on kstrdup without considering the possibility of an internal \u0027\\0\u0027 value, which allows attackers to trigger an out-of-bounds read, aka CID-15753588bcd4.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_45-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_45-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.45.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-13143", "url": "https://www.suse.com/security/cve/CVE-2020-13143" }, { "category": "external", "summary": "SUSE Bug 1171982 for CVE-2020-13143", "url": "https://bugzilla.suse.com/1171982" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_45-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_45-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.45.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_45-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_45-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.45.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.45.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.45.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-10T09:12:29Z", "details": "moderate" } ], "title": "CVE-2020-13143" } ] }
suse-su-2020:14521-1
Vulnerability from csaf_suse
Published
2020-10-22 12:09
Modified
2020-10-22 12:09
Summary
Security update for xen
Notes
Title of the patch
Security update for xen
Description of the patch
This update for xen fixes the following issues:
- CVE-2020-0543: Fixed a leak of Special Register Buffer Data Sampling (SRBDS) aka 'CrossTalk' (bsc#1172205,XSA-320)
- CVE-2020-14364: Fixed an out-of-bounds read/write access while processing usb packets (bsc#1175534).
- CVE-2020-15565: Fixed an issue cache write (bsc#1173378,XSA-321).
- CVE-2020-15567: Fixed an issue with non-atomic modification of live EPT PTE (bsc#1173380,XSA-328)
- CVE-2020-25595: Fixed an issue where PCI passthrough code was reading back hardware registers (bsc#1176344,XSA-337)
- CVE-2020-25596: Fixed a potential denial of service in x86 pv guest kernel via SYSENTER (bsc#1176345,XSA-339)
- CVE-2020-25597: Fixed an issue where a valid event channels may not turn invalid (bsc#1176346,XSA-338)
- CVE-2020-25600: Fixed out of bounds event channels available to 32-bit x86 domains (bsc#1176348,XSA-342)
- CVE-2020-25601: Fixed an issue due to lack of preemption in evtchn_reset() / evtchn_destroy() (bsc#1176350,XSA-344)
- CVE-2020-25603: Fixed an issue due to missing barriers when accessing/allocating an event channel (bsc#1176347,XSA-340)
- CVE-2020-25604: Fixed a race condition when migrating timers between x86
HVM vCPU-s (bsc#1176343,XSA-336)
Patchnames
slessp4-xen-14521
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for xen", "title": "Title of the patch" }, { "category": "description", "text": "This update for xen fixes the following issues:\n\n- CVE-2020-0543: Fixed a leak of Special Register Buffer Data Sampling (SRBDS) aka \u0027CrossTalk\u0027 (bsc#1172205,XSA-320)\n- CVE-2020-14364: Fixed an out-of-bounds read/write access while processing usb packets (bsc#1175534).\n- CVE-2020-15565: Fixed an issue cache write (bsc#1173378,XSA-321).\n- CVE-2020-15567: Fixed an issue with non-atomic modification of live EPT PTE (bsc#1173380,XSA-328)\n- CVE-2020-25595: Fixed an issue where PCI passthrough code was reading back hardware registers (bsc#1176344,XSA-337)\n- CVE-2020-25596: Fixed a potential denial of service in x86 pv guest kernel via SYSENTER (bsc#1176345,XSA-339)\n- CVE-2020-25597: Fixed an issue where a valid event channels may not turn invalid (bsc#1176346,XSA-338)\n- CVE-2020-25600: Fixed out of bounds event channels available to 32-bit x86 domains (bsc#1176348,XSA-342)\n- CVE-2020-25601: Fixed an issue due to lack of preemption in evtchn_reset() / evtchn_destroy() (bsc#1176350,XSA-344)\t \n- CVE-2020-25603: Fixed an issue due to missing barriers when accessing/allocating an event channel (bsc#1176347,XSA-340)\n- CVE-2020-25604: Fixed a race condition when migrating timers between x86 \n HVM vCPU-s (bsc#1176343,XSA-336)\n", "title": "Description of the patch" }, { "category": "details", "text": "slessp4-xen-14521", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2020_14521-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2020:14521-1", "url": "https://www.suse.com/support/update/announcement/2020/suse-su-202014521-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2020:14521-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-October/007611.html" }, { "category": "self", "summary": "SUSE Bug 1172205", "url": "https://bugzilla.suse.com/1172205" }, { "category": "self", "summary": "SUSE Bug 1173378", "url": "https://bugzilla.suse.com/1173378" }, { "category": "self", "summary": "SUSE Bug 1173380", "url": "https://bugzilla.suse.com/1173380" }, { "category": "self", "summary": "SUSE Bug 1175534", "url": "https://bugzilla.suse.com/1175534" }, { "category": "self", "summary": "SUSE Bug 1176343", "url": "https://bugzilla.suse.com/1176343" }, { "category": "self", "summary": "SUSE Bug 1176344", "url": "https://bugzilla.suse.com/1176344" }, { "category": "self", "summary": "SUSE Bug 1176345", "url": "https://bugzilla.suse.com/1176345" }, { "category": "self", "summary": "SUSE Bug 1176346", "url": "https://bugzilla.suse.com/1176346" }, { "category": "self", "summary": "SUSE Bug 1176347", "url": "https://bugzilla.suse.com/1176347" }, { "category": "self", "summary": "SUSE Bug 1176348", "url": "https://bugzilla.suse.com/1176348" }, { "category": "self", "summary": "SUSE Bug 1176350", "url": "https://bugzilla.suse.com/1176350" }, { "category": "self", "summary": "SUSE CVE CVE-2020-0543 page", "url": "https://www.suse.com/security/cve/CVE-2020-0543/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14364 page", "url": "https://www.suse.com/security/cve/CVE-2020-14364/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-15565 page", "url": "https://www.suse.com/security/cve/CVE-2020-15565/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-15567 page", "url": "https://www.suse.com/security/cve/CVE-2020-15567/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25595 page", "url": "https://www.suse.com/security/cve/CVE-2020-25595/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25596 page", "url": "https://www.suse.com/security/cve/CVE-2020-25596/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25597 page", "url": "https://www.suse.com/security/cve/CVE-2020-25597/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25600 page", "url": "https://www.suse.com/security/cve/CVE-2020-25600/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25601 page", "url": "https://www.suse.com/security/cve/CVE-2020-25601/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25603 page", "url": "https://www.suse.com/security/cve/CVE-2020-25603/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25604 page", "url": "https://www.suse.com/security/cve/CVE-2020-25604/" } ], "title": "Security update for xen", "tracking": { "current_release_date": "2020-10-22T12:09:09Z", "generator": { "date": "2020-10-22T12:09:09Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2020:14521-1", "initial_release_date": "2020-10-22T12:09:09Z", "revision_history": [ { "date": "2020-10-22T12:09:09Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "xen-kmp-default-4.4.4_44_3.0.101_108.117-61.55.1.i586", "product": { "name": "xen-kmp-default-4.4.4_44_3.0.101_108.117-61.55.1.i586", "product_id": "xen-kmp-default-4.4.4_44_3.0.101_108.117-61.55.1.i586" } }, { "category": "product_version", "name": "xen-kmp-pae-4.4.4_44_3.0.101_108.117-61.55.1.i586", "product": { "name": "xen-kmp-pae-4.4.4_44_3.0.101_108.117-61.55.1.i586", "product_id": "xen-kmp-pae-4.4.4_44_3.0.101_108.117-61.55.1.i586" } }, { "category": "product_version", "name": "xen-libs-4.4.4_44-61.55.1.i586", "product": { "name": "xen-libs-4.4.4_44-61.55.1.i586", "product_id": "xen-libs-4.4.4_44-61.55.1.i586" } }, { "category": "product_version", "name": "xen-tools-domU-4.4.4_44-61.55.1.i586", "product": { "name": "xen-tools-domU-4.4.4_44-61.55.1.i586", "product_id": "xen-tools-domU-4.4.4_44-61.55.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "xen-4.4.4_44-61.55.1.x86_64", "product": { "name": "xen-4.4.4_44-61.55.1.x86_64", "product_id": "xen-4.4.4_44-61.55.1.x86_64" } }, { "category": "product_version", "name": "xen-doc-html-4.4.4_44-61.55.1.x86_64", "product": { "name": "xen-doc-html-4.4.4_44-61.55.1.x86_64", "product_id": "xen-doc-html-4.4.4_44-61.55.1.x86_64" } }, { "category": "product_version", "name": "xen-kmp-default-4.4.4_44_3.0.101_108.117-61.55.1.x86_64", "product": { "name": "xen-kmp-default-4.4.4_44_3.0.101_108.117-61.55.1.x86_64", "product_id": "xen-kmp-default-4.4.4_44_3.0.101_108.117-61.55.1.x86_64" } }, { "category": "product_version", "name": "xen-libs-4.4.4_44-61.55.1.x86_64", "product": { "name": "xen-libs-4.4.4_44-61.55.1.x86_64", "product_id": "xen-libs-4.4.4_44-61.55.1.x86_64" } }, { "category": "product_version", "name": "xen-libs-32bit-4.4.4_44-61.55.1.x86_64", "product": { "name": "xen-libs-32bit-4.4.4_44-61.55.1.x86_64", "product_id": "xen-libs-32bit-4.4.4_44-61.55.1.x86_64" } }, { "category": "product_version", "name": "xen-tools-4.4.4_44-61.55.1.x86_64", "product": { "name": "xen-tools-4.4.4_44-61.55.1.x86_64", "product_id": "xen-tools-4.4.4_44-61.55.1.x86_64" } }, { "category": "product_version", "name": "xen-tools-domU-4.4.4_44-61.55.1.x86_64", "product": { "name": "xen-tools-domU-4.4.4_44-61.55.1.x86_64", "product_id": "xen-tools-domU-4.4.4_44-61.55.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server 11 SP4-LTSS", "product": { "name": "SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_sles:11:sp4" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "xen-4.4.4_44-61.55.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-4.4.4_44-61.55.1.x86_64" }, "product_reference": "xen-4.4.4_44-61.55.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-doc-html-4.4.4_44-61.55.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-doc-html-4.4.4_44-61.55.1.x86_64" }, "product_reference": "xen-doc-html-4.4.4_44-61.55.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-kmp-default-4.4.4_44_3.0.101_108.117-61.55.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-default-4.4.4_44_3.0.101_108.117-61.55.1.i586" }, "product_reference": "xen-kmp-default-4.4.4_44_3.0.101_108.117-61.55.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-kmp-default-4.4.4_44_3.0.101_108.117-61.55.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-default-4.4.4_44_3.0.101_108.117-61.55.1.x86_64" }, "product_reference": "xen-kmp-default-4.4.4_44_3.0.101_108.117-61.55.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-kmp-pae-4.4.4_44_3.0.101_108.117-61.55.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-pae-4.4.4_44_3.0.101_108.117-61.55.1.i586" }, "product_reference": "xen-kmp-pae-4.4.4_44_3.0.101_108.117-61.55.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.4.4_44-61.55.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-4.4.4_44-61.55.1.i586" }, "product_reference": "xen-libs-4.4.4_44-61.55.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.4.4_44-61.55.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-4.4.4_44-61.55.1.x86_64" }, "product_reference": "xen-libs-4.4.4_44-61.55.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-32bit-4.4.4_44-61.55.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-32bit-4.4.4_44-61.55.1.x86_64" }, "product_reference": "xen-libs-32bit-4.4.4_44-61.55.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.4.4_44-61.55.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-4.4.4_44-61.55.1.x86_64" }, "product_reference": "xen-tools-4.4.4_44-61.55.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.4.4_44-61.55.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-domU-4.4.4_44-61.55.1.i586" }, "product_reference": "xen-tools-domU-4.4.4_44-61.55.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.4.4_44-61.55.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-domU-4.4.4_44-61.55.1.x86_64" }, "product_reference": "xen-tools-domU-4.4.4_44-61.55.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-0543", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-0543" } ], "notes": [ { "category": "general", "text": "Incomplete cleanup from specific special register read operations in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-4.4.4_44-61.55.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-doc-html-4.4.4_44-61.55.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-default-4.4.4_44_3.0.101_108.117-61.55.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-default-4.4.4_44_3.0.101_108.117-61.55.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-pae-4.4.4_44_3.0.101_108.117-61.55.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-32bit-4.4.4_44-61.55.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-4.4.4_44-61.55.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-4.4.4_44-61.55.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-4.4.4_44-61.55.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-domU-4.4.4_44-61.55.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-domU-4.4.4_44-61.55.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-0543", "url": "https://www.suse.com/security/cve/CVE-2020-0543" }, { "category": "external", "summary": "SUSE Bug 1154824 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1154824" }, { "category": "external", "summary": "SUSE Bug 1172205 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172205" }, { "category": "external", "summary": "SUSE Bug 1172206 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172206" }, { "category": "external", "summary": "SUSE Bug 1172207 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172207" }, { "category": "external", "summary": "SUSE Bug 1172770 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172770" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-4.4.4_44-61.55.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-doc-html-4.4.4_44-61.55.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-default-4.4.4_44_3.0.101_108.117-61.55.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-default-4.4.4_44_3.0.101_108.117-61.55.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-pae-4.4.4_44_3.0.101_108.117-61.55.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-32bit-4.4.4_44-61.55.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-4.4.4_44-61.55.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-4.4.4_44-61.55.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-4.4.4_44-61.55.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-domU-4.4.4_44-61.55.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-domU-4.4.4_44-61.55.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-4.4.4_44-61.55.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-doc-html-4.4.4_44-61.55.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-default-4.4.4_44_3.0.101_108.117-61.55.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-default-4.4.4_44_3.0.101_108.117-61.55.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-pae-4.4.4_44_3.0.101_108.117-61.55.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-32bit-4.4.4_44-61.55.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-4.4.4_44-61.55.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-4.4.4_44-61.55.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-4.4.4_44-61.55.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-domU-4.4.4_44-61.55.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-domU-4.4.4_44-61.55.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-10-22T12:09:09Z", "details": "moderate" } ], "title": "CVE-2020-0543" }, { "cve": "CVE-2020-14364", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14364" } ], "notes": [ { "category": "general", "text": "An out-of-bounds read/write access flaw was found in the USB emulator of the QEMU in versions before 5.2.0. This issue occurs while processing USB packets from a guest when USBDevice \u0027setup_len\u0027 exceeds its \u0027data_buf[4096]\u0027 in the do_token_in, do_token_out routines. This flaw allows a guest user to crash the QEMU process, resulting in a denial of service, or the potential execution of arbitrary code with the privileges of the QEMU process on the host.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-4.4.4_44-61.55.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-doc-html-4.4.4_44-61.55.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-default-4.4.4_44_3.0.101_108.117-61.55.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-default-4.4.4_44_3.0.101_108.117-61.55.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-pae-4.4.4_44_3.0.101_108.117-61.55.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-32bit-4.4.4_44-61.55.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-4.4.4_44-61.55.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-4.4.4_44-61.55.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-4.4.4_44-61.55.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-domU-4.4.4_44-61.55.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-domU-4.4.4_44-61.55.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14364", "url": "https://www.suse.com/security/cve/CVE-2020-14364" }, { "category": "external", "summary": "SUSE Bug 1175441 for CVE-2020-14364", "url": "https://bugzilla.suse.com/1175441" }, { "category": "external", "summary": "SUSE Bug 1175534 for CVE-2020-14364", "url": "https://bugzilla.suse.com/1175534" }, { "category": "external", "summary": "SUSE Bug 1176494 for CVE-2020-14364", "url": "https://bugzilla.suse.com/1176494" }, { "category": "external", "summary": "SUSE Bug 1177130 for CVE-2020-14364", "url": "https://bugzilla.suse.com/1177130" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-4.4.4_44-61.55.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-doc-html-4.4.4_44-61.55.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-default-4.4.4_44_3.0.101_108.117-61.55.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-default-4.4.4_44_3.0.101_108.117-61.55.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-pae-4.4.4_44_3.0.101_108.117-61.55.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-32bit-4.4.4_44-61.55.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-4.4.4_44-61.55.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-4.4.4_44-61.55.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-4.4.4_44-61.55.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-domU-4.4.4_44-61.55.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-domU-4.4.4_44-61.55.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-4.4.4_44-61.55.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-doc-html-4.4.4_44-61.55.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-default-4.4.4_44_3.0.101_108.117-61.55.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-default-4.4.4_44_3.0.101_108.117-61.55.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-pae-4.4.4_44_3.0.101_108.117-61.55.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-32bit-4.4.4_44-61.55.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-4.4.4_44-61.55.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-4.4.4_44-61.55.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-4.4.4_44-61.55.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-domU-4.4.4_44-61.55.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-domU-4.4.4_44-61.55.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-10-22T12:09:09Z", "details": "moderate" } ], "title": "CVE-2020-14364" }, { "cve": "CVE-2020-15565", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-15565" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.13.x, allowing x86 Intel HVM guest OS users to cause a host OS denial of service or possibly gain privileges because of insufficient cache write-back under VT-d. When page tables are shared between IOMMU and CPU, changes to them require flushing of both TLBs. Furthermore, IOMMUs may be non-coherent, and hence prior to flushing IOMMU TLBs, a CPU cache also needs writing back to memory after changes were made. Such writing back of cached data was missing in particular when splitting large page mappings into smaller granularity ones. A malicious guest may be able to retain read/write DMA access to frames returned to Xen\u0027s free pool, and later reused for another purpose. Host crashes (leading to a Denial of Service) and privilege escalation cannot be ruled out. Xen versions from at least 3.2 onwards are affected. Only x86 Intel systems are affected. x86 AMD as well as Arm systems are not affected. Only x86 HVM guests using hardware assisted paging (HAP), having a passed through PCI device assigned, and having page table sharing enabled can leverage the vulnerability. Note that page table sharing will be enabled (by default) only if Xen considers IOMMU and CPU large page size support compatible.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-4.4.4_44-61.55.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-doc-html-4.4.4_44-61.55.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-default-4.4.4_44_3.0.101_108.117-61.55.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-default-4.4.4_44_3.0.101_108.117-61.55.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-pae-4.4.4_44_3.0.101_108.117-61.55.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-32bit-4.4.4_44-61.55.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-4.4.4_44-61.55.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-4.4.4_44-61.55.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-4.4.4_44-61.55.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-domU-4.4.4_44-61.55.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-domU-4.4.4_44-61.55.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-15565", "url": "https://www.suse.com/security/cve/CVE-2020-15565" }, { "category": "external", "summary": "SUSE Bug 1173378 for CVE-2020-15565", "url": "https://bugzilla.suse.com/1173378" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-4.4.4_44-61.55.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-doc-html-4.4.4_44-61.55.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-default-4.4.4_44_3.0.101_108.117-61.55.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-default-4.4.4_44_3.0.101_108.117-61.55.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-pae-4.4.4_44_3.0.101_108.117-61.55.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-32bit-4.4.4_44-61.55.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-4.4.4_44-61.55.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-4.4.4_44-61.55.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-4.4.4_44-61.55.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-domU-4.4.4_44-61.55.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-domU-4.4.4_44-61.55.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.9, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-4.4.4_44-61.55.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-doc-html-4.4.4_44-61.55.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-default-4.4.4_44_3.0.101_108.117-61.55.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-default-4.4.4_44_3.0.101_108.117-61.55.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-pae-4.4.4_44_3.0.101_108.117-61.55.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-32bit-4.4.4_44-61.55.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-4.4.4_44-61.55.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-4.4.4_44-61.55.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-4.4.4_44-61.55.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-domU-4.4.4_44-61.55.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-domU-4.4.4_44-61.55.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-10-22T12:09:09Z", "details": "important" } ], "title": "CVE-2020-15565" }, { "cve": "CVE-2020-15567", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-15567" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.13.x, allowing Intel guest OS users to gain privileges or cause a denial of service because of non-atomic modification of a live EPT PTE. When mapping guest EPT (nested paging) tables, Xen would in some circumstances use a series of non-atomic bitfield writes. Depending on the compiler version and optimisation flags, Xen might expose a dangerous partially written PTE to the hardware, which an attacker might be able to race to exploit. A guest administrator or perhaps even an unprivileged guest user might be able to cause denial of service, data corruption, or privilege escalation. Only systems using Intel CPUs are vulnerable. Systems using AMD CPUs, and Arm systems, are not vulnerable. Only systems using nested paging (hap, aka nested paging, aka in this case Intel EPT) are vulnerable. Only HVM and PVH guests can exploit the vulnerability. The presence and scope of the vulnerability depends on the precise optimisations performed by the compiler used to build Xen. If the compiler generates (a) a single 64-bit write, or (b) a series of read-modify-write operations in the same order as the source code, the hypervisor is not vulnerable. For example, in one test build using GCC 8.3 with normal settings, the compiler generated multiple (unlocked) read-modify-write operations in source-code order, which did not constitute a vulnerability. We have not been able to survey compilers; consequently we cannot say which compiler(s) might produce vulnerable code (with which code-generation options). The source code clearly violates the C rules, and thus should be considered vulnerable.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-4.4.4_44-61.55.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-doc-html-4.4.4_44-61.55.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-default-4.4.4_44_3.0.101_108.117-61.55.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-default-4.4.4_44_3.0.101_108.117-61.55.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-pae-4.4.4_44_3.0.101_108.117-61.55.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-32bit-4.4.4_44-61.55.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-4.4.4_44-61.55.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-4.4.4_44-61.55.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-4.4.4_44-61.55.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-domU-4.4.4_44-61.55.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-domU-4.4.4_44-61.55.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-15567", "url": "https://www.suse.com/security/cve/CVE-2020-15567" }, { "category": "external", "summary": "SUSE Bug 1173380 for CVE-2020-15567", "url": "https://bugzilla.suse.com/1173380" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2020-15567", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-4.4.4_44-61.55.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-doc-html-4.4.4_44-61.55.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-default-4.4.4_44_3.0.101_108.117-61.55.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-default-4.4.4_44_3.0.101_108.117-61.55.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-pae-4.4.4_44_3.0.101_108.117-61.55.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-32bit-4.4.4_44-61.55.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-4.4.4_44-61.55.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-4.4.4_44-61.55.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-4.4.4_44-61.55.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-domU-4.4.4_44-61.55.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-domU-4.4.4_44-61.55.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-4.4.4_44-61.55.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-doc-html-4.4.4_44-61.55.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-default-4.4.4_44_3.0.101_108.117-61.55.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-default-4.4.4_44_3.0.101_108.117-61.55.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-pae-4.4.4_44_3.0.101_108.117-61.55.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-32bit-4.4.4_44-61.55.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-4.4.4_44-61.55.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-4.4.4_44-61.55.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-4.4.4_44-61.55.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-domU-4.4.4_44-61.55.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-domU-4.4.4_44-61.55.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-10-22T12:09:09Z", "details": "moderate" } ], "title": "CVE-2020-15567" }, { "cve": "CVE-2020-25595", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25595" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.14.x. The PCI passthrough code improperly uses register data. Code paths in Xen\u0027s MSI handling have been identified that act on unsanitized values read back from device hardware registers. While devices strictly compliant with PCI specifications shouldn\u0027t be able to affect these registers, experience shows that it\u0027s very common for devices to have out-of-spec \"backdoor\" operations that can affect the result of these reads. A not fully trusted guest may be able to crash Xen, leading to a Denial of Service (DoS) for the entire system. Privilege escalation and information leaks cannot be excluded. All versions of Xen supporting PCI passthrough are affected. Only x86 systems are vulnerable. Arm systems are not vulnerable. Only guests with passed through PCI devices may be able to leverage the vulnerability. Only systems passing through devices with out-of-spec (\"backdoor\") functionality can cause issues. Experience shows that such out-of-spec functionality is common; unless you have reason to believe that your device does not have such functionality, it\u0027s better to assume that it does.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-4.4.4_44-61.55.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-doc-html-4.4.4_44-61.55.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-default-4.4.4_44_3.0.101_108.117-61.55.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-default-4.4.4_44_3.0.101_108.117-61.55.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-pae-4.4.4_44_3.0.101_108.117-61.55.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-32bit-4.4.4_44-61.55.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-4.4.4_44-61.55.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-4.4.4_44-61.55.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-4.4.4_44-61.55.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-domU-4.4.4_44-61.55.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-domU-4.4.4_44-61.55.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25595", "url": "https://www.suse.com/security/cve/CVE-2020-25595" }, { "category": "external", "summary": "SUSE Bug 1176344 for CVE-2020-25595", "url": "https://bugzilla.suse.com/1176344" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2020-25595", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-4.4.4_44-61.55.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-doc-html-4.4.4_44-61.55.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-default-4.4.4_44_3.0.101_108.117-61.55.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-default-4.4.4_44_3.0.101_108.117-61.55.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-pae-4.4.4_44_3.0.101_108.117-61.55.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-32bit-4.4.4_44-61.55.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-4.4.4_44-61.55.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-4.4.4_44-61.55.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-4.4.4_44-61.55.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-domU-4.4.4_44-61.55.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-domU-4.4.4_44-61.55.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-4.4.4_44-61.55.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-doc-html-4.4.4_44-61.55.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-default-4.4.4_44_3.0.101_108.117-61.55.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-default-4.4.4_44_3.0.101_108.117-61.55.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-pae-4.4.4_44_3.0.101_108.117-61.55.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-32bit-4.4.4_44-61.55.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-4.4.4_44-61.55.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-4.4.4_44-61.55.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-4.4.4_44-61.55.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-domU-4.4.4_44-61.55.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-domU-4.4.4_44-61.55.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-10-22T12:09:09Z", "details": "important" } ], "title": "CVE-2020-25595" }, { "cve": "CVE-2020-25596", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25596" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.14.x. x86 PV guest kernels can experience denial of service via SYSENTER. The SYSENTER instruction leaves various state sanitization activities to software. One of Xen\u0027s sanitization paths injects a #GP fault, and incorrectly delivers it twice to the guest. This causes the guest kernel to observe a kernel-privilege #GP fault (typically fatal) rather than a user-privilege #GP fault (usually converted into SIGSEGV/etc.). Malicious or buggy userspace can crash the guest kernel, resulting in a VM Denial of Service. All versions of Xen from 3.2 onwards are vulnerable. Only x86 systems are vulnerable. ARM platforms are not vulnerable. Only x86 systems that support the SYSENTER instruction in 64bit mode are vulnerable. This is believed to be Intel, Centaur, and Shanghai CPUs. AMD and Hygon CPUs are not believed to be vulnerable. Only x86 PV guests can exploit the vulnerability. x86 PVH / HVM guests cannot exploit the vulnerability.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-4.4.4_44-61.55.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-doc-html-4.4.4_44-61.55.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-default-4.4.4_44_3.0.101_108.117-61.55.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-default-4.4.4_44_3.0.101_108.117-61.55.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-pae-4.4.4_44_3.0.101_108.117-61.55.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-32bit-4.4.4_44-61.55.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-4.4.4_44-61.55.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-4.4.4_44-61.55.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-4.4.4_44-61.55.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-domU-4.4.4_44-61.55.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-domU-4.4.4_44-61.55.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25596", "url": "https://www.suse.com/security/cve/CVE-2020-25596" }, { "category": "external", "summary": "SUSE Bug 1176345 for CVE-2020-25596", "url": "https://bugzilla.suse.com/1176345" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2020-25596", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-4.4.4_44-61.55.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-doc-html-4.4.4_44-61.55.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-default-4.4.4_44_3.0.101_108.117-61.55.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-default-4.4.4_44_3.0.101_108.117-61.55.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-pae-4.4.4_44_3.0.101_108.117-61.55.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-32bit-4.4.4_44-61.55.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-4.4.4_44-61.55.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-4.4.4_44-61.55.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-4.4.4_44-61.55.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-domU-4.4.4_44-61.55.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-domU-4.4.4_44-61.55.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-4.4.4_44-61.55.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-doc-html-4.4.4_44-61.55.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-default-4.4.4_44_3.0.101_108.117-61.55.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-default-4.4.4_44_3.0.101_108.117-61.55.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-pae-4.4.4_44_3.0.101_108.117-61.55.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-32bit-4.4.4_44-61.55.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-4.4.4_44-61.55.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-4.4.4_44-61.55.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-4.4.4_44-61.55.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-domU-4.4.4_44-61.55.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-domU-4.4.4_44-61.55.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-10-22T12:09:09Z", "details": "moderate" } ], "title": "CVE-2020-25596" }, { "cve": "CVE-2020-25597", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25597" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.14.x. There is mishandling of the constraint that once-valid event channels may not turn invalid. Logic in the handling of event channel operations in Xen assumes that an event channel, once valid, will not become invalid over the life time of a guest. However, operations like the resetting of all event channels may involve decreasing one of the bounds checked when determining validity. This may lead to bug checks triggering, crashing the host. An unprivileged guest may be able to crash Xen, leading to a Denial of Service (DoS) for the entire system. All Xen versions from 4.4 onwards are vulnerable. Xen versions 4.3 and earlier are not vulnerable. Only systems with untrusted guests permitted to create more than the default number of event channels are vulnerable. This number depends on the architecture and type of guest. For 32-bit x86 PV guests, this is 1023; for 64-bit x86 PV guests, and for all ARM guests, this number is 4095. Systems where untrusted guests are limited to fewer than this number are not vulnerable. Note that xl and libxl limit max_event_channels to 1023 by default, so systems using exclusively xl, libvirt+libxl, or their own toolstack based on libxl, and not explicitly setting max_event_channels, are not vulnerable.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-4.4.4_44-61.55.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-doc-html-4.4.4_44-61.55.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-default-4.4.4_44_3.0.101_108.117-61.55.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-default-4.4.4_44_3.0.101_108.117-61.55.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-pae-4.4.4_44_3.0.101_108.117-61.55.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-32bit-4.4.4_44-61.55.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-4.4.4_44-61.55.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-4.4.4_44-61.55.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-4.4.4_44-61.55.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-domU-4.4.4_44-61.55.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-domU-4.4.4_44-61.55.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25597", "url": "https://www.suse.com/security/cve/CVE-2020-25597" }, { "category": "external", "summary": "SUSE Bug 1176346 for CVE-2020-25597", "url": "https://bugzilla.suse.com/1176346" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-4.4.4_44-61.55.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-doc-html-4.4.4_44-61.55.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-default-4.4.4_44_3.0.101_108.117-61.55.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-default-4.4.4_44_3.0.101_108.117-61.55.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-pae-4.4.4_44_3.0.101_108.117-61.55.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-32bit-4.4.4_44-61.55.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-4.4.4_44-61.55.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-4.4.4_44-61.55.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-4.4.4_44-61.55.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-domU-4.4.4_44-61.55.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-domU-4.4.4_44-61.55.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-4.4.4_44-61.55.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-doc-html-4.4.4_44-61.55.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-default-4.4.4_44_3.0.101_108.117-61.55.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-default-4.4.4_44_3.0.101_108.117-61.55.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-pae-4.4.4_44_3.0.101_108.117-61.55.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-32bit-4.4.4_44-61.55.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-4.4.4_44-61.55.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-4.4.4_44-61.55.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-4.4.4_44-61.55.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-domU-4.4.4_44-61.55.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-domU-4.4.4_44-61.55.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-10-22T12:09:09Z", "details": "moderate" } ], "title": "CVE-2020-25597" }, { "cve": "CVE-2020-25600", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25600" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.14.x. Out of bounds event channels are available to 32-bit x86 domains. The so called 2-level event channel model imposes different limits on the number of usable event channels for 32-bit x86 domains vs 64-bit or Arm (either bitness) ones. 32-bit x86 domains can use only 1023 channels, due to limited space in their shared (between guest and Xen) information structure, whereas all other domains can use up to 4095 in this model. The recording of the respective limit during domain initialization, however, has occurred at a time where domains are still deemed to be 64-bit ones, prior to actually honoring respective domain properties. At the point domains get recognized as 32-bit ones, the limit didn\u0027t get updated accordingly. Due to this misbehavior in Xen, 32-bit domains (including Domain 0) servicing other domains may observe event channel allocations to succeed when they should really fail. Subsequent use of such event channels would then possibly lead to corruption of other parts of the shared info structure. An unprivileged guest may cause another domain, in particular Domain 0, to misbehave. This may lead to a Denial of Service (DoS) for the entire system. All Xen versions from 4.4 onwards are vulnerable. Xen versions 4.3 and earlier are not vulnerable. Only x86 32-bit domains servicing other domains are vulnerable. Arm systems, as well as x86 64-bit domains, are not vulnerable.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-4.4.4_44-61.55.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-doc-html-4.4.4_44-61.55.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-default-4.4.4_44_3.0.101_108.117-61.55.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-default-4.4.4_44_3.0.101_108.117-61.55.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-pae-4.4.4_44_3.0.101_108.117-61.55.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-32bit-4.4.4_44-61.55.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-4.4.4_44-61.55.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-4.4.4_44-61.55.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-4.4.4_44-61.55.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-domU-4.4.4_44-61.55.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-domU-4.4.4_44-61.55.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25600", "url": "https://www.suse.com/security/cve/CVE-2020-25600" }, { "category": "external", "summary": "SUSE Bug 1176348 for CVE-2020-25600", "url": "https://bugzilla.suse.com/1176348" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-4.4.4_44-61.55.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-doc-html-4.4.4_44-61.55.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-default-4.4.4_44_3.0.101_108.117-61.55.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-default-4.4.4_44_3.0.101_108.117-61.55.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-pae-4.4.4_44_3.0.101_108.117-61.55.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-32bit-4.4.4_44-61.55.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-4.4.4_44-61.55.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-4.4.4_44-61.55.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-4.4.4_44-61.55.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-domU-4.4.4_44-61.55.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-domU-4.4.4_44-61.55.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-4.4.4_44-61.55.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-doc-html-4.4.4_44-61.55.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-default-4.4.4_44_3.0.101_108.117-61.55.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-default-4.4.4_44_3.0.101_108.117-61.55.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-pae-4.4.4_44_3.0.101_108.117-61.55.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-32bit-4.4.4_44-61.55.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-4.4.4_44-61.55.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-4.4.4_44-61.55.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-4.4.4_44-61.55.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-domU-4.4.4_44-61.55.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-domU-4.4.4_44-61.55.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-10-22T12:09:09Z", "details": "important" } ], "title": "CVE-2020-25600" }, { "cve": "CVE-2020-25601", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25601" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.14.x. There is a lack of preemption in evtchn_reset() / evtchn_destroy(). In particular, the FIFO event channel model allows guests to have a large number of event channels active at a time. Closing all of these (when resetting all event channels or when cleaning up after the guest) may take extended periods of time. So far, there was no arrangement for preemption at suitable intervals, allowing a CPU to spend an almost unbounded amount of time in the processing of these operations. Malicious or buggy guest kernels can mount a Denial of Service (DoS) attack affecting the entire system. All Xen versions are vulnerable in principle. Whether versions 4.3 and older are vulnerable depends on underlying hardware characteristics.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-4.4.4_44-61.55.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-doc-html-4.4.4_44-61.55.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-default-4.4.4_44_3.0.101_108.117-61.55.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-default-4.4.4_44_3.0.101_108.117-61.55.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-pae-4.4.4_44_3.0.101_108.117-61.55.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-32bit-4.4.4_44-61.55.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-4.4.4_44-61.55.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-4.4.4_44-61.55.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-4.4.4_44-61.55.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-domU-4.4.4_44-61.55.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-domU-4.4.4_44-61.55.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25601", "url": "https://www.suse.com/security/cve/CVE-2020-25601" }, { "category": "external", "summary": "SUSE Bug 1176350 for CVE-2020-25601", "url": "https://bugzilla.suse.com/1176350" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-4.4.4_44-61.55.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-doc-html-4.4.4_44-61.55.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-default-4.4.4_44_3.0.101_108.117-61.55.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-default-4.4.4_44_3.0.101_108.117-61.55.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-pae-4.4.4_44_3.0.101_108.117-61.55.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-32bit-4.4.4_44-61.55.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-4.4.4_44-61.55.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-4.4.4_44-61.55.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-4.4.4_44-61.55.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-domU-4.4.4_44-61.55.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-domU-4.4.4_44-61.55.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-4.4.4_44-61.55.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-doc-html-4.4.4_44-61.55.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-default-4.4.4_44_3.0.101_108.117-61.55.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-default-4.4.4_44_3.0.101_108.117-61.55.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-pae-4.4.4_44_3.0.101_108.117-61.55.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-32bit-4.4.4_44-61.55.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-4.4.4_44-61.55.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-4.4.4_44-61.55.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-4.4.4_44-61.55.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-domU-4.4.4_44-61.55.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-domU-4.4.4_44-61.55.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-10-22T12:09:09Z", "details": "moderate" } ], "title": "CVE-2020-25601" }, { "cve": "CVE-2020-25603", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25603" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.14.x. There are missing memory barriers when accessing/allocating an event channel. Event channels control structures can be accessed lockless as long as the port is considered to be valid. Such a sequence is missing an appropriate memory barrier (e.g., smp_*mb()) to prevent both the compiler and CPU from re-ordering access. A malicious guest may be able to cause a hypervisor crash resulting in a Denial of Service (DoS). Information leak and privilege escalation cannot be excluded. Systems running all versions of Xen are affected. Whether a system is vulnerable will depend on the CPU and compiler used to build Xen. For all systems, the presence and the scope of the vulnerability depend on the precise re-ordering performed by the compiler used to build Xen. We have not been able to survey compilers; consequently we cannot say which compiler(s) might produce vulnerable code (with which code generation options). GCC documentation clearly suggests that re-ordering is possible. Arm systems will also be vulnerable if the CPU is able to re-order memory access. Please consult your CPU vendor. x86 systems are only vulnerable if a compiler performs re-ordering.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-4.4.4_44-61.55.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-doc-html-4.4.4_44-61.55.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-default-4.4.4_44_3.0.101_108.117-61.55.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-default-4.4.4_44_3.0.101_108.117-61.55.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-pae-4.4.4_44_3.0.101_108.117-61.55.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-32bit-4.4.4_44-61.55.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-4.4.4_44-61.55.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-4.4.4_44-61.55.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-4.4.4_44-61.55.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-domU-4.4.4_44-61.55.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-domU-4.4.4_44-61.55.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25603", "url": "https://www.suse.com/security/cve/CVE-2020-25603" }, { "category": "external", "summary": "SUSE Bug 1176347 for CVE-2020-25603", "url": "https://bugzilla.suse.com/1176347" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2020-25603", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-4.4.4_44-61.55.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-doc-html-4.4.4_44-61.55.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-default-4.4.4_44_3.0.101_108.117-61.55.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-default-4.4.4_44_3.0.101_108.117-61.55.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-pae-4.4.4_44_3.0.101_108.117-61.55.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-32bit-4.4.4_44-61.55.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-4.4.4_44-61.55.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-4.4.4_44-61.55.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-4.4.4_44-61.55.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-domU-4.4.4_44-61.55.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-domU-4.4.4_44-61.55.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-4.4.4_44-61.55.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-doc-html-4.4.4_44-61.55.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-default-4.4.4_44_3.0.101_108.117-61.55.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-default-4.4.4_44_3.0.101_108.117-61.55.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-pae-4.4.4_44_3.0.101_108.117-61.55.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-32bit-4.4.4_44-61.55.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-4.4.4_44-61.55.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-4.4.4_44-61.55.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-4.4.4_44-61.55.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-domU-4.4.4_44-61.55.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-domU-4.4.4_44-61.55.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-10-22T12:09:09Z", "details": "important" } ], "title": "CVE-2020-25603" }, { "cve": "CVE-2020-25604", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25604" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.14.x. There is a race condition when migrating timers between x86 HVM vCPUs. When migrating timers of x86 HVM guests between its vCPUs, the locking model used allows for a second vCPU of the same guest (also operating on the timers) to release a lock that it didn\u0027t acquire. The most likely effect of the issue is a hang or crash of the hypervisor, i.e., a Denial of Service (DoS). All versions of Xen are affected. Only x86 systems are vulnerable. Arm systems are not vulnerable. Only x86 HVM guests can leverage the vulnerability. x86 PV and PVH cannot leverage the vulnerability. Only guests with more than one vCPU can exploit the vulnerability.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-4.4.4_44-61.55.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-doc-html-4.4.4_44-61.55.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-default-4.4.4_44_3.0.101_108.117-61.55.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-default-4.4.4_44_3.0.101_108.117-61.55.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-pae-4.4.4_44_3.0.101_108.117-61.55.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-32bit-4.4.4_44-61.55.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-4.4.4_44-61.55.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-4.4.4_44-61.55.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-4.4.4_44-61.55.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-domU-4.4.4_44-61.55.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-domU-4.4.4_44-61.55.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25604", "url": "https://www.suse.com/security/cve/CVE-2020-25604" }, { "category": "external", "summary": "SUSE Bug 1176343 for CVE-2020-25604", "url": "https://bugzilla.suse.com/1176343" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2020-25604", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-4.4.4_44-61.55.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-doc-html-4.4.4_44-61.55.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-default-4.4.4_44_3.0.101_108.117-61.55.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-default-4.4.4_44_3.0.101_108.117-61.55.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-pae-4.4.4_44_3.0.101_108.117-61.55.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-32bit-4.4.4_44-61.55.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-4.4.4_44-61.55.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-4.4.4_44-61.55.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-4.4.4_44-61.55.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-domU-4.4.4_44-61.55.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-domU-4.4.4_44-61.55.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-4.4.4_44-61.55.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-doc-html-4.4.4_44-61.55.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-default-4.4.4_44_3.0.101_108.117-61.55.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-default-4.4.4_44_3.0.101_108.117-61.55.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-pae-4.4.4_44_3.0.101_108.117-61.55.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-32bit-4.4.4_44-61.55.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-4.4.4_44-61.55.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-4.4.4_44-61.55.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-4.4.4_44-61.55.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-domU-4.4.4_44-61.55.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-domU-4.4.4_44-61.55.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-10-22T12:09:09Z", "details": "moderate" } ], "title": "CVE-2020-25604" } ] }
suse-su-2020:1632-1
Vulnerability from csaf_suse
Published
2020-06-17 08:35
Modified
2020-06-17 08:35
Summary
Security update for xen
Notes
Title of the patch
Security update for xen
Description of the patch
This update for xen to version 4.11.4 fixes the following issues:
- CVE-2020-0543: Fixed a side channel attack against special registers which could have resulted in leaking of read values to cores other than the one which called it.
This attack is known as Special Register Buffer Data Sampling (SRBDS) or 'CrossTalk' (bsc#1172205).
Patchnames
SUSE-2020-1632,SUSE-SLE-SDK-12-SP4-2020-1632,SUSE-SLE-SERVER-12-SP4-2020-1632
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for xen", "title": "Title of the patch" }, { "category": "description", "text": "This update for xen to version 4.11.4 fixes the following issues:\n\n- CVE-2020-0543: Fixed a side channel attack against special registers which could have resulted in leaking of read values to cores other than the one which called it.\n This attack is known as Special Register Buffer Data Sampling (SRBDS) or \u0027CrossTalk\u0027 (bsc#1172205).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2020-1632,SUSE-SLE-SDK-12-SP4-2020-1632,SUSE-SLE-SERVER-12-SP4-2020-1632", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2020_1632-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2020:1632-1", "url": "https://www.suse.com/support/update/announcement/2020/suse-su-20201632-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2020:1632-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-June/006959.html" }, { "category": "self", "summary": "SUSE Bug 1027519", "url": "https://bugzilla.suse.com/1027519" }, { "category": "self", "summary": "SUSE Bug 1172205", "url": "https://bugzilla.suse.com/1172205" }, { "category": "self", "summary": "SUSE CVE CVE-2020-0543 page", "url": "https://www.suse.com/security/cve/CVE-2020-0543/" } ], "title": "Security update for xen", "tracking": { "current_release_date": "2020-06-17T08:35:14Z", "generator": { "date": "2020-06-17T08:35:14Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2020:1632-1", "initial_release_date": "2020-06-17T08:35:14Z", "revision_history": [ { "date": "2020-06-17T08:35:14Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "xen-4.11.4_02-2.26.1.aarch64", "product": { "name": "xen-4.11.4_02-2.26.1.aarch64", "product_id": "xen-4.11.4_02-2.26.1.aarch64" } }, { "category": "product_version", "name": "xen-devel-4.11.4_02-2.26.1.aarch64", "product": { "name": "xen-devel-4.11.4_02-2.26.1.aarch64", "product_id": "xen-devel-4.11.4_02-2.26.1.aarch64" } }, { "category": "product_version", "name": "xen-doc-html-4.11.4_02-2.26.1.aarch64", "product": { "name": "xen-doc-html-4.11.4_02-2.26.1.aarch64", "product_id": "xen-doc-html-4.11.4_02-2.26.1.aarch64" } }, { "category": "product_version", "name": "xen-libs-4.11.4_02-2.26.1.aarch64", "product": { "name": "xen-libs-4.11.4_02-2.26.1.aarch64", "product_id": "xen-libs-4.11.4_02-2.26.1.aarch64" } }, { "category": "product_version", "name": "xen-tools-4.11.4_02-2.26.1.aarch64", "product": { "name": "xen-tools-4.11.4_02-2.26.1.aarch64", "product_id": "xen-tools-4.11.4_02-2.26.1.aarch64" } }, { "category": "product_version", "name": "xen-tools-domU-4.11.4_02-2.26.1.aarch64", "product": { "name": "xen-tools-domU-4.11.4_02-2.26.1.aarch64", "product_id": "xen-tools-domU-4.11.4_02-2.26.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "xen-libs-64bit-4.11.4_02-2.26.1.aarch64_ilp32", "product": { "name": "xen-libs-64bit-4.11.4_02-2.26.1.aarch64_ilp32", "product_id": "xen-libs-64bit-4.11.4_02-2.26.1.aarch64_ilp32" } } ], "category": "architecture", "name": "aarch64_ilp32" }, { "branches": [ { "category": "product_version", "name": "xen-devel-4.11.4_02-2.26.1.i586", "product": { "name": "xen-devel-4.11.4_02-2.26.1.i586", "product_id": "xen-devel-4.11.4_02-2.26.1.i586" } }, { "category": "product_version", "name": "xen-libs-4.11.4_02-2.26.1.i586", "product": { "name": "xen-libs-4.11.4_02-2.26.1.i586", "product_id": "xen-libs-4.11.4_02-2.26.1.i586" } }, { "category": "product_version", "name": "xen-tools-domU-4.11.4_02-2.26.1.i586", "product": { "name": "xen-tools-domU-4.11.4_02-2.26.1.i586", "product_id": "xen-tools-domU-4.11.4_02-2.26.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "xen-4.11.4_02-2.26.1.x86_64", "product": { "name": "xen-4.11.4_02-2.26.1.x86_64", "product_id": "xen-4.11.4_02-2.26.1.x86_64" } }, { "category": "product_version", "name": "xen-devel-4.11.4_02-2.26.1.x86_64", "product": { "name": "xen-devel-4.11.4_02-2.26.1.x86_64", "product_id": "xen-devel-4.11.4_02-2.26.1.x86_64" } }, { "category": "product_version", "name": "xen-doc-html-4.11.4_02-2.26.1.x86_64", "product": { "name": "xen-doc-html-4.11.4_02-2.26.1.x86_64", "product_id": "xen-doc-html-4.11.4_02-2.26.1.x86_64" } }, { "category": "product_version", "name": "xen-libs-4.11.4_02-2.26.1.x86_64", "product": { "name": "xen-libs-4.11.4_02-2.26.1.x86_64", "product_id": "xen-libs-4.11.4_02-2.26.1.x86_64" } }, { "category": "product_version", "name": "xen-libs-32bit-4.11.4_02-2.26.1.x86_64", "product": { "name": "xen-libs-32bit-4.11.4_02-2.26.1.x86_64", "product_id": "xen-libs-32bit-4.11.4_02-2.26.1.x86_64" } }, { "category": "product_version", "name": "xen-tools-4.11.4_02-2.26.1.x86_64", "product": { "name": "xen-tools-4.11.4_02-2.26.1.x86_64", "product_id": "xen-tools-4.11.4_02-2.26.1.x86_64" } }, { "category": "product_version", "name": "xen-tools-domU-4.11.4_02-2.26.1.x86_64", "product": { "name": "xen-tools-domU-4.11.4_02-2.26.1.x86_64", "product_id": "xen-tools-domU-4.11.4_02-2.26.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Software Development Kit 12 SP4", "product": { "name": "SUSE Linux Enterprise Software Development Kit 12 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-sdk:12:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP4", "product": { "name": "SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sles:12:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp4" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "xen-devel-4.11.4_02-2.26.1.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP4:xen-devel-4.11.4_02-2.26.1.aarch64" }, "product_reference": "xen-devel-4.11.4_02-2.26.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "xen-devel-4.11.4_02-2.26.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP4:xen-devel-4.11.4_02-2.26.1.x86_64" }, "product_reference": "xen-devel-4.11.4_02-2.26.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "xen-4.11.4_02-2.26.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:xen-4.11.4_02-2.26.1.x86_64" }, "product_reference": "xen-4.11.4_02-2.26.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "xen-doc-html-4.11.4_02-2.26.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:xen-doc-html-4.11.4_02-2.26.1.x86_64" }, "product_reference": "xen-doc-html-4.11.4_02-2.26.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.11.4_02-2.26.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:xen-libs-4.11.4_02-2.26.1.x86_64" }, "product_reference": "xen-libs-4.11.4_02-2.26.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-32bit-4.11.4_02-2.26.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:xen-libs-32bit-4.11.4_02-2.26.1.x86_64" }, "product_reference": "xen-libs-32bit-4.11.4_02-2.26.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.11.4_02-2.26.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:xen-tools-4.11.4_02-2.26.1.x86_64" }, "product_reference": "xen-tools-4.11.4_02-2.26.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.11.4_02-2.26.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:xen-tools-domU-4.11.4_02-2.26.1.x86_64" }, "product_reference": "xen-tools-domU-4.11.4_02-2.26.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "xen-4.11.4_02-2.26.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-4.11.4_02-2.26.1.x86_64" }, "product_reference": "xen-4.11.4_02-2.26.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "xen-doc-html-4.11.4_02-2.26.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-doc-html-4.11.4_02-2.26.1.x86_64" }, "product_reference": "xen-doc-html-4.11.4_02-2.26.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.11.4_02-2.26.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-libs-4.11.4_02-2.26.1.x86_64" }, "product_reference": "xen-libs-4.11.4_02-2.26.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-32bit-4.11.4_02-2.26.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-libs-32bit-4.11.4_02-2.26.1.x86_64" }, "product_reference": "xen-libs-32bit-4.11.4_02-2.26.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.11.4_02-2.26.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-tools-4.11.4_02-2.26.1.x86_64" }, "product_reference": "xen-tools-4.11.4_02-2.26.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.11.4_02-2.26.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-tools-domU-4.11.4_02-2.26.1.x86_64" }, "product_reference": "xen-tools-domU-4.11.4_02-2.26.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-0543", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-0543" } ], "notes": [ { "category": "general", "text": "Incomplete cleanup from specific special register read operations in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP4:xen-4.11.4_02-2.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:xen-doc-html-4.11.4_02-2.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:xen-libs-32bit-4.11.4_02-2.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:xen-libs-4.11.4_02-2.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:xen-tools-4.11.4_02-2.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:xen-tools-domU-4.11.4_02-2.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-4.11.4_02-2.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-doc-html-4.11.4_02-2.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-libs-32bit-4.11.4_02-2.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-libs-4.11.4_02-2.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-tools-4.11.4_02-2.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-tools-domU-4.11.4_02-2.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:xen-devel-4.11.4_02-2.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:xen-devel-4.11.4_02-2.26.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-0543", "url": "https://www.suse.com/security/cve/CVE-2020-0543" }, { "category": "external", "summary": "SUSE Bug 1154824 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1154824" }, { "category": "external", "summary": "SUSE Bug 1172205 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172205" }, { "category": "external", "summary": "SUSE Bug 1172206 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172206" }, { "category": "external", "summary": "SUSE Bug 1172207 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172207" }, { "category": "external", "summary": "SUSE Bug 1172770 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172770" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP4:xen-4.11.4_02-2.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:xen-doc-html-4.11.4_02-2.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:xen-libs-32bit-4.11.4_02-2.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:xen-libs-4.11.4_02-2.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:xen-tools-4.11.4_02-2.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:xen-tools-domU-4.11.4_02-2.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-4.11.4_02-2.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-doc-html-4.11.4_02-2.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-libs-32bit-4.11.4_02-2.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-libs-4.11.4_02-2.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-tools-4.11.4_02-2.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-tools-domU-4.11.4_02-2.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:xen-devel-4.11.4_02-2.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:xen-devel-4.11.4_02-2.26.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP4:xen-4.11.4_02-2.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:xen-doc-html-4.11.4_02-2.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:xen-libs-32bit-4.11.4_02-2.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:xen-libs-4.11.4_02-2.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:xen-tools-4.11.4_02-2.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:xen-tools-domU-4.11.4_02-2.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-4.11.4_02-2.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-doc-html-4.11.4_02-2.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-libs-32bit-4.11.4_02-2.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-libs-4.11.4_02-2.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-tools-4.11.4_02-2.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-tools-domU-4.11.4_02-2.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:xen-devel-4.11.4_02-2.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:xen-devel-4.11.4_02-2.26.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-17T08:35:14Z", "details": "moderate" } ], "title": "CVE-2020-0543" } ] }
gsd-2020-0543
Vulnerability from gsd
Modified
2023-12-13 01:21
Details
Incomplete cleanup from specific special register read operations in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2020-0543", "description": "Incomplete cleanup from specific special register read operations in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.", "id": "GSD-2020-0543", "references": [ "https://www.suse.com/security/cve/CVE-2020-0543.html", "https://www.debian.org/security/2020/dsa-4701", "https://www.debian.org/security/2020/dsa-4698", "https://www.debian.org/security/2020/dsa-4699", "https://access.redhat.com/errata/RHSA-2021:3364", "https://access.redhat.com/errata/RHSA-2021:3323", "https://access.redhat.com/errata/RHSA-2021:3322", "https://access.redhat.com/errata/RHSA-2021:3317", "https://access.redhat.com/errata/RHSA-2021:3255", "https://access.redhat.com/errata/RHSA-2021:3176", "https://access.redhat.com/errata/RHSA-2021:3029", "https://access.redhat.com/errata/RHSA-2021:3028", "https://access.redhat.com/errata/RHSA-2021:3027", "https://access.redhat.com/errata/RHSA-2020:2842", "https://access.redhat.com/errata/RHSA-2020:2771", "https://access.redhat.com/errata/RHSA-2020:2758", "https://access.redhat.com/errata/RHSA-2020:2757", "https://access.redhat.com/errata/RHSA-2020:2707", "https://access.redhat.com/errata/RHSA-2020:2706", "https://access.redhat.com/errata/RHSA-2020:2680", "https://access.redhat.com/errata/RHSA-2020:2679", "https://access.redhat.com/errata/RHSA-2020:2677", "https://access.redhat.com/errata/RHSA-2020:2433", "https://access.redhat.com/errata/RHSA-2020:2432", "https://access.redhat.com/errata/RHSA-2020:2431", "https://ubuntu.com/security/CVE-2020-0543", "https://advisories.mageia.org/CVE-2020-0543.html", "https://security.archlinux.org/CVE-2020-0543", "https://alas.aws.amazon.com/cve/html/CVE-2020-0543.html", "https://linux.oracle.com/cve/CVE-2020-0543.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2020-0543" ], "details": "Incomplete cleanup from specific special register read operations in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.", "id": "GSD-2020-0543", "modified": "2023-12-13T01:21:44.171353Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "secure@intel.com", "ID": "CVE-2020-0543", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Intel(R) Processors", "version": { "version_data": [ { "version_value": "See provided reference" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Incomplete cleanup from specific special register read operations in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Information Disclosure" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00320.html", "refsource": "MISC", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00320.html" }, { "name": "USN-4385-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/4385-1/" }, { "name": "USN-4388-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/4388-1/" }, { "name": "openSUSE-SU-2020:0818", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00025.html" }, { "name": "USN-4392-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/4392-1/" }, { "name": "USN-4393-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/4393-1/" }, { "name": "USN-4389-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/4389-1/" }, { "name": "USN-4387-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/4387-1/" }, { "name": "FEDORA-2020-3364913ace", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NQZMOSHLTBBIECENNXA6M7DN5FEED4KI/" }, { "name": "FEDORA-2020-e8835a5f8e", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T5OUM24ZC43G4IDT3JUCIHJTSDXJSK6Y/" }, { "name": "USN-4390-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/4390-1/" }, { "name": "USN-4391-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/4391-1/" }, { "name": "FEDORA-2020-11ddbfbdf0", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DT2VKDMQ3I37NBNJ256A2EXR7OJHXXKZ/" }, { "name": "[oss-security] 20200714 Flatcar membership on the linux-distros list", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2020/07/14/5" }, { "name": "openSUSE-SU-2020:0965", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00024.html" }, { "name": "openSUSE-SU-2020:0985", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00031.html" }, { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-534763.pdf", "refsource": "CONFIRM", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-534763.pdf" }, { "name": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10318", "refsource": "CONFIRM", "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10318" }, { "name": "FEDORA-2020-1afbe7ba2d", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GRFC7UAPKAFFH5WX3AMDUBVHLKYQA2NZ/" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:celeron_1000m:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:celeron_1005m:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:celeron_1007u:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:celeron_1017u:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:celeron_1019y:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:celeron_1020e:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:celeron_1020m:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:celeron_1037u:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:celeron_1047ue:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:celeron_2955u:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:celeron_2957u:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:celeron_2970m:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:celeron_2980u:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:celeron_2981u:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:celeron_3755u:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:celeron_3765u:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:celeron_3855u:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:celeron_3865u:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:celeron_3955u:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:celeron_3965u:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:celeron_3965y:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:celeron_5305u:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:celeron_725c:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:celeron_927ue:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:celeron_g1610:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:celeron_g1610t:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:celeron_g1620:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:celeron_g1620t:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:celeron_g1630:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:celeron_g1820:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:celeron_g1820t:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:celeron_g1830:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:celeron_g1840:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:celeron_g1840t:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:celeron_g1850:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:celeron_g3900:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:celeron_g3900t:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:celeron_g3900te:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:celeron_g3902e:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:celeron_g3920:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:celeron_g3920t:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:celeron_g3930e:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:celeron_g3930te:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:celeron_g3940:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:celeron_g4900:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:celeron_g4900t:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:celeron_g4920:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:celeron_g4930:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:celeron_g4950:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_4205u:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_4410y:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_4415y:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_5405u:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_8269u:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_9300h:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_9750hf:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3-2115c:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3-3110m:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3-3115c:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3-3120m:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3-3120me:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3-3130m:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3-3210:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3-3217u:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3-3217ue:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3-3220:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3-3220t:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3-3225:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3-3227u:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3-3229y:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3-3240:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3-3240t:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3-3245:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3-3250:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3-3250t:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3-4005u:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3-4010u:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3-4010y:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3-4012y:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3-4020y:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3-4025u:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3-4030u:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3-4030y:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3-4100m:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3-4100u:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3-4110m:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3-4120u:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3-4130:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3-4130t:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3-4150:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3-4150t:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3-4158u:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3-4160:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3-4160t:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3-4170:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3-4170t:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3-4330:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3-4330t:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3-4340:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3-4350:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3-4350t:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3-4360:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3-4360t:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3-4370:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3-4370t:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3-5005u:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3-5006u:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3-5010u:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3-5015u:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3-5020u:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3-5157u:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3-6100:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3-6100e:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3-6100h:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3-6100t:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3-6100te:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3-6100u:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3-6102e:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3-6110u:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3-6120:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3-6120t:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3-6167u:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3-6300:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3-6300t:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3-6320:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3-6320t:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3-7007u:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3-7020u:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3-7100e:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3-7100h:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3-7100u:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3-7101e:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3-7101te:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3-7102e:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3-7110u:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3-7120:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3-7120t:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3-7130u:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3-7167u:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3-7320t:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3-7340:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3-8000:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3-8000t:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3-8020:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3-8100:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3-8100h:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3-8100t:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3-8109u:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3-8120:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3-8130u:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3-8145u:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3-8300:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3-8300t:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3-8350k:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3-i3-8100h:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-10110y:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-10210u:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-10210y:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-10310y:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-3210m:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-3230m:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-3317u:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-3320m:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-3330:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-3330s:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-3337u:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-3339y:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-3340:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-3340m:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-3340s:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-3350p:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-3360m:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-3380m:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-3427u:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-3437u:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-3439y:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-3450:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-3450s:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-3470:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-3470s:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-3470t:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-3475s:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-3550:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-3550s:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-3570:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-3570k:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-3570s:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-3570t:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-3610me:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-4200u:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-4200y:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-4202y:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-4210h:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-4210u:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-4210y:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-4220y:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-4250u:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-4258u:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-4260u:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-4278u:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-4288u:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-4300u:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-4300y:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-4302y:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-4308u:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-4350u:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-4402ec:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-4430:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-4430s:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-4440:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-4440s:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-4460:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-4460s:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-4460t:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-4570:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-4570r:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-4570s:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-4570t:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-4590:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-4590s:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-4590t:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-4670:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-4670k:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-4670r:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-4670s:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-4670t:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-4690:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-4690s:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-4690t:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-5200u:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-5250u:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-5257u:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-5287u:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-5350:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-5350u:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-5575r:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-5675c:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-5675r:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-6200u:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-6210u:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-6260u:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-6267u:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-6287u:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-6300hq:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-6300u:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-6310u:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-6350hq:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-6360u:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-6400:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-6400t:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-6440eq:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-6440hq:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-6442eq:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-6500:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-6500t:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-6500te:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-6600:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-6600k:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-6600t:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-7200u:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-7210u:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-7260u:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-7267u:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-7287u:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-7300hq:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-7300u:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-7360u:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-7400:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-7400t:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-7440eq:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-7440hq:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-7442eq:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-7500:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-7500t:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-7500u:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-7600:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-7600k:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-7600t:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-7640x:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-7y54:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-7y57_:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-8200y:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-8210y:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-8250u:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-8259u:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-8265u:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-8300h:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-8305g:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-8310y:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-8350u:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-8365u:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-8400:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-8400b:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-8400h:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-8400t:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-8420:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-8420t:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-8500:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-8500b:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-8500t:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-8550:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-8600:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-8600k:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-8600t:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-8650:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-8650k:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-9400:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-9400f:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-9400h:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-9600k:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-9600kf:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-10510u:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-10510y:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-3517u:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-3517ue:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-3520m:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-3537u:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-3540m:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-3555le:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-3610qe:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-3610qm:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-3612qe:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-3612qm:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-3615qe:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-3615qm:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-3630qm:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-3632qm:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-3635qm:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-3667u:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-3687u:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-3689y:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-3720qm:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-3740qm:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-3770:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-3770k:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-3770s:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-3770t:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-3820qm:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-3840qm_:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-3920xm:-:*:*:*:extreme:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-3940xm:-:*:*:*:extreme:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-4500u:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-4510u:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-4550u:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-4558u:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-4578u:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-4600u:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-4610y:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-4650u:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-4700ec:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-4700eq:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-4700hq:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-4700mq:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-4702ec:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-4702hq:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-4702mq:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-4710hq:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-4710mq:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-4712hq:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-4712mq:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-4720hq:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-4722hq:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-4750hq:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-4760hq:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-4765t:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-4770:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-4770hq:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-4770k:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-4770r:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-4770s:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-4770t:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-4771:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-4785t:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-4790:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-4790s:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-4790t:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-4800mq:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-4810mq:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-4850hq:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-4860hq:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-4870hq:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-4900mq:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-4910mq:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-4950hq:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-4960hq:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-4980hq:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-5500u:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-5550u:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-5557u:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-5600u:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-5650u:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-5700eq:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-5700hq:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-5750hq:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-5775c:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-5775r:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-5850eq:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-5850hq:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-5950hq:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-6500u:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-6510u:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-6560u:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-6567u:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-6600u:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-6650u:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-6660u:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-6700:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-6700hq:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-6700k:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-6700t:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-6700te:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-6770hq:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-6820eq:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-6820hk:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-6820hq:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-6822eq:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-6870hq:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-6920hq:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-6970hq:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-7500u:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-7510u:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-7560u:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-7567u:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-7600u:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-7660u:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-7700:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-7700hq:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-7700k:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-7700t:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-7740x:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-7820eq:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-7820hk:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-7820hq:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-7920hq:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-7y75:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-8500y:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-8510y:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-8550u:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-8557u:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-8559u:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-8560u:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-8565u:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-8569u:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-8650u:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-8665u:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-8670:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-8670t:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-8700:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-8700b:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-8700k:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-8700t:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-8705g:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-8706g:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-8709g:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-8750h:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-8809g:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-8850h:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-9700k:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-9700kf:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-9850h:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i9-8950hk:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i9-9880h:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i9-9900k:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i9-9900kf:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i9-9980hk:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_m-5y10:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_m-5y10a:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_m-5y10c:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_m-5y3:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_m-5y51:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_m-5y70:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_m-5y71:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_m3-6y30:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_m3-7y30:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_m3-8100y:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_m5-6y54:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_m5-6y57:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_m7-6y75:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:pentium_1405_v2:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:pentium_2020m_v2:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:pentium_2030m_v2:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:pentium_2117u_v2:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:pentium_2127u_v2:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:pentium_2129y_v2:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:pentium_3205u:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:pentium_3215u:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:pentium_3556u:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:pentium_3558u:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:pentium_3560m:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:pentium_3560y:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:pentium_3561y:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:pentium_3665u:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:pentium_3765u:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:pentium_3805u:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:pentium_3825u:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:pentium_4405u:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:pentium_4405y:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:pentium_4415u:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:pentium_a1018_v2:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:pentium_b915c:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:pentium_b925c:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:pentium_g2010_v2:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:pentium_g2020_v2:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:pentium_g2020t_v2:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:pentium_g2030_v2:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:pentium_g2030t_v2:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:pentium_g2100t_v2:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:pentium_g2120_v2:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:pentium_g2120t_v2:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:pentium_g2130_v2:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:pentium_g2140_v2:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:pentium_g3220:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:pentium_g3220t:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:pentium_g3240:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:pentium_g3240t:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:pentium_g3250:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:pentium_g3250t:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:pentium_g3258:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:pentium_g3260:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:pentium_g3260t:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:pentium_g3420:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:pentium_g3420t:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:pentium_g3430:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:pentium_g3440:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:pentium_g3440t:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:pentium_g3450:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:pentium_g3450t:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:pentium_g3460:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:pentium_g3460t:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:pentium_g3470:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:pentium_g4400:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:pentium_g4400t:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:pentium_g4400te:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:pentium_g4420:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:pentium_g4420t:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:pentium_g4500:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:pentium_g4500t:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:pentium_g4520:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:pentium_g4520t:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:pentium_g4540:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:pentium_g5400:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:pentium_g5400t:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:pentium_g5420:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:pentium_g5420t:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:pentium_g5500:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:pentium_g5500t:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:pentium_g5600:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:pentium_gold_6405u:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e-2124:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e-2124g:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e-2126g:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e-2134:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e-2136:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e-2144g:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e-2146g:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e-2174g:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e-2176g:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e-2176m:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e-2184g:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e-2186g:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e-2186m:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e-2224:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e-2224g:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e-2226g:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e-2226ge:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e-2234:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e-2236:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e-2244g:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e-2246g:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e-2254me:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e-2254ml:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e-2274g:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e-2276g:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e-2276m:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e-2276me:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e-2276ml:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e-2278g:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e-2278ge:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e-2278gel:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e-2284g:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e-2286m:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e-2288g:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1105c:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1105c_v2:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1125c:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1125c_v2:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1220_v2:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1220_v3:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1220_v5:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1220_v6:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1220l_v2:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1220l_v3:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1221_v3:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1225_v2:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1225_v3:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1225_v5:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1225_v6:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1226_v3:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1230_v2:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1230_v3:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1230_v5:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1230_v6:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1230l_v3:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1231_v3:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1235_v2:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1235l_v5:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1240_v2:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1240_v3:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1240_v5:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1240_v6:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1240l_v3:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1240l_v5:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1241_v3:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1245_v2:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1245_v3:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1245_v5:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1245_v6:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1246_v3:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1258l_v4:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1260l_v5:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1265l:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1265l_v2:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1265l_v4:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1268l_v3:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1268l_v5:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1270:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1270_v2:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1270_v5:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1270_v6:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1271_v3:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1275_v2:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1275_v3:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1275_v5:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1275_v6:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1275l_v3:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1276_v3:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1278l_v4:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1280_v2:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1280_v3:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1280_v5:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1280_v6:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1281_v3:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1285_v3:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1285_v4:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1285_v6:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1285l_v3:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1286_v3:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1286l_v3:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1290_v2:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1501l_v6:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1501m_v6:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1505l_v5:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1505l_v6:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1505m_v5:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1505m_v6:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1515m_v5:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1535m_v5:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1535m_v6:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1545m_v5:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1558l_v5:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1565l_v5:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1575m_v5:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1578l_v5:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1585_v5:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1585l_v5:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:siemens:simatic_field_pg_m4_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:siemens:simatic_field_pg_m4:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:siemens:simatic_field_pg_m5_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "22.01.08", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:siemens:simatic_field_pg_m5:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:siemens:simatic_field_pg_m6_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "26.01.07", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:siemens:simatic_field_pg_m6:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:siemens:simatic_ipc347e_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:siemens:simatic_ipc347e:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:siemens:simatic_ipc427d_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:siemens:simatic_ipc427d:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:siemens:simatic_ipc427e_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "21.01.14", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:siemens:simatic_ipc427e:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:siemens:simatic_ipc477d_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:siemens:simatic_ipc477d:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:siemens:simatic_ipc477e_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "21.01.14", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:siemens:simatic_ipc477e:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:siemens:simatic_ipc477e_pro_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "21.01.14", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:siemens:simatic_ipc477e_pro:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:siemens:simatic_ipc527g_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "1.4.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:siemens:simatic_ipc527g:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:siemens:simatic_ipc547e_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:siemens:simatic_ipc547e:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:siemens:simatic_ipc547g_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "r1.28.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:siemens:simatic_ipc547g:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:siemens:simatic_ipc627d_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:siemens:simatic_ipc627d:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:siemens:simatic_ipc627e_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "25.02.06", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:siemens:simatic_ipc627e:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:siemens:simatic_ipc647d_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:siemens:simatic_ipc647d:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:siemens:simatic_ipc647e_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "25.02.06", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:siemens:simatic_ipc647e:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:siemens:simatic_ipc677d_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:siemens:simatic_ipc677d:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:siemens:simatic_ipc677e_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "25.02.06", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:siemens:simatic_ipc677e:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:siemens:simatic_ipc827d_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:siemens:simatic_ipc827d:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:siemens:simatic_ipc847d_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:siemens:simatic_ipc847d:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:siemens:simatic_ipc847e_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "25.02.06", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:siemens:simatic_ipc847e:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:siemens:simatic_ipc3000_smart_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "1.b", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:siemens:simatic_ipc3000_smart:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:siemens:simatic_itp1000_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "23.01.08", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:siemens:simatic_itp1000:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:siemens:simotion_p320-4e_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:siemens:simotion_p320-4e:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:siemens:simotion_p320-4s_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:siemens:simotion_p320-4s:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:mcafee:threat_intelligence_exchange_server:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "2.3.1", "versionStartIncluding": "2.0.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mcafee:threat_intelligence_exchange_server:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "secure@intel.com", "ID": "CVE-2020-0543" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "Incomplete cleanup from specific special register read operations in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-459" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00320.html", "refsource": "MISC", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00320.html" }, { "name": "USN-4385-1", "refsource": "UBUNTU", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/4385-1/" }, { "name": "USN-4388-1", "refsource": "UBUNTU", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/4388-1/" }, { "name": "openSUSE-SU-2020:0818", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00025.html" }, { "name": "USN-4392-1", "refsource": "UBUNTU", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/4392-1/" }, { "name": "USN-4393-1", "refsource": "UBUNTU", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/4393-1/" }, { "name": "USN-4389-1", "refsource": "UBUNTU", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/4389-1/" }, { "name": "USN-4387-1", "refsource": "UBUNTU", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/4387-1/" }, { "name": "FEDORA-2020-3364913ace", "refsource": "FEDORA", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NQZMOSHLTBBIECENNXA6M7DN5FEED4KI/" }, { "name": "FEDORA-2020-e8835a5f8e", "refsource": "FEDORA", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T5OUM24ZC43G4IDT3JUCIHJTSDXJSK6Y/" }, { "name": "USN-4390-1", "refsource": "UBUNTU", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/4390-1/" }, { "name": "USN-4391-1", "refsource": "UBUNTU", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/4391-1/" }, { "name": "FEDORA-2020-11ddbfbdf0", "refsource": "FEDORA", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DT2VKDMQ3I37NBNJ256A2EXR7OJHXXKZ/" }, { "name": "[oss-security] 20200714 Flatcar membership on the linux-distros list", "refsource": "MLIST", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2020/07/14/5" }, { "name": "openSUSE-SU-2020:0965", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00024.html" }, { "name": "openSUSE-SU-2020:0985", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00031.html" }, { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-534763.pdf", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-534763.pdf" }, { "name": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10318", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10318" }, { "name": "FEDORA-2020-1afbe7ba2d", "refsource": "FEDORA", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GRFC7UAPKAFFH5WX3AMDUBVHLKYQA2NZ/" } ] } }, "impact": { "baseMetricV2": { "acInsufInfo": false, "cvssV2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "userInteractionRequired": false }, "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6 } }, "lastModifiedDate": "2022-04-28T19:33Z", "publishedDate": "2020-06-15T14:15Z" } } }
wid-sec-w-2023-0063
Vulnerability from csaf_certbund
Published
2022-01-12 23:00
Modified
2023-01-11 23:00
Summary
Juniper Junos Space: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Junos Space ist eine Software-Plattform, die eine Reihe von Applikationen für das Netzwerkmanagement beinhaltet.
Angriff
Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter anonymer, authentisierter oder lokaler Angreifer kann mehrere Schwachstellen in Juniper Junos Space ausnutzen, um Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszulösen, beliebigen Code auszuführen und seine Privilegien zu erweitern.
Betroffene Betriebssysteme
- Juniper Appliance
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Junos Space ist eine Software-Plattform, die eine Reihe von Applikationen f\u00fcr das Netzwerkmanagement beinhaltet.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter anonymer, authentisierter oder lokaler Angreifer kann mehrere Schwachstellen in Juniper Junos Space ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern.", "title": "Angriff" }, { "category": "general", "text": "- Juniper Appliance", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2023-0063 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2023-0063.json" }, { "category": "self", "summary": "WID-SEC-2023-0063 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-0063" }, { "category": "external", "summary": "Juniper Security Advisory JSA70182 vom 2023-01-12", "url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Contrail-Service-Orchestration-Multiple-vulnerabilities-resolved-in-CSO-6-3-0?language=en_US" }, { "category": "external", "summary": "Juniper Security Advisory vom 2022-01-12", "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11287\u0026cat=SIRT_1" } ], "source_lang": "en-US", "title": "Juniper Junos Space: Mehrere Schwachstellen", "tracking": { "current_release_date": "2023-01-11T23:00:00.000+00:00", "generator": { "date": "2024-08-15T17:41:07.526+00:00", "engine": { "name": "BSI-WID", "version": "1.3.5" } }, "id": "WID-SEC-W-2023-0063", "initial_release_date": "2022-01-12T23:00:00.000+00:00", "revision_history": [ { "date": "2022-01-12T23:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2023-01-11T23:00:00.000+00:00", "number": "2", "summary": "Neue Updates von Juniper aufgenommen" } ], "status": "final", "version": "2" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Juniper Contrail Service Orchestration", "product": { "name": "Juniper Contrail Service Orchestration", "product_id": "T025794", "product_identification_helper": { "cpe": "cpe:/a:juniper:contrail_service_orchestration:-" } } }, { "category": "product_name", "name": "Juniper Junos Space \u003c 21.3R1", "product": { "name": "Juniper Junos Space \u003c 21.3R1", "product_id": "T021576", "product_identification_helper": { "cpe": "cpe:/a:juniper:junos_space:21.3r1" } } } ], "category": "vendor", "name": "Juniper" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-17543", "notes": [ { "category": "description", "text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T025794" ] }, "release_date": "2022-01-12T23:00:00.000+00:00", "title": "CVE-2019-17543" }, { "cve": "CVE-2019-20934", "notes": [ { "category": "description", "text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T025794" ] }, "release_date": "2022-01-12T23:00:00.000+00:00", "title": "CVE-2019-20934" }, { "cve": "CVE-2020-0543", "notes": [ { "category": "description", "text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T025794" ] }, "release_date": "2022-01-12T23:00:00.000+00:00", "title": "CVE-2020-0543" }, { "cve": "CVE-2020-0548", "notes": [ { "category": "description", "text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T025794" ] }, "release_date": "2022-01-12T23:00:00.000+00:00", "title": "CVE-2020-0548" }, { "cve": "CVE-2020-0549", "notes": [ { "category": "description", "text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T025794" ] }, "release_date": "2022-01-12T23:00:00.000+00:00", "title": "CVE-2020-0549" }, { "cve": "CVE-2020-11022", "notes": [ { "category": "description", "text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T025794" ] }, "release_date": "2022-01-12T23:00:00.000+00:00", "title": "CVE-2020-11022" }, { "cve": "CVE-2020-11023", "notes": [ { "category": "description", "text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T025794" ] }, "release_date": "2022-01-12T23:00:00.000+00:00", "title": "CVE-2020-11023" }, { "cve": "CVE-2020-11668", "notes": [ { "category": "description", "text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T025794" ] }, "release_date": "2022-01-12T23:00:00.000+00:00", "title": "CVE-2020-11668" }, { "cve": "CVE-2020-11984", "notes": [ { "category": "description", "text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T025794" ] }, "release_date": "2022-01-12T23:00:00.000+00:00", "title": "CVE-2020-11984" }, { "cve": "CVE-2020-11993", "notes": [ { "category": "description", "text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T025794" ] }, "release_date": "2022-01-12T23:00:00.000+00:00", "title": "CVE-2020-11993" }, { "cve": "CVE-2020-12362", "notes": [ { "category": "description", "text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T025794" ] }, "release_date": "2022-01-12T23:00:00.000+00:00", "title": "CVE-2020-12362" }, { "cve": "CVE-2020-12363", "notes": [ { "category": "description", "text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T025794" ] }, "release_date": "2022-01-12T23:00:00.000+00:00", "title": "CVE-2020-12363" }, { "cve": "CVE-2020-12364", "notes": [ { "category": "description", "text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T025794" ] }, "release_date": "2022-01-12T23:00:00.000+00:00", "title": "CVE-2020-12364" }, { "cve": "CVE-2020-1927", "notes": [ { "category": "description", "text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T025794" ] }, "release_date": "2022-01-12T23:00:00.000+00:00", "title": "CVE-2020-1927" }, { "cve": "CVE-2020-1934", "notes": [ { "category": "description", "text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T025794" ] }, "release_date": "2022-01-12T23:00:00.000+00:00", "title": "CVE-2020-1934" }, { "cve": "CVE-2020-24489", "notes": [ { "category": "description", "text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T025794" ] }, "release_date": "2022-01-12T23:00:00.000+00:00", "title": "CVE-2020-24489" }, { "cve": "CVE-2020-24511", "notes": [ { "category": "description", "text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T025794" ] }, "release_date": "2022-01-12T23:00:00.000+00:00", "title": "CVE-2020-24511" }, { "cve": "CVE-2020-24512", "notes": [ { "category": "description", "text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T025794" ] }, "release_date": "2022-01-12T23:00:00.000+00:00", "title": "CVE-2020-24512" }, { "cve": "CVE-2020-27170", "notes": [ { "category": "description", "text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T025794" ] }, "release_date": "2022-01-12T23:00:00.000+00:00", "title": "CVE-2020-27170" }, { "cve": "CVE-2020-27777", "notes": [ { "category": "description", "text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T025794" ] }, "release_date": "2022-01-12T23:00:00.000+00:00", "title": "CVE-2020-27777" }, { "cve": "CVE-2020-29443", "notes": [ { "category": "description", "text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T025794" ] }, "release_date": "2022-01-12T23:00:00.000+00:00", "title": "CVE-2020-29443" }, { "cve": "CVE-2020-8625", "notes": [ { "category": "description", "text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T025794" ] }, "release_date": "2022-01-12T23:00:00.000+00:00", "title": "CVE-2020-8625" }, { "cve": "CVE-2020-8648", "notes": [ { "category": "description", "text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T025794" ] }, "release_date": "2022-01-12T23:00:00.000+00:00", "title": "CVE-2020-8648" }, { "cve": "CVE-2020-8695", "notes": [ { "category": "description", "text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T025794" ] }, "release_date": "2022-01-12T23:00:00.000+00:00", "title": "CVE-2020-8695" }, { "cve": "CVE-2020-8696", "notes": [ { "category": "description", "text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T025794" ] }, "release_date": "2022-01-12T23:00:00.000+00:00", "title": "CVE-2020-8696" }, { "cve": "CVE-2020-8698", "notes": [ { "category": "description", "text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T025794" ] }, "release_date": "2022-01-12T23:00:00.000+00:00", "title": "CVE-2020-8698" }, { "cve": "CVE-2020-9490", "notes": [ { "category": "description", "text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T025794" ] }, "release_date": "2022-01-12T23:00:00.000+00:00", "title": "CVE-2020-9490" }, { "cve": "CVE-2021-20254", "notes": [ { "category": "description", "text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T025794" ] }, "release_date": "2022-01-12T23:00:00.000+00:00", "title": "CVE-2021-20254" }, { "cve": "CVE-2021-22555", "notes": [ { "category": "description", "text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T025794" ] }, "release_date": "2022-01-12T23:00:00.000+00:00", "title": "CVE-2021-22555" }, { "cve": "CVE-2021-22901", "notes": [ { "category": "description", "text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T025794" ] }, "release_date": "2022-01-12T23:00:00.000+00:00", "title": "CVE-2021-22901" }, { "cve": "CVE-2021-2341", "notes": [ { "category": "description", "text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T025794" ] }, "release_date": "2022-01-12T23:00:00.000+00:00", "title": "CVE-2021-2341" }, { "cve": "CVE-2021-2342", "notes": [ { "category": "description", "text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T025794" ] }, "release_date": "2022-01-12T23:00:00.000+00:00", "title": "CVE-2021-2342" }, { "cve": "CVE-2021-2356", "notes": [ { "category": "description", "text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T025794" ] }, "release_date": "2022-01-12T23:00:00.000+00:00", "title": "CVE-2021-2356" }, { "cve": "CVE-2021-2369", "notes": [ { "category": "description", "text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T025794" ] }, "release_date": "2022-01-12T23:00:00.000+00:00", "title": "CVE-2021-2369" }, { "cve": "CVE-2021-2372", "notes": [ { "category": "description", "text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T025794" ] }, "release_date": "2022-01-12T23:00:00.000+00:00", "title": "CVE-2021-2372" }, { "cve": "CVE-2021-2385", "notes": [ { "category": "description", "text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T025794" ] }, "release_date": "2022-01-12T23:00:00.000+00:00", "title": "CVE-2021-2385" }, { "cve": "CVE-2021-2388", "notes": [ { "category": "description", "text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T025794" ] }, "release_date": "2022-01-12T23:00:00.000+00:00", "title": "CVE-2021-2388" }, { "cve": "CVE-2021-2389", "notes": [ { "category": "description", "text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T025794" ] }, "release_date": "2022-01-12T23:00:00.000+00:00", "title": "CVE-2021-2389" }, { "cve": "CVE-2021-2390", "notes": [ { "category": "description", "text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T025794" ] }, "release_date": "2022-01-12T23:00:00.000+00:00", "title": "CVE-2021-2390" }, { "cve": "CVE-2021-25214", "notes": [ { "category": "description", "text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T025794" ] }, "release_date": "2022-01-12T23:00:00.000+00:00", "title": "CVE-2021-25214" }, { "cve": "CVE-2021-25217", "notes": [ { "category": "description", "text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T025794" ] }, "release_date": "2022-01-12T23:00:00.000+00:00", "title": "CVE-2021-25217" }, { "cve": "CVE-2021-27219", "notes": [ { "category": "description", "text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T025794" ] }, "release_date": "2022-01-12T23:00:00.000+00:00", "title": "CVE-2021-27219" }, { "cve": "CVE-2021-29154", "notes": [ { "category": "description", "text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T025794" ] }, "release_date": "2022-01-12T23:00:00.000+00:00", "title": "CVE-2021-29154" }, { "cve": "CVE-2021-29650", "notes": [ { "category": "description", "text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T025794" ] }, "release_date": "2022-01-12T23:00:00.000+00:00", "title": "CVE-2021-29650" }, { "cve": "CVE-2021-31535", "notes": [ { "category": "description", "text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T025794" ] }, "release_date": "2022-01-12T23:00:00.000+00:00", "title": "CVE-2021-31535" }, { "cve": "CVE-2021-32399", "notes": [ { "category": "description", "text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T025794" ] }, "release_date": "2022-01-12T23:00:00.000+00:00", "title": "CVE-2021-32399" }, { "cve": "CVE-2021-33033", "notes": [ { "category": "description", "text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T025794" ] }, "release_date": "2022-01-12T23:00:00.000+00:00", "title": "CVE-2021-33033" }, { "cve": "CVE-2021-33034", "notes": [ { "category": "description", "text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T025794" ] }, "release_date": "2022-01-12T23:00:00.000+00:00", "title": "CVE-2021-33034" }, { "cve": "CVE-2021-3347", "notes": [ { "category": "description", "text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T025794" ] }, "release_date": "2022-01-12T23:00:00.000+00:00", "title": "CVE-2021-3347" }, { "cve": "CVE-2021-33909", "notes": [ { "category": "description", "text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T025794" ] }, "release_date": "2022-01-12T23:00:00.000+00:00", "title": "CVE-2021-33909" }, { "cve": "CVE-2021-3653", "notes": [ { "category": "description", "text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T025794" ] }, "release_date": "2022-01-12T23:00:00.000+00:00", "title": "CVE-2021-3653" }, { "cve": "CVE-2021-3656", "notes": [ { "category": "description", "text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T025794" ] }, "release_date": "2022-01-12T23:00:00.000+00:00", "title": "CVE-2021-3656" }, { "cve": "CVE-2021-3715", "notes": [ { "category": "description", "text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T025794" ] }, "release_date": "2022-01-12T23:00:00.000+00:00", "title": "CVE-2021-3715" }, { "cve": "CVE-2021-37576", "notes": [ { "category": "description", "text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T025794" ] }, "release_date": "2022-01-12T23:00:00.000+00:00", "title": "CVE-2021-37576" }, { "cve": "CVE-2021-4104", "notes": [ { "category": "description", "text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T025794" ] }, "release_date": "2022-01-12T23:00:00.000+00:00", "title": "CVE-2021-4104" }, { "cve": "CVE-2021-42550", "notes": [ { "category": "description", "text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T025794" ] }, "release_date": "2022-01-12T23:00:00.000+00:00", "title": "CVE-2021-42550" }, { "cve": "CVE-2021-44228", "notes": [ { "category": "description", "text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T025794" ] }, "release_date": "2022-01-12T23:00:00.000+00:00", "title": "CVE-2021-44228" }, { "cve": "CVE-2021-45046", "notes": [ { "category": "description", "text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T025794" ] }, "release_date": "2022-01-12T23:00:00.000+00:00", "title": "CVE-2021-45046" } ] }
fkie_cve-2020-0543
Vulnerability from fkie_nvd
Published
2020-06-15 14:15
Modified
2024-11-21 04:53
Severity ?
Summary
Incomplete cleanup from specific special register read operations in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
References
▶ | URL | Tags | |
---|---|---|---|
secure@intel.com | http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00025.html | Mailing List, Third Party Advisory | |
secure@intel.com | http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00024.html | Mailing List, Third Party Advisory | |
secure@intel.com | http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00031.html | Mailing List, Third Party Advisory | |
secure@intel.com | http://www.openwall.com/lists/oss-security/2020/07/14/5 | Mailing List, Third Party Advisory | |
secure@intel.com | https://cert-portal.siemens.com/productcert/pdf/ssa-534763.pdf | Third Party Advisory | |
secure@intel.com | https://kc.mcafee.com/corporate/index?page=content&id=SB10318 | Third Party Advisory | |
secure@intel.com | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DT2VKDMQ3I37NBNJ256A2EXR7OJHXXKZ/ | ||
secure@intel.com | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GRFC7UAPKAFFH5WX3AMDUBVHLKYQA2NZ/ | ||
secure@intel.com | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NQZMOSHLTBBIECENNXA6M7DN5FEED4KI/ | ||
secure@intel.com | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T5OUM24ZC43G4IDT3JUCIHJTSDXJSK6Y/ | ||
secure@intel.com | https://usn.ubuntu.com/4385-1/ | Third Party Advisory | |
secure@intel.com | https://usn.ubuntu.com/4387-1/ | Third Party Advisory | |
secure@intel.com | https://usn.ubuntu.com/4388-1/ | Third Party Advisory | |
secure@intel.com | https://usn.ubuntu.com/4389-1/ | Third Party Advisory | |
secure@intel.com | https://usn.ubuntu.com/4390-1/ | Third Party Advisory | |
secure@intel.com | https://usn.ubuntu.com/4391-1/ | Third Party Advisory | |
secure@intel.com | https://usn.ubuntu.com/4392-1/ | Third Party Advisory | |
secure@intel.com | https://usn.ubuntu.com/4393-1/ | Third Party Advisory | |
secure@intel.com | https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00320.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00025.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00024.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00031.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2020/07/14/5 | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://cert-portal.siemens.com/productcert/pdf/ssa-534763.pdf | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://kc.mcafee.com/corporate/index?page=content&id=SB10318 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DT2VKDMQ3I37NBNJ256A2EXR7OJHXXKZ/ | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GRFC7UAPKAFFH5WX3AMDUBVHLKYQA2NZ/ | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NQZMOSHLTBBIECENNXA6M7DN5FEED4KI/ | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T5OUM24ZC43G4IDT3JUCIHJTSDXJSK6Y/ | ||
af854a3a-2127-422b-91ae-364da2661108 | https://usn.ubuntu.com/4385-1/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://usn.ubuntu.com/4387-1/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://usn.ubuntu.com/4388-1/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://usn.ubuntu.com/4389-1/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://usn.ubuntu.com/4390-1/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://usn.ubuntu.com/4391-1/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://usn.ubuntu.com/4392-1/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://usn.ubuntu.com/4393-1/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00320.html | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
intel | celeron_1000m | - | |
intel | celeron_1005m | - | |
intel | celeron_1007u | - | |
intel | celeron_1017u | - | |
intel | celeron_1019y | - | |
intel | celeron_1020e | - | |
intel | celeron_1020m | - | |
intel | celeron_1037u | - | |
intel | celeron_1047ue | - | |
intel | celeron_2955u | - | |
intel | celeron_2957u | - | |
intel | celeron_2970m | - | |
intel | celeron_2980u | - | |
intel | celeron_2981u | - | |
intel | celeron_3755u | - | |
intel | celeron_3765u | - | |
intel | celeron_3855u | - | |
intel | celeron_3865u | - | |
intel | celeron_3955u | - | |
intel | celeron_3965u | - | |
intel | celeron_3965y | - | |
intel | celeron_5305u | - | |
intel | celeron_725c | - | |
intel | celeron_927ue | - | |
intel | celeron_g1610 | - | |
intel | celeron_g1610t | - | |
intel | celeron_g1620 | - | |
intel | celeron_g1620t | - | |
intel | celeron_g1630 | - | |
intel | celeron_g1820 | - | |
intel | celeron_g1820t | - | |
intel | celeron_g1830 | - | |
intel | celeron_g1840 | - | |
intel | celeron_g1840t | - | |
intel | celeron_g1850 | - | |
intel | celeron_g3900 | - | |
intel | celeron_g3900t | - | |
intel | celeron_g3900te | - | |
intel | celeron_g3902e | - | |
intel | celeron_g3920 | - | |
intel | celeron_g3920t | - | |
intel | celeron_g3930e | - | |
intel | celeron_g3930te | - | |
intel | celeron_g3940 | - | |
intel | celeron_g4900 | - | |
intel | celeron_g4900t | - | |
intel | celeron_g4920 | - | |
intel | celeron_g4930 | - | |
intel | celeron_g4950 | - | |
intel | core_4205u | - | |
intel | core_4410y | - | |
intel | core_4415y | - | |
intel | core_5405u | - | |
intel | core_8269u | - | |
intel | core_9300h | - | |
intel | core_9750hf | - | |
intel | core_i3-2115c | - | |
intel | core_i3-3110m | - | |
intel | core_i3-3115c | - | |
intel | core_i3-3120m | - | |
intel | core_i3-3120me | - | |
intel | core_i3-3130m | - | |
intel | core_i3-3210 | - | |
intel | core_i3-3217u | - | |
intel | core_i3-3217ue | - | |
intel | core_i3-3220 | - | |
intel | core_i3-3220t | - | |
intel | core_i3-3225 | - | |
intel | core_i3-3227u | - | |
intel | core_i3-3229y | - | |
intel | core_i3-3240 | - | |
intel | core_i3-3240t | - | |
intel | core_i3-3245 | - | |
intel | core_i3-3250 | - | |
intel | core_i3-3250t | - | |
intel | core_i3-4005u | - | |
intel | core_i3-4010u | - | |
intel | core_i3-4010y | - | |
intel | core_i3-4012y | - | |
intel | core_i3-4020y | - | |
intel | core_i3-4025u | - | |
intel | core_i3-4030u | - | |
intel | core_i3-4030y | - | |
intel | core_i3-4100m | - | |
intel | core_i3-4100u | - | |
intel | core_i3-4110m | - | |
intel | core_i3-4120u | - | |
intel | core_i3-4130 | - | |
intel | core_i3-4130t | - | |
intel | core_i3-4150 | - | |
intel | core_i3-4150t | - | |
intel | core_i3-4158u | - | |
intel | core_i3-4160 | - | |
intel | core_i3-4160t | - | |
intel | core_i3-4170 | - | |
intel | core_i3-4170t | - | |
intel | core_i3-4330 | - | |
intel | core_i3-4330t | - | |
intel | core_i3-4340 | - | |
intel | core_i3-4350 | - | |
intel | core_i3-4350t | - | |
intel | core_i3-4360 | - | |
intel | core_i3-4360t | - | |
intel | core_i3-4370 | - | |
intel | core_i3-4370t | - | |
intel | core_i3-5005u | - | |
intel | core_i3-5006u | - | |
intel | core_i3-5010u | - | |
intel | core_i3-5015u | - | |
intel | core_i3-5020u | - | |
intel | core_i3-5157u | - | |
intel | core_i3-6100 | - | |
intel | core_i3-6100e | - | |
intel | core_i3-6100h | - | |
intel | core_i3-6100t | - | |
intel | core_i3-6100te | - | |
intel | core_i3-6100u | - | |
intel | core_i3-6102e | - | |
intel | core_i3-6110u | - | |
intel | core_i3-6120 | - | |
intel | core_i3-6120t | - | |
intel | core_i3-6167u | - | |
intel | core_i3-6300 | - | |
intel | core_i3-6300t | - | |
intel | core_i3-6320 | - | |
intel | core_i3-6320t | - | |
intel | core_i3-7007u | - | |
intel | core_i3-7020u | - | |
intel | core_i3-7100e | - | |
intel | core_i3-7100h | - | |
intel | core_i3-7100u | - | |
intel | core_i3-7101e | - | |
intel | core_i3-7101te | - | |
intel | core_i3-7102e | - | |
intel | core_i3-7110u | - | |
intel | core_i3-7120 | - | |
intel | core_i3-7120t | - | |
intel | core_i3-7130u | - | |
intel | core_i3-7167u | - | |
intel | core_i3-7320t | - | |
intel | core_i3-7340 | - | |
intel | core_i3-8000 | - | |
intel | core_i3-8000t | - | |
intel | core_i3-8020 | - | |
intel | core_i3-8100 | - | |
intel | core_i3-8100h | - | |
intel | core_i3-8100t | - | |
intel | core_i3-8109u | - | |
intel | core_i3-8120 | - | |
intel | core_i3-8130u | - | |
intel | core_i3-8145u | - | |
intel | core_i3-8300 | - | |
intel | core_i3-8300t | - | |
intel | core_i3-8350k | - | |
intel | core_i3-i3-8100h | - | |
intel | core_i5-10110y | - | |
intel | core_i5-10210u | - | |
intel | core_i5-10210y | - | |
intel | core_i5-10310y | - | |
intel | core_i5-3210m | - | |
intel | core_i5-3230m | - | |
intel | core_i5-3317u | - | |
intel | core_i5-3320m | - | |
intel | core_i5-3330 | - | |
intel | core_i5-3330s | - | |
intel | core_i5-3337u | - | |
intel | core_i5-3339y | - | |
intel | core_i5-3340 | - | |
intel | core_i5-3340m | - | |
intel | core_i5-3340s | - | |
intel | core_i5-3350p | - | |
intel | core_i5-3360m | - | |
intel | core_i5-3380m | - | |
intel | core_i5-3427u | - | |
intel | core_i5-3437u | - | |
intel | core_i5-3439y | - | |
intel | core_i5-3450 | - | |
intel | core_i5-3450s | - | |
intel | core_i5-3470 | - | |
intel | core_i5-3470s | - | |
intel | core_i5-3470t | - | |
intel | core_i5-3475s | - | |
intel | core_i5-3550 | - | |
intel | core_i5-3550s | - | |
intel | core_i5-3570 | - | |
intel | core_i5-3570k | - | |
intel | core_i5-3570s | - | |
intel | core_i5-3570t | - | |
intel | core_i5-3610me | - | |
intel | core_i5-4200u | - | |
intel | core_i5-4200y | - | |
intel | core_i5-4202y | - | |
intel | core_i5-4210h | - | |
intel | core_i5-4210u | - | |
intel | core_i5-4210y | - | |
intel | core_i5-4220y | - | |
intel | core_i5-4250u | - | |
intel | core_i5-4258u | - | |
intel | core_i5-4260u | - | |
intel | core_i5-4278u | - | |
intel | core_i5-4288u | - | |
intel | core_i5-4300u | - | |
intel | core_i5-4300y | - | |
intel | core_i5-4302y | - | |
intel | core_i5-4308u | - | |
intel | core_i5-4350u | - | |
intel | core_i5-4402ec | - | |
intel | core_i5-4430 | - | |
intel | core_i5-4430s | - | |
intel | core_i5-4440 | - | |
intel | core_i5-4440s | - | |
intel | core_i5-4460 | - | |
intel | core_i5-4460s | - | |
intel | core_i5-4460t | - | |
intel | core_i5-4570 | - | |
intel | core_i5-4570r | - | |
intel | core_i5-4570s | - | |
intel | core_i5-4570t | - | |
intel | core_i5-4590 | - | |
intel | core_i5-4590s | - | |
intel | core_i5-4590t | - | |
intel | core_i5-4670 | - | |
intel | core_i5-4670k | - | |
intel | core_i5-4670r | - | |
intel | core_i5-4670s | - | |
intel | core_i5-4670t | - | |
intel | core_i5-4690 | - | |
intel | core_i5-4690s | - | |
intel | core_i5-4690t | - | |
intel | core_i5-5200u | - | |
intel | core_i5-5250u | - | |
intel | core_i5-5257u | - | |
intel | core_i5-5287u | - | |
intel | core_i5-5350 | - | |
intel | core_i5-5350u | - | |
intel | core_i5-5575r | - | |
intel | core_i5-5675c | - | |
intel | core_i5-5675r | - | |
intel | core_i5-6200u | - | |
intel | core_i5-6210u | - | |
intel | core_i5-6260u | - | |
intel | core_i5-6267u | - | |
intel | core_i5-6287u | - | |
intel | core_i5-6300hq | - | |
intel | core_i5-6300u | - | |
intel | core_i5-6310u | - | |
intel | core_i5-6350hq | - | |
intel | core_i5-6360u | - | |
intel | core_i5-6400 | - | |
intel | core_i5-6400t | - | |
intel | core_i5-6440eq | - | |
intel | core_i5-6440hq | - | |
intel | core_i5-6442eq | - | |
intel | core_i5-6500 | - | |
intel | core_i5-6500t | - | |
intel | core_i5-6500te | - | |
intel | core_i5-6600 | - | |
intel | core_i5-6600k | - | |
intel | core_i5-6600t | - | |
intel | core_i5-7200u | - | |
intel | core_i5-7210u | - | |
intel | core_i5-7260u | - | |
intel | core_i5-7267u | - | |
intel | core_i5-7287u | - | |
intel | core_i5-7300hq | - | |
intel | core_i5-7300u | - | |
intel | core_i5-7360u | - | |
intel | core_i5-7400 | - | |
intel | core_i5-7400t | - | |
intel | core_i5-7440eq | - | |
intel | core_i5-7440hq | - | |
intel | core_i5-7442eq | - | |
intel | core_i5-7500 | - | |
intel | core_i5-7500t | - | |
intel | core_i5-7500u | - | |
intel | core_i5-7600 | - | |
intel | core_i5-7600k | - | |
intel | core_i5-7600t | - | |
intel | core_i5-7640x | - | |
intel | core_i5-7y54 | - | |
intel | core_i5-7y57_ | - | |
intel | core_i5-8200y | - | |
intel | core_i5-8210y | - | |
intel | core_i5-8250u | - | |
intel | core_i5-8259u | - | |
intel | core_i5-8265u | - | |
intel | core_i5-8300h | - | |
intel | core_i5-8305g | - | |
intel | core_i5-8310y | - | |
intel | core_i5-8350u | - | |
intel | core_i5-8365u | - | |
intel | core_i5-8400 | - | |
intel | core_i5-8400b | - | |
intel | core_i5-8400h | - | |
intel | core_i5-8400t | - | |
intel | core_i5-8420 | - | |
intel | core_i5-8420t | - | |
intel | core_i5-8500 | - | |
intel | core_i5-8500b | - | |
intel | core_i5-8500t | - | |
intel | core_i5-8550 | - | |
intel | core_i5-8600 | - | |
intel | core_i5-8600k | - | |
intel | core_i5-8600t | - | |
intel | core_i5-8650 | - | |
intel | core_i5-8650k | - | |
intel | core_i5-9400 | - | |
intel | core_i5-9400f | - | |
intel | core_i5-9400h | - | |
intel | core_i5-9600k | - | |
intel | core_i5-9600kf | - | |
intel | core_i7-10510u | - | |
intel | core_i7-10510y | - | |
intel | core_i7-3517u | - | |
intel | core_i7-3517ue | - | |
intel | core_i7-3520m | - | |
intel | core_i7-3537u | - | |
intel | core_i7-3540m | - | |
intel | core_i7-3555le | - | |
intel | core_i7-3610qe | - | |
intel | core_i7-3610qm | - | |
intel | core_i7-3612qe | - | |
intel | core_i7-3612qm | - | |
intel | core_i7-3615qe | - | |
intel | core_i7-3615qm | - | |
intel | core_i7-3630qm | - | |
intel | core_i7-3632qm | - | |
intel | core_i7-3635qm | - | |
intel | core_i7-3667u | - | |
intel | core_i7-3687u | - | |
intel | core_i7-3689y | - | |
intel | core_i7-3720qm | - | |
intel | core_i7-3740qm | - | |
intel | core_i7-3770 | - | |
intel | core_i7-3770k | - | |
intel | core_i7-3770s | - | |
intel | core_i7-3770t | - | |
intel | core_i7-3820qm | - | |
intel | core_i7-3840qm_ | - | |
intel | core_i7-3920xm | - | |
intel | core_i7-3940xm | - | |
intel | core_i7-4500u | - | |
intel | core_i7-4510u | - | |
intel | core_i7-4550u | - | |
intel | core_i7-4558u | - | |
intel | core_i7-4578u | - | |
intel | core_i7-4600u | - | |
intel | core_i7-4610y | - | |
intel | core_i7-4650u | - | |
intel | core_i7-4700ec | - | |
intel | core_i7-4700eq | - | |
intel | core_i7-4700hq | - | |
intel | core_i7-4700mq | - | |
intel | core_i7-4702ec | - | |
intel | core_i7-4702hq | - | |
intel | core_i7-4702mq | - | |
intel | core_i7-4710hq | - | |
intel | core_i7-4710mq | - | |
intel | core_i7-4712hq | - | |
intel | core_i7-4712mq | - | |
intel | core_i7-4720hq | - | |
intel | core_i7-4722hq | - | |
intel | core_i7-4750hq | - | |
intel | core_i7-4760hq | - | |
intel | core_i7-4765t | - | |
intel | core_i7-4770 | - | |
intel | core_i7-4770hq | - | |
intel | core_i7-4770k | - | |
intel | core_i7-4770r | - | |
intel | core_i7-4770s | - | |
intel | core_i7-4770t | - | |
intel | core_i7-4771 | - | |
intel | core_i7-4785t | - | |
intel | core_i7-4790 | - | |
intel | core_i7-4790s | - | |
intel | core_i7-4790t | - | |
intel | core_i7-4800mq | - | |
intel | core_i7-4810mq | - | |
intel | core_i7-4850hq | - | |
intel | core_i7-4860hq | - | |
intel | core_i7-4870hq | - | |
intel | core_i7-4900mq | - | |
intel | core_i7-4910mq | - | |
intel | core_i7-4950hq | - | |
intel | core_i7-4960hq | - | |
intel | core_i7-4980hq | - | |
intel | core_i7-5500u | - | |
intel | core_i7-5550u | - | |
intel | core_i7-5557u | - | |
intel | core_i7-5600u | - | |
intel | core_i7-5650u | - | |
intel | core_i7-5700eq | - | |
intel | core_i7-5700hq | - | |
intel | core_i7-5750hq | - | |
intel | core_i7-5775c | - | |
intel | core_i7-5775r | - | |
intel | core_i7-5850eq | - | |
intel | core_i7-5850hq | - | |
intel | core_i7-5950hq | - | |
intel | core_i7-6500u | - | |
intel | core_i7-6510u | - | |
intel | core_i7-6560u | - | |
intel | core_i7-6567u | - | |
intel | core_i7-6600u | - | |
intel | core_i7-6650u | - | |
intel | core_i7-6660u | - | |
intel | core_i7-6700 | - | |
intel | core_i7-6700hq | - | |
intel | core_i7-6700k | - | |
intel | core_i7-6700t | - | |
intel | core_i7-6700te | - | |
intel | core_i7-6770hq | - | |
intel | core_i7-6820eq | - | |
intel | core_i7-6820hk | - | |
intel | core_i7-6820hq | - | |
intel | core_i7-6822eq | - | |
intel | core_i7-6870hq | - | |
intel | core_i7-6920hq | - | |
intel | core_i7-6970hq | - | |
intel | core_i7-7500u | - | |
intel | core_i7-7510u | - | |
intel | core_i7-7560u | - | |
intel | core_i7-7567u | - | |
intel | core_i7-7600u | - | |
intel | core_i7-7660u | - | |
intel | core_i7-7700 | - | |
intel | core_i7-7700hq | - | |
intel | core_i7-7700k | - | |
intel | core_i7-7700t | - | |
intel | core_i7-7740x | - | |
intel | core_i7-7820eq | - | |
intel | core_i7-7820hk | - | |
intel | core_i7-7820hq | - | |
intel | core_i7-7920hq | - | |
intel | core_i7-7y75 | - | |
intel | core_i7-8500y | - | |
intel | core_i7-8510y | - | |
intel | core_i7-8550u | - | |
intel | core_i7-8557u | - | |
intel | core_i7-8559u | - | |
intel | core_i7-8560u | - | |
intel | core_i7-8565u | - | |
intel | core_i7-8569u | - | |
intel | core_i7-8650u | - | |
intel | core_i7-8665u | - | |
intel | core_i7-8670 | - | |
intel | core_i7-8670t | - | |
intel | core_i7-8700 | - | |
intel | core_i7-8700b | - | |
intel | core_i7-8700k | - | |
intel | core_i7-8700t | - | |
intel | core_i7-8705g | - | |
intel | core_i7-8706g | - | |
intel | core_i7-8709g | - | |
intel | core_i7-8750h | - | |
intel | core_i7-8809g | - | |
intel | core_i7-8850h | - | |
intel | core_i7-9700k | - | |
intel | core_i7-9700kf | - | |
intel | core_i7-9850h | - | |
intel | core_i9-8950hk | - | |
intel | core_i9-9880h | - | |
intel | core_i9-9900k | - | |
intel | core_i9-9900kf | - | |
intel | core_i9-9980hk | - | |
intel | core_m-5y10 | - | |
intel | core_m-5y10a | - | |
intel | core_m-5y10c | - | |
intel | core_m-5y3 | - | |
intel | core_m-5y51 | - | |
intel | core_m-5y70 | - | |
intel | core_m-5y71 | - | |
intel | core_m3-6y30 | - | |
intel | core_m3-7y30 | - | |
intel | core_m3-8100y | - | |
intel | core_m5-6y54 | - | |
intel | core_m5-6y57 | - | |
intel | core_m7-6y75 | - | |
intel | pentium_1405_v2 | - | |
intel | pentium_2020m_v2 | - | |
intel | pentium_2030m_v2 | - | |
intel | pentium_2117u_v2 | - | |
intel | pentium_2127u_v2 | - | |
intel | pentium_2129y_v2 | - | |
intel | pentium_3205u | - | |
intel | pentium_3215u | - | |
intel | pentium_3556u | - | |
intel | pentium_3558u | - | |
intel | pentium_3560m | - | |
intel | pentium_3560y | - | |
intel | pentium_3561y | - | |
intel | pentium_3665u | - | |
intel | pentium_3765u | - | |
intel | pentium_3805u | - | |
intel | pentium_3825u | - | |
intel | pentium_4405u | - | |
intel | pentium_4405y | - | |
intel | pentium_4415u | - | |
intel | pentium_a1018_v2 | - | |
intel | pentium_b915c | - | |
intel | pentium_b925c | - | |
intel | pentium_g2010_v2 | - | |
intel | pentium_g2020_v2 | - | |
intel | pentium_g2020t_v2 | - | |
intel | pentium_g2030_v2 | - | |
intel | pentium_g2030t_v2 | - | |
intel | pentium_g2100t_v2 | - | |
intel | pentium_g2120_v2 | - | |
intel | pentium_g2120t_v2 | - | |
intel | pentium_g2130_v2 | - | |
intel | pentium_g2140_v2 | - | |
intel | pentium_g3220 | - | |
intel | pentium_g3220t | - | |
intel | pentium_g3240 | - | |
intel | pentium_g3240t | - | |
intel | pentium_g3250 | - | |
intel | pentium_g3250t | - | |
intel | pentium_g3258 | - | |
intel | pentium_g3260 | - | |
intel | pentium_g3260t | - | |
intel | pentium_g3420 | - | |
intel | pentium_g3420t | - | |
intel | pentium_g3430 | - | |
intel | pentium_g3440 | - | |
intel | pentium_g3440t | - | |
intel | pentium_g3450 | - | |
intel | pentium_g3450t | - | |
intel | pentium_g3460 | - | |
intel | pentium_g3460t | - | |
intel | pentium_g3470 | - | |
intel | pentium_g4400 | - | |
intel | pentium_g4400t | - | |
intel | pentium_g4400te | - | |
intel | pentium_g4420 | - | |
intel | pentium_g4420t | - | |
intel | pentium_g4500 | - | |
intel | pentium_g4500t | - | |
intel | pentium_g4520 | - | |
intel | pentium_g4520t | - | |
intel | pentium_g4540 | - | |
intel | pentium_g5400 | - | |
intel | pentium_g5400t | - | |
intel | pentium_g5420 | - | |
intel | pentium_g5420t | - | |
intel | pentium_g5500 | - | |
intel | pentium_g5500t | - | |
intel | pentium_g5600 | - | |
intel | pentium_gold_6405u | - | |
intel | xeon_e-2124 | - | |
intel | xeon_e-2124g | - | |
intel | xeon_e-2126g | - | |
intel | xeon_e-2134 | - | |
intel | xeon_e-2136 | - | |
intel | xeon_e-2144g | - | |
intel | xeon_e-2146g | - | |
intel | xeon_e-2174g | - | |
intel | xeon_e-2176g | - | |
intel | xeon_e-2176m | - | |
intel | xeon_e-2184g | - | |
intel | xeon_e-2186g | - | |
intel | xeon_e-2186m | - | |
intel | xeon_e-2224 | - | |
intel | xeon_e-2224g | - | |
intel | xeon_e-2226g | - | |
intel | xeon_e-2226ge | - | |
intel | xeon_e-2234 | - | |
intel | xeon_e-2236 | - | |
intel | xeon_e-2244g | - | |
intel | xeon_e-2246g | - | |
intel | xeon_e-2254me | - | |
intel | xeon_e-2254ml | - | |
intel | xeon_e-2274g | - | |
intel | xeon_e-2276g | - | |
intel | xeon_e-2276m | - | |
intel | xeon_e-2276me | - | |
intel | xeon_e-2276ml | - | |
intel | xeon_e-2278g | - | |
intel | xeon_e-2278ge | - | |
intel | xeon_e-2278gel | - | |
intel | xeon_e-2284g | - | |
intel | xeon_e-2286m | - | |
intel | xeon_e-2288g | - | |
intel | xeon_e3-1105c | - | |
intel | xeon_e3-1105c_v2 | - | |
intel | xeon_e3-1125c | - | |
intel | xeon_e3-1125c_v2 | - | |
intel | xeon_e3-1220_v2 | - | |
intel | xeon_e3-1220_v3 | - | |
intel | xeon_e3-1220_v5 | - | |
intel | xeon_e3-1220_v6 | - | |
intel | xeon_e3-1220l_v2 | - | |
intel | xeon_e3-1220l_v3 | - | |
intel | xeon_e3-1221_v3 | - | |
intel | xeon_e3-1225_v2 | - | |
intel | xeon_e3-1225_v3 | - | |
intel | xeon_e3-1225_v5 | - | |
intel | xeon_e3-1225_v6 | - | |
intel | xeon_e3-1226_v3 | - | |
intel | xeon_e3-1230_v2 | - | |
intel | xeon_e3-1230_v3 | - | |
intel | xeon_e3-1230_v5 | - | |
intel | xeon_e3-1230_v6 | - | |
intel | xeon_e3-1230l_v3 | - | |
intel | xeon_e3-1231_v3 | - | |
intel | xeon_e3-1235_v2 | - | |
intel | xeon_e3-1235l_v5 | - | |
intel | xeon_e3-1240_v2 | - | |
intel | xeon_e3-1240_v3 | - | |
intel | xeon_e3-1240_v5 | - | |
intel | xeon_e3-1240_v6 | - | |
intel | xeon_e3-1240l_v3 | - | |
intel | xeon_e3-1240l_v5 | - | |
intel | xeon_e3-1241_v3 | - | |
intel | xeon_e3-1245_v2 | - | |
intel | xeon_e3-1245_v3 | - | |
intel | xeon_e3-1245_v5 | - | |
intel | xeon_e3-1245_v6 | - | |
intel | xeon_e3-1246_v3 | - | |
intel | xeon_e3-1258l_v4 | - | |
intel | xeon_e3-1260l_v5 | - | |
intel | xeon_e3-1265l | - | |
intel | xeon_e3-1265l_v2 | - | |
intel | xeon_e3-1265l_v4 | - | |
intel | xeon_e3-1268l_v3 | - | |
intel | xeon_e3-1268l_v5 | - | |
intel | xeon_e3-1270 | - | |
intel | xeon_e3-1270_v2 | - | |
intel | xeon_e3-1270_v5 | - | |
intel | xeon_e3-1270_v6 | - | |
intel | xeon_e3-1271_v3 | - | |
intel | xeon_e3-1275_v2 | - | |
intel | xeon_e3-1275_v3 | - | |
intel | xeon_e3-1275_v5 | - | |
intel | xeon_e3-1275_v6 | - | |
intel | xeon_e3-1275l_v3 | - | |
intel | xeon_e3-1276_v3 | - | |
intel | xeon_e3-1278l_v4 | - | |
intel | xeon_e3-1280_v2 | - | |
intel | xeon_e3-1280_v3 | - | |
intel | xeon_e3-1280_v5 | - | |
intel | xeon_e3-1280_v6 | - | |
intel | xeon_e3-1281_v3 | - | |
intel | xeon_e3-1285_v3 | - | |
intel | xeon_e3-1285_v4 | - | |
intel | xeon_e3-1285_v6 | - | |
intel | xeon_e3-1285l_v3 | - | |
intel | xeon_e3-1286_v3 | - | |
intel | xeon_e3-1286l_v3 | - | |
intel | xeon_e3-1290_v2 | - | |
intel | xeon_e3-1501l_v6 | - | |
intel | xeon_e3-1501m_v6 | - | |
intel | xeon_e3-1505l_v5 | - | |
intel | xeon_e3-1505l_v6 | - | |
intel | xeon_e3-1505m_v5 | - | |
intel | xeon_e3-1505m_v6 | - | |
intel | xeon_e3-1515m_v5 | - | |
intel | xeon_e3-1535m_v5 | - | |
intel | xeon_e3-1535m_v6 | - | |
intel | xeon_e3-1545m_v5 | - | |
intel | xeon_e3-1558l_v5 | - | |
intel | xeon_e3-1565l_v5 | - | |
intel | xeon_e3-1575m_v5 | - | |
intel | xeon_e3-1578l_v5 | - | |
intel | xeon_e3-1585_v5 | - | |
intel | xeon_e3-1585l_v5 | - | |
opensuse | leap | 15.1 | |
opensuse | leap | 15.2 | |
canonical | ubuntu_linux | 12.04 | |
canonical | ubuntu_linux | 14.04 | |
canonical | ubuntu_linux | 16.04 | |
canonical | ubuntu_linux | 18.04 | |
canonical | ubuntu_linux | 19.10 | |
canonical | ubuntu_linux | 20.04 | |
fedoraproject | fedora | 31 | |
fedoraproject | fedora | 32 | |
siemens | simatic_field_pg_m4_firmware | * | |
siemens | simatic_field_pg_m4 | - | |
siemens | simatic_field_pg_m5_firmware | * | |
siemens | simatic_field_pg_m5 | - | |
siemens | simatic_field_pg_m6_firmware | * | |
siemens | simatic_field_pg_m6 | - | |
siemens | simatic_ipc347e_firmware | * | |
siemens | simatic_ipc347e | - | |
siemens | simatic_ipc427d_firmware | * | |
siemens | simatic_ipc427d | - | |
siemens | simatic_ipc427e_firmware | * | |
siemens | simatic_ipc427e | - | |
siemens | simatic_ipc477d_firmware | * | |
siemens | simatic_ipc477d | - | |
siemens | simatic_ipc477e_firmware | * | |
siemens | simatic_ipc477e | - | |
siemens | simatic_ipc477e_pro_firmware | * | |
siemens | simatic_ipc477e_pro | - | |
siemens | simatic_ipc527g_firmware | * | |
siemens | simatic_ipc527g | - | |
siemens | simatic_ipc547e_firmware | * | |
siemens | simatic_ipc547e | - | |
siemens | simatic_ipc547g_firmware | * | |
siemens | simatic_ipc547g | - | |
siemens | simatic_ipc627d_firmware | * | |
siemens | simatic_ipc627d | - | |
siemens | simatic_ipc627e_firmware | * | |
siemens | simatic_ipc627e | - | |
siemens | simatic_ipc647d_firmware | * | |
siemens | simatic_ipc647d | - | |
siemens | simatic_ipc647e_firmware | * | |
siemens | simatic_ipc647e | - | |
siemens | simatic_ipc677d_firmware | * | |
siemens | simatic_ipc677d | - | |
siemens | simatic_ipc677e_firmware | * | |
siemens | simatic_ipc677e | - | |
siemens | simatic_ipc827d_firmware | * | |
siemens | simatic_ipc827d | - | |
siemens | simatic_ipc847d_firmware | * | |
siemens | simatic_ipc847d | - | |
siemens | simatic_ipc847e_firmware | * | |
siemens | simatic_ipc847e | - | |
siemens | simatic_ipc3000_smart_firmware | * | |
siemens | simatic_ipc3000_smart | 2.0 | |
siemens | simatic_itp1000_firmware | * | |
siemens | simatic_itp1000 | - | |
siemens | simotion_p320-4e_firmware | * | |
siemens | simotion_p320-4e | - | |
siemens | simotion_p320-4s_firmware | * | |
siemens | simotion_p320-4s | - | |
mcafee | threat_intelligence_exchange_server | * | |
mcafee | threat_intelligence_exchange_server | 3.0.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:celeron_1000m:-:*:*:*:*:*:*:*", "matchCriteriaId": "B8BE23AB-1F5F-4FA7-8617-D4A4C9D5F6A4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_1005m:-:*:*:*:*:*:*:*", "matchCriteriaId": "DD5FDB66-4805-4EB5-B6BE-938D40C48C25", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_1007u:-:*:*:*:*:*:*:*", "matchCriteriaId": "5DD7CD7F-F0F4-408E-858C-8EB9BC82382E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_1017u:-:*:*:*:*:*:*:*", "matchCriteriaId": "F898D49D-6B5C-45AA-A166-BFCE5CC9A6E1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_1019y:-:*:*:*:*:*:*:*", "matchCriteriaId": "29560B2E-DAC6-478A-84AE-508AE21D0AEE", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_1020e:-:*:*:*:*:*:*:*", "matchCriteriaId": "CAB9B322-ACB3-4505-8281-2A365A21D286", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_1020m:-:*:*:*:*:*:*:*", "matchCriteriaId": "9D54B11B-18A3-4DEE-84FF-B5A32C7E60CF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_1037u:-:*:*:*:*:*:*:*", "matchCriteriaId": "C0198F9C-60DA-4D91-9FD2-5CC65ED346ED", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_1047ue:-:*:*:*:*:*:*:*", "matchCriteriaId": "B7F39FE0-A9F4-4232-B925-598E4F9167A4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_2955u:-:*:*:*:*:*:*:*", "matchCriteriaId": "C6886FA9-E9FE-427C-A403-45C554ADA19C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_2957u:-:*:*:*:*:*:*:*", "matchCriteriaId": "E3BE78C2-660F-4C48-B0F1-05D0116F0FDE", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_2970m:-:*:*:*:*:*:*:*", "matchCriteriaId": "BDB04659-871D-4B1E-9681-D5ADCEAE2CE3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_2980u:-:*:*:*:*:*:*:*", "matchCriteriaId": "6F21EEA7-EE23-483B-8B01-5324E0063B2F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_2981u:-:*:*:*:*:*:*:*", "matchCriteriaId": "29792C69-EAE9-4DD9-B127-5AF1FFA9A1D1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_3755u:-:*:*:*:*:*:*:*", "matchCriteriaId": "9B8FA7CE-FF47-4918-8171-EDCEA156C314", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_3765u:-:*:*:*:*:*:*:*", "matchCriteriaId": "E2F086FB-60AA-421A-BA6C-C687B54A4993", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_3855u:-:*:*:*:*:*:*:*", "matchCriteriaId": "44FEB5D1-5177-4B5E-BB06-0C7E2A0CA6D1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_3865u:-:*:*:*:*:*:*:*", "matchCriteriaId": "20F761B4-2DCE-4E31-9974-C399B4982EFA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_3955u:-:*:*:*:*:*:*:*", "matchCriteriaId": "9796C997-40C0-4C75-B2B3-06D037138976", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_3965u:-:*:*:*:*:*:*:*", "matchCriteriaId": "11F8482B-2E48-4976-83D0-F1E4BA015FEA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_3965y:-:*:*:*:*:*:*:*", "matchCriteriaId": "D36CCEB4-62C0-427D-B4B3-41F9B1B9194E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_5305u:-:*:*:*:*:*:*:*", "matchCriteriaId": "39831D4E-743A-4C09-900F-24DDAB5D1B22", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_725c:-:*:*:*:*:*:*:*", "matchCriteriaId": "ED49334B-38E1-4212-A23F-FE5437B773CE", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_927ue:-:*:*:*:*:*:*:*", "matchCriteriaId": "A5AD98D1-5A73-4A92-A6F5-D9DDC14056AB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_g1610:-:*:*:*:*:*:*:*", "matchCriteriaId": "4003B029-36AE-47CD-BFB1-1F06DFEBA0C6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_g1610t:-:*:*:*:*:*:*:*", "matchCriteriaId": "FADF19F8-54BB-4BF4-BF1C-515EBBEE2060", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_g1620:-:*:*:*:*:*:*:*", "matchCriteriaId": "B67D44E3-F8E1-4EB9-8D91-5777DC97D497", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_g1620t:-:*:*:*:*:*:*:*", "matchCriteriaId": "0E4AC5E9-94DB-4970-BE29-747503AE81E4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_g1630:-:*:*:*:*:*:*:*", "matchCriteriaId": "06FFA194-E200-4F4D-8E66-60D0134184E2", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_g1820:-:*:*:*:*:*:*:*", "matchCriteriaId": "12FD8D3B-0FC0-4E8A-9476-3092BAE9F15E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_g1820t:-:*:*:*:*:*:*:*", "matchCriteriaId": "B950F6FC-2848-45B7-9C28-B0DF46BC442B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_g1830:-:*:*:*:*:*:*:*", "matchCriteriaId": "95101653-A2BF-47F5-A209-097CA98A91F2", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_g1840:-:*:*:*:*:*:*:*", "matchCriteriaId": "B72870A6-E156-46AE-A5C4-B9B8F10C147D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_g1840t:-:*:*:*:*:*:*:*", "matchCriteriaId": "AAD76063-D9C2-4F41-B7D3-29A32678B527", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_g1850:-:*:*:*:*:*:*:*", "matchCriteriaId": "95826FC7-9E92-4C6A-8F16-9D20B8E41F75", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_g3900:-:*:*:*:*:*:*:*", "matchCriteriaId": "25847980-2D7B-4D4B-B0F2-C2CAB648182C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_g3900t:-:*:*:*:*:*:*:*", "matchCriteriaId": "C5723C9D-E59D-4FA3-893F-D79E726025C3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_g3900te:-:*:*:*:*:*:*:*", "matchCriteriaId": "25BC4638-06F6-41C9-BF0F-74037F24CBEF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_g3902e:-:*:*:*:*:*:*:*", "matchCriteriaId": "11A64939-F09B-4FEC-8F1D-FAC34D8E14BC", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_g3920:-:*:*:*:*:*:*:*", "matchCriteriaId": "77D7291F-752E-409F-82BE-6060BA5E2559", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_g3920t:-:*:*:*:*:*:*:*", "matchCriteriaId": "17560EF4-27C7-466A-9CD1-164F1B0F5B79", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_g3930e:-:*:*:*:*:*:*:*", "matchCriteriaId": "226CBC16-EC2A-4498-ADB3-655A0E9CF396", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_g3930te:-:*:*:*:*:*:*:*", "matchCriteriaId": "B9278297-5E4B-40D0-8782-E5AE87E43B7B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_g3940:-:*:*:*:*:*:*:*", "matchCriteriaId": "A562A07B-EDC4-4545-AC10-6CAA1494C6E7", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_g4900:-:*:*:*:*:*:*:*", "matchCriteriaId": "7B801EF4-980C-40EF-84A8-4AA2D29CFB06", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_g4900t:-:*:*:*:*:*:*:*", "matchCriteriaId": "2129E439-63C1-4CBF-B39D-2941621AB454", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_g4920:-:*:*:*:*:*:*:*", "matchCriteriaId": "26E9CDAC-8C63-4F9A-B171-9E5E11E5313E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_g4930:-:*:*:*:*:*:*:*", "matchCriteriaId": "DA2A4A2A-CB99-4AEC-B0EB-11763E6C0E0F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_g4950:-:*:*:*:*:*:*:*", "matchCriteriaId": "22828766-08EF-430F-A0F0-F59E772E38B2", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_4205u:-:*:*:*:*:*:*:*", "matchCriteriaId": "E6F8D167-C5B9-4B15-8861-529598D1C491", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_4410y:-:*:*:*:*:*:*:*", "matchCriteriaId": "0E6A6A15-1406-41C8-84F8-E0C202F554DC", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_4415y:-:*:*:*:*:*:*:*", "matchCriteriaId": "A4B0FE5D-07FD-43E7-B89E-BDE6D6F49D30", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_5405u:-:*:*:*:*:*:*:*", "matchCriteriaId": "61FFCFE8-2B6E-4EB8-965C-AA5CB5493516", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_8269u:-:*:*:*:*:*:*:*", "matchCriteriaId": "EDB4120A-B29F-496B-8FEB-CFD4A155202C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_9300h:-:*:*:*:*:*:*:*", "matchCriteriaId": "04AA92B3-DF06-45C3-8E46-D721262EFE71", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_9750hf:-:*:*:*:*:*:*:*", "matchCriteriaId": "454DA7E4-ECDE-40C8-AA8F-181333BEFBE1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3-2115c:-:*:*:*:*:*:*:*", "matchCriteriaId": "166ED4A3-9466-4072-BD9D-B10AE3B98D31", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3-3110m:-:*:*:*:*:*:*:*", "matchCriteriaId": "60EEC961-3871-47C8-87F3-E803E2DD63CE", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3-3115c:-:*:*:*:*:*:*:*", "matchCriteriaId": "CBB7DD58-9F34-42A7-90D6-39B29933527E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3-3120m:-:*:*:*:*:*:*:*", "matchCriteriaId": "44C95EF0-D6F2-4F51-BA74-88B56F0FBED2", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3-3120me:-:*:*:*:*:*:*:*", "matchCriteriaId": "AE48E32B-9FF2-4F16-8E18-F982994457CD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3-3130m:-:*:*:*:*:*:*:*", "matchCriteriaId": "DE4BF988-5A82-4A0F-97EB-8D709CE5417D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3-3210:-:*:*:*:*:*:*:*", "matchCriteriaId": "913D6C36-8335-46EF-9164-E6FABDFFB6B4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3-3217u:-:*:*:*:*:*:*:*", "matchCriteriaId": "B8A452D4-0DD6-43A9-9390-A62AE48AF310", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3-3217ue:-:*:*:*:*:*:*:*", "matchCriteriaId": "3E95D40C-E599-4297-8079-39FA45AEA395", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3-3220:-:*:*:*:*:*:*:*", "matchCriteriaId": "E117D09A-02A0-4A4C-8233-98C42E94A580", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3-3220t:-:*:*:*:*:*:*:*", "matchCriteriaId": "DCCED1FD-FAC8-4E12-97DF-5ACAC0C55632", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3-3225:-:*:*:*:*:*:*:*", "matchCriteriaId": "E8C1BC59-9CB9-4A88-B414-0F94AF440086", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3-3227u:-:*:*:*:*:*:*:*", "matchCriteriaId": "D5E6FE39-7A75-4897-8336-9E4AFD77E3C1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3-3229y:-:*:*:*:*:*:*:*", "matchCriteriaId": "FFFB351B-14E8-4145-A733-07586AE4C920", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3-3240:-:*:*:*:*:*:*:*", "matchCriteriaId": "869B680B-2585-418B-9C5C-349A3339C753", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3-3240t:-:*:*:*:*:*:*:*", "matchCriteriaId": "B8009F20-942D-47B6-9C6C-3DB33C334ABF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3-3245:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7DFFAE3-24FF-4A9E-B3AC-93406A362E58", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3-3250:-:*:*:*:*:*:*:*", "matchCriteriaId": "A219AF5E-BD41-4BFE-A299-6B45DB027663", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3-3250t:-:*:*:*:*:*:*:*", "matchCriteriaId": "EB755E29-BD69-4FFC-BEED-C5AE16357394", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3-4005u:-:*:*:*:*:*:*:*", "matchCriteriaId": "EDC0FB13-6766-4ED4-BF2E-439BEAAA29D0", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3-4010u:-:*:*:*:*:*:*:*", "matchCriteriaId": "A4201168-8AF2-4C17-8D49-89D77062B835", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3-4010y:-:*:*:*:*:*:*:*", "matchCriteriaId": "CCB9DBB4-5202-4A51-94BF-330756FED881", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3-4012y:-:*:*:*:*:*:*:*", "matchCriteriaId": "10606356-43F2-4DEB-AB52-6810FDD4CE49", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3-4020y:-:*:*:*:*:*:*:*", "matchCriteriaId": "1D690FD7-DB10-4071-B156-09F49E71C479", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3-4025u:-:*:*:*:*:*:*:*", "matchCriteriaId": "225F1973-15DA-4D6D-89EA-17E6AA10C36E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3-4030u:-:*:*:*:*:*:*:*", "matchCriteriaId": "5CD2F2F4-395C-4AB5-AAB0-0CB6FEE8ACE8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3-4030y:-:*:*:*:*:*:*:*", "matchCriteriaId": "B5AF7A04-AAC2-4B03-9F66-5078BECBADF4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3-4100m:-:*:*:*:*:*:*:*", "matchCriteriaId": "BCF1BEDB-776F-4CAE-84F5-F29F7EE20D69", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3-4100u:-:*:*:*:*:*:*:*", "matchCriteriaId": "C6F33467-2074-4775-871F-013A513881A6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3-4110m:-:*:*:*:*:*:*:*", "matchCriteriaId": "4AD8C3F8-2B03-4FC3-826B-529B0AE005CF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3-4120u:-:*:*:*:*:*:*:*", "matchCriteriaId": "435E1592-37A8-4436-8755-95FB585579E9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3-4130:-:*:*:*:*:*:*:*", "matchCriteriaId": "92C15BE9-B984-4675-AE59-9E275C4763F2", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3-4130t:-:*:*:*:*:*:*:*", "matchCriteriaId": "983FD869-68B3-454A-AF09-4AAF2F59BFAA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3-4150:-:*:*:*:*:*:*:*", "matchCriteriaId": "06C65583-56E8-46E6-A0F1-A46405460188", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3-4150t:-:*:*:*:*:*:*:*", "matchCriteriaId": "F3D3C6D6-504F-4FC2-A871-C4B36A5949D8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3-4158u:-:*:*:*:*:*:*:*", "matchCriteriaId": "49482ADE-4DDE-448C-B491-88AFBBF08381", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3-4160:-:*:*:*:*:*:*:*", "matchCriteriaId": "8D246820-03D1-48CD-9A08-2328D77428B1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3-4160t:-:*:*:*:*:*:*:*", "matchCriteriaId": "C714E08F-C724-4C36-99FC-4A85EB2B8BAA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3-4170:-:*:*:*:*:*:*:*", "matchCriteriaId": "793B03CA-B9F9-48CC-A0C6-E1FF86B71199", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3-4170t:-:*:*:*:*:*:*:*", "matchCriteriaId": "F117F239-FA9C-4B7F-A1C7-F0EB0F24E003", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3-4330:-:*:*:*:*:*:*:*", "matchCriteriaId": "9B0D3709-EB3A-48E6-9A7B-0108FAE2AF04", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3-4330t:-:*:*:*:*:*:*:*", "matchCriteriaId": "68066973-CB03-4AA8-9F24-D43C6F479348", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3-4340:-:*:*:*:*:*:*:*", "matchCriteriaId": "C242A17E-6A79-4435-BF37-C503D69EB3E4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3-4350:-:*:*:*:*:*:*:*", "matchCriteriaId": "7555AB52-CE91-48FE-8950-9E8B98A184FC", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3-4350t:-:*:*:*:*:*:*:*", "matchCriteriaId": "E9D0B6B6-1CD6-4962-9054-7DB56D584248", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3-4360:-:*:*:*:*:*:*:*", "matchCriteriaId": "C8042533-01E5-4C3E-9EF2-9AF475E2373E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3-4360t:-:*:*:*:*:*:*:*", "matchCriteriaId": "D29161F8-B122-4544-9B7F-9C9498532E44", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3-4370:-:*:*:*:*:*:*:*", "matchCriteriaId": "D4C82B27-415C-4C7B-B3AC-FE398581EE81", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3-4370t:-:*:*:*:*:*:*:*", "matchCriteriaId": "F1A225BD-6E71-4EF0-A9DF-50AC5D94139B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3-5005u:-:*:*:*:*:*:*:*", "matchCriteriaId": "E3F45AB6-55EF-4ED0-BBAD-E78894ED399B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3-5006u:-:*:*:*:*:*:*:*", "matchCriteriaId": "0A4DB9FB-2256-4D44-9DCF-A8D6AFAE091B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3-5010u:-:*:*:*:*:*:*:*", "matchCriteriaId": "5DA07BF1-F5E6-4AFB-AE92-26E3E5125064", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3-5015u:-:*:*:*:*:*:*:*", "matchCriteriaId": "81A627BB-47E3-4870-8B66-92546ABA0060", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3-5020u:-:*:*:*:*:*:*:*", "matchCriteriaId": "B6DD467D-BCB8-48CA-920B-5591A3E8D4C9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3-5157u:-:*:*:*:*:*:*:*", "matchCriteriaId": "9A64B0EA-FB22-4CE6-81E7-56CFFE12FC5A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3-6100:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A6E16A4-5B81-412F-9B02-D15288F0EB52", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3-6100e:-:*:*:*:*:*:*:*", "matchCriteriaId": "8448F47A-F956-4228-9A13-24AE86C532CA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3-6100h:-:*:*:*:*:*:*:*", "matchCriteriaId": "F0B9E6DB-C9C3-4B19-915B-B2E6E4D12158", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3-6100t:-:*:*:*:*:*:*:*", "matchCriteriaId": "78C4115F-E374-47E9-A81F-CC06FA72C67F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3-6100te:-:*:*:*:*:*:*:*", "matchCriteriaId": "AE81958E-5DFA-424C-9662-ECB1D9B738D5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3-6100u:-:*:*:*:*:*:*:*", "matchCriteriaId": "BE0F2403-8146-4CA0-9E89-04022B375CEC", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3-6102e:-:*:*:*:*:*:*:*", "matchCriteriaId": "CD67C284-EFCE-4530-8E68-42BB1B6F15C3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3-6110u:-:*:*:*:*:*:*:*", "matchCriteriaId": "2E8CD54D-7BB0-4CA7-99C6-8E3EC20E2265", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3-6120:-:*:*:*:*:*:*:*", "matchCriteriaId": "BE3DA00E-1BAC-4227-9ED0-F4757BC23B65", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3-6120t:-:*:*:*:*:*:*:*", "matchCriteriaId": "34E0E209-5CEE-418F-B99B-9142CDE9ADE6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3-6167u:-:*:*:*:*:*:*:*", "matchCriteriaId": "20B1E424-885F-4BB0-9257-8284A18B1655", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3-6300:-:*:*:*:*:*:*:*", "matchCriteriaId": "BADEBE08-1478-4B88-9E06-5164BA0517DE", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3-6300t:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D672383-B9AD-466E-8D6C-68DEC432B9A8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3-6320:-:*:*:*:*:*:*:*", "matchCriteriaId": "D16BDFF3-4CC0-4423-8385-C5E49C941F49", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3-6320t:-:*:*:*:*:*:*:*", "matchCriteriaId": "048C652D-352D-4088-9986-30C280BC5C8B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3-7007u:-:*:*:*:*:*:*:*", "matchCriteriaId": "102122A3-D47E-4CD2-8151-4B708C39D3E8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3-7020u:-:*:*:*:*:*:*:*", "matchCriteriaId": "35F2CA68-9EEA-421F-A92E-E7685EC010EF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3-7100e:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C17DCC3-9200-4198-B08D-EAD531B59995", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3-7100h:-:*:*:*:*:*:*:*", "matchCriteriaId": "31CBD3FB-0835-4F28-BFA2-3D07459066F3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3-7100u:-:*:*:*:*:*:*:*", "matchCriteriaId": "5F059A42-0B43-4F79-BBAF-6ED05CFFE7EB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3-7101e:-:*:*:*:*:*:*:*", "matchCriteriaId": "1B6B298A-1480-41C2-BE7C-7291E7256D7C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3-7101te:-:*:*:*:*:*:*:*", "matchCriteriaId": "CB3ABEFE-11A5-4EC3-9537-F9C75A46FF65", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3-7102e:-:*:*:*:*:*:*:*", "matchCriteriaId": "14C20D2A-CD26-4019-A266-AB4E89EBD2E1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3-7110u:-:*:*:*:*:*:*:*", "matchCriteriaId": "04C8B673-9E57-4970-AC45-EE3526757425", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3-7120:-:*:*:*:*:*:*:*", "matchCriteriaId": "A6F9C441-D99C-4BA2-9269-83283507D7D7", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3-7120t:-:*:*:*:*:*:*:*", "matchCriteriaId": "CF5748B4-1ED9-49DD-9140-DC7B47A30BB5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3-7130u:-:*:*:*:*:*:*:*", "matchCriteriaId": "B608F333-BD78-4082-B2AE-0F5BBE7E0D9A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3-7167u:-:*:*:*:*:*:*:*", "matchCriteriaId": "6F609E73-203F-45B9-9A3A-DC754B33860A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3-7320t:-:*:*:*:*:*:*:*", "matchCriteriaId": "00A6DEC8-14E3-4A0E-93A5-72BB607A9D18", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3-7340:-:*:*:*:*:*:*:*", "matchCriteriaId": "3C195F5C-9666-48C7-A1C0-43E189B17EEA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3-8000:-:*:*:*:*:*:*:*", "matchCriteriaId": "BD3CA819-AFF3-47F8-AABE-A5F9DA89BAE5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3-8000t:-:*:*:*:*:*:*:*", "matchCriteriaId": "06FDA087-0896-4138-9BA2-8238A845F5E7", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3-8020:-:*:*:*:*:*:*:*", "matchCriteriaId": "D8A63B09-D870-411D-8B26-ACDEE48C10F3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3-8100:-:*:*:*:*:*:*:*", "matchCriteriaId": "FD84789A-B7F4-493E-A3F6-D5287ACFEB98", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3-8100h:-:*:*:*:*:*:*:*", "matchCriteriaId": "47B28199-5B9A-4AC4-9529-77A6FC591DC9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3-8100t:-:*:*:*:*:*:*:*", "matchCriteriaId": "33B0B0C9-54ED-4D7E-B0F2-C87690056800", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3-8109u:-:*:*:*:*:*:*:*", "matchCriteriaId": "E7DDCC11-A3DD-493E-AAFA-B50050FE3AC4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3-8120:-:*:*:*:*:*:*:*", "matchCriteriaId": "408A8035-BE57-435B-85A5-9C59D3B2DD42", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3-8130u:-:*:*:*:*:*:*:*", "matchCriteriaId": "6287BCB7-8EFD-485E-B40E-AE6B9DB067DF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3-8145u:-:*:*:*:*:*:*:*", "matchCriteriaId": "0D78093B-076C-48FB-A224-F94F5743ACF3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3-8300:-:*:*:*:*:*:*:*", "matchCriteriaId": "F1DCD6D7-7FF2-419B-A41C-CF1FA830F289", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3-8300t:-:*:*:*:*:*:*:*", "matchCriteriaId": "B8127E47-6082-4313-B310-1C6278471A21", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3-8350k:-:*:*:*:*:*:*:*", "matchCriteriaId": "C14BA084-59CC-40E8-A62F-7AD1C9DD9283", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3-i3-8100h:-:*:*:*:*:*:*:*", "matchCriteriaId": "C25C1699-E656-4FA0-A9B7-59A3940814DD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-10110y:-:*:*:*:*:*:*:*", "matchCriteriaId": "62BFF15A-0C78-45BC-8E71-EDF624AC162D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-10210u:-:*:*:*:*:*:*:*", "matchCriteriaId": "71615EAF-4DF4-4B9E-BF34-6ED0371A53D7", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-10210y:-:*:*:*:*:*:*:*", "matchCriteriaId": "376B6DD7-1284-4BD9-88A4-5C34303CC5D1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-10310y:-:*:*:*:*:*:*:*", "matchCriteriaId": "C8515D29-3823-4F9B-9578-8BB52336A2A7", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-3210m:-:*:*:*:*:*:*:*", "matchCriteriaId": "16614725-F21F-45C9-85CA-9F9C8EFE0FBC", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-3230m:-:*:*:*:*:*:*:*", "matchCriteriaId": "6659D386-A44A-484F-AAE1-EA5CB3F17528", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-3317u:-:*:*:*:*:*:*:*", "matchCriteriaId": "5427E131-5B27-4C64-BED0-C5780595831C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-3320m:-:*:*:*:*:*:*:*", "matchCriteriaId": "9969E654-88F4-4F97-A737-C53D078BB9AE", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-3330:-:*:*:*:*:*:*:*", "matchCriteriaId": "27934CF8-2FB2-4D04-92FC-081F31B18D5E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-3330s:-:*:*:*:*:*:*:*", "matchCriteriaId": "C5552F0B-6AA4-4E55-8871-E3E61B78F0B5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-3337u:-:*:*:*:*:*:*:*", "matchCriteriaId": "94F26990-272B-4A25-AAD1-1CEE2EC96515", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-3339y:-:*:*:*:*:*:*:*", "matchCriteriaId": "FEC9E4B4-BDF7-4D6B-99E2-9DFD3408EA9B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-3340:-:*:*:*:*:*:*:*", "matchCriteriaId": "9265D619-7C06-4297-BCA0-7B44AC3DE2BA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-3340m:-:*:*:*:*:*:*:*", "matchCriteriaId": "6BAAB044-56DD-4F28-B794-7F3DF8F403DD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-3340s:-:*:*:*:*:*:*:*", "matchCriteriaId": "2559481C-347F-4E3D-9E46-FB5E3E85682B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-3350p:-:*:*:*:*:*:*:*", "matchCriteriaId": "46D61342-E48F-426E-A856-3E0EAD268E5B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-3360m:-:*:*:*:*:*:*:*", "matchCriteriaId": "22D9B565-1A4C-4344-93E9-05390E036102", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-3380m:-:*:*:*:*:*:*:*", "matchCriteriaId": "C5262FA4-704A-4FD8-AFC6-B35B28768CFF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-3427u:-:*:*:*:*:*:*:*", "matchCriteriaId": "96D540DD-94C1-4568-9275-01ED97A313BB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-3437u:-:*:*:*:*:*:*:*", "matchCriteriaId": "AEBACE66-D68E-4D1D-9CDC-8A23F387BFE2", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-3439y:-:*:*:*:*:*:*:*", "matchCriteriaId": "CBE75BFF-5251-4216-A49E-5CF2A8B69A0F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-3450:-:*:*:*:*:*:*:*", "matchCriteriaId": "C862334A-9B62-4FE9-AD65-383A240E1E2A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-3450s:-:*:*:*:*:*:*:*", "matchCriteriaId": "25345701-D7A9-47D9-8E84-BFD44669DBDA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-3470:-:*:*:*:*:*:*:*", "matchCriteriaId": "DA2E8D01-9A86-45ED-8E5D-83A41D68FA5F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-3470s:-:*:*:*:*:*:*:*", "matchCriteriaId": "ABE78550-8862-4449-A114-39CDA89C4A6F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-3470t:-:*:*:*:*:*:*:*", "matchCriteriaId": "1C3EBF20-9833-481F-86C4-65EF106D2438", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-3475s:-:*:*:*:*:*:*:*", "matchCriteriaId": "29A1EFA9-49A9-4127-8AC5-78EA78162A8D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-3550:-:*:*:*:*:*:*:*", "matchCriteriaId": "26059622-2A47-4D95-B32C-867E19BFA204", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-3550s:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8E0A34F-29B3-487F-8FFA-63DC0E581F36", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-3570:-:*:*:*:*:*:*:*", "matchCriteriaId": "163C5423-A6F8-4824-A823-962147C72BD2", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-3570k:-:*:*:*:*:*:*:*", "matchCriteriaId": "48BDE191-B712-4AE6-B577-788934849708", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-3570s:-:*:*:*:*:*:*:*", "matchCriteriaId": "EE7D55B8-E611-4D90-85BC-2159136C47B6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-3570t:-:*:*:*:*:*:*:*", "matchCriteriaId": "B3E241E2-9569-4F13-AE70-F717713AE845", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-3610me:-:*:*:*:*:*:*:*", "matchCriteriaId": "8BA5C764-BF33-4035-B832-0C5B7A084081", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-4200u:-:*:*:*:*:*:*:*", "matchCriteriaId": "13038065-613A-4560-AFC1-6CAD2C9D27EA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-4200y:-:*:*:*:*:*:*:*", "matchCriteriaId": "E44E93A2-5483-4CE5-B3E3-759BCDF67847", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-4202y:-:*:*:*:*:*:*:*", "matchCriteriaId": "0B769FF2-10FA-40F8-A702-CBF5EBB23B3A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-4210h:-:*:*:*:*:*:*:*", "matchCriteriaId": "71BBDB01-D110-4B44-92D3-D2936F02E749", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-4210u:-:*:*:*:*:*:*:*", "matchCriteriaId": "044D188E-792A-4007-9D87-6FB55AA685C8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-4210y:-:*:*:*:*:*:*:*", "matchCriteriaId": "C8D46072-8F46-4FCB-B161-7812B544C1A0", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-4220y:-:*:*:*:*:*:*:*", "matchCriteriaId": "3F6A65B2-FFBE-482C-8E08-19E3D72977DE", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-4250u:-:*:*:*:*:*:*:*", "matchCriteriaId": "1DC0C2C7-F8A4-4ED0-B4FA-3372FAC11FA7", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-4258u:-:*:*:*:*:*:*:*", "matchCriteriaId": "2D98CCDE-E246-43B4-8778-9C357AF0C1C5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-4260u:-:*:*:*:*:*:*:*", "matchCriteriaId": "58AD9023-0D04-4A77-BB47-FAB873342FF5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-4278u:-:*:*:*:*:*:*:*", "matchCriteriaId": "09C41E56-9836-4D9E-8289-B9BFF8836B59", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-4288u:-:*:*:*:*:*:*:*", "matchCriteriaId": "E0A15D53-6CCA-42AE-8DDE-B11E004451DE", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-4300u:-:*:*:*:*:*:*:*", "matchCriteriaId": "A69BF8F7-AB89-43B0-BD04-F95E7C655766", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-4300y:-:*:*:*:*:*:*:*", "matchCriteriaId": "E5D97AAB-5FD8-40DF-B13F-D12356023873", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-4302y:-:*:*:*:*:*:*:*", "matchCriteriaId": "2A0F7C52-2F89-449A-810D-4EDE87729EC0", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-4308u:-:*:*:*:*:*:*:*", "matchCriteriaId": "BC2BEF57-EADD-45C7-93EA-4257A0F8571B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-4350u:-:*:*:*:*:*:*:*", "matchCriteriaId": "B6778D27-5442-44EA-8B69-3E9C406A7109", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-4402ec:-:*:*:*:*:*:*:*", "matchCriteriaId": "260C49FB-83F0-428B-861B-9A34B28EBA3F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-4430:-:*:*:*:*:*:*:*", "matchCriteriaId": "32531475-E54A-49B1-B15C-9366DE0BC003", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-4430s:-:*:*:*:*:*:*:*", "matchCriteriaId": "430479CC-7246-424F-A514-96035A14BA6A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-4440:-:*:*:*:*:*:*:*", "matchCriteriaId": "061078C4-0B54-4BAD-9E3B-4114893FC8BC", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-4440s:-:*:*:*:*:*:*:*", "matchCriteriaId": "1ECAE7B1-7948-45A9-B73C-B362846A13EF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-4460:-:*:*:*:*:*:*:*", "matchCriteriaId": "F5B0D553-AB7D-453C-92C6-E3D08A7FAB08", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-4460s:-:*:*:*:*:*:*:*", "matchCriteriaId": "6D153FDC-5420-4C9A-8FC3-2B29133F6F5F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-4460t:-:*:*:*:*:*:*:*", "matchCriteriaId": "166B6B12-BEEA-4CB4-B194-B53F382CCC3B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-4570:-:*:*:*:*:*:*:*", "matchCriteriaId": "3F417FFF-166E-4158-8AAF-B2B46539792B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-4570r:-:*:*:*:*:*:*:*", "matchCriteriaId": "829EDA96-60C4-4BC9-AAFD-2E3CFFD8D878", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-4570s:-:*:*:*:*:*:*:*", "matchCriteriaId": "F1F9933E-9B7E-439A-8E10-AAC45C834A5A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-4570t:-:*:*:*:*:*:*:*", "matchCriteriaId": "CB34FDE0-6251-4B88-AA3F-B883639256B8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-4590:-:*:*:*:*:*:*:*", "matchCriteriaId": "BE57DEE6-5C9C-4A76-9EB2-7DD9A34599DE", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-4590s:-:*:*:*:*:*:*:*", "matchCriteriaId": "9BC6F12C-CADB-4D53-A75B-E7D98FF96383", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-4590t:-:*:*:*:*:*:*:*", "matchCriteriaId": "62D4DE4E-9FE4-4488-8B14-59A87EB6E286", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-4670:-:*:*:*:*:*:*:*", "matchCriteriaId": "6DCB38B4-DC0E-4C23-9E51-16B73199D0D4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-4670k:-:*:*:*:*:*:*:*", "matchCriteriaId": "10FE39EA-B42A-4AD5-8343-0B644E795B3E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-4670r:-:*:*:*:*:*:*:*", "matchCriteriaId": "4612D9EA-ACEE-449D-A32B-AAA9474B49B2", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-4670s:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C47E01F-EACA-41C4-B478-F1E718B5EC52", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-4670t:-:*:*:*:*:*:*:*", "matchCriteriaId": "6CB47108-1104-4272-98B4-9458E1B1EA5B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-4690:-:*:*:*:*:*:*:*", "matchCriteriaId": "50B07453-9E7C-4F2F-9B9E-B0F3A3710811", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-4690s:-:*:*:*:*:*:*:*", "matchCriteriaId": "505D6E8F-51BA-4947-9667-9402ED9111EF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-4690t:-:*:*:*:*:*:*:*", "matchCriteriaId": "74D12E38-F78E-4111-88FE-F8472F8A571B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-5200u:-:*:*:*:*:*:*:*", "matchCriteriaId": "60A08817-7679-4B7B-8D32-08F7F42525CC", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-5250u:-:*:*:*:*:*:*:*", "matchCriteriaId": "D8085F23-481D-4395-9071-5F79DCC4EFEA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-5257u:-:*:*:*:*:*:*:*", "matchCriteriaId": "9CB0B9DA-FB37-4E96-99E7-3345B53FDC2F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-5287u:-:*:*:*:*:*:*:*", "matchCriteriaId": "B7138774-E0CF-47C6-BA82-4034AA63AC1D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-5350:-:*:*:*:*:*:*:*", "matchCriteriaId": "444D4778-B28C-4DA9-9F44-C2D1ACE20BF8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-5350u:-:*:*:*:*:*:*:*", "matchCriteriaId": "D7EA9832-4E75-4295-B0AE-AB632B043FCF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-5575r:-:*:*:*:*:*:*:*", "matchCriteriaId": "E9BE5A85-4721-4AED-BC92-690094C877FB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-5675c:-:*:*:*:*:*:*:*", "matchCriteriaId": "0EDD172D-7ECF-4EF8-A731-0B6484240F23", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-5675r:-:*:*:*:*:*:*:*", "matchCriteriaId": "EFE1C5F5-C523-4EED-8C5C-7EEBFE9E6D73", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-6200u:-:*:*:*:*:*:*:*", "matchCriteriaId": "9F611716-F3D6-4187-AE71-4FF87C95C18E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-6210u:-:*:*:*:*:*:*:*", "matchCriteriaId": "033028FD-BBD8-4BE0-B0D2-4744380D3EF7", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-6260u:-:*:*:*:*:*:*:*", "matchCriteriaId": "D5F67974-81B3-43C2-8DAE-A66C6A876B7A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-6267u:-:*:*:*:*:*:*:*", "matchCriteriaId": "1054FBFC-1609-4301-A0D0-B78878FB2427", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-6287u:-:*:*:*:*:*:*:*", "matchCriteriaId": "A0F889F1-3B57-46C1-9C23-9E78CD0DEECF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-6300hq:-:*:*:*:*:*:*:*", "matchCriteriaId": "93929C7B-D4D9-436B-BA69-FD3C22FCEC2D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-6300u:-:*:*:*:*:*:*:*", "matchCriteriaId": "C7F9109E-EADD-40F4-8360-BF7E37433E2B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-6310u:-:*:*:*:*:*:*:*", "matchCriteriaId": "02F5A50A-AAA4-440D-8AA3-54BE556322B9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-6350hq:-:*:*:*:*:*:*:*", "matchCriteriaId": "41F7C959-BC66-40AB-8038-D37181A4CE5A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-6360u:-:*:*:*:*:*:*:*", "matchCriteriaId": "3B9B3858-E58D-471E-8F12-DC109A133B81", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-6400:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D37104E-78E5-4368-B67F-1F8C63873C3C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-6400t:-:*:*:*:*:*:*:*", "matchCriteriaId": "A3B6BBA6-BAA6-4258-8A5D-94CD786A3B96", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-6440eq:-:*:*:*:*:*:*:*", "matchCriteriaId": "30DFA368-60E2-42D7-9C59-04F61F1A1FDB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-6440hq:-:*:*:*:*:*:*:*", "matchCriteriaId": "0974E563-6326-4E79-95FF-40625440696E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-6442eq:-:*:*:*:*:*:*:*", "matchCriteriaId": "6B9D15BA-CC1B-4D83-9944-2593E2BA4AB2", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-6500:-:*:*:*:*:*:*:*", "matchCriteriaId": "467F294F-2FC5-4B2A-A1CD-4FE90F9D9C16", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-6500t:-:*:*:*:*:*:*:*", "matchCriteriaId": "E904FB93-EFF6-4E8E-92F2-95C4952B0240", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-6500te:-:*:*:*:*:*:*:*", "matchCriteriaId": "5B232290-B3AD-4BB5-80B8-4CB3E6259A44", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-6600:-:*:*:*:*:*:*:*", "matchCriteriaId": "772568B9-C502-4154-9320-16D78BF60B34", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-6600k:-:*:*:*:*:*:*:*", "matchCriteriaId": "912614A7-45BA-411D-AE77-610EFE8D2A35", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-6600t:-:*:*:*:*:*:*:*", "matchCriteriaId": "8FBD651A-306D-4341-8DEE-2E928CA6E0EF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-7200u:-:*:*:*:*:*:*:*", "matchCriteriaId": "E993BEE9-72BD-4615-B1BE-5E9129D61ABD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-7210u:-:*:*:*:*:*:*:*", "matchCriteriaId": "0FD6FEF4-73DA-47B7-966D-9C0C16089423", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-7260u:-:*:*:*:*:*:*:*", "matchCriteriaId": "EFA6BB38-CDF8-46B0-9910-897AB7920D18", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-7267u:-:*:*:*:*:*:*:*", "matchCriteriaId": "BF244D02-2B47-4884-8D70-37DFEB18CB60", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-7287u:-:*:*:*:*:*:*:*", "matchCriteriaId": "615D9B0D-8E91-4C8F-B5BC-6315C2CA90BD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-7300hq:-:*:*:*:*:*:*:*", "matchCriteriaId": "8EE85AE7-B4BD-442E-AFAB-CD01744C91B7", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-7300u:-:*:*:*:*:*:*:*", "matchCriteriaId": "2425FF8A-158C-40EE-BDBF-43E7641BC058", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-7360u:-:*:*:*:*:*:*:*", "matchCriteriaId": "ADA681B4-37F8-4E2E-B73B-E0E17C66B754", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-7400:-:*:*:*:*:*:*:*", "matchCriteriaId": "DE4C6ADA-EE5E-401D-82B4-6E450EDBD49E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-7400t:-:*:*:*:*:*:*:*", "matchCriteriaId": "173C6F98-4022-4F40-A39A-D3D490CA6461", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-7440eq:-:*:*:*:*:*:*:*", "matchCriteriaId": "F6EACCCA-7ADB-40B8-87DD-A55313E5BB97", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-7440hq:-:*:*:*:*:*:*:*", "matchCriteriaId": "78F1BD53-55ED-4346-A67A-141B5BC552CD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-7442eq:-:*:*:*:*:*:*:*", "matchCriteriaId": "44D7B5DF-716F-48E6-9445-BB56A620DEF1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-7500:-:*:*:*:*:*:*:*", "matchCriteriaId": "2F3E6176-6F6D-4488-A03B-2BBF846ADC93", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-7500t:-:*:*:*:*:*:*:*", "matchCriteriaId": "6AEAE7D3-6E26-43C5-B530-B0EE3DA65C80", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-7500u:-:*:*:*:*:*:*:*", "matchCriteriaId": "B3C31236-EEDA-4558-944D-A6859F1A779A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-7600:-:*:*:*:*:*:*:*", "matchCriteriaId": "2603B0FB-A7B0-4E87-B989-D7EFFC2A64E4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-7600k:-:*:*:*:*:*:*:*", "matchCriteriaId": "BF705120-459D-49BA-BDCD-6AC38D95C820", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-7600t:-:*:*:*:*:*:*:*", "matchCriteriaId": "2B91585C-4BD7-475B-8AC8-1B813A698D77", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-7640x:-:*:*:*:*:*:*:*", "matchCriteriaId": "70B7093E-97DA-4BED-AE7C-87090B82E5E8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-7y54:-:*:*:*:*:*:*:*", "matchCriteriaId": "CFA675E6-83DD-47FF-BEBC-D32E5223A065", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-7y57_:-:*:*:*:*:*:*:*", "matchCriteriaId": "3F5E4A60-291F-4F51-8F21-40928A95BA2D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-8200y:-:*:*:*:*:*:*:*", "matchCriteriaId": "2AC12E92-33CB-4603-AC14-3351CE1D4E3A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-8210y:-:*:*:*:*:*:*:*", "matchCriteriaId": "6E62309E-1071-4569-8C9A-11748D629CAB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-8250u:-:*:*:*:*:*:*:*", "matchCriteriaId": "2DDA599F-09D5-4351-B7F5-351A2E04E091", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-8259u:-:*:*:*:*:*:*:*", "matchCriteriaId": "D0D473E4-5EB1-434D-9D8F-C9365988EEAD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-8265u:-:*:*:*:*:*:*:*", "matchCriteriaId": "6D3E166F-3D9F-4D0D-924A-147883598EA3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-8300h:-:*:*:*:*:*:*:*", "matchCriteriaId": "8BD64BB5-CBC1-4862-BEE6-04FC53017976", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-8305g:-:*:*:*:*:*:*:*", "matchCriteriaId": "F4D55B9D-4BAB-4082-A33F-626E15229333", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-8310y:-:*:*:*:*:*:*:*", "matchCriteriaId": "71294A32-F3DD-45EA-A0FC-C3EA0351FA29", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-8350u:-:*:*:*:*:*:*:*", "matchCriteriaId": "4E920376-561D-4892-97A2-F4400223B3CA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-8365u:-:*:*:*:*:*:*:*", "matchCriteriaId": "C9054F35-AAB5-481E-B512-EDF4C3F2EA2F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-8400:-:*:*:*:*:*:*:*", "matchCriteriaId": "9D350A92-3992-4464-84AB-960ABCA45698", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-8400b:-:*:*:*:*:*:*:*", "matchCriteriaId": "43DA2F8C-1C05-4447-A861-A33E81050F37", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-8400h:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D9E3717-83D4-4C7B-9700-2ABDA6DDAD23", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-8400t:-:*:*:*:*:*:*:*", "matchCriteriaId": "AA341190-21EC-46FB-849D-F54AD3DFCF93", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-8420:-:*:*:*:*:*:*:*", "matchCriteriaId": "874EF732-1067-45BB-BC15-DF815EC8CAFE", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-8420t:-:*:*:*:*:*:*:*", "matchCriteriaId": "BD92F60E-0103-44AC-A377-52FFACB0A701", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-8500:-:*:*:*:*:*:*:*", "matchCriteriaId": "908629C1-FD27-4247-A33E-4F5E57DFF918", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-8500b:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A98CDB0-BC13-4FB3-9DF2-56D9DCD9002F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-8500t:-:*:*:*:*:*:*:*", "matchCriteriaId": "C2AF0758-7F39-40C0-A174-4805AADACE14", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-8550:-:*:*:*:*:*:*:*", "matchCriteriaId": "1AB63EC2-E95B-43B5-BA7A-16314C968126", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-8600:-:*:*:*:*:*:*:*", "matchCriteriaId": "D99484C0-1349-47EC-AFEB-5F7F281A514E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-8600k:-:*:*:*:*:*:*:*", "matchCriteriaId": "CF02D685-1E67-40E1-A858-000498D5D877", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-8600t:-:*:*:*:*:*:*:*", "matchCriteriaId": "C9F74885-92EE-4F36-B4E1-5F1F8AD65F88", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-8650:-:*:*:*:*:*:*:*", "matchCriteriaId": "238D4D09-7183-40D2-ABE0-4C477BCCEA49", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-8650k:-:*:*:*:*:*:*:*", "matchCriteriaId": "4CB1E0C8-5FFD-42A5-9798-1F324488A54A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-9400:-:*:*:*:*:*:*:*", "matchCriteriaId": "8AC9F52F-6669-459A-A0A9-8F472E1F2761", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-9400f:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7E91B92-4DB7-4866-8370-C6F8616D3D81", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-9400h:-:*:*:*:*:*:*:*", "matchCriteriaId": "85F465BF-4548-45EB-AC40-384F4E6248EE", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-9600k:-:*:*:*:*:*:*:*", "matchCriteriaId": "B1DFFFEB-CC63-4F51-8828-C5D4E0287264", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-9600kf:-:*:*:*:*:*:*:*", "matchCriteriaId": "B176D141-26B0-477E-B2DB-2E48D6FB82AE", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-10510u:-:*:*:*:*:*:*:*", "matchCriteriaId": "494A828B-F2BF-40CA-AAFB-7D2AF2BAF3AA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-10510y:-:*:*:*:*:*:*:*", "matchCriteriaId": "FD97F84B-ED73-4FFD-8634-10631FEE03EA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-3517u:-:*:*:*:*:*:*:*", "matchCriteriaId": "3BF84DAA-69A2-4437-9AF5-972FB1569990", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-3517ue:-:*:*:*:*:*:*:*", "matchCriteriaId": "41804B09-DFF0-48E4-91AC-6499FDA21C26", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-3520m:-:*:*:*:*:*:*:*", "matchCriteriaId": "71BDCDE0-A21F-47F1-A253-AAA5EDDD31BC", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-3537u:-:*:*:*:*:*:*:*", "matchCriteriaId": "EB5B6864-B51C-4C31-AA93-C7C170F4BD28", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-3540m:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D38D1F4-8332-4EFE-8998-86C654403C6A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-3555le:-:*:*:*:*:*:*:*", "matchCriteriaId": "04D88300-9CC8-4725-9BEB-BA705CFD57A9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-3610qe:-:*:*:*:*:*:*:*", "matchCriteriaId": "1932E842-21A1-4D9F-A755-4201BD6721E2", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-3610qm:-:*:*:*:*:*:*:*", "matchCriteriaId": "3257ABFD-7053-48BE-8827-311E9E922501", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-3612qe:-:*:*:*:*:*:*:*", "matchCriteriaId": "D8194009-767B-48E8-85FA-EB5F242C1B9C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-3612qm:-:*:*:*:*:*:*:*", "matchCriteriaId": "9CB92F26-67EC-4110-AD45-62530E662E45", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-3615qe:-:*:*:*:*:*:*:*", "matchCriteriaId": "7035D479-4C83-4A41-9164-6D8557E8F598", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-3615qm:-:*:*:*:*:*:*:*", "matchCriteriaId": "DF5113F5-A058-414F-B82B-EE91C71DD4AF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-3630qm:-:*:*:*:*:*:*:*", "matchCriteriaId": "47D5CD40-9F2B-4021-B43E-E71B3E78B7E4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-3632qm:-:*:*:*:*:*:*:*", "matchCriteriaId": "09B0D125-332D-416D-A379-F0D7C1F9DA27", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-3635qm:-:*:*:*:*:*:*:*", "matchCriteriaId": "CDB62B03-84E1-4514-BA89-1E13705F672B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-3667u:-:*:*:*:*:*:*:*", "matchCriteriaId": "A036D2F8-6666-403C-B187-7884CE5D00A6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-3687u:-:*:*:*:*:*:*:*", "matchCriteriaId": "C2BBBA0B-7761-44BE-82CF-92C1C3E25CA8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-3689y:-:*:*:*:*:*:*:*", "matchCriteriaId": "89771BDB-E24E-48B1-885E-22B1A5BFD228", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-3720qm:-:*:*:*:*:*:*:*", "matchCriteriaId": "59247DA5-9162-462A-9E3D-3FFB23CFCCED", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-3740qm:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C75CB4A-259E-4B40-B8E0-490B93DD11CC", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-3770:-:*:*:*:*:*:*:*", "matchCriteriaId": "1F47B9E3-118C-4270-824A-6A1BD2CC2121", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-3770k:-:*:*:*:*:*:*:*", "matchCriteriaId": "EAD0A970-9B15-4D9E-8644-15C5A93CEC03", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-3770s:-:*:*:*:*:*:*:*", "matchCriteriaId": "0144B84E-7286-4316-B408-6F860FF03C28", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-3770t:-:*:*:*:*:*:*:*", "matchCriteriaId": "5709EB3E-5B0E-46C7-9B6B-26999818EE18", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-3820qm:-:*:*:*:*:*:*:*", "matchCriteriaId": "DFD1A362-9C06-4BB7-830B-B308BB44A3DE", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-3840qm_:-:*:*:*:*:*:*:*", "matchCriteriaId": "904FF4A2-D2B6-4B3E-ACB2-3079F5098397", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-3920xm:-:*:*:*:extreme:*:*:*", "matchCriteriaId": "521F58D1-C114-4D81-88AD-6EC56A7AC686", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-3940xm:-:*:*:*:extreme:*:*:*", "matchCriteriaId": "D596B65D-A288-4DF1-9022-9E4946039954", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-4500u:-:*:*:*:*:*:*:*", "matchCriteriaId": "677C66EF-E9B9-430F-A19D-2D87AD83DBDB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-4510u:-:*:*:*:*:*:*:*", "matchCriteriaId": "EFC25D04-7FF5-4178-A7D1-795B6A6134E9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-4550u:-:*:*:*:*:*:*:*", "matchCriteriaId": "238EA0E0-0FD6-4DA4-93C8-83490BB61A73", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-4558u:-:*:*:*:*:*:*:*", "matchCriteriaId": "73BBB876-4CC0-48C9-A40E-B2A017D7E8BF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-4578u:-:*:*:*:*:*:*:*", "matchCriteriaId": "757DBB7A-D8F1-4BA9-882F-4A112F41D3E2", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-4600u:-:*:*:*:*:*:*:*", "matchCriteriaId": "E6B019A1-F44F-426C-BE8B-189E7B0CFDB7", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-4610y:-:*:*:*:*:*:*:*", "matchCriteriaId": "9DA22F64-0372-49DF-AB8F-0DF5519CB221", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-4650u:-:*:*:*:*:*:*:*", "matchCriteriaId": "D973CBCE-D6AF-49A5-A8B4-355E866DA51B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-4700ec:-:*:*:*:*:*:*:*", "matchCriteriaId": "0A9D9852-5090-4BD2-B311-E6A7B7837795", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-4700eq:-:*:*:*:*:*:*:*", "matchCriteriaId": "78AB646B-1FE3-44E3-A762-911843934439", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-4700hq:-:*:*:*:*:*:*:*", "matchCriteriaId": "0B4D9DD3-4EFD-448B-BA6E-175A99F47C99", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-4700mq:-:*:*:*:*:*:*:*", "matchCriteriaId": "840CD8CE-E506-4273-9A42-80488E56FBE9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-4702ec:-:*:*:*:*:*:*:*", "matchCriteriaId": "9A6E0594-D194-4840-A323-FE0EE56D7E97", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-4702hq:-:*:*:*:*:*:*:*", "matchCriteriaId": "794FB0BC-73A4-4FBA-8613-42057E8FCB1E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-4702mq:-:*:*:*:*:*:*:*", "matchCriteriaId": "66B08A47-9478-4F1A-9959-BB9C7BC1C9E3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-4710hq:-:*:*:*:*:*:*:*", "matchCriteriaId": "43479AB1-1D98-48EF-BD29-3EA0127CED22", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-4710mq:-:*:*:*:*:*:*:*", "matchCriteriaId": "12F8412D-F1D5-4219-8DD3-EBFC1BDF27FF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-4712hq:-:*:*:*:*:*:*:*", "matchCriteriaId": "E974332C-498F-4183-8CE4-56BF61A7950E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-4712mq:-:*:*:*:*:*:*:*", "matchCriteriaId": "C7125D26-367E-45DA-A9B5-562310D8E01E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-4720hq:-:*:*:*:*:*:*:*", "matchCriteriaId": "E3B71011-540B-4C21-8E8F-FDC7AA80B557", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-4722hq:-:*:*:*:*:*:*:*", "matchCriteriaId": "FFDAAA3C-F332-4799-A0B3-952CB076E199", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-4750hq:-:*:*:*:*:*:*:*", "matchCriteriaId": "67AB6E17-4975-4D45-9B42-FA2EBAF2D73B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-4760hq:-:*:*:*:*:*:*:*", "matchCriteriaId": "0ED0763B-9406-4644-A60A-676B665C9B34", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-4765t:-:*:*:*:*:*:*:*", "matchCriteriaId": "B5DDE5AC-EB56-47B3-A737-05FC0050BC62", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-4770:-:*:*:*:*:*:*:*", "matchCriteriaId": "AC81D07E-F6D1-4B75-87BD-5A79F182FC03", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-4770hq:-:*:*:*:*:*:*:*", "matchCriteriaId": "B99F445E-2385-46CD-959A-32B95DEF22FE", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-4770k:-:*:*:*:*:*:*:*", "matchCriteriaId": "F5277739-48A8-447A-A730-1C45107182F0", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-4770r:-:*:*:*:*:*:*:*", "matchCriteriaId": "AC7A7DE5-019C-4FF6-B810-3A5FBB8A9276", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-4770s:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A321932-8B3C-49FD-87B2-CCC215A6A2A7", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-4770t:-:*:*:*:*:*:*:*", "matchCriteriaId": "57585A7D-EF0A-4EF9-8AFE-A5F6AAAC9EF6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-4771:-:*:*:*:*:*:*:*", "matchCriteriaId": "5ADDCBE6-9148-420D-8DFF-AE6667DB71FF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-4785t:-:*:*:*:*:*:*:*", "matchCriteriaId": "ADEBD889-5D07-4620-8E80-BEA16E7BEC54", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-4790:-:*:*:*:*:*:*:*", "matchCriteriaId": "1BF582C2-6958-4060-A49E-AC943678C5A2", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-4790s:-:*:*:*:*:*:*:*", "matchCriteriaId": "CDA7EEAE-64FE-4891-AC8C-019B1242E12A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-4790t:-:*:*:*:*:*:*:*", "matchCriteriaId": "FB407F25-0554-4CD0-AC93-FC546EFB52DC", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-4800mq:-:*:*:*:*:*:*:*", "matchCriteriaId": "6D83B6CD-CF5B-47B2-A547-C6EE8F901203", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-4810mq:-:*:*:*:*:*:*:*", "matchCriteriaId": "20884D35-BBBA-44A8-BF14-95103C62F72B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-4850hq:-:*:*:*:*:*:*:*", "matchCriteriaId": "A14A6ECA-8879-40A2-8E33-156541B4E35B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-4860hq:-:*:*:*:*:*:*:*", "matchCriteriaId": "07AD0193-68BC-44E6-99DF-DC266B16A8AE", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-4870hq:-:*:*:*:*:*:*:*", "matchCriteriaId": "D38873C6-BB11-43A1-8233-7828FF143CF0", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-4900mq:-:*:*:*:*:*:*:*", "matchCriteriaId": "7E079890-9A4D-4AF2-86F4-3663789105DC", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-4910mq:-:*:*:*:*:*:*:*", "matchCriteriaId": "D9CB4BA0-CA4E-4C45-9A49-92AB0D411A95", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-4950hq:-:*:*:*:*:*:*:*", "matchCriteriaId": "074C330A-B69B-4414-8B80-E67A6AFEA651", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-4960hq:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EDDDFB8-3F05-4912-ABA3-A9F52B6636F9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-4980hq:-:*:*:*:*:*:*:*", "matchCriteriaId": "38ECE802-5548-44A8-9777-081C28402AE9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-5500u:-:*:*:*:*:*:*:*", "matchCriteriaId": "C34148EB-C6A7-49DE-8139-316F710D57F5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-5550u:-:*:*:*:*:*:*:*", "matchCriteriaId": "0EA33B05-493C-4F55-82D9-5F2C942A603D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-5557u:-:*:*:*:*:*:*:*", "matchCriteriaId": "7E8D6B87-CA43-4773-B13E-EB07128E5501", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-5600u:-:*:*:*:*:*:*:*", "matchCriteriaId": "80BAD40A-BE40-411C-A5E3-19C264BF4805", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-5650u:-:*:*:*:*:*:*:*", "matchCriteriaId": "BCD85430-4610-41B7-B7BD-CD3AA5391FB6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-5700eq:-:*:*:*:*:*:*:*", "matchCriteriaId": "BA71265A-4E37-4AC6-97D4-ED31D94A35B6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-5700hq:-:*:*:*:*:*:*:*", "matchCriteriaId": "91CEC4BC-098C-4B8F-AA4F-25B9211010D6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-5750hq:-:*:*:*:*:*:*:*", "matchCriteriaId": "9453959E-FB00-441B-B9B6-4BC75DD534B5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-5775c:-:*:*:*:*:*:*:*", "matchCriteriaId": "5ADC848D-C1AF-4FCE-89B4-DD3ABA050202", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-5775r:-:*:*:*:*:*:*:*", "matchCriteriaId": "0846BDFE-1643-49BE-8B48-03EC17B9BAC4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-5850eq:-:*:*:*:*:*:*:*", "matchCriteriaId": "B131EF48-4094-48C4-807E-4A76156A34CA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-5850hq:-:*:*:*:*:*:*:*", "matchCriteriaId": "466ECE77-E232-4C03-83A2-FBAC06C82021", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-5950hq:-:*:*:*:*:*:*:*", "matchCriteriaId": "1D98586A-473F-44D7-B299-9480129AE8DA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-6500u:-:*:*:*:*:*:*:*", "matchCriteriaId": "6CAD248D-0B95-4BE1-917F-E0976447927D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-6510u:-:*:*:*:*:*:*:*", "matchCriteriaId": "104F999D-584F-4D34-9538-679EDBE3B180", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-6560u:-:*:*:*:*:*:*:*", "matchCriteriaId": "5726D5D4-F188-4F06-B78A-2C7C694A40E3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-6567u:-:*:*:*:*:*:*:*", "matchCriteriaId": "72467515-7793-479B-BABF-839275CA9AAD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-6600u:-:*:*:*:*:*:*:*", "matchCriteriaId": "56B79264-C756-408C-A32A-BFD4AA0B20CA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-6650u:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D3DB891-40F6-4000-BEAE-A1710C70C43D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-6660u:-:*:*:*:*:*:*:*", "matchCriteriaId": "0D3EA33F-D137-4B24-9211-C8A62A7427A6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-6700:-:*:*:*:*:*:*:*", "matchCriteriaId": "86FFF97C-C121-4F91-B62F-057356B0A048", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-6700hq:-:*:*:*:*:*:*:*", "matchCriteriaId": "213B09CA-91E9-4D11-AA11-B84F40495E9A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-6700k:-:*:*:*:*:*:*:*", "matchCriteriaId": "EAFC55E4-D84D-4588-976D-1E2637B1BF0E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-6700t:-:*:*:*:*:*:*:*", "matchCriteriaId": "DCB20762-51C5-44DD-9CEE-FEEC1E9C0E5A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-6700te:-:*:*:*:*:*:*:*", "matchCriteriaId": "FAC1A189-D822-405B-A090-B1573FE12B14", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-6770hq:-:*:*:*:*:*:*:*", "matchCriteriaId": "31C57E58-66E3-4FEC-A88F-B82C4B372B2B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-6820eq:-:*:*:*:*:*:*:*", "matchCriteriaId": "C173CF7E-81DF-4AD5-AB17-A4C330B933D1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-6820hk:-:*:*:*:*:*:*:*", "matchCriteriaId": "638549EC-1BB1-4206-B8DC-C0101BBEF8A3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-6820hq:-:*:*:*:*:*:*:*", "matchCriteriaId": "A8F450DA-5FBA-47BB-9A7D-75873FB3E69F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-6822eq:-:*:*:*:*:*:*:*", "matchCriteriaId": "112701D9-7154-46E5-BF36-EE36A607C7DA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-6870hq:-:*:*:*:*:*:*:*", "matchCriteriaId": "87B5258B-26E4-4853-9F27-4BB12886CC38", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-6920hq:-:*:*:*:*:*:*:*", "matchCriteriaId": "9B1B04E8-A31F-4027-8E05-5461E7855F04", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-6970hq:-:*:*:*:*:*:*:*", "matchCriteriaId": "49BDD476-E402-408D-9BD6-886AB195704D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-7500u:-:*:*:*:*:*:*:*", "matchCriteriaId": "0D566CFB-935B-40E4-9F4E-6216A42E7EBA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-7510u:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8065A9B-4236-44AE-B60B-17F6695A705C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-7560u:-:*:*:*:*:*:*:*", "matchCriteriaId": "6A97ED15-D0C6-4B64-BA08-EE50A6990272", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-7567u:-:*:*:*:*:*:*:*", "matchCriteriaId": "E6A121D8-0D01-4AA7-A1D9-5E2B9F0D30A6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-7600u:-:*:*:*:*:*:*:*", "matchCriteriaId": "6D57834B-C031-4301-9839-7A32F13687EF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-7660u:-:*:*:*:*:*:*:*", "matchCriteriaId": "CEE126ED-B743-4C6D-95FF-04F473A9A008", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-7700:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D901944-8E2B-41E5-BB82-CF1C97064711", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-7700hq:-:*:*:*:*:*:*:*", "matchCriteriaId": "2A13E353-0063-468B-96CD-97BF91C747C9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-7700k:-:*:*:*:*:*:*:*", "matchCriteriaId": "913BBEFF-49E7-42AF-A850-B49E5A12AB98", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-7700t:-:*:*:*:*:*:*:*", "matchCriteriaId": "2FE6AE98-E4D9-4FBF-B90A-2B170A0AF26F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-7740x:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E9EF2F2-750C-4CB7-9858-69D7FFA4EF31", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-7820eq:-:*:*:*:*:*:*:*", "matchCriteriaId": "B8C1205B-6AC7-4DB5-B247-2108511D9957", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-7820hk:-:*:*:*:*:*:*:*", "matchCriteriaId": "FA47107D-237A-4184-8BA2-601660F7FB5C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-7820hq:-:*:*:*:*:*:*:*", "matchCriteriaId": "E9862E49-124E-4B7D-941A-CFD2668B6481", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-7920hq:-:*:*:*:*:*:*:*", "matchCriteriaId": "EE6572E2-5B24-4E21-9F6F-3A7A17A9F098", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-7y75:-:*:*:*:*:*:*:*", "matchCriteriaId": "85C7AD56-CA31-4C08-A5C1-B50E767E1FFD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-8500y:-:*:*:*:*:*:*:*", "matchCriteriaId": "957F3AC9-D071-4932-B2C9-1643FB78BC7A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-8510y:-:*:*:*:*:*:*:*", "matchCriteriaId": "8B8DD6D2-5F42-4E44-A4BB-D3179D83C2BB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-8550u:-:*:*:*:*:*:*:*", "matchCriteriaId": "1395788D-E23B-433A-B111-745C55018C68", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-8557u:-:*:*:*:*:*:*:*", "matchCriteriaId": "05EA3461-021B-42CD-B4BD-4D2E8703DB93", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-8559u:-:*:*:*:*:*:*:*", "matchCriteriaId": "CB6774C8-431B-42AC-8955-02B529222372", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-8560u:-:*:*:*:*:*:*:*", "matchCriteriaId": "DA0960D2-93EC-4CFC-B901-E38A59B798FF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-8565u:-:*:*:*:*:*:*:*", "matchCriteriaId": "F41025AC-6EFE-4562-B1D1-BAB004875B06", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-8569u:-:*:*:*:*:*:*:*", "matchCriteriaId": "AC1ED81E-3D62-47FB-8FD4-B2732525C33C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-8650u:-:*:*:*:*:*:*:*", "matchCriteriaId": "AC82E058-25FE-4B6C-BA3C-AB043CFAB113", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-8665u:-:*:*:*:*:*:*:*", "matchCriteriaId": "34DD3CCB-91D5-48D6-80BC-CA643385BCE4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-8670:-:*:*:*:*:*:*:*", "matchCriteriaId": "86817715-BF5A-40C8-8250-7A8CD637C05C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-8670t:-:*:*:*:*:*:*:*", "matchCriteriaId": "DAAC740C-A02E-4342-8388-B85DDE54DF25", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-8700:-:*:*:*:*:*:*:*", "matchCriteriaId": "04076FFA-D74F-4501-9921-D8EBDF97CD20", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-8700b:-:*:*:*:*:*:*:*", "matchCriteriaId": "A4440FC7-F90C-44E0-B7FB-C88BC95EAB77", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-8700k:-:*:*:*:*:*:*:*", "matchCriteriaId": "B8846D3C-39C6-48BE-9643-ACC479416257", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-8700t:-:*:*:*:*:*:*:*", "matchCriteriaId": "07279DDB-B07D-4224-AA1C-24B4F3D63BB8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-8705g:-:*:*:*:*:*:*:*", "matchCriteriaId": "D4DDEFAF-EEC8-441D-82EF-ECF20B9496A4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-8706g:-:*:*:*:*:*:*:*", "matchCriteriaId": "F423BBE6-327A-40DC-8BCE-BF43600A68D5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-8709g:-:*:*:*:*:*:*:*", "matchCriteriaId": "08718840-D468-4E86-8FFF-A2B1841E6BF6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-8750h:-:*:*:*:*:*:*:*", "matchCriteriaId": "C9B77426-B579-43C6-9340-F291138ECD7A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-8809g:-:*:*:*:*:*:*:*", "matchCriteriaId": "DD0CF1E4-487A-4C61-AF4E-733D7ECBCFCC", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-8850h:-:*:*:*:*:*:*:*", "matchCriteriaId": "DE776B91-9E25-48F5-A4F0-EB36B704AEBB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-9700k:-:*:*:*:*:*:*:*", "matchCriteriaId": "1FB0C1DA-60C6-4C9E-99D6-7A47696DACD8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-9700kf:-:*:*:*:*:*:*:*", "matchCriteriaId": "F2EB81B1-7DEF-4CC3-ADC9-A4CB1042E406", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-9850h:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D0320CB-05E3-4D5B-BCEF-D862566B0AA2", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i9-8950hk:-:*:*:*:*:*:*:*", "matchCriteriaId": "469D79CD-B627-4ACF-ABC7-0EAE5D41A005", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i9-9880h:-:*:*:*:*:*:*:*", "matchCriteriaId": "659206BB-510A-47F8-8B6E-FD030A6BE1DA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i9-9900k:-:*:*:*:*:*:*:*", "matchCriteriaId": "7C3257F5-CA55-4F35-9D09-5B85253DE786", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i9-9900kf:-:*:*:*:*:*:*:*", "matchCriteriaId": "B6F8CEA0-1CD6-4F17-85E3-C1CB04D9833A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i9-9980hk:-:*:*:*:*:*:*:*", "matchCriteriaId": "A48A2969-DC53-48E2-A5CA-4DF2B00D1960", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_m-5y10:-:*:*:*:*:*:*:*", "matchCriteriaId": "71AF96FE-EB28-474A-B260-EC22B4A334A1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_m-5y10a:-:*:*:*:*:*:*:*", "matchCriteriaId": "80F61261-1AF5-4B77-8065-25A6B0AFFEEC", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_m-5y10c:-:*:*:*:*:*:*:*", "matchCriteriaId": "232B0352-B020-4CAA-A5E3-38E75A157C4C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_m-5y3:-:*:*:*:*:*:*:*", "matchCriteriaId": "7CD2FE9A-BFFB-4EC8-9C44-26B2D9911B5F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_m-5y51:-:*:*:*:*:*:*:*", "matchCriteriaId": "B0A5C29F-3597-4846-8CEC-74C8C73740C5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_m-5y70:-:*:*:*:*:*:*:*", "matchCriteriaId": "091D17D3-213F-4EC7-81C3-CD96AB7BC89C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_m-5y71:-:*:*:*:*:*:*:*", "matchCriteriaId": "3F011F80-4FBA-490D-AF5F-F6DDC941CB61", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_m3-6y30:-:*:*:*:*:*:*:*", "matchCriteriaId": "831048A2-657F-4F2C-83AC-802DF45204A5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_m3-7y30:-:*:*:*:*:*:*:*", "matchCriteriaId": "18340F86-5545-4EEF-9F79-6560BB24F277", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_m3-8100y:-:*:*:*:*:*:*:*", "matchCriteriaId": "E5AFFC8B-3AC1-49B4-9A73-18A3EC928591", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_m5-6y54:-:*:*:*:*:*:*:*", "matchCriteriaId": "0504478A-E635-4A8B-A3F2-BE0E5908A7AA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_m5-6y57:-:*:*:*:*:*:*:*", "matchCriteriaId": "7AFFF65E-6576-41A5-82E0-F2EECDC64743", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_m7-6y75:-:*:*:*:*:*:*:*", "matchCriteriaId": "E29F8E70-5429-4756-A574-C7B60BE74A86", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_1405_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "C25607D2-8404-4BD1-9E42-7ECE8DCF3E9F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_2020m_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "3475F6C6-4E36-44E3-8E84-25ED06B4DB4F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_2030m_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "E859E810-7280-464A-AB18-10E6DC6B038D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_2117u_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "3255C643-CD77-446B-B98E-083D2F07CE12", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_2127u_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "493C0F33-F0FF-4828-9210-5976F0259D18", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_2129y_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "0B612898-5BC9-4880-AF5E-F498A9634EFA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_3205u:-:*:*:*:*:*:*:*", "matchCriteriaId": "AB8E1648-C77C-4C8A-BBDF-20468FF3BA00", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_3215u:-:*:*:*:*:*:*:*", "matchCriteriaId": "779DA292-A24F-42D6-8013-9DFC27BD8C2C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_3556u:-:*:*:*:*:*:*:*", "matchCriteriaId": "8EF5B50A-63E4-469B-9D59-A2C7BD6F2E72", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_3558u:-:*:*:*:*:*:*:*", "matchCriteriaId": "AC84C9FF-5E9B-41A1-8FF7-88D3F6687894", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_3560m:-:*:*:*:*:*:*:*", "matchCriteriaId": "489DA073-57C8-4904-90B7-F4E94CA34DDB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_3560y:-:*:*:*:*:*:*:*", "matchCriteriaId": "E8165EF6-316B-4EA3-95C3-F84B0028024F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_3561y:-:*:*:*:*:*:*:*", "matchCriteriaId": "00024F21-F6FC-4EEC-BFD4-3723CAD8F8EA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_3665u:-:*:*:*:*:*:*:*", "matchCriteriaId": "AD0D4FB5-8ABF-40CA-AABC-EF97D8993E15", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_3765u:-:*:*:*:*:*:*:*", "matchCriteriaId": "2D6920AE-35D7-4A6F-9169-4EC5E7F2902B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_3805u:-:*:*:*:*:*:*:*", "matchCriteriaId": "3E24661E-9974-466F-AA8E-C57048DD0978", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_3825u:-:*:*:*:*:*:*:*", "matchCriteriaId": "BFB91D35-0E4F-478A-AE1E-7C8645DA51E1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_4405u:-:*:*:*:*:*:*:*", "matchCriteriaId": "4156AF88-99DA-4331-93A9-07F2049D6B07", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_4405y:-:*:*:*:*:*:*:*", "matchCriteriaId": "A5F17DA0-EAF5-4BE0-B6CE-AE710C3F871E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_4415u:-:*:*:*:*:*:*:*", "matchCriteriaId": "079877E5-12C3-4A37-98F8-443DA366BAB3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_a1018_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "A5E6A6CF-12C1-452E-8450-18BD2D4FD95C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_b915c:-:*:*:*:*:*:*:*", "matchCriteriaId": "AF838448-0E87-4E73-AF51-55302B329E6B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_b925c:-:*:*:*:*:*:*:*", "matchCriteriaId": "66D7E11D-B0E7-42BC-8A6F-3B77D08EC79A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_g2010_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "B1290CDC-0F8D-4860-85F7-A4B1B40E1F44", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_g2020_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "B1110D3C-D880-4D4E-BB68-5A305AD3D5C7", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_g2020t_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "1623BCE2-AF99-45B1-B156-E81CE0D89D72", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_g2030_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "2C2D72A6-9227-4F44-8243-626AF77A0D90", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_g2030t_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "1BBA4425-A154-4F6A-86D1-A05D6FC26963", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_g2100t_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "311F9683-A58C-42F8-8044-711A7339EF4D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_g2120_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "FADD9066-D903-4B59-A9C1-7987A7663ED7", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_g2120t_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "1B6C28AE-BAB8-4FC4-910D-A935B26D00E7", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_g2130_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "341AB666-177D-47D2-B2BB-70C17400AECD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_g2140_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "ADD28BA3-D5EE-4CA4-8A2B-3DC44BCB400A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_g3220:-:*:*:*:*:*:*:*", "matchCriteriaId": "A920E6F1-4226-44D1-A86E-43247DBC97E5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_g3220t:-:*:*:*:*:*:*:*", "matchCriteriaId": "851A04D2-49C2-451C-9CAE-40E98C729EAE", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_g3240:-:*:*:*:*:*:*:*", "matchCriteriaId": "6AB0A5B7-DF08-40B2-B185-0956B2D7379E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_g3240t:-:*:*:*:*:*:*:*", "matchCriteriaId": "D9591F53-E005-4DB6-B162-0DF218919D62", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_g3250:-:*:*:*:*:*:*:*", "matchCriteriaId": "556DC4B9-4302-483F-BA37-2AF4801D5569", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_g3250t:-:*:*:*:*:*:*:*", "matchCriteriaId": "F71359BA-067C-421B-B647-1D69C8BF7ED0", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_g3258:-:*:*:*:*:*:*:*", "matchCriteriaId": "63002B5D-D73A-4EE5-B0CB-21EDF718E70F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_g3260:-:*:*:*:*:*:*:*", "matchCriteriaId": "7B9F42F2-D5D7-4220-A327-359D3BF1C09F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_g3260t:-:*:*:*:*:*:*:*", "matchCriteriaId": "C558DDC0-2998-476D-96B2-54235CEF4AE2", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_g3420:-:*:*:*:*:*:*:*", "matchCriteriaId": "D6090D78-51C8-4295-A4D2-700AD290F745", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_g3420t:-:*:*:*:*:*:*:*", "matchCriteriaId": "ACFB23AC-680E-4EE1-B9D9-E2B96E3794BD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_g3430:-:*:*:*:*:*:*:*", "matchCriteriaId": "11E3D70C-F003-4A13-A9EC-3810E9585FB1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_g3440:-:*:*:*:*:*:*:*", "matchCriteriaId": "14403B92-E903-4093-BFAB-F7C639D63862", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_g3440t:-:*:*:*:*:*:*:*", "matchCriteriaId": "D252FFC3-B059-44DD-A4F9-49B591B4FD18", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_g3450:-:*:*:*:*:*:*:*", "matchCriteriaId": "D7075CF7-B643-460B-ABF2-9AE24ED68FCB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_g3450t:-:*:*:*:*:*:*:*", "matchCriteriaId": "631CD42C-4F66-42A7-8F9D-114CF866EBDF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_g3460:-:*:*:*:*:*:*:*", "matchCriteriaId": "BB7720B3-5489-41B8-BD0A-A6E5A004568F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_g3460t:-:*:*:*:*:*:*:*", "matchCriteriaId": "988D6BBB-3056-4AC3-8960-5BA6C2F74367", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_g3470:-:*:*:*:*:*:*:*", "matchCriteriaId": "3CBCDE97-E95E-4B53-B4C0-19F026A47229", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_g4400:-:*:*:*:*:*:*:*", "matchCriteriaId": "A85AE2D5-1BA9-45F5-808A-166E27D7D6CE", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_g4400t:-:*:*:*:*:*:*:*", "matchCriteriaId": "F142F6EC-F106-4828-B152-13612273A7AB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_g4400te:-:*:*:*:*:*:*:*", "matchCriteriaId": "FF5D3457-C139-499F-8B41-57C8E7E66D40", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_g4420:-:*:*:*:*:*:*:*", "matchCriteriaId": "F6FEFAF2-7784-4407-B58A-A0B1DA84415F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_g4420t:-:*:*:*:*:*:*:*", "matchCriteriaId": "FD36DCA7-31D4-4E50-A38C-C437CB2BB439", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_g4500:-:*:*:*:*:*:*:*", "matchCriteriaId": "63BED4F5-65DE-457D-9BDF-89AA5369304B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_g4500t:-:*:*:*:*:*:*:*", "matchCriteriaId": "6C590C99-2770-4D63-9837-D1E1F251675D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_g4520:-:*:*:*:*:*:*:*", "matchCriteriaId": "A1FC6A24-AF3E-4B7F-9C12-E947C3E4BB1E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_g4520t:-:*:*:*:*:*:*:*", "matchCriteriaId": "C90F5FB0-7AAD-42F2-9780-E93A82E0C239", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_g4540:-:*:*:*:*:*:*:*", "matchCriteriaId": "B207606B-14AD-48D0-8219-A54D2617F067", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_g5400:-:*:*:*:*:*:*:*", "matchCriteriaId": "9E80ABC5-7BAB-41A1-8D61-481A59BD9C21", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_g5400t:-:*:*:*:*:*:*:*", "matchCriteriaId": "6A82B8D9-E751-48DA-948C-231ABEE90B54", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_g5420:-:*:*:*:*:*:*:*", "matchCriteriaId": "D7706D22-7E16-4068-A467-EE2D4BFAE968", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_g5420t:-:*:*:*:*:*:*:*", "matchCriteriaId": "B8D28A52-5EE7-42D2-B942-7A341AB00AB1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_g5500:-:*:*:*:*:*:*:*", "matchCriteriaId": "9ACD1AA7-8805-42A2-852E-C839417B10E1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_g5500t:-:*:*:*:*:*:*:*", "matchCriteriaId": "C55F7F50-61ED-487F-AB1D-70B75D972184", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_g5600:-:*:*:*:*:*:*:*", "matchCriteriaId": "9AF50627-7830-4984-8F12-7B73C51E5828", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_gold_6405u:-:*:*:*:*:*:*:*", "matchCriteriaId": "DE118AB2-A2C4-452C-B9AD-DDEF65B5EC67", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e-2124:-:*:*:*:*:*:*:*", "matchCriteriaId": "43126A13-5931-4989-BEFD-E1A096F98D94", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e-2124g:-:*:*:*:*:*:*:*", "matchCriteriaId": "342E0783-288A-4DB0-A657-29937903927C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e-2126g:-:*:*:*:*:*:*:*", "matchCriteriaId": "D4C40F91-138F-4396-9A6B-B969F6AC30B8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e-2134:-:*:*:*:*:*:*:*", "matchCriteriaId": "23CA9365-B1C4-4188-A9BF-19215AFF58A0", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e-2136:-:*:*:*:*:*:*:*", "matchCriteriaId": "C4797D2E-1270-447B-BFE4-CC96D9F10D5B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e-2144g:-:*:*:*:*:*:*:*", "matchCriteriaId": "2CA77EB3-6F11-43BC-8B59-84217AA73205", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e-2146g:-:*:*:*:*:*:*:*", "matchCriteriaId": "0866F1A3-8B9C-4B5A-B30D-71B3465EC80A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e-2174g:-:*:*:*:*:*:*:*", "matchCriteriaId": "331B8F10-3A20-46A8-B960-3546271CF701", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e-2176g:-:*:*:*:*:*:*:*", "matchCriteriaId": "AE638E59-DF75-43B1-A6DC-10A838B05B00", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e-2176m:-:*:*:*:*:*:*:*", "matchCriteriaId": "109FA97C-10EE-41F9-B52B-B37E31642251", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e-2184g:-:*:*:*:*:*:*:*", "matchCriteriaId": "F3FB62DD-090B-4434-9056-09427B66AAF0", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e-2186g:-:*:*:*:*:*:*:*", "matchCriteriaId": "A67B3834-E59E-47AF-A806-13A990E812B3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e-2186m:-:*:*:*:*:*:*:*", "matchCriteriaId": "FDA04EFF-A9A0-4900-A2F8-7C0D346ACF6D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e-2224:-:*:*:*:*:*:*:*", "matchCriteriaId": "79214F8B-1090-4DCD-B1F4-0FF78FC29C4A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e-2224g:-:*:*:*:*:*:*:*", "matchCriteriaId": "DD176FB0-7427-4F2E-A969-72062BB3EF98", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e-2226g:-:*:*:*:*:*:*:*", "matchCriteriaId": "B278081F-F900-4581-9D10-B5A2ACD2E2C1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e-2226ge:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBBDAA3E-960B-4E84-AD3F-2F8B3A4FF903", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e-2234:-:*:*:*:*:*:*:*", "matchCriteriaId": "45689B37-5085-41B3-BA9D-F05FD07DF1FC", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e-2236:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7186EA5-448F-473A-8FC8-058FC823ACC5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e-2244g:-:*:*:*:*:*:*:*", "matchCriteriaId": "C12F0C71-8F25-4C77-A3F3-1231AC53C0CA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e-2246g:-:*:*:*:*:*:*:*", "matchCriteriaId": "EB179A6F-FED8-45FB-89C7-3B17D6F5EB21", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e-2254me:-:*:*:*:*:*:*:*", "matchCriteriaId": "F58AEEB9-919B-4C6C-83B6-080846786A56", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e-2254ml:-:*:*:*:*:*:*:*", "matchCriteriaId": "C0BAE174-A158-4807-9D67-36F795028D76", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e-2274g:-:*:*:*:*:*:*:*", "matchCriteriaId": "FAD38AEA-979D-484B-82F0-0161BA39E9F5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e-2276g:-:*:*:*:*:*:*:*", "matchCriteriaId": "780AB9F4-0C87-4528-B53A-69FBC4D87ADB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e-2276m:-:*:*:*:*:*:*:*", "matchCriteriaId": "E5AA7BB1-6131-4206-8F99-BA8DCE60BFC7", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e-2276me:-:*:*:*:*:*:*:*", "matchCriteriaId": "C2CA54AE-915F-45B9-B775-C04589E49802", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e-2276ml:-:*:*:*:*:*:*:*", "matchCriteriaId": "DB86F018-1F56-4146-A78E-C7BF7B616023", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e-2278g:-:*:*:*:*:*:*:*", "matchCriteriaId": "63650DBF-4DBD-4655-AE93-5CBE53F8E0FB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e-2278ge:-:*:*:*:*:*:*:*", "matchCriteriaId": "00912C9C-D386-445E-B390-E96361ECDFA6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e-2278gel:-:*:*:*:*:*:*:*", "matchCriteriaId": "60B582A1-784C-4BE8-A0D5-706DE01D769E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e-2284g:-:*:*:*:*:*:*:*", "matchCriteriaId": "56F30E1A-8EF1-4C90-974C-791312241BCA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e-2286m:-:*:*:*:*:*:*:*", "matchCriteriaId": "556637E1-9502-41E7-B91D-082C92F233A1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e-2288g:-:*:*:*:*:*:*:*", "matchCriteriaId": "5EA930BC-EF68-4AD5-AA1B-0659358028D5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1105c:-:*:*:*:*:*:*:*", "matchCriteriaId": "E70E7B6B-C4B6-4864-939A-A0D8D648C661", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1105c_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "09BD9ADD-4FBE-4A12-A5F0-594B93824671", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1125c:-:*:*:*:*:*:*:*", "matchCriteriaId": "97560433-94FE-44AC-98B6-E371C878162A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1125c_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "E82681A7-C9A8-4CCD-A19A-B4D53343B34F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1220_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A2BF613-A53F-437A-A483-564BB4D8CC96", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1220_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "0493CF98-1A11-41D2-B719-6D94583232E8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1220_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "4E629CF7-A706-4DD3-B3EB-A1F9711B0372", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1220_v6:-:*:*:*:*:*:*:*", "matchCriteriaId": "EFD11A3F-A2D4-4B09-84D2-548F97268805", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1220l_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "72953F49-8FB3-4D07-A1F9-96D682348679", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1220l_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "EF9C696B-FA4E-419C-B036-76DCBBD9022C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1221_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "92ABFE16-E712-4805-8DAC-AA17C5214631", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1225_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "2E8C4032-40A3-420E-BE9D-ADA27443535B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1225_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "771E2F3E-3FC2-462E-93C4-12301660E6C4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1225_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "E1BCDBDF-A902-43A8-94A8-13541FB8CB32", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1225_v6:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E031BE7-87C6-4E4B-8988-020221ECAEE7", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1226_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "58BEE344-48BE-4D5E-B5BE-9391255C8550", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1230_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "ADF68144-22B0-4B0E-A73D-6FE38C213C71", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1230_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "67A9DE3D-FA10-4C8A-952F-979DE9B19AA5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1230_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "1CC1EDA9-6CB8-4643-AC65-76B892319879", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1230_v6:-:*:*:*:*:*:*:*", "matchCriteriaId": "49C57129-0A27-4142-BF6E-68A558773573", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1230l_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "73B301CD-6105-448E-B013-52F894D8106E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1231_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "DE531899-3AB8-4540-9099-BE4A0FB75EAF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1235_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "B86BD818-70F8-409B-AB96-53CCF490B7FC", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1235l_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "15DB4F8D-E42C-4119-83BD-44D6AB9319B0", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1240_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "E7FB452F-4FFE-449B-9846-198A61B1F521", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1240_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "231327DF-C1E2-469F-9C5C-25B14541F3AF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1240_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "51E0227B-8F2B-48B3-97BC-73BA1BACEED8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1240_v6:-:*:*:*:*:*:*:*", "matchCriteriaId": "D5EFEF14-4ECB-45C9-8911-01FD7B115D7B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1240l_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "F6A3E845-3883-4034-B90B-3ABB61BBD1D0", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1240l_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "C8BD1F0B-7B75-4A5A-A708-BDE56D237354", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1241_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "5BE15F08-0B49-486A-808F-5B647142F093", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1245_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "7C661F8C-0F1B-4A0B-9B0F-A845883BA3D3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1245_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "15236325-68D7-4D7F-B500-A79AD02812CE", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1245_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "DE01A935-4048-4578-8FBA-1D12A95654D1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1245_v6:-:*:*:*:*:*:*:*", "matchCriteriaId": "333364EE-BF57-4217-9517-2C1B95B826CC", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1246_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "CB7C3F31-16F9-4177-B7F2-B865010A6EDB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1258l_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "AB35FC19-9CDC-46EB-87D5-F2418F16B548", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1260l_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "2D45FCBB-CC03-40A8-ADCE-7AE0A7AA05A4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1265l:-:*:*:*:*:*:*:*", "matchCriteriaId": "DC84425F-C08A-4188-82B9-E56F22DFA17D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1265l_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "F2F157D9-5288-42FA-943C-53F0D227590A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1265l_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "2F3FD78E-7790-4CFD-88F2-46889CBE1BF4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1268l_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "E0BB6C08-9816-4F79-A91D-84B7E365D586", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1268l_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "28D7D164-E631-4D49-B87A-0B7885148790", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1270:-:*:*:*:*:*:*:*", "matchCriteriaId": "23544F02-3847-4089-97F1-8C29B5596B9A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1270_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "251A501D-9744-49A7-88E8-035C239B06C8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1270_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "FA74EB5E-3D7D-4E5A-8D7D-AF902F8BCF8C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1270_v6:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F2476F2-6A8B-442F-B054-738F36613CE2", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1271_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "95F1E851-0C83-466B-A89D-03486BD90CC0", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1275_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "000FB0C9-0642-48D1-94CC-A035145963AA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1275_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "98FA6E45-B945-4923-84FD-B34F2CAA15C1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1275_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "F2A10975-3375-4FB3-A008-56EB2ACD2737", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1275_v6:-:*:*:*:*:*:*:*", "matchCriteriaId": "7BC9CEA2-C621-4DCF-B64C-5495D3208DB4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1275l_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "565C5D54-D6C2-4387-AA45-F18C4DC344FE", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1276_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "5516A1EB-1A09-4248-A1E0-6438751DA0AF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1278l_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "D4E19F29-3E2C-4F0C-A887-07E68D1EFB3F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1280_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "CC228684-3F7B-477F-A010-66CD28B64ACD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1280_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "99848B67-F10E-4DD0-B394-A30463EF0E0D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1280_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "E6A99895-6A48-4A44-B0F7-7BED55C677FC", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1280_v6:-:*:*:*:*:*:*:*", "matchCriteriaId": "A32F3CD6-6BA6-40E7-9580-3C1A455B3C99", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1281_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "8FC720A2-BD40-4FF7-ADE3-52430B263AD4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1285_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "D4FBE620-5CA2-45B6-9CD9-15928146F23D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1285_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "A656CC1F-943D-4B35-931C-CFBF8F3110B5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1285_v6:-:*:*:*:*:*:*:*", "matchCriteriaId": "C2559D24-F8AD-4202-A00D-F48D51A0940A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1285l_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "3391CFE3-DDED-406A-8126-416C29E20A34", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1286_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "88DDE104-1102-4847-AF28-55A380E8C4C6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1286l_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "53E830C3-BCD4-45F1-8D00-0DE7959F4369", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1290_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "37C7A319-3FB2-460D-AF17-D70903EC53DD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1501l_v6:-:*:*:*:*:*:*:*", "matchCriteriaId": "37AF4F98-0672-4101-9825-57B0F64EDBEE", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1501m_v6:-:*:*:*:*:*:*:*", "matchCriteriaId": "2231374F-222A-4BA3-B14D-F69860668F7A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1505l_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "057E3667-7BA8-4142-8A1E-B957333D776A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1505l_v6:-:*:*:*:*:*:*:*", "matchCriteriaId": "31BF874F-B640-4A18-AC92-F0E16AB7E1C4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1505m_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "84A77114-92C8-48C4-9D12-3ACC3030D5A3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1505m_v6:-:*:*:*:*:*:*:*", "matchCriteriaId": "542BC61B-1EA3-4C42-BB99-C9C67EE82F7D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1515m_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "13B5BF22-5E95-46A4-AF05-450CFD1312C1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1535m_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "9490F926-AD57-40F3-A523-61D67486DCB0", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1535m_v6:-:*:*:*:*:*:*:*", "matchCriteriaId": "5FA12E60-4B0A-4723-8A02-3115494CD1DE", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1545m_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "29CC9B92-CF59-4121-9638-F4D4521952D3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1558l_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "2CC6592D-743B-4656-B1C0-247F36ABE5CA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1565l_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "BCC32129-C5DC-4D26-96D5-219F5291D6F2", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1575m_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "81F4426C-970C-49DB-950B-3F5ED17E682A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1578l_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "4ADED698-2702-479C-A24E-E9E6F35E9AFE", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1585_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "D86C0CFB-72A3-4446-9601-2C956C9A71F4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1585l_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "D3C578D9-8973-4F36-8BA4-9F4F3A8E0AE6", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*", "matchCriteriaId": "B620311B-34A3-48A6-82DF-6F078D7A4493", "vulnerable": true }, { "criteria": "cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*", "matchCriteriaId": "B009C22E-30A4-4288-BCF6-C3E81DEAF45A", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*", "matchCriteriaId": "8D305F7A-D159-4716-AB26-5E38BB5CD991", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*", "matchCriteriaId": "815D70A8-47D3-459C-A32C-9FEACA0659D1", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "matchCriteriaId": "F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "matchCriteriaId": "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*", "matchCriteriaId": "A31C8344-3E02-4EB8-8BD8-4C84B7959624", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*", "matchCriteriaId": "902B8056-9E37-443B-8905-8AA93E2447FB", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*", "matchCriteriaId": "80F0FA5D-8D3B-4C0E-81E2-87998286AF33", "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*", "matchCriteriaId": "36D96259-24BD-44E2-96D9-78CE1D41F956", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_field_pg_m4_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "496228A2-6907-4970-BEDC-E9B44CBF7CCD", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_field_pg_m4:-:*:*:*:*:*:*:*", "matchCriteriaId": "7ADAD919-32C1-49D2-A419-C9A803DB6250", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_field_pg_m5_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F5320759-AAAB-4FEA-99AB-51A7F7EE9F58", "versionEndExcluding": "22.01.08", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_field_pg_m5:-:*:*:*:*:*:*:*", "matchCriteriaId": "506DEE00-30D2-4E29-9645-757EB8778C0F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_field_pg_m6_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "36E7D51E-4657-4594-BBD3-F98E3E50F4E1", "versionEndExcluding": "26.01.07", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_field_pg_m6:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F3C3E60-7C36-4F5D-B454-97C9D0FD9459", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc347e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C9830BAC-C836-4D00-8E21-28F180A59163", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc347e:-:*:*:*:*:*:*:*", "matchCriteriaId": "49D276DE-950F-4A61-BA13-DD5D07A17571", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc427d_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F6A2E4F1-7402-4EF2-8559-B9318A01C008", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc427d:-:*:*:*:*:*:*:*", "matchCriteriaId": "46CC8AFE-ED6C-4A50-AC80-D2309E03FAE4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc427e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "77B3A9A8-2AE8-4938-9114-BE75DDBB6A1D", "versionEndExcluding": "21.01.14", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc427e:-:*:*:*:*:*:*:*", "matchCriteriaId": "A40D0CDB-7BE6-491F-B730-3B4E10CA159A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc477d_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A946EA63-4FA9-44B8-97F4-E53A5DAADE46", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc477d:-:*:*:*:*:*:*:*", "matchCriteriaId": "754A6744-5194-4A99-BD3B-944A8707C80F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc477e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AF94A909-1192-41AD-9717-EC88B30B8DCF", "versionEndExcluding": "21.01.14", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc477e:-:*:*:*:*:*:*:*", "matchCriteriaId": "FDF9D4C3-1892-48FA-95B4-835B636A4005", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc477e_pro_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C7011395-6ACF-4FC5-AF8F-971427128D27", "versionEndExcluding": "21.01.14", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc477e_pro:-:*:*:*:*:*:*:*", "matchCriteriaId": "3FC5CE20-7D08-4496-A857-C3A4BD0AB1AC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc527g_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "65A6E7CD-4AEA-465D-89B3-6EF66E4F17B6", "versionEndExcluding": "1.4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc527g:-:*:*:*:*:*:*:*", "matchCriteriaId": "55156889-E9DA-4F04-B894-339DC39CA942", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc547e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F6A15ED1-124A-4642-988F-890FF4162346", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc547e:-:*:*:*:*:*:*:*", "matchCriteriaId": "D9DD4A97-1648-4C7F-A5A0-6899BD13A617", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc547g_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "03F52E28-42B0-444F-892D-749B9A7EC498", "versionEndExcluding": "r1.28.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc547g:-:*:*:*:*:*:*:*", "matchCriteriaId": "9EB339B5-602F-4AB5-9998-465FDC6ABD6C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc627d_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A30CB799-FF9A-4E4E-A3C6-EB12CE2EB5B0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc627d:-:*:*:*:*:*:*:*", "matchCriteriaId": "509AD120-3465-4C00-AAB3-B6F6ED708B51", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc627e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1291471D-D36E-4ACF-A912-76697396CDE1", "versionEndExcluding": "25.02.06", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc627e:-:*:*:*:*:*:*:*", "matchCriteriaId": "9D9AF082-8345-4BE1-B1FC-6E0316BB833B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc647d_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "43337EC1-0BF8-40B3-88BC-38F06EF48DC6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc647d:-:*:*:*:*:*:*:*", "matchCriteriaId": "D0EF28FB-BAB3-4710-9D25-25F67ACADC60", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc647e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7CAAF2D6-7799-4BB7-A151-561E8AB260DA", "versionEndExcluding": "25.02.06", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc647e:-:*:*:*:*:*:*:*", "matchCriteriaId": "E430C4C5-D887-47C6-B50F-66EEE9519151", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc677d_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7FCA9FA2-AA26-46A3-9E2D-3C87BC2BE0F3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc677d:-:*:*:*:*:*:*:*", "matchCriteriaId": "057D9947-CE4A-4B4C-B721-4B29FB71350C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc677e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F4DF4B0B-F376-472B-83E0-1B7E5F87EF6A", "versionEndExcluding": "25.02.06", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc677e:-:*:*:*:*:*:*:*", "matchCriteriaId": "5F9FA42D-B2F0-456F-89B7-6A5789787FBA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc827d_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3A03BCCF-9EF5-4353-8886-15DFE6A35765", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc827d:-:*:*:*:*:*:*:*", "matchCriteriaId": "E6D87239-40C1-4038-B734-D77AC4DDD571", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc847d_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "681C8A24-C3AC-4CF4-8283-DAC337909CC9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc847d:-:*:*:*:*:*:*:*", "matchCriteriaId": "D8F37D88-E086-4060-8420-BD0F8D8FF580", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc847e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8E63A5F2-8767-4E25-8785-F8F197B77F7A", "versionEndExcluding": "25.02.06", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc847e:-:*:*:*:*:*:*:*", "matchCriteriaId": "1157418C-14C4-43C4-B63E-7E98D868A94F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc3000_smart_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BD3F04ED-C6D0-4387-BB3A-31C86B1F918F", "versionEndExcluding": "1.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc3000_smart:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "DD37AB3C-6E1A-4E8D-A617-4D97B4501A28", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_itp1000_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4ABF49D4-34CE-4DEA-AA2E-A40A53472D1F", "versionEndExcluding": "23.01.08", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_itp1000:-:*:*:*:*:*:*:*", "matchCriteriaId": "187C6D51-5B86-484D-AE0F-26D1C9465580", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simotion_p320-4e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F66E1293-5598-4A7D-8523-951F62080B22", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simotion_p320-4e:-:*:*:*:*:*:*:*", "matchCriteriaId": "9EE09494-625A-4FF7-8B3E-6510FF9AFC9C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simotion_p320-4s_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D77F8F19-06C8-4B8A-8436-26508B2277DA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simotion_p320-4s:-:*:*:*:*:*:*:*", "matchCriteriaId": "A49883F4-8360-4895-8E9E-B274A35BDE57", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mcafee:threat_intelligence_exchange_server:*:*:*:*:*:*:*:*", "matchCriteriaId": "E26D80A2-E490-44B6-A8D2-1AEF487E72B2", "versionEndIncluding": "2.3.1", "versionStartIncluding": "2.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:mcafee:threat_intelligence_exchange_server:3.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "A0F26126-55C2-4E2E-A586-D93FF38ABF6F", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Incomplete cleanup from specific special register read operations in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access." }, { "lang": "es", "value": "Una limpieza incompleta de operaciones de lectura de un registro especial espec\u00edfico en algunos Intel\u00ae Processors puede permitir a un usuario autenticado habilitar potencialmente una divulgaci\u00f3n de informaci\u00f3n por medio de un acceso local" } ], "id": "CVE-2020-0543", "lastModified": "2024-11-21T04:53:42.440", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-06-15T14:15:11.207", "references": [ { "source": "secure@intel.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00025.html" }, { "source": "secure@intel.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00024.html" }, { "source": "secure@intel.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00031.html" }, { "source": "secure@intel.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2020/07/14/5" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-534763.pdf" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10318" }, { "source": "secure@intel.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DT2VKDMQ3I37NBNJ256A2EXR7OJHXXKZ/" }, { "source": "secure@intel.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GRFC7UAPKAFFH5WX3AMDUBVHLKYQA2NZ/" }, { "source": "secure@intel.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NQZMOSHLTBBIECENNXA6M7DN5FEED4KI/" }, { "source": "secure@intel.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T5OUM24ZC43G4IDT3JUCIHJTSDXJSK6Y/" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/4385-1/" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/4387-1/" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/4388-1/" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/4389-1/" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/4390-1/" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/4391-1/" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/4392-1/" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/4393-1/" }, { "source": "secure@intel.com", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00320.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00025.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00024.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00031.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2020/07/14/5" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-534763.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10318" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DT2VKDMQ3I37NBNJ256A2EXR7OJHXXKZ/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GRFC7UAPKAFFH5WX3AMDUBVHLKYQA2NZ/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NQZMOSHLTBBIECENNXA6M7DN5FEED4KI/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T5OUM24ZC43G4IDT3JUCIHJTSDXJSK6Y/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/4385-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/4387-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/4388-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/4389-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/4390-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/4391-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/4392-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/4393-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00320.html" } ], "sourceIdentifier": "secure@intel.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-459" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
ghsa-8gvr-7c6p-jfwg
Vulnerability from github
Published
2022-05-24 17:20
Modified
2022-05-24 17:20
Severity ?
VLAI Severity ?
Details
Incomplete cleanup from specific special register read operations in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
{ "affected": [], "aliases": [ "CVE-2020-0543" ], "database_specific": { "cwe_ids": [ "CWE-200", "CWE-459" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2020-06-15T14:15:00Z", "severity": "LOW" }, "details": "Incomplete cleanup from specific special register read operations in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.", "id": "GHSA-8gvr-7c6p-jfwg", "modified": "2022-05-24T17:20:28Z", "published": "2022-05-24T17:20:28Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-0543" }, { "type": "WEB", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-534763.pdf" }, { "type": "WEB", "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10318" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DT2VKDMQ3I37NBNJ256A2EXR7OJHXXKZ" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GRFC7UAPKAFFH5WX3AMDUBVHLKYQA2NZ" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NQZMOSHLTBBIECENNXA6M7DN5FEED4KI" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T5OUM24ZC43G4IDT3JUCIHJTSDXJSK6Y" }, { "type": "WEB", "url": "https://usn.ubuntu.com/4385-1" }, { "type": "WEB", "url": "https://usn.ubuntu.com/4387-1" }, { "type": "WEB", "url": "https://usn.ubuntu.com/4388-1" }, { "type": "WEB", "url": "https://usn.ubuntu.com/4389-1" }, { "type": "WEB", "url": "https://usn.ubuntu.com/4390-1" }, { "type": "WEB", "url": "https://usn.ubuntu.com/4391-1" }, { "type": "WEB", "url": "https://usn.ubuntu.com/4392-1" }, { "type": "WEB", "url": "https://usn.ubuntu.com/4393-1" }, { "type": "WEB", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00320.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00025.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00024.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00031.html" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2020/07/14/5" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "type": "CVSS_V3" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…